Build nmap commands visually from your terminal.
Part of OffSecKit | Browser version | Unified CLI
This tool is part of the OffSecKit CLI toolkit:
pip install offseckit# Build a basic SYN scan command
osk nmap build -t 10.10.10.10
# Full port scan with version detection
osk nmap build -t 10.10.10.10 --all-ports -sV --open
# Use a preset profile
osk nmap preset quick -t 192.168.1.0/24
# Vulnerability scan preset
osk nmap preset vuln -t 10.10.10.10
# Stealth scan with evasion
osk nmap build -t 10.10.10.10 -s syn -T 2 -f --source-port 53
# List all presets, scan types, and timing templates
osk nmap presets
osk nmap scans
osk nmap timing| Flag | Description | Default |
|---|---|---|
-t, --target |
Target IP, hostname, or CIDR | (required) |
-s, --scan-type |
Scan type (syn, connect, udp, null, fin, xmas, ack, window) | syn |
-p, --ports |
Port specification | top 1000 |
--top-ports |
Scan top N ports | — |
--all-ports |
Scan all 65535 ports | — |
-F, --fast |
Fast mode (top 100 ports) | — |
-sV |
Service version detection | — |
-O |
OS detection | — |
-sC |
Default NSE scripts | — |
-A |
Aggressive mode | — |
-T |
Timing template (0-5) | 3 |
--script |
NSE script(s) | — |
--open |
Show only open ports | — |
-f |
Fragment packets | — |
-D |
Decoy addresses | — |
| Preset | Description |
|---|---|
quick |
Top 100 ports with version detection |
full |
All 65535 ports with version detection |
stealth |
Low-noise scan for monitored environments |
vuln |
Version detection + vulnerability scripts |
aggressive |
OS, versions, scripts, and traceroute |
udp |
Top 100 UDP ports with version detection |
- OffSecKit CLI — full toolkit (
pip install offseckit) - Browser version — use in your browser
- Nmap Cheat Sheet — full guide
MIT