SecTools.Org: Top Network Security Tools
For more than a decade, theNmap SecurityScanner Project has been running regular surveys to determine thecommunity's favorite software, includingweb scanners,password crackers,network sniffers, andexploitation tools. Previous releases werestatic sites (2000 top 50,2003 top 75, and2006 top 100), but in 2011 we launched anew dynamic system which can grow and improve with community help. Itnow includes ratings, reviews, searching, sorting, and anew tool suggestion form.It initially features 125 tools sorted by votes from 2,959 Nmap users.You can alsosort by ratings from SecTools.Orgusers like you!
This sites allows open source and commercial tools on anyplatform. But since it is run by the Nmap Project, we omit tools that we maintain, including theNmap Security Scanner,Ncat network connector, andNping packet manipulator.
We're really impressed by the collective smarts of the securitycommunity, and we highly recommend reading the whole list andinvestigating any tools you are unfamiliar with. And for the toolsyou already know, please share a review. Nmap authorFyodor discovers many new toolsfrom each new edition of the survey, and always points newbies to thislist when complain that they “don't know where tostart”.
Click on a tool name in the list view for more details on thatparticular application, including the chance to read (and write)reviews and other comments. Many site elements are explained by tooltips if you hover your mouse over them. Every tool is described byone or more attributes. Clicking on an icon will show you all thetools with that attribute.
Additionally tools are grouped into categories:
- Antimalware (3)
- Application-specific scanners (3)
- Web browser–related (4)
- Encryption tools (8)
- Debuggers (5)
- Firewalls (2)
- Forensics (4)
- Fuzzers (4)
- General-purpose tools (8)
- Intrusion detection systems (6)
- Packet crafting tools (6)
- Password auditing (12)
- Port scanners (4)
- Rootkit detectors (5)
- Security-oriented operating systems (5)
- Packet sniffers (14)
- Vulnerability exploitation tools (11)
- Traffic monitoring tools (10)
- Vulnerability scanners (11)
- Web proxies (4)
- Web vulnerability scanners (20)
- Wireless tools (5)
Enjoy the site!
-Fyodor andDavid Fifield