Best Software for 2025 is now live!
By Nmap
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Zenmap Features

What are the features of Zenmap?

Performance

  • Issue Tracking
  • Detection Rate
  • False Positives
  • Automated Scans

Network

  • Compliance Testing
  • Perimeter Scanning
  • Configuration Monitoring

Application

  • Manual Application Testing

Top Rated Zenmap Alternatives

Filter for Features

Performance

Issue Tracking

As reported in 13 Zenmap reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
73%
(Based on 13 reviews)

Detection Rate

Based on 15 Zenmap reviews and verified by the G2 Product R&D team. The rate at which scans accurately detect all vulnerabilities associated with the target.
88%
(Based on 15 reviews)

False Positives

Based on 14 Zenmap reviews and verified by the G2 Product R&D team. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
68%
(Based on 14 reviews)

Automated Scans

Based on 12 Zenmap reviews. Runs pre-scripted vulnerability scans without requiring manual work.
83%
(Based on 12 reviews)

Network

Compliance Testing

As reported in 13 Zenmap reviews. Allows users to scan applications and networks for specific compliance requirements.
85%
(Based on 13 reviews)

Perimeter Scanning

Analyzes network devices, servers and operating systems for vulnerabilities. 15 reviewers of Zenmap have provided feedback on this feature.
89%
(Based on 15 reviews)

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 12 reviewers of Zenmap have provided feedback on this feature.
71%
(Based on 12 reviews)

Application

Manual Application Testing

Based on 13 Zenmap reviews and verified by the G2 Product R&D team. Allows users to perfrom hands-on live simulations and penetration tests.
83%
(Based on 13 reviews)

Static Code Analysis

Scans application source code for security flaws without executing it.

Not enough data