SecTools.Org: Top Network Security Tools
For more than a decade, the Nmap Security Scanner Project has been running regular surveys to determine the community's favorite software, including web scanners, password crackers, network sniffers, and exploitation tools. Previous releases were static sites (2000 top 50, 2003 top 75, and 2006 top 100), but in 2011 we launched a new dynamic system which can grow and improve with community help. It now includes ratings, reviews, searching, sorting, and a new tool suggestion form. It initially features 125 tools sorted by votes from 2,959 Nmap users. You can also sort by ratings from SecTools.Org users like you!
This sites allows open source and commercial tools on any platform. But since it is run by the Nmap Project, we omit tools that we maintain, including the Nmap Security Scanner, Ncat network connector, and Nping packet manipulator.
We're really impressed by the collective smarts of the security community, and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. And for the tools you already know, please share a review. Nmap author Fyodor discovers many new tools from each new edition of the survey, and always points newbies to this list when complain that they “don't know where to start”.
Click on a tool name in the list view for more details on that particular application, including the chance to read (and write) reviews and other comments. Many site elements are explained by tool tips if you hover your mouse over them. Every tool is described by one or more attributes. Clicking on an icon will show you all the tools with that attribute.
Additionally tools are grouped into categories:
- Antimalware (3)
- Application-specific scanners (3)
- Web browser–related (4)
- Encryption tools (8)
- Debuggers (5)
- Firewalls (2)
- Forensics (4)
- Fuzzers (4)
- General-purpose tools (8)
- Intrusion detection systems (6)
- Packet crafting tools (6)
- Password auditing (12)
- Port scanners (4)
- Rootkit detectors (5)
- Security-oriented operating systems (5)
- Packet sniffers (14)
- Vulnerability exploitation tools (11)
- Traffic monitoring tools (10)
- Vulnerability scanners (11)
- Web proxies (4)
- Web vulnerability scanners (20)
- Wireless tools (5)