Free Security Scanner For Network Exploration & Security Audits

Zenmap

Zenmap 7.96

  -  34.04 MB  -  Open Source
  • Latest Version

    Zenmap 7.97

  • Operating System

    Windows 10 (32-bit) / Windows 10 (64-bit) / Windows 11

  • User Rating

    Click to vote
  • Author / Product

    Gordon Lyon / External Link

  • Filename

    nmap-7.96-setup.exe

  • MD5 Checksum

    29671b2bd2f85bbe2c1a4001f5dd35be

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Zenmap 7.96.


For those interested in downloading the most recent release of Zenmap or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

Why is this app published on FileHorse? (More info)
  • Zenmap 7.96 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Zenmap 7.96 Screenshot 1
  • Zenmap 7.96 Screenshot 2
  • Zenmap 7.96 Screenshot 3

What's new in this version:

- [Nping]Promoted Nping version number from a 0.7.95 alpha release to the same release version as Nmap
- Fixed an issue preventing the Nmap OEM 7.95 uninstaller from correctly uninstalling Nmap OEM
- [Zenmap]Fixed a Zenmap crash in DiffViewer when Ndiff exits with error
- [Zenmap]Fixed several UnicodeDecodeError or UnicodeEncodeError crashes throughout Zenmap
- [Zenmap]Fixed an issue preventing Zenmap from launching if nmap was not in the PATH. The issue primarily affected macOS users
- Fixed a couple of issues with parsing the argument to the -iR option
- [NSE]Added TLS support to redis.lua and improved -sV detection of redis
- [Zenmap]Added dark mode, accessed via Profile->Toggle Dark Mode or window::dark_mode in zenmap.conf
- Upgraded included libraries: Lua 5.4.7, libssh2 1.11.1, libpcap 1.10.5, libpcre 10.45
- [NSE]New script targets-ipv6-eui64 generates target IPv6 addresses from a user-provided file of MAC addresses, using the EUI-64 method
- [NSE]New service probes and scripts for MikroTik's WinBox router admin service. mikrotik-routeros-version queries the 'info' and 'list' files to get the RouterOS version. mikrotik-routeros-username-brute brute-forces usernames for the router using CVE-2024-54772
- Fix 2 potential crashes in parsing IPv6 extension headers discovered using AFL++ fuzzer
- [Nping]Bind raw socket to device when possible. This was already done for IPv6, but was needed for IPv4 L3 tunnels
- [Ncat]Ncat in connect mode no longer defaults to half-closed TCP connections. This makes it more compatible with other netcats. The -k option will enable the old behavior. See https://seclists.org/nmap-dev/2013/q1/188
- [Nsock]Fix an issue affecting Ncat where unread bytes in the SSL layer's buffer could not be read until more data arrived on the socket, which could lead to deadlock
- [Ncat]New Ncat option -q to delay quit after EOF on stdin, the same as traditional netcat's -q option
- [Ncat]Ncat in listen mode with -e or -c correctly handles error and EOF conditions that had not been being delivered to the child process.
- [Ncat][Windows]All Nsock engines now work correctly. The default is still 'select', but others can be set with --nsock-engine=iocp or --nsock-engine=poll
- [NSE]SSH NSE scripts now catch connection errors thrown by the libssh2 Lua binding, providing useful output instead of a backtrace
- [NSE]Several fixes and extensions to the libssh2 NSE bindings: fixed libssh2.channel_read_stderr, which was reading stdout instead; add binding for libssh2_userauth_publickey_frommemory; allow open_channel to avoid allocating a pty;
- [Nsock][Windows]Fixed the IOCP Nsock engine, which had been demoted since Nmap 7.91 due to unresolved issues around SSL sockets and IPv6
- [Nsock]Improvements for platforms without selectable pcap handles (e.g. Windows). Interleaved pcap and socket events were favoring pcap reads, possibly resulting in timeouts of the socket events
- [Nsock]Improved memory performance of poll engine on Windows
- [Nsock]Improvements to Nsock event list management, fixing errors like "could not find 1 of the purportedly pending events on that IOD."
- Fixed the issue where TCP Connect scans (-sT) on Windows would show 'filtered' instead of 'closed', due to differences in understanding timeouts.
- Nmap will now allow targets to be specified both on the command line and in an input file with -iL. Previously, if targets were provided in both places, only the targets in the input file would be scanned, and no notice was given that the command-line targets were ignored
- Nmap now performs forward DNS lookups in parallel, using the same engine that has been reliably performing reverse-DNS lookups for nearly a decade. Scanning large lists of hostnames is now enormously faster and avoids the unresponsive wait for blocking system calls, so progress stats can be shown. In testing, resolving 1 million website names to both IPv4 and IPv6 took just over an hour. The previous system took 49 hours for the same data set!
- When Nmap is used with --disable-arp-ping, a local IP that cannot be ARP-resolved will use the "no-route" reason instead of the "unknown-response" reason, since no response was received.
- [NSE]Various bug fixes in the mssql NSE library
- [NSE]Testing for acceptance of SSH keys for a given username caused heap corruption
- [NSE]Scripts were not able to load SSH public keys. from a file
- [NSE]Encryption/decryption performed by the OpenSSL NSE module did not work correctly when the IV started with a null byte
- [NSE]Arbitrary separator in stdnse.tohex() is now supported. Script smb-protocols now reports SMB dialects correctly
- [NSE]ether_type inconsistency in packet.Frame has been resolved. Both Frame:new() and Frame:build_ether_frame() now use an integer
- Nmap is now able to scan IP protocol 255