Port Scanning Hacking Tools

Port Scanner Tools For 2024

Port Scanning is one of the initial steps that a Penetration Tester (‘Ethical Hacker’) will take to determine how secure a network or web application is from black hat hackers.

Port Scanning Software, of which there is plenty, is a ‘must-learn’ if you are serious about becoming a Cybersecurity Professional. We’ve tried to list as many useful and ‘user-friendly’ Port Scanning Tools that we have used in the past.

What is Network Scanning?

This concept refers to, somewhat obviously, scanning the network! ‘Ports’ on a network can be considered as being the entry points to a machine, or computer (box) that is connected to the Internet. An application or service that listens on port functions by receiving data (bytes) from a client application, processing that data and then sending it back.

If a network is hacked into, or compromised, then a malicious client can be programmed to exploit vulnerabilities in the server code with the purpose of being able to gain access to sensitive data or execute malicious code remotely. The communication and commands would be administered through the implementation of a Remote Access Tool (RAT).

What is Port Scanning?

Network scanning and port scanning are often used interchangeably. Port scanners (of which there are several, such as Angry IP Scanner, NetScanTools, Unicornscan, and NetworkMiner) are used by the system and network administrators to verify security profiles of networks to prevent hackers from being able to identify services running on a host that have exploitable vulnerabilities.

Of course, if a network admin (or any other IT professional) performing a scan discovers a vulnerability then their priority is to patch the hole without delay. Port scanning is a task performed in the initial phase of a penetration test (‘pentest’) in order to establish all network entry points into the target system.

Why Are There So Many ‘Network and Port Scanning’ Tools?

At first, it might seem that there are a ton of ‘similar’ tools.

However, most of these tools serve a particular need, or said in a more technical way, the tools have expertise with regards to certain protocol scanning, for example, some are better at TCP ports scanning rather than UDP ports scanning and vice versa.

Nmap (Network Mapping Tool)
Angry IP Scanner
Netscan Tools
Unicorn Scan

Nmap (Network Mapping Tool)

Nmap is an abbreviation for ‘Network Mapper’ – ‘Network’ in an IT sense of the word. This is a classic hacking tool and perhaps the most famous one on our list.

You can consider Nmap as being one of the best-known, and in fact, one of the most useful hacking tools out there. Period. If you are serious about pentesting, ethical hacking and IT Security in general, then learning Nmap is essential.

Is Nmap Free?

You betcha!

In fact, a lot of other tools out there, Metasploit for example, pulls in Nmap for network discovery and security auditing. Many system admins will use Nmap along with other such tools as Wireshark (and perhaps even ‘Network Miner’) for a wide variety of port and network scanning. If you’re completely new to port and network scanning then we’d suggest this article here.

How does Nmap Work?

Nmap tool works by inspecting raw IP packets in creative ways to understand what hosts (servers) are available on the network, what services (application name and version) those hosts are using, what operating systems (including Operating System versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target. In summary, you’ve got to learn Nmap and if you want to work in Cyber Security as a practitioner.

Does Nmap Work on all Operating Systems?

Yes, Nmap works on all major computer operating systems, and official binary packages are available for Linux, Windows, Mac OS X, IRIX, and AmigaOS. Of course, there’s a much easier way to install Nmap – just use Kali Linux or use BackBox since it ships with Nmap and you’ll be able to update the program with ease.

A Brief word about ‘Zenmap’

Zenmap is the GUI version of Nmap. Here’s our advice: learn how to use Nmap, but when you’re out in the field performing a penetration test etc., then fire-up Zenmap. The awesome thing about Zenmap is that it pre-loads all the command lines in one go so you don’t have to start tapping ‘nmap’ into the command terminal to load the command help prompts.

Angry IP Scanner

Angry IP Scanner is another classic tool that could (and should be) used in tandem with nmap and other similar tools for hacking and monitoring networks. Angry IP Scanner is a cross-platform and, like nmap, is an open-source network scanner created to for fast and efficient deployment.

From our experience, the Angry IP Scanner is very easy to use.

Angry IP Scanner is mostly used by network administrators but it can also be used for penetration testing.

Features of this particular hacking software include IP Range Scanning and being able to exports results in many formats and provide a command-line interface.

Is Angry IP Scanner Free?

Yes! This tool is completely free.

Does Angry IP Scanner Work on all Operating Systems?

It runs on Linux, Windows and MAC OS X operating systems.

What are the Typical Uses for Angry IP Scanner?

One of the uses of this tool is to scan IP addresses and ports to find out what is out there on the network.

Netscan Tools

NetScanTools is really a collection of different pentesting tools that a system admin would find particularly useful.

The range of network toolkits is designed for those who work in network engineering, network security, network administration, network training, or law enforcement internet crime investigation. Like many other pentester tools in our series, the developers offer a free and commercial grade of their products.

Is NetScanTools Free?

NetScanTools has a free and commercial product available.

Does NetScanTools Work on all Operating Systems?

It is designed for Microsoft Windows operating systems.

What are the Typical Uses for NetScanTools?

NetScanTool was created to help people in internet information gathering and network troubleshooting. With this tool, you can automatically research IPv4 and IPv6 addresses, domain names, hostnames, email address and URLs. Tools that are automated are started by the user and it means that several tools are being used to do the research and then the results will be presented in the users’ web browser.

Unicorn Scan

Unicornscan is another tool that is similar to nmap, Angry IP Scanner, and NetScanTools. This tool works by gathering and correlating datasets for analysis. This hacking software was created to provide an engine that is, according to the developers: “Scalable, Accurate, Flexible, and Efficient”.

It is released for the community to use under the terms of the GPL license.

Is Unicornscan Free?

Yes sir, Yes Ma’am! Using this tool is free.

Does Unicornscan Work on all Operating Systems?

Unicornscan currently works on Linux operating systems but this could be wrong – please verify.

What are the Typical Uses for Unicornscan?

Unicornscan is intended to give hackers and penetration testers a way to visualize TCP/IP packets.

Features of this tool include

An Asynchronous stateless TCP banner grabbing, asynchronous stateless TCP scanning with all variations of TCP Flags, asynchronous protocol specific UDP Scanning (sending enough of a signature to elicit a response), PCAP file logging and filtering, relational database output, active and Passive remote OS, application, and component identification by analyzing responses, custom module support and customized data-set views

Unicornscan Website

There’s a good resource here if you’re interested.


Is Port Scanning Against The Law?

In the US there isn’t a Federal Law that outright bans port scanning using specific tools but you still need to be very careful because your actions would constitute a violation of privacy. Furthermore, performing an authorized port scan of a network using (for example) nmap or a similar hackers tool like that, could get you into a ton of issues within a civil lawsuit capacity. So, the short answer is no – but – it’s technically illegal because it’s a breach of privacy.

What Is A Port Scanning Attack?

A hacker or a Cybersecurity Professional such as an “Ethical Hacker” or a Penetration Tester (with explicit permission) would initiate a port scan to see what’s on the network. A “Port Scanning Attack” is a broad term that implies that an offensive attack has been executed to breach a system, but in reality, a port scan is only an important step within the penetration test.

The actual scan would be done using a port scanning tool like nmap whilst the “attack” would be done by something like Metasploit if a vulnerability is discovered on a specific port. They’d work together, therefore: the scanning would discover what can be hacked and a tool like Metasploit with exploit the discovered vulnerability, assuming that it hadn’t been patched. So, in summary, you’d be using a bunch of tools available o both security professionals as well as hackers.”

What Do Port Scanning Tools And Software Typically Search For?

TCP and UDP are generally the protocols used in port scanning, as previously mentioned and there are several methods of actually performing a port scan with these protocols. The most commonly used method of TCP scanning is SYN scans

The two most common protocols that a port scanning tool would search for would be the obvious (and most commonly found on HTTP), i.e. TCP and UDP. They are both different protocols of course: TCP/IP is really datasets (packets) which constitute the vast majority of internet traffic whilst UDP is generally more for media.

Hacking tools such as nmap is very good at scanning the ports that are associated with these protocols as well as executing the transit of packet formations typically associated with TCP and UDP.

How does using a port scanning tool help a hacker?

Cybersecurity Professionals and “Criminal Hackers” would typically use a port scanning tool and software because it’s a simple way to audit or “discover” what’s on your target’s network. When you know what’s on the network then you can decide on what can (and could) be hacked. Think of port scanning in the same way as conducting an “audit”.

What’s An Average Speed When Executing A Port Scanner?

It’s impossible to calculate “how long” a port scan will take because there is a multitude of variables that dictate the speed and accuracy of a port scan. However, one thing is for certain: the noiser the scan is the more likely that a firewall and security alarms will be triggered. It’s typical for hackers to move slowly and scan even slower to avoid detection.

Are Port Scans Unsafe?

No, they’re not. An innocent scan performing expected pings or sending anticipated TCP/UDP packets will not bring down a network. However, a skillful hacker can manipulate packets (“craft packets”) to test for specific known vulnerabilities on a system.

Is It Possible To Prevent Your Network Being Scanned?

While it’s virtually impossible to prevent your network from all types of port scans, there are best practices available to all that will protect your network. A lot of these tools are provided by Cybersecurity vendors as well as there being open source options. A simple Firewall configured correctly will help prevent “script kiddie” attacks.

Once A Hacker Finds An “Open Port” What Do They Do?

A hacker executes a port scan using a particular software tool to discover ports that shouldn’t be open. Once the hacker (or Security Professional) has discovered an open port then a decision can be made as to whether the service with the open port can be breached and to what outcome.

Why Is It Necessary To Use Proxy In Executing A Scan?

Hiding your tracks is vital for a skilled hacker and that’s why a lot of hackers and “Ethical Hackers” learn the importance of using proxies when using port scanning software.

Rootkit Detectors & Software

Rootkit Tools 2024

Detecting Rootkits can be very challenging.

The hacker wants to insert a (preferably) hidden Rootkit on the victim’s machine whilst the competent programmer will think of ways to prevent the hacker from doing so.

The Rootkit Software tools that we list here we hope will be of use to you.

If you are interested in becoming a programmer or a Cybersecurity Pro then learning how Rootkits work will only benefit your career.

Advanced Intrusion Detection Environment (AIDS)

Advanced Intrusion Detection Environment (AIDE)

Advanced Intrusion Detection Environment (simply abbreviated to AIDE) is taking a “snapshot” of the state of the system, modification times, register hashes and other data.

The “image” is then used to create a database that is saved and may be stored on an external device. Features of this tool include supported messages digest algorithms (md5, sha1, tiger, rmd160, crc32, sha256, etc.), supported file attributes, plain text configurations files, powerful regular expression support and many more.

Is Advanced Intrusion Detection Environment Free?

Yes. AIDE is free.

Does Advanced Intrusion Detection Environment Work on all Operating Systems?

AIDE works on Linux, MAC OS X, and Windows Operating systems.

What are the Typical Uses for Advanced Intrusion Detection Environment?

AIDE is used to build a database from the regular expression rules that it will find from the config files. Once initialized, this database can be used to authenticate the integrity of the files. It has several message digest algorithms that are being used to check the integrity of this file. All the common file attributes can also be verified for inconsistencies. It can read databases from newer or older versions.


Dumpsec is a security program created for Microsoft Windows. It can dump the DACLs and SACLs for the file system, printer, registry and share it in a detailed and readable format.

This tool can also dump user, group and replication data.

Is DumpSec Free?

DumpSec is now free to use!

Does DumpSec Work on all Operating Systems?

It only works for Microsoft Windows operating systems.

What are the Typical Uses for DumpSec?

DumpSec is used to identify and fix weaknesses or security holes in systems. This tool can assist people who work for legitimate businesses who are trying to create security into established IT systems against different hackers.


HijackThis is an open-source tool to detect adware and malware on Microsoft Windows. This tool is known for quickly scanning a computer to display the common location of a malware.

HijackThis is for the diagnosis of malware and adware and not to remove it. Uninformed use of these tools’ removal facilities can lead to software damage to a computer. Doing a browser hijack can also cause malware to be installed on a computer.

Is HijackThis Free?

Yes. This tool is free.

Does HijackThis Work on all Operating Systems?

It only works for Microsoft Windows operating systems.

What are the Typical Uses for HijackThis?

HijackThis is used to inspect the browser and operating system settings of a computer to generate a log file of its current state. It can also be used to remove unwanted files and settings. It focuses on web browser hijacking.


Sysinternals Live is one service that lets you execute Sysinternals tools directly from the internet without hunting for and manually downloading the tools. Simply enter a tool’s Sysinternal Live path into command prompt or windows explorer.

Is Sysinternals Free?

Yes! This tool is free.

Does Sysinternals Work on all Operating Systems?

It only works for Microsoft Windows operating systems.

What are the Typical Uses for Sysinternals?

Sysintenals is primarily used for ProcessExplorer – monitor directories and files opened by any process. PsTools – Managing local and remote processes. Autoruns – Discover what executables are set to run during login or boot up. RootkitRevealer – Detect file system and registry API discrepancies that may indicate the presence of a kernel-mode or user-mode rootkit and TCPView – View UDP and TCP traffic endpoints used by each process.


Tripwire is a directory and file integrity checker. This tool helps system administrators and users in checking a designated set of files for changes. This tool can notify administrators if there are tampered or corrupted files so damage control measures can be taken.

Is Tripwire Free?

Open-source Linux version of this tool can still be found at SourceForge but the company Tripwire Corp is now focused on their paid enterprise configuration control offerings.

Does Tripwire Work on all Operating Systems?

It works on Linux, MAC OS X and Windows operating systems.

What are the Typical Uses for Tripwire?

Tripwire products are useful for detecting intrusions after an event. It can serve other purposes such as assurance, integrity, policy compliance, and change management.


How Does A Rootkit Work?

A rootkit is a nefarious hacking manner that is malicious software that allows an unauthorized user (hacker) to have privileged access to a computer system and to restricted areas of the operating system. A rootkit typically contains a number of malicious hacking tools such as keyloggers, banking credential stealers, password crackers, antivirus disablers, and for example bot activations for DoS attacks.

A rookit scanning tool works by comparing the files of known “clean” code against a set of differences. Should a difference be found by the tool or software then you can assume that there may have been a compromise of the Operating System.

What Is Meant By Rootkit Scan?

A rootkit scan is performed by a hacking tool (penetration testing tool) to seek indications of the insertion of malicious software by hackers.

Are rootkits against the law?

Malicious or illegal rootkits used by hackers to infiltrate and breach systems are certainly illegal. However, the interesting thing about a rootkit is that on its’ own it is not defined as being specifically “malware”.

Can Rootkits Be Removed?

Rootkits is dangerous software that has the ability to gain root access to your computer and/or network. Whilst there are ways to remove the rootkit from your system, we here at Concise Courses would recommend that you just simply reinstall the Operating System to a known clean version or do a factory reinstall.

What Are Typical Characteristics Of A Rootkit?

Typical characteristics of a rootkit are that they are inserted by a computer hacker against your will and that they can be “persistent”. A persistent rootkit is a typical characteristic in the sense that it will be activated every time the system boots up. The easiest and most effective way of fixing this hack is to simply reinstall the operating system.

How Risky Are Rootkits To A Victim’s Computer?

The danger of a rootkit does not come from the code itself because the purpose of the malicious code is to hide files and processes from other applications as well as the operating system virus scanning tools.

How Does A Hacker Install A Rootkit?

The easiest way would be to have physical access to the victim’s machine. The second easiest way is to send a phishing attack. In reality, there are a dozen different ways for a hacker to get their victim to inadvertently install a rootkit but they all, for the most part, require the victim to inadvertently “help” the hacker by taking an action, for example – by installing an app that looks legitimate but actually contains the rootkit virus.

Is Windows Defender Good At Scanning For Rootkits?

Each time your (Windows) computer boots the “Windows Defender” application will start and by default starts to scan your system automatically which also includes the root architecture of your machine. If any rootkit or virus is detected, the antivirus tool will attempt to remove it automatically.

How Possible Is It That A Rootkit Can Also Infect The BIOS?

A BIOS-level rootkit attack, also known in the Cybersecurity industry as a persistent BIOS attack, is an exploit in which the BIOS of a machine is flashed (which really means updated) with malicious code. A BIOS rootkit is programming that would allow the hacker to have remote administration. The BIOS (basic input/output system) is firmware that every machine has (cross-platform) that resides in memory and is executed each time a computer boots up.

What Computer Languages Are Rootkits Written In?

Operating system startup routines are most likely to be written in C, so drivers are inevitably written in C as well (not C++) meaning that rootkits would also need to be written in the same language. So, the answer is “C”.

Traffic Monitoring Hacking Tools

Traffic Monitoring Tools To Use In 2024

Understanding what is going in and out of your network is vital! If you are unfamiliar to this concept then go ahead and read up about ingress and egress traffic.

Clearly the first step is to understand what should be on your network and what shouldn’t be on your network! The tools listed on this resource we hope are of use to you.

We’ve played with many of them and whilst there is no perfect solution they are all vital to learn how to use if you’d like to become a Penetration Tester or System Network Engineer or System Admin.



This tool is a network packet analyzer and this kind of tool will try to capture network packets used for analysis, network troubleshooting, education, software, and communications.

We’ve covered Wireshark a lot – the best summary, if you are new to it, would be here.


Argus can be used to help support network security management and network forensics and is compatible with Wireshark and Nmap.

With the right strategies, argus data can be mined to determine if you’ve been compromised or attacked historically after an attack has been announced and indicators-of-compromise (IOCs) have been established.

Is Argus Free?

Using Argus tool is free of charge!

Does Argus Work on all Operating Systems?

Argus works on Linux, MAC OS X, and Windows operating systems.

What are the Typical Uses for Argus?

Argus can easily be adapted to be a network activity monitoring system, easily answering a variety of activity questions (such as bandwidth utilization). It can also be used to track network performance through the stack and capture higher-level protocol data. With additional mining techniques (such as utilizing moving averages), Argus data can be used for “spike tracking” of many fields.


Etherape is a Graphical Network Monitor that is modeled after etherman. It features an IP, TCP and link-layer modes that displays network activity graphically.

Links and hosts change in size with traffic. It also has a color-coded protocols displays. This tool supports Hardware and Protocols such as FDDI, Ethernet, ISDN, Token Ring, SLIP, PPP and WLAN devices plus a lot of encapsulation formats. EtherApe can filter traffic to be shown and can read packets coming from a file as well as life from the network. Node statistics can also be exported.

Is Etherape Free?

Yes, Etherape is free to use.

Does Etherape Work on all Operating Systems?

Etherape works on Linux and MAC OS X operating systems.

What are the Typical Uses for Etherape?

Etherape is primarily used to track several types of network traffic.

How Do You Install Argus?

We’d recommend you hit this link for more information.


Ettercap is an open-source network security tool made for man in the middle attacks on local area networks.

It works by ARP poisoning the computer systems and putting a network interface into promiscuous mode. Thereby it can unleash several attacks on its victims. It also has plugin support so features can be extended by putting new plugins.

Is Ettercap Free?

Ethercap is free and can be downloaded through their website which can be found on their website.

Does Ettercap Work on all Operating Systems?

It works on several operating systems including Windows, Mac OS X, and Linux.

What are the Typical Uses for Ettercap?

Ettercap is used to content filtering on the fly, sniff live connection and many more. It is also used for security auditing and computer network protocol analysis. It has the capability to intercept traffic on a network segment, conduct active eavesdropping against common protocols and also used to capture passwords.

How Do You Install Etherape?

Follow these commands (one line at a time)

sudo apt-get install zlib1g zlib1g-dev

sudo apt-get install build-essential

sudo apt-get install ettercap


Nagios is a network and system monitoring application. It monitors services and hosts that you specify, alerting you when things go bad or when things get better.

Some of the many features of Nagios include monitoring of your entire IT infrastructure, know immediately when problems arise, spot problems before they occur, detect security breaches, share availability data with stakeholders, plan, and budget for IT upgrades and reduce downtime and business losses.

Is Nagios Free?

This application is free to use.

Does Nagios Work on all Operating Systems?

Nagios is available for Linux operating systems.

What are the Typical Uses for Nagios?

Nagios is used to monitor network services such as SMTP, POP, HTTP, ICMP, NNTP etc. It is also used for monitoring host resources, contact notifications when host or service problems occur and gets resolved.


This tool has been mentioned a few other times in our directory. It is complementary to the other tools listed within this category.

Ngrep is similar to tcpdump, but it offers more in that it will show the ‘regular expression’ in the payload of a packet, and also demonstrate the matching packets on a screen or console. The end result is that the user (typically a penetration tester or network security engineer) will see all unencrypted traffic being passed over the network. You need to put the network interface into promiscuous mode in order for this to work.

Is Ngrep Free?

Downloading and using of Ngrep is free.

Does Ngrep Work on all Operating Systems?

It works on operating systems running Linux, Windows and MAC OS X.

What are the Typical Uses for Ngrep?

Ngrep is used to store traffic on the wire and store pcap dump files and read files generated by tools like tcpdump or wireshark.


Ntop is a network probing tool used by cybersecurity professionals to show network usage. When in ‘interactive mode’ ntop displays the network status on an end user’s terminal.

If placed on ‘web mode’, this tool will behave like a web server and will create an HTML dump of the network status. It supports a Flow emitter/NetFlow/collector which is an HTTP-based client interface for making ntop-centric monitoring applications and RRD for storing traffic statistics persistently.

Is Ntop Free?

Yes, Ntop is free to use.

Does Ntop Work on all Operating Systems?

Ntop works on Linux, Microsoft Windows, and MAC OS X operating systems.

What are the Typical Uses for Ntop?

Ntop is used to show network usage in real-time. You can use web browsers like Google Chrome or Mozilla to manage and navigate through traffic information to understand more about network status. It monitors and supports protocols like Decnet, DLC, AppleTalk, TCP/UDP/ICMP, (R)ARP, Netbios and IPX.


p0f is a very effective and well-known passive fingerprinting tool that comes highly recommended. p0f is a passive fingerprinting tool that can identify the machines you connect to, machines that connect to your box and even machines that go near your box even if that device is behind a packet firewall.

Is P0f Free?

The use of this tool is free.

Does P0f Work on all Operating Systems?

P0f works on Linux, Microsoft and MAC OS X operating systems.

What are the Typical Uses for P0f?

P0f is used to identify the target host’s operating system by simply examining packets captured even when the device is behind a packet firewall. It can also detect what kind of remote system is hooked up to or how far it is located. The latest beta can detect illegal network hook-ups. P0f can detect types of NAT setups and packet filters and can sometimes determine the ISP of the other person.


SolarWinds Firewall Security Manager (FSM) is a great solution for organizations and companies who need reporting and expert management on their most critical security devices.

Set-up and configuration of this product are pretty straightforward and multi clients can be deployed to allow multiple administrators to access the system.

Is SolarWinds Free?

No. SolarWinds is a paid product offered by an excellent and well-respected company.

Does SolarWinds Work on all Operating Systems?

SolarWinds works on Windows operating systems.

What are the Typical Uses for SolarWinds?

Uses of this tool include network discovery scanners, router password decryption, SNMP brute force cracker, and TCP connection reset program.


Splunk captures, indexes and then correlates data in a searchable repository from which it can generate reports, graphs, alerts, visualization, and dashboards. Considered as one of the best security tools, the sheer power of this thing is incredible. It can scale endlessly and also has the ability to cluster.

Is Splunk Free?

A commercial version is available. Free versions may also be offered.

Does Splunk Work on all Operating Systems?

Works natively for Linux and MAC OS X.

What are the Typical Uses for Splunk?

Splunk is used to search, monitor, report and analyze real-time streaming and historical IT data. It can collect logs from different sources and make them searchable in a unified interface.


If My Internet Is Slow Does It Mean The Network Is Hacked?

There are many possible reasons your Internet connection might seem to be slow. Potential problems include issues with your modem or router, Wi-Fi signal, signal strength on your cable line, the number of devices on your network saturating your bandwidth, or even a slow DNS server. It does NOT necessarily mean that someone has installed some sort of hacking network device, software or tool on your network.

Can Wireshark Be Detected On A Network?

You can’t detect a fully passive sniffing tool (such as Wireshark) on the network when in “fully passive” mode because the software uses a network card with its TCP/IP stack disabled. That way the tool card will only listen and never talk, so it’s almost impossible to detect Wireshark.

Vulnerability Scanning Hacker Tools

‘Vulnerability Exploitation Scanning Software’ can make the life of a Pentester easy easier.

However, a good Penetration Tester (‘Ethical Hacker’) will never rely solely on their tools. The ‘human’ and the ‘tool’ when combined can have very difficult results. What is often the case in the corporate world is when a Penetration Test is commissioned by the client they might often request that a second Red Team come into the organization to conduct the same test.

The reason for this is not so much to ensure a competitive atmosphere but rather it is done to compare the results of offensive security teams since it is very likely that the teams will be using the same tools and hacking software that we have listed below.

If you prefer a list of CMS specific Vulnerability scanners then hit this list.

GFI LanGuard
Core Impact

GFI LanGuard

GFI Languard is a vulnerability and network security scanner that provides a concise analysis of the state of your network. Included here are the default configurations or application that poses as a security risk. This tool can also provide you a clear and complete picture of installed programs, mobile devices that connect to Exchange servers, the hardware on your networks, state of security applications, open ports and existing services and shares running on computers.

Is GFI LanGuard Free?

A commercial version is available. Free trial versions may also be offered.

Does GFI LanGuard Work on all Operating Systems?

GFI works on Microsoft Windows operating systems.

What are the Typical Uses for GFI LanGuard?

GFI Languard is used to aid with network and software audits, patch management and vulnerability assessments.


This tool works great as a vulnerability scanner and highly recommended. We’ve actually reviewed this tool before.


Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that helps confirm the security of your computer based on Microsoft security recommendations. After the tool completes the scan on your computer, you receive specific remediation suggestions. Use MBSA to improve your security management process by detecting common security misconfigurations and missing security updates on your computer systems.

Is MBSA Free?

Yes. All versions of this tool are free of charge.

Does MBSA Work on all Operating Systems?

It currently works on Microsoft Windows operating systems.

What are the Typical Uses for MBSA?

This tool created for IT professionals is used to determine the state of security of small to medium-sized businesses. Please take note that MBSA only scans for missing security updates and critical or optional updates are left behind.


Nessus is one of the well-known vulnerability scanners particularly Unix operating systems. Even if they closed the source code in 2005 and removed the free version in 2008, this tool still beats many of its competitors. This tool is updated constantly with over 70,000 plugins. Features of this tool include local and remote security checks, client-server architecture with a web-based interface and embedded scripting language that enable users to write their own plugins and learn more about the existing ones.

Is Nessus Free?

A commercial version of this tool is available. There is a free Nessus tool version but it has limited features and can only be licensed for home network use.

Does Nessus Work on all Operating Systems?

It is compatible with Linux, MAC OS X and Windows operating systems.

What are the Typical Uses for Nessus?

Nessus is used to scan for the following vulnerabilities like misconfigurations, default passwords or a few common passwords and absent passwords on system accounts. Nessus can also an external tool like Hydra to launch a dictionary attack, denials of service against TCP/IP stack by using malformed packets or prepare for PCI DSS audits.


Sn1per has generated a lot of buzz, mostly because it just works great; runs smoothly and is designed to be an efficient tool that enumerates and scans for vulnerabilities. This hacking tool comes in three flavors: a Community Edition and paid versions (Professional and Enterprise).

You can check out their site for more information.

Sn1per, much like Metasploit, is integrated with many other popular hacking tools such as Nmap, THC Hydra, nbtscan, w3af, whois, nikto and of course WPScan. WPScan is particularly important because at the last check 33% of web CRM’s are WordPress.

How Does It Work?

Sn1per works by automating a bunch of processes that collect basic recon on a target domain, (for example executing dorks search parameters, enumerating open ports, scanning for a known web app for vulnerabilities, brute-forcing open servicing – and a lot more).

Much like Nmap, you can set the tool to be noisy or stealth.

We’d absolutely recommend this tool and would advise using it as an initial “what’s what” out there to garner some intel on a target during the initial stages of engagement (pentest).

(We should really place this tool in our Multi-Purpose Tools section!)


Made by the same folks that manage Metasploit (Rapid7) Nexpose is a vulnerability scanner that aims to support the whole vulnerability management lifecycle. This tool addresses the discovery, detection, verification, risk classification, impact analysis, reporting and mitigation of operating systems within a network. The tool integrates with Rapid7’s Metasploit for vulnerability exploitation. This tool is sold as standalone software, an appliance, virtual machine, or as a managed service or private cloud deployment.

Is Nexpose Free?

There are commercial versions of Nexpose that start with $2,000 per year and there is also a free but limited community edition this tool.

Does Nexpose Work on all Operating Systems?

Works for Microsoft Windows and Linux operating systems.

What are the Typical Uses for Nexpose?

Nexpose is used to gather fresh data and by its Live Monitoring, you can fix the problems in a matter of hours. By also using this tool, you can transform your data into detailed visualization so you can focus resources and easily share each action with IT, compliance, security and the C-Suite.


Nipper Studio processes the devices’ native configurations during a network audit and enables users to create various audit reports.

Using traditional methodology for your network audits, such as Agent-based software and Network Scanners or manual Penetration Testing, you could experience various drawbacks, which does not affect Nipper Studio security audit software. These network scanners send large numbers of network probes to a device and can impact performance. Only the exposed vulnerabilities are verified, potentially missing many issues.

Agent-based audit software requires software to be installed on the devices during the network audit. This is not possible for all devices and can introduce additional security vulnerabilities.

Manual Penetration Tests checks individual network devices in detail. However, this is slow, expensive and results in point in time audits of only a sample of devices.

Is Nipper Free?

A commercial version is available. Free or limited use may also be offered.

Does Nipper Work on all Operating Systems?

Nipper natively works on Linux, Microsoft Windows, and MAC OS X operating systems.

What are the Typical Uses for Nipper?

Network Infrastructure Parser is known as Nipper audits the security of network devices such as routers, switches, and firewalls. It can parse and analyze device configuration files which the user must supply.


OpenVas is a free vulnerability scanner that was forked out from the last free version of another vulnerability scanner (Nessus) after this tool went propriety in 2005. Plugins of OpenVAS are still written in the Nessus NASL language and even if this project seems dead for a while, its development has restarted.

Is OpenVAS Free?

Yes, all versions of this tool are free of charge.

Does OpenVAS Work on all Operating Systems?

OpenVAS is compatible with Linux and Windows operating systems.

What are the Typical Uses for OpenVAS?

OpenVAS framework is typically used for vulnerability scanning and vulnerability management.


QualysGuard is used for network discovery and mapping, vulnerability assessment reporting, remediation tracking according to business risk and vulnerability assessment.

QualysGuard aids businesses in simplifying security operations and lower the cost of compliance by providing critical security intelligence on demand and automating the full spectrum of auditing, protection for IT system, compliance, and web applications.

Is QualysGuard Free?

A commercial version is available. The free trial may also be offered.

Does QualysGuard Work on all Operating Systems?

It works natively on Linux, Microsoft Office, and MAC OS X operating systems.


This tool may be discontinued.

Just like the Nessus tool, Retina is used to monitor and scan all the hosts on a certain network and report any found vulnerabilities.

Retina is one of the security industry’s most respected and industry-validated vulnerability scanner and serves as the engine for our vulnerability management solutions. There’s no better option for securing your network from vulnerabilities.

Is Retina Free?

Retina is a paid program that starts at $1,700.00.

Does Retina Work on all Operating Systems?

Retina is a Microsft Windows-only tool.


This tool has been discontinued, but the codebase remains on GitHub.

SAINT is a paid product that provides support to the Security Content Automation Protocol specification as an Authenticated vulnerability, unauthenticated vulnerability scanner. There are four steps of a SAINT Scan…

Step 1 is to screen every live system on a network for TCP and UDP services.

Step 2 is for each service that it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service, or gain sensitive information about the network.

Step 3 is to scan for vulnerabilities and the last step is that when vulnerabilities are detected, the results are categorized in several ways, allowing customers to target the data they find most useful.

Is SAINT Free?

SAINT is used to be an open-source tool but like Nessus but is now a commercial vulnerability scanning tool.

Does SAINT Work on all Operating Systems?

It works on Linux and MAC OS X while other users say that it can also run on the Windows operating system and can scan Windows vulnerabilities.

What are the Typical Uses for SAINT?

SAINT is used to screen every live system on a network for UDP and TCP services. For every service and node that it discovers, it will launch a set of pings and probes designed to detect anything that will allow attackers or hackers to gain unauthorized access, gain sensitive information about the network or create a denial of service (DOS).


What does a vulnerability scanning tool do?

Vulnerability scanning using one of the tools listed in our resource works by inspecting potential points of exploitation on a computer or network to identify security holes that can later be patched by a Cybersecurity Professional.

A vulnerability scanning tool also typically detects and classifies system weaknesses in computers, networks and communications equipment (hardware) and predicts the effectiveness of countermeasures.

Is Nmap a vulnerability scanner?

Nmap doesn’t ship specifically as a vulnerability scanner but the NSE (Engine) is able to execute vulnerability checks. Many vulnerability detection scripts are available to security professionals (mostly Penetration Testers would find them useful).

Web Browser Hacking Tools

Browser Hacking Tools For 2020

We need to update this resource because there’s no doubt that hacking add-ons (extensions) for Firefox and Chrome are becoming more and more popular.

Name Of Tool
Tamper Data


Firebug is a free and open-source web browser extension that currently works on Firefox and Chrome.

Although not strictly speaking a ‘hackers tool’, Firebug helps the penetration tester understand how certain technologies and systems work and therefore he or she is able to find holes that might be able to be exploited.

Is Firebug Free?

Yes, Firebug is free.

Does Firebug Work on all Operating Systems?

Works on Linux, Microsoft Windows, and MAC OS X.

What are the Typical Uses for Firebug?

If you are unfamiliar with Firebug then consider it as a tool to check for bugs and checking CSS, HTML, DOM, XHR, and JavaScript. Firebug can also accurately analyze network usage and performance which has a huge benefit for most cybersecurity professionals.


NoScript is a good tool to see what works and doesn’t work with regards to Javascript.

NoScript or sometimes called NoScript Security Suite is an open-source extension designed for Mozilla Firefox, SeaMonkey and other Mozilla based web browsers.

Since a lot of web browser attacks require scripting, disabling “active” contents like JAVA or JavaScript will reduce the chances of exploitation. Once installed, it will take the form of a status icon in Firefox and will be displayed on every website to denote whether it has either allowed, blocked or partially allowed scripts to run on the page being viewed.

Is NoScript Free?

Yes. It’s absolutely free.

Does NoScript Work on all Operating Systems?

Yes, it’s working on all operating systems that have Firefox browser installed. What are the Typical Uses for NoScript? NoScript is typically used for blocking Java, Flash, JavaScript and other plugin contents.

Tamper Data

Tamper Data Mozilla Firefox extension that can modify and view HTTP requests before they are sent. It will show what data the web browser is sending on your behalf such as hidden form fields and cookies.

Is Tamper Data Free?

Yes! All versions of this tool are free of charge.

Does Tamper Data Work on all Operating Systems?

It works on all operating systems with Mozilla Firefox installed.

What are the Typical Uses for Tamper Data?

Tamper Data is used for tracking requests or responses and security testing of web-based applications.

Web Proxy Hacking Tools & Software

Anonymizing Tools For 2024

Remaining in the shadows is critical if you are a Black Hat Hacker.

In this resource we list certain tools and software that is all designed to hide and obfuscate identity through web proxies.

Paros Proxy
Rat Proxy


Fiddler is created for web debugging as well as for proxies. Debug traffic from Windows operating systems.

It ensures that the proper headers, cookies, and cache directives are transferred between the server and client. It can support any framework, including Java, .NET, Ruby, etc.

Is Fiddler Free?

Yes all versions of this tool are free of charge.

Does Fiddler Work on all Operating Systems?

It only works for Microsoft Windows operating systems.

What are the Typical Uses for Fiddler?

Fiddler is used for debugging web services and to automate responses. It can also be used to inspect all HTTP/HTTPS traffic, “fiddle” with the incoming or outgoing data and set breakpoints.

Paros Proxy

“Paros” Proxy was written for people who need to evaluate the security of their web applications which are written in Java.

This tool supports editing/viewing HTTP/HTTPS messages in real-time to change items such as cookies and form fields.

It also includes a web traffic recorder, web spider, a hash calculator, and an ability to scan for testing common web application attacks such as SQL injection and cross-site scripting.

Rat Proxy

Rat Proxy is a large passive and semi-automated security audit tool which has a very loyal following and community.

It is optimized for sensitive, accurate detection and automatic annotation of security-relevant design patterns and potential problems based on the observation of existing user-initiated traffic in web 2.0 environments.

Is Rat Proxy Free?

Yes. It’s free to use.

Does Rat Proxy Work on all Operating Systems?

Rat Proxy works on Linux, Mac OS X, and Windows.

What are the Typical Uses for Rat Proxy?

Typical uses of this tool include detection and broad classes prioritization of security problems such as script inclusion issues, dynamic cross-site trust model considerations, insufficient XSRF, and XSS defenses, content serving problems and a lot more.


sslstrip is created to make HTTP sessions look like HTTPS sessions. With a known private key, it can convert https links to http or to https.

For a secure channel illusion, this tool can also provide a padlock favicon. Normally, many HTTPS sites are accessed from a redirect on an HTTP page and some people don’t notice when their connection is not upgraded.

Is sslstrip Free?

All versions of this tool are free of charge.

Does sslstrip Work on all Operating Systems?

It works natively on Linux, Windows and MAC OS X operating systems.

What are the Typical Uses for sslstrip?

sslstrip is used to strip attack HTTPS. It can also be used to transparently hijack HTTP traffic on networks.


What is a Web Proxy?

The point of being a hacker is that you don’t get caught! So, a web proxy is one way to try to anonymize yourself. Spoofing mac addresses is just as important but for the purpose of this answer let’s define a web proxy as being a method used by hackers and “Ethical Hackers” to hide their IP addresses from the websites they visit (when hacking or auditing).

What is a Web Proxy Server?

A web proxy server acts as a gateway between you and the internet at large. Most modern proxy servers are able to execute a bunch more functions but in essence, their main purpose is to forward web requests. The additional benefit of proxy servers is that they also act as a firewall and web filter, provide shared network connections, and cache data to improve loading speeds.