Three and a half years after the release of version 6, the developers of the Nmap Security Scanner announced this week the availability of Nmap 7.0.0.
Nmap, short for Network Mapper, is a free and open source tool designed for network discovery and security auditing. The utility, available for all major operating systems, can be highly useful for identifying malware-infected, unauthorized, and vulnerable devices on a network.
According to the Nmap Project, Nmap 7 is the result of almost 3,200 code commits and brings several significant improvements compared to previous versions.
One of the most important enhancements is related to the Nmap Scripting Engine (NSE), which allows users to create scripts designed to automate networking tasks. More than 170 new scripts have been added since the release of version 6, bringing the total count to 515.
Nmap 7 also brings faster scans, improved IPv6 support, faster and better SSL/TLS-related scans, and an updated version of the Ncat utility.
Nmap Security Scanner 7 can be used on Microsoft’s latest operating system, Windows 10, but it also works on older versions, such as Vista and even XP, although the developers recommend against the outdated OS. In the case of Mac operating systems, Nmap runs on OS X 10.8 Mountain Lion through 10.11 El Capitan. Support for IBM’s AIX and Oracle’s Solaris UNIX operating systems has also been updated.
The Nmap Project says it has also made some improvements to its infrastructure to ensure that it can handle a growing user base. The official website, nmap.org, has been moved to HTTPS, and an official bug tracker has been launched on GitHub.
In total, 330 significant improvements have been made to the scanner since the last major release.
The release of Nmap 7 comes shortly after the developers of Wireshark, the popular network protocol analyzed used by many security researchers, announced the availability of version 2.0.
Wireshark 2.0 comes with a new user interface for enhanced user experience, new and updated features, API changes, and many bug fixes.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
