Nmap Security Scanner
Web Page: http://nmap.org/soc/
Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
- Network Discovery specialist A good recap of the project could be found in this blog post: http://kroosec.blogspot.com/2012/08/google-summer-of-code-with-nmap-recap.html
- Nmap Scripting Engine - Vulnerability and exploitation specialist Developing new NSE scripts for detecting remotely exploitable high impact vulnerabilities and widespread malware to leverage Nmap's scanning capabilities.
- NSE - script development Using Nmap Scripting Engine (NSE), users can write scripts which automate networking tasks. My project is to enhance existing scripts and write new ones.
- The Great Bug Hunt I have worked with NMap before and love using it as a tool in my security analysis toolbox. I am an experienced bug hunter and hope to put my skills to good use on my favorite project.