https://github.com/nmap/nmap
-sN (Null scan; do not set RST, SYN or ACK bit)
-sF (FIN scan)
-sW (Window scan; pos = open, neg = closed)
-T0 (Timing; 0 = paranoid 5 minutes between each probe, 5 = insane)
-g/--source-port <port> (send from this port>
--data <hex string> (append a custom payload to packets)
--data-string <string> (append a custom ASCII string to packets)
--data-length <num> (append random data to packets)
--badsum (send packets with a bogus TCP/UDP/SCTP checksum)
--scanflags URG,ACK,PSH,RST,SYN,FIN
nmap -A -sV -O --min-rate 600 --script "(vuln or exploit or auth) and not broadcast" -oA <rhost>-vuln-scripts <rhost> -p- -vv --open
nmap --resume <file>
nmap --version-intensity 4 <rhost>
nmap --min-rate 500 -sS -sV -O -sC -iL <file> -oA <file>-sS-sV-O-sC-1k-ports
nmap --script-help "*ms* and *sql*"
nmap -p 443 --script http-ntlm-info --script-args http-ntlm-info.root=/<path>/ <rhost>