## == standart scan - disables host discovery
> nmap -A -Pn 172.24.0.8 > foo

## == scan active hosts
> nmap -sn 192.168.1.0/24

## == scan only port 80
> nmap -p 80 192.168.1.1

## == scan port 80 and 443
> nmap -p 80,443 192.168.1.1

## == scan port range
> nmap -p 80-3000 192.168.1.1

## == scan popular ports
> nmap --top-ports 5 192.168.1.1
> nmap --top-ports 10 192.168.1.1

## == show supported protocols
> nmap -sO 192.168.0.1

## scan all port
> nmap -p "*" 192.168.1.1

## == scan all tcp ports
> nmap -sT 192.168.1.1

## == scan particular tcp ports
> nmap -p T:80 192.168.1.1

## == scan all udp ports
> nmap -sU 192.168.1.1

## == scan particular udp ports
> nmap -p U:53 192.168.1.1

## == scan different ports
> nmap -p U:53,79,113,T:21-25,80,443,8080 192.168.1.1

## == fast scan
> nmap -F 192.168.1.1

## show reason why nmap thin
> nmap --reason 192.168.1.1

## == show only open ports
> nmap --open 192.168.1.1

## == use os detection
> nmap -O 192.168.1.1

## use version detection
> nmap -sV 192.168.1.1

## == firewall detection
> nmap -sV 192.168.1.1

## == spoof random mac address
> nmap --spoof-mac 0 192.168.1.1

## == spoof define mac address
> nmap --spoof-mac 00:11:22:33:44:55 192.168.1.1

## == disable dns resolution
> nmap -n 192.168.1.1

## == stealth scan
> nmap -sS 192.168.1.1
## == scan from host file
> nmap -iL foo

## == exclude host/ranges
> nmap 192.168.1.0/24 --exclude 192.168.1.1
> nmap 192.168.1.0/24 --exclude 192.168.1.1 192.168.1.5
> nmap 192.168.1.0/24 --exclude 192.168.1.1,2,3

## == null scan
> nmap -sN 192.168.1.1

## == fin scan
> nmap -sF 192.168.1.1

## == xmas scan
> nmap -sX 192.168.1.1

> rustscan -a 192.168.178.1
> rustscan -b 4500 -a git.x33u.org --range 1-3400 --scan-order "Random"
> rustscan -b 4500 -a git.x33u.org --range 1-3400 --scan-order "Random" -ulimit 10000