External/Internal
Nmap
Network Discovery with scripts
sudo nmap -sS -Pn -sV -v --top-ports 8000 --min-parallelism 20 --min-hostgroup 30 --max-rtt-timeout 300ms --max-retries 2 -oA SYN_8K_ports --script default,discovery,broadcast --open-only -iL ip_hostname.txtICMP
ping -c 1 199.66.11.4 # 1 echo request to a host
fping -g 199.66.11.0/24 # Send echo requests to ranges
nmap -PE -PM -PP -sn -n 199.66.11.0/24 #Send echo, timestamp requests and subnet mask requestssudo nmap -PE -PP -PM --min-parallelism 20 --min-hostgroup 30 --max-rtt-timeout 30ms --max-retries 2 -A -oA HostDiscoveryMultpleICMP NetworkUDP Port Discovery
Nmap Docker
Using a list of domains/IPs
Masscan
Scan Networks
HTTP Port Discovery
Scan Specific Hosts
Run the Scan
Zmap
sn1per
DISCOVER
AIRSTRIKE

HackerTarget Tools
Last updated