Secbot nmap-usage
install
source · Clone the upstream repo
git clone https://github.com/iammm0/secbot
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/iammm0/secbot "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/base/nmap-usage" ~/.claude/skills/iammm0-secbot-nmap-usage && rm -rf "$T"
manifest:
skills/base/nmap-usage/SKILL.mdsource content
Nmap Professional Scanning Techniques
Overview
This skill provides advanced nmap scanning techniques optimized for penetration testing engagements.
Timing Optimization
Aggressive Timing (-T4
)
-T4Use for fast, reliable scanning on known networks:
nmap -T4 -sS <target>
Stealth Timing (-T2
)
-T2Use when avoiding detection is critical:
nmap -T2 -sS -f --data-length 50 <target>
Parallel Scanning
nmap --min-parallelism 100 -p- <target>
Port Selection Strategies
Quick Discovery
nmap --top-ports 100 <target>
Full Port Scan
nmap -p- <target>
Specific Port Ranges
nmap -p 80,443,8080,8443 <target>
Service Detection
Version Detection
nmap -sV --version-intensity 9 <target>
Lightweight Detection
nmap -sV --version-light <target>
OS Detection
Aggressive OS Detection
nmap -O <target>
With Version + Script
nmap -A <target>
Output Formats
XML (for parsing)
nmap -oX report.xml <target>
Grepable
nmap -oG report.gnmap <target>
All Formats
nmap -oA report <target>
Useful NSE Scripts
Vulnerability Scanning
nmap --script vuln <target>