Nmap Command Generator
Tools on this domain use client-side only JavaScript. STS never sees, stores, or processes any of the information ourselves.Note: This tool generates Nmap commands for educational and authorized security testing purposes only. Always ensure you have proper authorization before scanning networks or systems.
Scan Options:
TCP SYN Scan (-sS)
This is the default scan type in Nmap. It sends TCP SYN packets to determine open ports on target systems.
TCP Connect Scan (-sT)
This scan type establishes a full TCP connection with the target port. It is more reliable but less stealthy than the SYN scan.
UDP Scan (-sU)
This option enables Nmap to scan for open UDP ports, which are commonly used by services like DNS and DHCP.
OS Detection (-O)
Nmap attempts to determine the operating system running on the target host by analyzing various network characteristics and responses.
Version Detection (-sV)
Probe open ports to determine service/version info.
Aggressive Scan (-A)
Enables OS detection, version detection, script scanning, and traceroute, providing a comprehensive scan of the target system.
Verbose Output (-v)
Use this option to get more detailed information during the scan.
Script Scan (-sC)
Performs a script scan using the default set of scripts.
Fast Scan (-F)
Fast mode - Scan fewer ports than the default scan.
0 comments