nmap target_ip
nmap -p port_number target_ip
nmap target1 target2 target3
nmap target_ip_range
nmap target_subnet/mask
nmap -sS target_ip
nmap -sT target_ip
nmap -sU target_ip
nmap -sA target_ip
nmap -sW target_ip
nmap -sO target_ip
nmap -O target_ip
nmap -sV target_ip
nmap -A target_ip
nmap --script vuln target_ip
nmap --script script_name target_ip
nmap --script category_name target_ip
nmap --script script_name --script-args argument_name=argument_value target_ip
nmap --script category_name --script-args argument_name=argument_value target_ip
nmap --script dns-recursion target_ip
nmap -Pn target_ip
nmap -oN output.txt target_ip
nmap -e interface_name target_ip
nmap --packet-trace target_ip
nmap -n target_ip
nmap -v target_ip
nmap --proxy socks4:https://proxy_host:port target_ip
- Remember to replace target_ip, port_number, target_ip_range, target_subnet/mask, script_name, category_name, interface_name, argument_name, and argument_value with the appropriate values for your specific use case.