{
	"id": "0aa36a31-7532-47c6-9ec0-5820398058ae",
	"created_at": "2026-04-06T00:13:03.665809Z",
	"updated_at": "2026-04-10T13:12:54.566361Z",
	"deleted_at": null,
	"sha1_hash": "3b87bc6f88c91a275a8e3a81f324e2fee859848f",
	"title": "Nmap: the Network Mapper - Free Security Scanner",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 75786,
	"plain_text": "Nmap: the Network Mapper - Free Security Scanner\r\nArchived: 2026-04-05 22:08:05 UTC\r\nDownload Reference Guide Book Docs Zenmap GUI In the Movies\r\nGet Nmap 7.99 here\r\nNmap.org has been redesigned! Our new mobile-friendly layout is also on Npcap.com, Seclists.org,\r\nInsecure.org, and Sectools.org.\r\nNmap 7.90 has been released with Npcap 1.00 along with dozens of other performance improvements, bug\r\nfixes, and feature enhancements! [Release Announcement | Download page]\r\nAfter more than 7 years of development and 170 public pre-releases, we're delighted to announce Npcap\r\nversion 1.00! [Release Announcement | Download page]\r\nNmap 7.80 was released for DEFCON 27! [release notes | download]\r\nNmap turned 20 years old on September 1, 2017! Celebrate by reading the original Phrack #51 article.\r\n#Nmap20!\r\nNmap 7.50 is now available! [release notes | download]\r\nNmap 7 is now available! [release notes | download]\r\nWe're pleased to release our new and Improved Icons of the Web project—a 5-gigapixel interactive collage\r\nof the top million sites on the Internet!\r\nNmap has been discovered in two new movies! It's used to hack Matt Damon's brain in Elysium and also to\r\nlaunch nuclear missiles in G.I. Joe: Retaliation!\r\nWe're delighted to announce Nmap 6.40 with 14 new NSE scripts, hundreds of new OS and version\r\ndetection signatures, and many great new features! [Announcement/Details], [Download Site]\r\nWe just released Nmap 6.25 with 85 new NSE scripts, performance improvements, better OS/version\r\ndetection, and more! [Announcement/Details], [Download Site]\r\nAny release as big as Nmap 6 is bound to uncover a few bugs. We've now fixed them with Nmap 6.01!\r\nNmap 6 is now available! [release notes | download]\r\nThe security community has spoken! 3,000 of you shared favorite security tools for our relaunched\r\nSecTools.Org. It is sort of like Yelp for security tools. Are you familiar with all of the 49 new tools in this\r\nedition?\r\nNmap 5.50 Released: Now with Gopher protocol support! Our first stable release in a year includes 177\r\nNSE scripts, 2,982 OS fingerprints, and 7,319 version detection signatures. Release focuses were the Nmap\r\nScripting Engine, performance, Zenmap GUI, and the Nping packet analysis tool. [Download page |\r\nRelease notes]\r\nThose who missed Defcon can now watch Fyodor and David Fifield demonstrate the power of the Nmap\r\nScripting Engine. They give an overview of NSE, use it to explore Microsoft's global network, write an\r\nNSE script from scratch, and hack a webcam--all in 38 minutes! (Presentation video)\r\nIcons of the Web: explore favicons for the top million web sites with our new poster and online viewer.\r\nWe're delighted to announce the immediate, free availability of the Nmap Security Scanner version 5.00.\r\nDon't miss the top 5 improvements in Nmap 5.\r\nhttps://nmap.org/\r\nPage 1 of 3\n\nAfter years of effort, we are delighted to release Nmap Network Scanning: The Official Nmap Project\r\nGuide to Network Discovery and Security Scanning!\r\nWe now have an active Nmap Facebook page and Twitter feed to augment the mailing lists. All of these\r\noptions offer RSS feeds as well.\r\nNmap (\"Network Mapper\") is a free and open source utility for network discovery and security auditing. Many\r\nsystems and network administrators also find it useful for tasks such as network inventory, managing service\r\nupgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine\r\nwhat hosts are available on the network, what services (application name and version) those hosts are offering,\r\nwhat operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and\r\ndozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts.\r\nNmap runs on all major computer operating systems, and official binary packages are available for Linux,\r\nWindows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an\r\nadvanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a\r\nutility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).\r\nNmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and\r\nCodetalker Digest. It was even featured in twelve movies, including The Matrix Reloaded, Die Hard 4, Girl With\r\nthe Dragon Tattoo, and The Bourne Ultimatum.\r\nNmap is ...\r\nFlexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls,\r\nrouters, and other obstacles. This includes many port scanning mechanisms (both TCP \u0026 UDP), OS\r\ndetection, version detection, ping sweeps, and more. See the documentation page.\r\nPowerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.\r\nPortable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD,\r\nOpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.\r\nEasy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as\r\n\"nmap -v -A targethost\". Both traditional command line and graphical (GUI) versions are available to suit\r\nyour preference. Binaries are available for those who do not wish to compile Nmap from source.\r\nFree: The primary goals of the Nmap Project is to help make the Internet a little more secure and to\r\nprovide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is\r\navailable for free download, and also comes with full source code that you may modify and redistribute\r\nunder the terms of the license.\r\nWell Documented: Significant effort has been put into comprehensive and up-to-date man pages,\r\nwhitepapers, tutorials, and even a whole book! Find them in multiple languages here.\r\nSupported: While Nmap comes with no warranty, it is well supported by a vibrant community of\r\ndevelopers and users. Most of this interaction occurs on the Nmap mailing lists. Most bug reports and\r\nquestions should be sent to the nmap-dev list, but only after you read the guidelines. We recommend that\r\nall users subscribe to the low-traffic nmap-hackers announcement list. You can also find Nmap on\r\nFacebook and Twitter. For real-time chat, join the #nmap channel on Freenode or EFNet.\r\nAcclaimed: Nmap has won numerous awards, including \"Information Security Product of the Year\" by\r\nLinux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles,\r\nhttps://nmap.org/\r\nPage 2 of 3\n\nseveral movies, dozens of books, and one comic book series. Visit the press page for further details.\r\nPopular: Thousands of people download Nmap every day, and it is included with many operating systems\r\n(Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000)\r\nprograms at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development\r\nand user support communities.\r\nNmap users are encouraged to subscribe to the Nmap-hackers mailing list. It is a low volume (6 posts in 2017),\r\nmoderated list for the most important announcements about Nmap, Insecure.org, and related projects. You can join\r\nmore than 128,000 current subscribers by submitting your email address here:\r\nWe also have a development list for more hardcore members (especially programmers) who are interested in\r\nhelping the project by helping with coding, testing, feature ideas, etc. New (test/beta) versions of Nmap are\r\nsometimes released here prior to general availability for QA purposes. You can subscribe at the Nmap-dev list info\r\npage.\r\nBoth lists are archived (along with many other security lists) at Seclists.org.\r\nThough it isn't nearly as active as the mailing lists, the official IRC channel is #nmap on Freenode\r\n(irc.freenode.net).\r\nSource: https://nmap.org/\r\nhttps://nmap.org/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://nmap.org/"
	],
	"report_names": [
		"nmap.org"
	],
	"threat_actors": [],
	"ts_created_at": 1775434383,
	"ts_updated_at": 1775826774,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3b87bc6f88c91a275a8e3a81f324e2fee859848f.pdf",
		"text": "https://archive.orkl.eu/3b87bc6f88c91a275a8e3a81f324e2fee859848f.txt",
		"img": "https://archive.orkl.eu/3b87bc6f88c91a275a8e3a81f324e2fee859848f.jpg"
	}
}