Network Scan
Automatic Network Scan
Mynmap
NmapAutomator
Manual Network Scan
Nmap
Netcat
Masscan
Last updated
Last updated
-t, --target <TARGET_IP> #The IP address of the target to scan.
-d, --domain <DOMAIN_NAME> #The domain name of the target to scan.-nc, --no-colors #Disable console coloring../port-scan.sh -t 192.168.1.1 -d mydomain.com
./port-scan.sh -t 10.0.0.2 -d mydomain.com --no-colorsnmap -sVC -sS -sU -T4 -p- <IP_RANGE> -oG output.txtgrep Up ping-sweep.txt | cut -d " " -f 2cd /usr/share/nmap/scripts/
head -n 5 script.db
cat script.db | grep '"vuln"\|"exploit"'sudo nmap --script vuln 10.11.1.10nc -nv -u -z -w 1 10.11.1.0/24 1-65535nc -nvv -w 1 -z 10.11.1.0/24 1-65535sudo masscan -p80 10.11.1.0/24 --rate=1000 -e tap0 --router-ip 10.11.0.1