diff --git a/scripts/http-auth-finder.nse b/scripts/http-auth-finder.nse
index e899717eb..9bc9a7f5f 100644
--- a/scripts/http-auth-finder.nse
+++ b/scripts/http-auth-finder.nse
@@ -35,6 +35,9 @@ detected method.
-- @args http-auth-finder.withindomain only spider URLs within the same
-- domain. This widens the scope from withinhost and can
-- not be used in combination. (default: false)
+--
+-- @see http-auth.nse
+-- @see http-brute.nse
author = "Patrik Karlsson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/http-auth.nse b/scripts/http-auth.nse
index 7281adb83..d71847ffb 100644
--- a/scripts/http-auth.nse
+++ b/scripts/http-auth.nse
@@ -41,6 +41,9 @@ authentication.
--
--
-- @args http-auth.path Define the request path
+--
+-- @see http-auth-finder.nse
+-- @see http-brute.nse
-- HTTP authentication information gathering script
-- rev 1.1 (2007-05-25)
diff --git a/scripts/http-dombased-xss.nse b/scripts/http-dombased-xss.nse
index 9f7d9cae9..bcf41c2c6 100644
--- a/scripts/http-dombased-xss.nse
+++ b/scripts/http-dombased-xss.nse
@@ -31,6 +31,9 @@ http://www.webappsec.org/projects/articles/071105.shtml
-- | Source: document.write(document.URL.substring(pos,document.URL.length)
-- |_ Pages: http://some-very-random-page.com/foo.html
--
+-- @see http-stored-xss.nse
+-- @see http-phpself-xss.nse
+-- @see http-xssed.nse
---
categories = {"intrusive", "exploit", "vuln"}
diff --git a/scripts/http-enum.nse b/scripts/http-enum.nse
index 6ed0a560e..335c2a659 100644
--- a/scripts/http-enum.nse
+++ b/scripts/http-enum.nse
@@ -72,6 +72,8 @@ database can specify their own criteria for accepting a page as valid.
-- | /images/outlook.jpg: Outlook Web Access
-- | /nfservlets/servlet/SPSRouterServlet/: netForensics
-- |_ /nfservlets/servlet/SPSRouterServlet/: netForensics
+--
+-- @see http-iis-short-name-brute.nse
author = {"Ron Bowes", "Andrew Orr", "Rob Nicholls"}
diff --git a/scripts/http-internal-ip-disclosure.nse b/scripts/http-internal-ip-disclosure.nse
index f8c8392f8..1cff0a189 100644
--- a/scripts/http-internal-ip-disclosure.nse
+++ b/scripts/http-internal-ip-disclosure.nse
@@ -25,7 +25,8 @@ versions of Microsoft IIS, but affects other web servers as well.
--
-- @xmloutput
-- 10.0.0.2
----
+--
+-- @see ssl-cert-intaddr.nse
author = "Josh Amishav-Zlatin"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/http-joomla-brute.nse b/scripts/http-joomla-brute.nse
index d47d8ff94..293511081 100644
--- a/scripts/http-joomla-brute.nse
+++ b/scripts/http-joomla-brute.nse
@@ -50,8 +50,7 @@ Joomla's default uri and form names:
-- * userdb = String - Path to user list
--
--
--- Based on Patrik Karlsson's http-form-brute
---
+-- @see http-form-brute.nse
author = "Paulino Calderon "
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/http-methods.nse b/scripts/http-methods.nse
index cf344ec0f..0d58b13d3 100644
--- a/scripts/http-methods.nse
+++ b/scripts/http-methods.nse
@@ -54,9 +54,9 @@ only the potentially risky methods are shown.
-- OPTIONS
--
--
--- @see http-method-tamper
--- @see http-trace
--- @see http-put
+-- @see http-method-tamper.nse
+-- @see http-trace.nse
+-- @see http-put.nse
author = {"Bernd Stroessenreuther ", "Gyanendra Mishra"}
diff --git a/scripts/http-mobileversion-checker.nse b/scripts/http-mobileversion-checker.nse
index 261edb4b1..ae0942b92 100644
--- a/scripts/http-mobileversion-checker.nse
+++ b/scripts/http-mobileversion-checker.nse
@@ -18,7 +18,7 @@ Checks if the website holds a mobile version.
-- 80/tcp open http syn-ack
-- |_ http-mobileversion-checker: Found mobile version: https://m.some-very-random-website.com (Redirected to a different host)
--
----
+-- @see http-useragent-tester.nse
categories = {"discovery", "safe"}
author = "George Chatzisofroniou"
diff --git a/scripts/http-phpself-xss.nse b/scripts/http-phpself-xss.nse
index 5fb1312d0..9be1845a6 100644
--- a/scripts/http-phpself-xss.nse
+++ b/scripts/http-phpself-xss.nse
@@ -47,6 +47,10 @@ The attack vector/probe used is: /'"/>
--
-- @args http-phpself-xss.uri URI. Default: /
-- @args http-phpself-xss.timeout Spidering timeout. (default 10s)
+--
+-- @see http-stored-xss.nse
+-- @see http-dombased-xss.nse
+-- @see http-xssed.nse
author = "Paulino Calderon "
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
categories = {"fuzzer", "intrusive", "vuln"}
diff --git a/scripts/http-slowloris-check.nse b/scripts/http-slowloris-check.nse
index 84ab66eb0..8006091d8 100644
--- a/scripts/http-slowloris-check.nse
+++ b/scripts/http-slowloris-check.nse
@@ -56,6 +56,8 @@ Idea from Qualys blogpost:
-- | References:
-- | http://ha.ckers.org/slowloris/
-- |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
+--
+-- @see http-slowloris.nse
author = "Aleksandar Nikolic"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/http-slowloris.nse b/scripts/http-slowloris.nse
index c66009a9c..2ea43f31c 100644
--- a/scripts/http-slowloris.nse
+++ b/scripts/http-slowloris.nse
@@ -52,6 +52,8 @@ when run from Windows.
-- | the DoS attack took +2m22s
-- | with 501 concurrent connections
-- |_ and 441 sent queries
+--
+-- @see http-slowloris-check.nse
author = {"Aleksandar Nikolic", "Ange Gutek"}
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/http-stored-xss.nse b/scripts/http-stored-xss.nse
index a484e53e6..c57c44b02 100644
--- a/scripts/http-stored-xss.nse
+++ b/scripts/http-stored-xss.nse
@@ -48,8 +48,9 @@ strings to determine whether the payloads were successful.
-- | Uploaded on: /posts.php
-- |_ Description: Unfiltered " (double quotation mark). An indication of potential XSS vulnerability.
--
---
---
+-- @see http-dombased-xss.nse
+-- @see http-phpself-xss.nse
+-- @see http-xssed.nse
---
categories = {"intrusive", "exploit", "vuln"}
diff --git a/scripts/http-useragent-tester.nse b/scripts/http-useragent-tester.nse
index 197e003cf..768e8311d 100644
--- a/scripts/http-useragent-tester.nse
+++ b/scripts/http-useragent-tester.nse
@@ -40,7 +40,7 @@ Checks if various crawling utilities are allowed by the host.
-- | libcurl-agent/1.0 redirected to: https://www.some-random-page.com/unsupportedbrowser (different host)
-- |_ Wget/1.13.4 (linux-gnu) redirected to: https://www.some-random-page.com/unsupportedbrowser (different host)
--
----
+-- @see http-mobileversion-checker.nse
categories = {"discovery", "safe"}
author = "George Chatzisofroniou"
diff --git a/scripts/http-wordpress-brute.nse b/scripts/http-wordpress-brute.nse
index 41376ad25..842cdf799 100644
--- a/scripts/http-wordpress-brute.nse
+++ b/scripts/http-wordpress-brute.nse
@@ -48,8 +48,7 @@ Wordpress default uri and form names:
-- * passdb = String - Path to password list
-- * userdb = String - Path to user list
--
--- Based on Patrik Karlsson's http-form-brute
---
+-- @see http-form-brute.nse
author = "Paulino Calderon "
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/http-xssed.nse b/scripts/http-xssed.nse
index 493d83b1a..5b6403d6f 100644
--- a/scripts/http-xssed.nse
+++ b/scripts/http-xssed.nse
@@ -21,7 +21,10 @@ This script searches the xssed.com database and outputs the result.
-- | xssed.com found the following previously reported XSS vulnerabilities marked as fixed:
-- |
-- |_ /myBook/myregion.php?targetUrl=javascript:alert(1);
----
+--
+-- @see http-stored-xss.nse
+-- @see http-dombased-xss.nse
+-- @see http-phpself-xss.nse
author = "George Chatzisofroniou"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/metasploit-info.nse b/scripts/metasploit-info.nse
index 3c11d58be..3be5186a1 100644
--- a/scripts/metasploit-info.nse
+++ b/scripts/metasploit-info.nse
@@ -37,6 +37,8 @@ References:
-- @args metasploit-info.username Valid metasploit rpc username (required)
-- @args metasploit-info.password Valid metasploit rpc password (required)
-- @args metasploit-info.command Custom command to run on the server (optional)
+--
+-- @see metasploit-msgrpc-brute.nse
diff --git a/scripts/rpc-grind.nse b/scripts/rpc-grind.nse
index 6cf56b07e..dfe990927 100644
--- a/scripts/rpc-grind.nse
+++ b/scripts/rpc-grind.nse
@@ -33,6 +33,7 @@ Any other accept state is an incorrect behaviour.
--PORT STATE SERVICE VERSION
--53344/udp open walld 1 (RPC #100008)
--
+-- @see rpcinfo.nse
author = "Hani Benhabiles"
diff --git a/scripts/rpcap-info.nse b/scripts/rpcap-info.nse
index 311bbc3cf..fd460c939 100644
--- a/scripts/rpcap-info.nse
+++ b/scripts/rpcap-info.nse
@@ -31,6 +31,7 @@ setup to require authentication or not and also supports IP restrictions.
--
-- @args creds.rpcap username:password to use for authentication
--
+-- @see rpcap-brute.nse
author = "Patrik Karlsson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/rpcinfo.nse b/scripts/rpcinfo.nse
index b028d6fd3..d4785debc 100644
--- a/scripts/rpcinfo.nse
+++ b/scripts/rpcinfo.nse
@@ -72,6 +72,8 @@ supported version numbers, port number and protocol, and program name.
--
--
--
+--
+-- @see rpc-grind.nse
author = "Patrik Karlsson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/smb-enum-sessions.nse b/scripts/smb-enum-sessions.nse
index 76eb08216..5aed00d3f 100644
--- a/scripts/smb-enum-sessions.nse
+++ b/scripts/smb-enum-sessions.nse
@@ -58,7 +58,8 @@ the system, besides showing a message box to the user.
-- | |_ DOMAIN\rbowes since 2008-10-20 09:03:23
-- | Active SMB Sessions:
-- |_ |_ ADMINISTRATOR is connected from 10.100.254.138 for [just logged in, it's probably you], idle for [not idle]
------------------------------------------------------------------------
+--
+-- @see smb-enum-users.nse
author = "Ron Bowes"
copyright = "Ron Bowes"
diff --git a/scripts/smb-vuln-ms10-061.nse b/scripts/smb-vuln-ms10-061.nse
index 75920deac..9bb5e84bf 100644
--- a/scripts/smb-vuln-ms10-061.nse
+++ b/scripts/smb-vuln-ms10-061.nse
@@ -52,6 +52,8 @@ References:
-- | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729
-- | http://technet.microsoft.com/en-us/security/bulletin/MS10-061
-- |_ http://blogs.technet.com/b/srd/archive/2010/09/14/ms10-061-printer-spooler-vulnerability.aspx
+--
+-- @see stuxnet-detect.nse
author = "Aleksandar Nikolic"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/ssl-cert-intaddr.nse b/scripts/ssl-cert-intaddr.nse
index c3d0fe668..f474d050f 100644
--- a/scripts/ssl-cert-intaddr.nse
+++ b/scripts/ssl-cert-intaddr.nse
@@ -32,7 +32,8 @@ address itself is not private. Nmap v7.30 or later is required.
--
----
+--
+-- @see http-internal-ip-disclosure.nse
author = "Steve Benson"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"
diff --git a/scripts/stuxnet-detect.nse b/scripts/stuxnet-detect.nse
index d52e8e6e1..548430680 100644
--- a/scripts/stuxnet-detect.nse
+++ b/scripts/stuxnet-detect.nse
@@ -27,6 +27,8 @@ for the filename is given on the command line.
--
-- Host script results:
-- |_stuxnet-detect: INFECTED (version 4c:04:00:00:01:00:00:00)
+--
+-- @see smb-vuln-ms10-061.nse
author = "Mak Kolybabi"
license = "Same as Nmap--See https://nmap.org/book/man-legal.html"