CINXE.COM
SecTools.Org Top Network Security Tools
<!DOCTYPE html> <html lang="en"> <head> <title> SecTools.Org Top Network Security Tools </title> <meta name="description" content="Rankings and reviews of computer and network security software, programs, and tools."> <link rel="alternate" type="application/rss+xml" href="/feed/"> <link rel="canonical" href="https://sectools.org/tag/free/"> <link rel="next" href="https://sectools.org/tag/free/?page=2"> <meta name="viewport" content="width=device-width,initial-scale=1"> <meta name="theme-color" content="#2A0D45"> <link rel="preload" as="image" href="/images/sitelogo.png" imagesizes="168px" imagesrcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x"> <link rel="preload" as="image" href="/shared/images/nst-icons.svg"> <link rel="stylesheet" href="/shared/css/nst.css?v=2"> <script async src="/shared/js/nst.js?v=2"></script> <link rel="stylesheet" href="/shared/css/nst-foot.css?v=2" media="print" onload="this.media='all'"> <link rel="stylesheet" href="/site.css"> <!--Google Analytics Code--> <link rel="preload" href="https://www.google-analytics.com/analytics.js" as="script"> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-11009417-1', 'auto'); ga('send', 'pageview'); </script> <!--END Google Analytics Code--> <META NAME="ROBOTS" CONTENT="NOARCHIVE"> <link rel="shortcut icon" href="/shared/images/tiny-eyeicon.png" type="image/png"> </head> <body><div id="nst-wrapper"> <div id="menu"> <div class="blur"> <header id="nst-head"> <a id="menu-open" href="#menu" aria-label="Open menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#menu"> </a> <a id="menu-close" href="#" aria-label="Close menu"> <img width="44" height="44" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#close"> </a> <a id="nst-logo" href="/" aria-label="Home page"> <img alt="Home page logo" srcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x" src="/images/sitelogo.png" onerror="this.onerror=null;this.srcset=this.src" height=90 width=168></a> <nav id="nst-gnav"> <a class="nlink" href="https://nmap.org/">Nmap.org</a> <a class="nlink" href="https://npcap.com/">Npcap.com</a> <a class="nlink" href="https://seclists.org/">Seclists.org</a> <a class="nlink" href="https://sectools.org">Sectools.org</a> <a class="nlink" href="https://insecure.org/">Insecure.org</a> </nav> <form class="nst-search" id="nst-head-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> </header> </div> </div> <main id="nst-content"> <nav> <div id="nav"> <ul> <li><a href="/">Home</a></li> <li><a href="/about/">About/Help</a></li> <li><a href="/contrib/">Suggest a new tool</a></li> <li><form action="/search/" method="get"><input type="text" name="q" size="10"><input type="submit" value="Search"></form></li> </ul> </div> </nav> <br> <h2>SecTools.Org: Top 125 Network Security Tools</h2> <p>For more than a decade, the <a href="http://nmap.org">Nmap Project</a> has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a <a href="http://sectools.org/contrib/">new tool suggestion form</a>. This site allows open source and commercial tools on any platform, except those tools that we maintain (such as the <a href="http://nmap.org">Nmap Security Scanner</a>, <a href="http://nmap.org/ncat/">Ncat network connector</a>, and <a href="http://nmap.org/nping/">Nping packet manipulator</a>).</p> <p>We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. Click any tool name for more details on that particular application, including the chance to read (and write) reviews. Many site elements are explained by tool tips if you hover your mouse over them. Enjoy!</p> <div class="inline-tags"> <p> Filtering by tag: </p> <ul> <li><a href="/tag/free/">free</a></li> </ul> <small><a href="/">remove filters</a></small> </div> <div style="float:right; margin-right:1em"> Sort by: <span style="margin-left:2em" title="Sort based on favorite tool votes by 2,959 people"> popularity </span> <span style="margin-left:2em" title="Sort based on tool ratings from site users like you"> <a href="/?sort=rating">rating</a> </span> <span style="margin-left:2em" title="Sort with the most recently released (including new versions) software first"> <a href="/?sort=release">release date</a> </span> </div> <p> Tools 1–10 of 94 <a style="margin-left:2em" href="?page=2">next page →</a> </p> <h2 class="toolhead"> <a href="/tool/wireshark/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(20)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★★</span> </a> <a style="margin-right:1em" href="/tool/wireshark/">Wireshark</a> (#1, <span class="rank-up" title="Change in popularity since last survey"><img src="/flags/uparrow.gif">1</span>) </h2> <div class="logo"><a href="/tool/wireshark/"><img src="/logos/wireshark-80x144.png" alt="Wireshark logo"></a></div> <p> Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source multi-platform network protocol analyzer. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A <a class="local" href="/tool/tcpdump/">tcpdump</a>-like console version named tshark is included. One word of caution is that Wireshark has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences). <a href="/tool/wireshark/#comments">Read 31 reviews.</a> </p> <p> <strong>Latest release:</strong> version 1.12.7 on Aug. 12, 2015 (9 years, 6 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.wireshark.org/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Wireshark"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/sniffers/" title="Packet sniffers">sniffers</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/aircrack/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(10)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★½</span> </a> <a style="margin-right:1em" href="/tool/aircrack/">Aircrack</a> (#4, <span class="rank-up" title="Change in popularity since last survey"><img src="/flags/uparrow.gif">17</span>) </h2> <div class="logo"><a href="/tool/aircrack/"><img src="/logos/aircrack-80x63.png" alt="Aircrack logo"></a></div> <p> Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It implements the best known cracking algorithms to recover wireless keys once enough encrypted packets have been gathered. . The suite comprises over a dozen discrete tools, including airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files). <a href="/tool/aircrack/#comments">Read 15 reviews.</a> </p> <p> <strong>Latest release:</strong> version 1.1 on April 24, 2010 (14 years, 10 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.aircrack-ng.org/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Aircrack-ng"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> <li><a href="/tag/wireless/" title="Wireless tools">wireless</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/cain/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(6)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★½</span> </a> <a style="margin-right:1em" href="/tool/cain/">Cain and Abel</a> (#6, <span class="rank-up" title="Change in popularity since last survey"><img src="/flags/uparrow.gif">3</span>) </h2> <div class="logo"><a href="/tool/cain/"><img src="/logos/cain-80x32.png" alt="Cain and Abel logo"></a></div> <p> UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also <a href="http://www.oxid.it/ca_um/">well documented</a>. <a href="/tool/cain/#comments">Read 17 reviews.</a> </p> <p> <strong>Latest release:</strong> version 4.9.56 on April 7, 2014 (10 years, 10 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.oxid.it/cain.html"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Cain_and_Abel_(software)"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/pass-audit/" title="Password auditing">pass-audit</a></li> <li><a href="/tag/sniffers/" title="Packet sniffers">sniffers</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/backtrack/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(17)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★</span> </a> <a style="margin-right:1em" href="/tool/backtrack/">BackTrack</a> (#7, <span class="rank-up" title="Change in popularity since last survey"><img src="/flags/uparrow.gif">25</span>) </h2> <div class="logo"><a href="/tool/backtrack/"><img src="/logos/backtrack-80x76.png" alt="BackTrack logo"></a></div> <p> This excellent bootable live CD Linux distribution comes from the merger of Whax and Auditor. It boasts a huge variety of Security and Forensics tools and provides a rich development environment. User modularity is emphasized so the distribution can be easily customized by the user to include personal scripts, additional tools, customized kernels, etc. BackTrack is succeeded by <a href="http://www.kali.org/">Kali Linux</a>. <a href="/tool/backtrack/#comments">Read 22 reviews.</a> </p> <p> <strong>Latest release:</strong> version 5 R3 on Aug. 13, 2012 (12 years, 6 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.backtrack-linux.org/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/BackTrack"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/gui/"><img src="/flags/mouse-30x30.png" title="Offers a GUI (point and click) interface." alt="Mouse icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/sec-distros/" title="Security-oriented operating systems">sec-distros</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/netcat/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(10)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★½</span> </a> <a style="margin-right:1em" href="/tool/netcat/">Netcat</a> (#8, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">4</span>) </h2> <div class="logo"><a href="/tool/netcat/"><img src="/logos/netcat-80x155.png" alt="Netcat logo"></a></div> <p> This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool to use directly or easily drive by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. <p>The original Netcat was <a href="http://seclists.org/bugtraq/1995/Oct/0028.html">released</a> by Hobbit in 1995, but it hasn't been maintained despite its popularity. It can sometimes even be hard to find <a href="http://download.insecure.org/stf/nc110.tgz">a copy of the v1.10 source code</a>. The flexibility and usefulness of this tool prompted the Nmap Project to produce <a href="http://nmap.org/ncat/">Ncat</a>, a modern reimplementation which supports SSL, IPv6, SOCKS and http proxies, connection brokering, and more. Other takes on this classic tool include the amazingly versatile <a class="local" href="/tool/socat/">Socat</a>, <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/nc/">OpenBSD's nc</a>, <a href="http://cryptcat.sourceforge.net/">Cryptcat</a>, <a href="http://www.deepspace6.net/projects/netcat6.html">Netcat6</a>, <a href="http://stromberg.dnsalias.org/~strombrg/pnetcat.html">pnetcat</a>, <a href="http://cycom.se/dl/sbd">SBD</a>, and so-called <a href="http://netcat.sourceforge.net/">GNU Netcat</a>. <a href="/tool/netcat/#comments">Read 13 reviews.</a> </p> <p> <strong>Latest release:</strong> version 1.10 on March 20, 1996 (28 years, 11 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://en.wikipedia.org/wiki/Netcat"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Netcat"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/general/" title="General-purpose tools">general</a></li> <li><a href="/tag/packet-crafters/" title="Packet crafting tools">packet-crafters</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/tcpdump/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(2)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★½</span> </a> <a style="margin-right:1em" href="/tool/tcpdump/">tcpdump</a> (#9, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">1</span>) </h2> <div class="logo"><a href="/tool/tcpdump/"><img src="/logos/tcpdump-80x70.png" alt="tcpdump logo"></a></div> <p> Tcpdump is the network sniffer we all used before (<a class="local" href="/tool/wireshark/">Wireshark</a>) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI and parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with less security risk. It also requires fewer system resources. While Tcpdump doesn't receive new features often, it is <a href="http://www.tcpdump.org">actively maintained</a> to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named <a href="http://www.winpcap.org/windump/">WinDump</a>. tcpdump is the source of the <a href="http://www.tcpdump.org/">Libpcap</a>/<a href="http://www.winpcap.org/">WinPcap</a> packet capture library, which is used by <a href="http://nmap.org/">Nmap</a> and many other tools. <a href="/tool/tcpdump/#comments">Read 3 reviews.</a> </p> <p> <strong>Latest release:</strong> version 4.7.4 on April 22, 2015 (9 years, 10 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.tcpdump.org"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/tcpdump"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/sniffers/" title="Packet sniffers">sniffers</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/kismet/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(2)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★★</span> </a> <a style="margin-right:1em" href="/tool/kismet/">Kismet</a> (#11, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">4</span>) </h2> <div class="logo"><a href="/tool/kismet/"><img src="/logos/kismet-80x46.png" alt="Kismet logo"></a></div> <p> Kismet is a console (ncurses) based 802.11 layer-2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as <a class="local" href="/tool/netstumbler/">NetStumbler</a>), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in <a class="local" href="/tool/wireshark/">Wireshark</a>/<a class="local" href="/tool/tcpdump/">tcpdump</a> compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for <a href="http://en.wikipedia.org/wiki/Wardriving">wardriving</a>. Oh, and also <a href="http://en.wikipedia.org/wiki/Warwalking">warwalking</a>, <a href="http://arstechnica.com/old/content/2002/08/warflying.ars">warflying</a>, and <a href="http://www.oldskoolphreak.com/tfiles/wifi/warskating/warskating.html">warskating</a>, etc. <a href="/tool/kismet/#comments">Read 2 reviews.</a> </p> <p> <strong>Latest release:</strong> version Kismet-2013-03-R1b on April 8, 2013 (11 years, 10 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.kismetwireless.net/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Kismet_(software)"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/sniffers/" title="Packet sniffers">sniffers</a></li> <li><a href="/tag/wireless/" title="Wireless tools">wireless</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/ssh/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(2)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★★</span> </a> <a style="margin-right:1em" href="/tool/ssh/">OpenSSH/PuTTY/SSH</a> (#12, <span class="rank-up" title="Change in popularity since last survey"><img src="/flags/uparrow.gif">2</span>) </h2> <div class="logo"><a href="/tool/ssh/"><img src="/logos/ssh-85x85.gif" alt="OpenSSH/PuTTY/SSH logo"></a></div> <p> SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source <a href="http://www.openssh.com/">OpenSSH</a> server and client. Windows users often prefer the free <a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/">PuTTY</a> client, which is also available for many mobile devices, and <a href="http://winscp.net/">WinSCP</a>. Other Windows users prefer the nice terminal-based port of OpenSSH that comes with <a href="http://www.cygwin.com/">Cygwin</a>. There are <a href="http://en.wikipedia.org/wiki/Comparison_of_SSH_clients">dozens of other free and proprietary clients</a> to consider as well. <a href="/tool/ssh/#comments">Read 2 reviews.</a> </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.openssh.com/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://winscp.net/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://www.ssh.com/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Secure_Shell"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/crypto/" title="Encryption tools">crypto</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/nikto/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(10)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★½</span> </a> <a style="margin-right:1em" href="/tool/nikto/">Nikto</a> (#14, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">2</span>) </h2> <div class="logo"><a href="/tool/nikto/"><img src="/logos/nikto-64x118.png" alt="Nikto logo"></a></div> <p> Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. <a href="/tool/nikto/#comments">Read 15 reviews.</a> </p> <p> <strong>Latest release:</strong> version 2.1.4 on Feb. 20, 2011 (14 years ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.cirt.net/nikto2"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/web-scanners/" title="Web vulnerability scanners">web-scanners</a></li> </ul> </li> </ul> <h2 class="toolhead"> <a href="/tool/hping/#comments"> <span style="float:right; font-size:smaller; font-weight:normal">(3)</span> <span style="float:right; min-width:5em; margin-left:0.5em">★★★★★</span> </a> <a style="margin-right:1em" href="/tool/hping/">Hping</a> (#15, <span class="rank-down" title="Change in popularity since last survey"><img src="/flags/downarrow.gif">9</span>) </h2> <div class="logo"><a href="/tool/hping/"><img src="/logos/hping-80x31.png" alt="Hping logo"></a></div> <p> This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. Hping is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rule sets. It is also great for learning more about TCP/IP and experimenting with IP protocols. Unfortunately, it hasn't been updated since 2005. The Nmap Project created and maintains <a href="http://nmap.org/nping/">Nping</a>, a similar program with more modern features such as IPv6 support, and a unique <a href="http://nmap.org/book/nping-man-echo-mode.html">echo mode</a>. <a href="/tool/hping/#comments">Read 4 reviews.</a> </p> <p> <strong>Latest release:</strong> version hping3-20051105 on Nov. 5, 2005 (19 years, 3 months ago). </p> <ul class="inline-tags-container"> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="http://www.hping.org/"><img src="/flags/home-icon.png" title="Homepage" alt="Home icon" border="0"></a></li> <li><a href="http://en.wikipedia.org/wiki/Hping"><img src="/flags/wiki-icon.png" title="Wikipedia" alt="Wikipedia icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/free/"><img src="/flags/free_30x30.png" title="All official versions are free of charge" alt=""Free" price tag icon" border="0"></a></li> <li><a href="/tag/linux/"><img src="/flags/linuxpenguinlogo_30x30.gif" title="Works natively on Linux." alt="Linux penguin icon" border="0"></a></li> <li><a href="/tag/os-x/"><img src="/flags/osx-30x30.png" title="Works natively on Apple Mac OS X." alt="OS X icon" border="0"></a></li> <li><a href="/tag/windows/"><img src="/flags/winlogo_30x30.gif" title="Works natively on Microsoft Windows." alt="Windows icon" border="0"></a></li> <li><a href="/tag/command-line/"><img src="/flags/term-30x30.png" title="Features a command-line interface." alt="Terminal window icon" border="0"></a></li> <li><a href="/tag/source/"><img src="/flags/magnifying-glass-19x30.png" title="Source code available for inspection." alt="Magnifying glass icon" border="0"></a></li> </ul> </li> <li class="inline-tags-container"> <ul class="inline-tags"> <li><a href="/tag/packet-crafters/" title="Packet crafting tools">packet-crafters</a></li> </ul> </li> </ul> <p> Tools 1–10 of 94 <a style="margin-left:2em" href="?page=2">next page →</a> </p> <h3 id="categories">Categories</h3> <ul> <li><a href="/tag/antimalware/">Antimalware (3)</a></li> <li><a href="/tag/app-scanners/">Application-specific scanners (3)</a></li> <li><a href="/tag/browser/">Web browser–related (4)</a></li> <li><a href="/tag/crypto/">Encryption tools (8)</a></li> <li><a href="/tag/debuggers/">Debuggers (5)</a></li> <li><a href="/tag/firewalls/">Firewalls (2)</a></li> <li><a href="/tag/forensics/">Forensics (4)</a></li> <li><a href="/tag/fuzzers/">Fuzzers (4)</a></li> <li><a href="/tag/general/">General-purpose tools (8)</a></li> <li><a href="/tag/ids/">Intrusion detection systems (6)</a></li> <li><a href="/tag/packet-crafters/">Packet crafting tools (6)</a></li> <li><a href="/tag/pass-audit/">Password auditing (12)</a></li> <li><a href="/tag/port-scanners/">Port scanners (4)</a></li> <li><a href="/tag/rootkit-detectors/">Rootkit detectors (5)</a></li> <li><a href="/tag/sec-distros/">Security-oriented operating systems (5)</a></li> <li><a href="/tag/sniffers/">Packet sniffers (14)</a></li> <li><a href="/tag/sploits/">Vulnerability exploitation tools (11)</a></li> <li><a href="/tag/traffic-monitors/">Traffic monitoring tools (10)</a></li> <li><a href="/tag/vuln-scanners/">Vulnerability scanners (11)</a></li> <li><a href="/tag/web-proxy/">Web proxies (4)</a></li> <li><a href="/tag/web-scanners/">Web vulnerability scanners (20)</a></li> <li><a href="/tag/wireless/">Wireless tools (5)</a></li> </ul> </main><!-- content --> <footer id="nst-foot"> <form class="nst-search" id="nst-foot-search" action="/search/"> <input class="nst-search-q" name="q" type="search" placeholder="Site Search"> <button class="nst-search-button" title="Search"> <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search"> </button> </form> <div class="flexlists"> <div class="fl-unit"> <h2><a class="nlink" href="https://nmap.org/">Nmap Security Scanner</a></h2> <ul> <li><a class="nlink" href="https://nmap.org/book/man.html">Ref Guide</a> <li><a class="nlink" href="https://nmap.org/book/install.html">Install Guide</a> <li><a class="nlink" href="https://nmap.org/docs.html">Docs</a> <li><a class="nlink" href="https://nmap.org/download.html">Download</a> <li><a class="nlink" href="https://nmap.org/oem/">Nmap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://npcap.com/">Npcap packet capture</a></h2> <ul> <li><a class="nlink" href="https://npcap.com/guide/">User's Guide</a> <li><a class="nlink" href="https://npcap.com/guide/npcap-devguide.html#npcap-api">API docs</a> <li><a class="nlink" href="https://npcap.com/#download">Download</a> <li><a class="nlink" href="https://npcap.com/oem/">Npcap OEM</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://seclists.org/">Security Lists</a></h2> <ul> <li><a class="nlink" href="https://seclists.org/nmap-announce/">Nmap Announce</a> <li><a class="nlink" href="https://seclists.org/nmap-dev/">Nmap Dev</a> <li><a class="nlink" href="https://seclists.org/fulldisclosure/">Full Disclosure</a> <li><a class="nlink" href="https://seclists.org/oss-sec/">Open Source Security</a> <li><a class="nlink" href="https://seclists.org/dataloss/">BreachExchange</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://sectools.org">Security Tools</a></h2> <ul> <li><a class="nlink" href="https://sectools.org/tag/vuln-scanners/">Vuln scanners</a> <li><a class="nlink" href="https://sectools.org/tag/pass-audit/">Password audit</a> <li><a class="nlink" href="https://sectools.org/tag/web-scanners/">Web scanners</a> <li><a class="nlink" href="https://sectools.org/tag/wireless/">Wireless</a> <li><a class="nlink" href="https://sectools.org/tag/sploits/">Exploitation</a> </ul> </div> <div class="fl-unit"> <h2><a class="nlink" href="https://insecure.org/">About</a></h2> <ul> <li><a class="nlink" href="https://insecure.org/fyodor/">About/Contact</a> <li><a class="nlink" href="https://insecure.org/privacy.html">Privacy</a> <li><a class="nlink" href="https://insecure.org/advertising.html">Advertising</a> <li><a class="nlink" href="https://nmap.org/npsl/">Nmap Public Source License</a> </ul> </div> <div class="fl-unit social-links"> <a class="nlink" href="https://twitter.com/nmap" title="Visit us on Twitter"> <img width="32" height="32" src="/shared/images/nst-icons.svg#twitter" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://facebook.com/nmap" title="Visit us on Facebook"> <img width="32" height="32" src="/shared/images/nst-icons.svg#facebook" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://github.com/nmap/" title="Visit us on Github"> <img width="32" height="32" src="/shared/images/nst-icons.svg#github" alt="" aria-hidden="true"> </a> <a class="nlink" href="https://reddit.com/r/nmap/" title="Discuss Nmap on Reddit"> <img width="32" height="32" src="/shared/images/nst-icons.svg#reddit" alt="" aria-hidden="true"> </a> </div> </div> </footer> </div><!-- wrapper --> </body> </html>