A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests
Originally posted by **Aaronepower** November 17, 2022
when I pass naabu to nmap, it will pass ip to nmap not hostname, how can I pass hostname to nmap?
> echo hackerone.com | naabu -silent -nmap-cli 'nmap'
```
hackerone.com:8443
hackerone.com:8080
hackerone.com:443
hackerone.com:80
Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-17 16:15 UTC
Nmap scan report for 104.16.99.52
Host is up (0.00067s latency).
PORT STATE SERVICE
80/tcp open http
443/tcp open https
8080/tcp open http-proxy
8443/tcp open https-alt
Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
```
#### Expected:
> echo hackerone.com | naabu -silent -nmap-cli 'nmap'
```
hackerone.com:8443
hackerone.com:8080
hackerone.com:443
hackerone.com:80
Starting Nmap 7.80 ( https://nmap.org ) at 2022-11-17 16:15 UTC
Nmap scan report for hackerone.com
Host is up (0.00067s latency).
PORT STATE SERVICE
80/tcp open http
443/tcp open https
8080/tcp open http-proxy
8443/tcp open https-alt
Nmap done: 1 IP address (1 host up) scanned in 0.05 seconds
```
Discussed in https://github.com/projectdiscovery/naabu/discussions/479