Last reviewed against v0.9.0
source:
internal/tools/nmap.go Nmap
Wraps the system nmap binary. Parses XML output into the result grid.
Wraps the system nmap binary. ShellYard runs nmap -oX - against your target with the flags you supply, then parses the XML into the result grid.
Common flag presets
| Preset | Flags |
|---|---|
| Quick TCP | -sS -F -T4 |
| Service version | -sV --version-light |
| OS detect | -O |
| All TCP ports | -p- -T4 |
| UDP top 100 | -sU --top-ports 100 |
You can paste any nmap invocation; only the target+flag arg list is parsed.