Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Network reconnaissance and port scanning using Nmap. Use when asked to scan a target, find open ports, detect services, check for vulnerabilities, or perform network reconnaissance.
"scan [target]", "port scan", "nmap", "what ports are open", "recon [target]", "service detection", "vulnerability scan"
nmap must be installed (standard on Kali, available via package managers) Root/sudo for SYN scans and OS detection
nmap -sC -sV -oA scan_$(date +%Y%m%d_%H%M%S) TARGET
nmap -p- -sC -sV -oA fullscan_$(date +%Y%m%d_%H%M%S) TARGET
nmap -F -T4 TARGET
sudo nmap -sS -sV -O -oA stealth_$(date +%Y%m%d_%H%M%S) TARGET
sudo nmap -sU --top-ports 100 -oA udp_$(date +%Y%m%d_%H%M%S) TARGET
nmap --script vuln -oA vulnscan_$(date +%Y%m%d_%H%M%S) TARGET
nmap -A -T4 -oA aggressive_$(date +%Y%m%d_%H%M%S) TARGET
Nmap outputs in multiple formats with -oA: .nmap - Human readable .xml - Machine parseable .gnmap - Greppable format
grep "open" scan.gnmap | awk -F'[/]' '{print $1}' | tr ',' '\n' | sort -u
grep -E "^[0-9]+/" scan.nmap | awk '{print $1, $3, $4}'
xmllint --xpath "//port[@state='open']" scan.xml 2>/dev/null
ProfileCommandUse CaseQuicknmap -F -T4Fast initial reconStandardnmap -sC -sVService detection + default scriptsFullnmap -p- -sC -sVAll 65535 portsStealthsudo nmap -sS -T2Evasive scanningVulnnmap --script vulnVulnerability detectionAggressivenmap -A -T4Full enumeration
# List available scripts ls /usr/share/nmap/scripts/ # Run specific category nmap --script=default,safe TARGET nmap --script=vuln TARGET nmap --script=exploit TARGET nmap --script=auth TARGET # Run specific script nmap --script=http-title TARGET nmap --script=smb-vuln* TARGET
# Single host nmap 192.168.1.1 # CIDR range nmap 192.168.1.0/24 # Range nmap 192.168.1.1-254 # From file nmap -iL targets.txt # Exclude hosts nmap 192.168.1.0/24 --exclude 192.168.1.1
-T0 Paranoid (IDS evasion) -T1 Sneaky (IDS evasion) -T2 Polite (slow) -T3 Normal (default) -T4 Aggressive (fast) -T5 Insane (very fast, may miss ports)
โ ๏ธ Only scan targets you own or have explicit written authorization to test. Never scan: Public infrastructure without permission Networks you don't control Production systems without approval
# 1. Quick scan to find live hosts nmap -sn 192.168.1.0/24 -oA live_hosts # 2. Fast port scan on discovered hosts nmap -F -T4 -iL live_hosts.gnmap -oA quick_ports # 3. Deep scan interesting hosts nmap -p- -sC -sV -oA deep_scan TARGET # 4. Vulnerability scan nmap --script vuln -oA vuln_scan TARGET
Code helpers, APIs, CLIs, browser automation, testing, and developer operations.
Largest current source with strong distribution and engagement signals.