Nmap & Rustscan - A1vinSmith/OSCP-PWK GitHub Wiki
docker run -it --rm --name rustscan rustscan/rustscan:1.10.0 <rustscan arguments here> <ip address to scan>
https://github.com/RustScan/RustScan/wiki/Installation-Guide
nmap -oA as --stylesheet https://raw.githubusercontent.com/honze-net/nmap-bootstrap-xsl/master/nmap-bootstrap.xsl host
- https://stationx-public-download.s3.us-west-2.amazonaws.com/nmap_cheet_sheet_v7.pdf
- https://s3-us-west-2.amazonaws.com/stationx-public-download/nmap_cheet_sheet_0.6.pdf
- https://null-byte.wonderhowto.com/how-to/easily-detect-cves-with-nmap-scripts-0181925/
- https://securitytrails.com/blog/nmap-vulnerability-scan
nmap -p- -v --min-rate=1000 -T4 <IP>
nmap -p- -v --min-parallelism 100 --min-rate=1000 -T4 <IP>
ports=$(nmap -p- --min-rate=1000 -T1 <MACHINE IP> | grep ^[0-9] | cut -d '/' -f 1 | tr '\n' ',' | sed s/,$//)
nmap -p$ports -sC -sV -oA hooray <MACHINE IP>
nmap -p- -T4 --min-rate=1000 -sC -sV postman.htb
default -sC
can be blind sometimes. try --script vuln
or other advanced params.