Nmap Recon
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Real data. Real impact.
Emerging
Developers
Per week
Open source
Skills give you superpowers. Install in 30 seconds.
Network reconnaissance and port scanning using Nmap. Use when asked to scan a target, find open ports, detect services, check for vulnerabilities, or perform network reconnaissance.
nmap must be installed (standard on Kali, available via package managers)nmap -sC -sV -oA scan_$(date +%Y%m%d_%H%M%S) TARGET
nmap -p- -sC -sV -oA fullscan_$(date +%Y%m%d_%H%M%S) TARGET
nmap -F -T4 TARGET
sudo nmap -sS -sV -O -oA stealth_$(date +%Y%m%d_%H%M%S) TARGET
sudo nmap -sU --top-ports 100 -oA udp_$(date +%Y%m%d_%H%M%S) TARGET
nmap --script vuln -oA vulnscan_$(date +%Y%m%d_%H%M%S) TARGET
nmap -A -T4 -oA aggressive_$(date +%Y%m%d_%H%M%S) TARGET
Nmap outputs in multiple formats with
-oA:
.nmap - Human readable.xml - Machine parseable.gnmap - Greppable formatgrep "open" scan.gnmap | awk -F'[/]' '{print $1}' | tr ',' '\n' | sort -u
grep -E "^[0-9]+/" scan.nmap | awk '{print $1, $3, $4}'
xmllint --xpath "//port[@state='open']" scan.xml 2>/dev/null
| Profile | Command | Use Case |
|---|---|---|
| Quick | | Fast initial recon |
| Standard | | Service detection + default scripts |
| Full | | All 65535 ports |
| Stealth | | Evasive scanning |
| Vuln | | Vulnerability detection |
| Aggressive | | Full enumeration |
# List available scripts ls /usr/share/nmap/scripts/Run specific category
nmap --script=default,safe TARGET nmap --script=vuln TARGET nmap --script=exploit TARGET nmap --script=auth TARGET
Run specific script
nmap --script=http-title TARGET nmap --script=smb-vuln* TARGET
# Single host nmap 192.168.1.1CIDR range
nmap 192.168.1.0/24
Range
nmap 192.168.1.1-254
From file
nmap -iL targets.txt
Exclude hosts
nmap 192.168.1.0/24 --exclude 192.168.1.1
-T0 Paranoid (IDS evasion)-T1 Sneaky (IDS evasion)-T2 Polite (slow)-T3 Normal (default)-T4 Aggressive (fast)-T5 Insane (very fast, may miss ports)⚠️ Only scan targets you own or have explicit written authorization to test.
Never scan:
# 1. Quick scan to find live hosts nmap -sn 192.168.1.0/24 -oA live_hosts2. Fast port scan on discovered hosts
nmap -F -T4 -iL live_hosts.gnmap -oA quick_ports
3. Deep scan interesting hosts
nmap -p- -sC -sV -oA deep_scan TARGET
4. Vulnerability scan
nmap --script vuln -oA vuln_scan TARGET
No automatic installation available. Please visit the source repository for installation instructions.
View Installation Instructions1,500+ AI skills, agents & workflows. Install in 30 seconds. Part of the Torly.ai family.
© 2026 Torly.ai. All rights reserved.