Secbot nmap-usage

install
source · Clone the upstream repo
git clone https://github.com/iammm0/secbot
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/iammm0/secbot "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/base/nmap-usage" ~/.claude/skills/iammm0-secbot-nmap-usage && rm -rf "$T"
manifest: skills/base/nmap-usage/SKILL.md
source content

Nmap Professional Scanning Techniques

Overview

This skill provides advanced nmap scanning techniques optimized for penetration testing engagements.

Timing Optimization

Aggressive Timing (
-T4
)

Use for fast, reliable scanning on known networks:

nmap -T4 -sS <target>

Stealth Timing (
-T2
)

Use when avoiding detection is critical:

nmap -T2 -sS -f --data-length 50 <target>

Parallel Scanning

nmap --min-parallelism 100 -p- <target>

Port Selection Strategies

Quick Discovery

nmap --top-ports 100 <target>

Full Port Scan

nmap -p- <target>

Specific Port Ranges

nmap -p 80,443,8080,8443 <target>

Service Detection

Version Detection

nmap -sV --version-intensity 9 <target>

Lightweight Detection

nmap -sV --version-light <target>

OS Detection

Aggressive OS Detection

nmap -O <target>

With Version + Script

nmap -A <target>

Output Formats

XML (for parsing)

nmap -oX report.xml <target>

Grepable

nmap -oG report.gnmap <target>

All Formats

nmap -oA report <target>

Useful NSE Scripts

Vulnerability Scanning

nmap --script vuln <target>