# Nmap Alternatives

### Smap

<p align="center"><strong>passive Nmap like scanner built with shodan.io</strong></p>

{% embed url="<https://github.com/s0md3v/Smap>" %}

### Naabu

{% embed url="<https://github.com/projectdiscovery/naabu>" %}

<figure><img src="https://755681241-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fa5rXMZ1JAQhUeS7TtZkM%2Fuploads%2FcCx6YRHmYVWgYiiqJijr%2Fimage.png?alt=media&#x26;token=2f8dfe50-e6d6-4e75-84ba-598878713c96" alt=""><figcaption></figcaption></figure>

### fping

```
fping -a -g 10.10.23.0/24 2>/dev/null > live_hosts.txt
```

* `-a`: This flag stands for "alive." It filters the output to *only* show you the hosts that respond to the ping request.
* `-g`: This flag stands for "generate." It tells `fping` to generate a list of target IP addresses from a given range.
* `10.10.23.0/24`: This is the target network you are scanning.
  * The `/24` (a CIDR notation) represents a subnet mask of `255.255.255.0`.
  * This tells `fping` to generate and scan all 256 IP addresses in this range, from `10.10.23.0` to `10.10.23.255`.

<figure><img src="https://755681241-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fa5rXMZ1JAQhUeS7TtZkM%2Fuploads%2FOHJTCgEA8fqH0qlYxlTT%2Fimage.png?alt=media&#x26;token=766e0c84-cabd-4ddc-ae16-2de9a8c20b1f" alt=""><figcaption></figcaption></figure>

### Zenmap

{% file src="<https://755681241-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fa5rXMZ1JAQhUeS7TtZkM%2Fuploads%2FZuAKylvgmpfocLwzyCIp%2Fzenmap.pdf?alt=media&token=69089c1b-c5cb-4142-b133-4196802c680a>" %}
