grep -i "description" /usr/share/nmap/scripts/ftp-*.nse
--packet-trace --disable-arp-ping
--reason
--initial-rtt-timeout [XX]ms --max-rtt-timeout [XX]ms
--max-retries []
--min-rate 300
-T
rustscan -a [t1] --utimit 5000 -b 2000
nmap -sn -PA [IP/24] (Host discovery if some hosts may seem down but sure they up)
nmap -p- --open -sS -min-rate 5000 -n -vvv -Pn <ip>
full_nmap: nmap -p- -sS -T4 -Pn -n -oA full_scan [] ā grep ^[0-9] full_scan.nmap | cut -d '/' -f1 | paste -sd, - ā nmap -sC -sV -p <ports> -T4 -oA detailed_scan []
nmap -sC -sV -p <ports> -oA detailed_scan (When Iām really curious about a specific port)
sudo nmap -sU -p53,67,123,137,138,139,161 -T4 (UDP)