Wr3nch0x1
  • $id
  • Field Manual
    • Pentest Cheatsheet
    • Useful Google Dorks
  • 0x0 Recon
    • Monitoring the Environment: Nmap Diffing
    • Scheduling Nmap - LazyNmap
  • 0x1 Code Injection
    • T1038: DLL Hijacking / Injection
    • Backdooring PE Files
  • 0x2 Thick Client Security Testing
    • CWE-316: Sensitive Information Stored in Memory
  • Reviews
    • PentesterAcademy Windows Red Team Labs
  • Cloud Security
    • Exploiting Misconfigured IAM assume-role in AWS
Powered by GitBook
On this page
  • TL;DR
  • Usage
  • Instructions
  • References
  1. 0x0 Recon

Scheduling Nmap - LazyNmap

https://github.com/wr3nch0x1/LazyNmap

PreviousMonitoring the Environment: Nmap DiffingNextT1038: DLL Hijacking / Injection

Last updated 5 years ago

TL;DR

LazyNmap [Windows Version] aims to be a Nmap Scheduler because by default Nmap does not provide functionality to schedule the scans.

It uses the Windows Task Scheduler and Powershell Functions.

Tested in Windows 10 Build 18363 with Powershell v5

  • Author Handle: @wr3nch0x1

  • Author Name: Akshay Jain

  • License: BSD 3-Clause

  • Required Dependencies: Nmap

  • Optional Dependencies: None

  • Version: 1.0

  • Platform: Microsoft Windows

Usage

Instructions

  • Nmap should be installed and accessible by the current user.

  • I suggest to run the script as Administrator.

  • Please create one output directory before scheduling the scan and save the results in the same for better results.

  • Feel free to contact me through twitter in case you have any suggestions and contributions.

References

New-ScheduledTaskAction (ScheduledTasks)docsmsft
Logo
New-ScheduledTaskSettingsSet (ScheduledTasks)docsmsft
Logo
New-ScheduledTaskTrigger (ScheduledTasks)docsmsft
Logo
Register-ScheduledTask (ScheduledTasks)docsmsft
Logo
What is PowerShell? - PowerShelldocsmsft
Logo
Browse code samplesdocsmsft
Logo
Usage