A free and open-source network discovery and security auditing tool for mapping networks and identifying services.
Nmap (Network Mapper) is a free and open-source utility for network discovery and security auditing. It scans networks to identify active hosts, open ports, running services, and operating systems, helping administrators map network topology and assess security posture. It is widely used for penetration testing, vulnerability detection, and network inventory management.
Network administrators, security professionals, penetration testers, and IT auditors who need to analyze network infrastructure, identify security weaknesses, and maintain network visibility.
Developers choose Nmap for its comprehensive feature set, extensibility through the Nmap Scripting Engine (NSE), cross-platform support, and proven reliability in both offensive and defensive security contexts.
Nmap - the Network Mapper. Github mirror of official SVN repository.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Offers host discovery, port scanning, service/version detection, OS fingerprinting, and scriptable extensions via NSE, covering most network analysis needs.
Nmap Scripting Engine allows users to write custom scripts for advanced tasks like vulnerability scanning, automation, and protocol-specific checks.
Available on Windows, macOS, and Linux with binary installers, ensuring it can be deployed in diverse IT environments.
Decades of development and widespread use in security communities make it a trusted tool for accurate and consistent network scanning.
Default scan techniques can be noisy and easily detected by intrusion detection systems, requiring advanced options for covert operations.
Mastering advanced features like NSE scripting and custom scan parameters demands significant networking and security knowledge.
Scanning very large networks can be slow without optimization, such as using parallel scans or adjusting timing parameters.