Free Security Scanner For Network Exploration & Security Audits

Zenmap

Zenmap 7.93

  -  27.77 MB  -  Open Source
  • Latest Version

    Zenmap 7.95

  • Operating System

    Windows 10 (32-bit) / Windows 10 (64-bit) / Windows 11

  • User Rating

    Click to vote
  • Author / Product

    Gordon Lyon / External Link

  • Filename

    nmap-7.93-setup.exe

  • MD5 Checksum

    f9e753cccea0ffae6871dc65f67d3f89

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Zenmap 7.93.


For those interested in downloading the most recent release of Zenmap or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Zenmap 7.93 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Zenmap 7.93 Screenshot 1
  • Zenmap 7.93 Screenshot 2
  • Zenmap 7.93 Screenshot 3

What's new in this version:

- This release commemorates Nmap's 25th anniversary! It all started with this September 1, 1997 Phrack article by Fyodor
- [Windows]Upgraded Npcap (our Windows raw packet capturing and transmission driver) from version 1.50 to the latest version 1.71. It includes dozens of performance improvements
- Ensure Nmap builds with OpenSSL 3.0 using no deprecated API functions. Binaries for this release include OpenSSL 3.0.5.
- Upgrade included libraries: libssh2 1.10.0, zlib 1.2.12, Lua 5.3.6, libpcap 1.10.1
- Fix a bug that prevented Nmap from discovering interfaces on Linux when no IPv4 addresses were configured
- [NSE][GH#2463]NSE "exception handling" with nmap.new_try() will no longer result in a stack traceback in debug output nor a "ERROR: script execution failed" message in script output, since the intended behavior has always been to end the script immediately without output.
- Update the Nmap output DTD to match actual output since the `<hosthint>` element was added in Nmap 7.90
- [NSE][GH#2496]Fix newtargets support: since Nmap 7.92, scripts could not add targets in script pre-scanning phase
- Scripts dhcp-discover and broadcast-dhcp-discover now support setting a client identifier
- Script oracle-tns-version was not reporting the version correctly for Oracle 19c or newer
- Script redis-info was crashing or producing inaccurate information about client connections and/or cluster nodes
- Nmap and Nping were unable to obtain system routes on FreeBSD
- Script ipidseq was broken due to calling an unreachable library function
- Support for EC crypto was not properly enabled if Nmap was compiled with OpenSSL in a custom location
- [NSE]Improvements to event handling and pcap socket garbage collection, fixing potential hangs and crashes
- We ceased creating the Nmap win32 binary zipfile. It was useful back when you could just unzip it and run Nmap from there, but that hasn't worked well for many years. The win32 self-installer handles Npcap installation and many other dependencies and complexities. Anyone who needs the binaries for some reason can still install Nmap on any system and retrieve them from there. For now we're keeping the Win32 zipfile in the Nmap OEM Edition for companies building Nmap into their own products. But even in that case we believe that running the Nmap OEM self-installer in silent mode is a better approach.
- Fix TDS7 password encoding for mssql.lua, which had been assuming ASCII input even though other parts of the library had been passing it Unicode
- Replace deprecated CPEs for IIS with their updated identifier, cpe:/a:microsoft:internet_information_services
- Fix script-terminating error when unknown BSON data types are encountered. Added parsers for most standard data types.
- Fix hostname/certificate comparison and matching to handle ASN.1 strings without null terminators, a similar bug to OpenSSL's CVE-2021-3712
- Added support for SOCKS5 proxies that return bind addresses as hostnames, instead of IPv4/IPv6 addresses