FREE THOUGHT · FREE SOFTWARE · FREE WORLD

Home » Hacking » Top 5 Vulnerability Port Scanners

by comment

Asked some hackers and Computer Security gurus to list their 5 favorite Vulnerability/Port Scanners. Here are the results.

You might like the more in-depth article: Vulnerability Scanners Review, or you may be looking for the Computer Security Toolbox


  1. netcat
  2. nmap
  3. hping3
  4. isic
  5. p0f2
  6. sing
  7. nikto
  8. firewalk - Detecting Firewall Rulles
  9. nikto/wnikto - cgi scanner
  10. whisker - cgi scanner with IDS feature
  11. nessus / NewT - Vulnerability scanner
  12. Qualys
  13. eEye Retina
  14. GFI Languard
  15. ISS
  16. Shadow Security Scanner (SSS)
  17. pakketo's scanrand
  18. FX Scanner
  19. Acunetix web vulnerability scanner
  20. IPCScan
  21. SQLRecon
  22. Metasploit
  23. Whax
  24. SoftPerfect Network Scanner - Network Share Scanner
  25. Cain & Abel
  26. autoscan - . integrate some other tools
  27. hydra - Password finder by Brute forcer
  28. Retina - Vulnerability scanner
  29. X-scan3 - Vulnerability scanner GUI & CLI uses nasl
  30. SupperScan - fast port scanner
  31. Dfind - CLI vuln scanner
  32. Sfind - CLI vuln scanner
  33. scan1000 - fast CLI vuln scanner
  34. ScanLine - CLI vuln scanner
  35. GhostPortScanner (GPS) to keep from triggering firewalls
  36. Superscan 3.0 for TCP Scanning
  37. Superscan 4.0 for UDP Scanning
  38. X-Scan v2.3 (nmap + nessus for windows)
  39. Webdavscan.exe for Mass Port 80 Banner
  40. NTscan for IPC$ Passwords
  41. foundstone tools
  42. sara
  43. X-Scan
  44. FOUNDSCAN
  45. HSCAN
  46. cheops-ng
  47. dsns
  48. MicrosoftBaseLine - IIS vuln scanner

Tags

Comments Welcome

Information is freedom. Freedom is non-negotiable. So please feel free to modify, copy, republish, sell, or use anything on this site in any way at any time ;)

My Online Tools

Popular Articles
Hacking and Hackers

The use of "hacker" to mean "security breaker" is a confusion on the part of the mass media. We hackers refuse to recognize that meaning, and continue using the word to mean someone who loves to program, someone who enjoys playful cleverness, or the combination of the two.
-- Richard M. Stallman


It's very simple - you read the protocol and write the code. -Bill Joy

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution 3.0 License, just credit with a link.
This site is not supported or endorsed by The Apache Software Foundation (ASF). All software and documentation produced by The ASF is licensed. "Apache" is a trademark of The ASF. NCSA HTTPd.
UNIX ® is a registered Trademark of The Open Group. POSIX ® is a registered Trademark of The IEEE.

+Askapache | htaccess.io | htaccess.guru

Site Map | Contact Webmaster | License and Disclaimer | Terms of Service | @Htaccess

↑ TOPMain