Keep scrolling down for answers and more stats ...
Description
Tool
An open-source utility that eases numerous security auditing tasks, such as managing service upgrade schedules and monitoring service uptime and network inventory. This top Kali Linux tool's functionality is based on the raw IP packets used in different methods to provide results.
Supports advanced techniques for effective network mapping.
Can scan voluminous quantities of networks.
Freely available with full source code and open for modification and redistribution.
Portable across different operating systems.
Nmap
A Ruby-based collection of tools. The modular penetration testing platform allows for dealing with exploit code by writing, testing, and execution. Users can find tools that support various functions such as network enumeration, evading detection, testing security vulnerabilities and executing attacks. It comprises two types of data stores: global and module. While the worldwide datastore is open for usage by all datastores, module one can be used only where the datastore is defined.
Exhibits user-friendliness with ease of configuration.
The presence of command utilities like hardware, plugins and memdump.
Comprises scripts and resources for running functionalities.
Allows automation of manual tasks with extensions.
Offers editable files that encourage the storage of wordlists, templates, binaries, logos and images.
Metasploit
Description
Tool
Offers happenings and occurrences in the network. The tool can read and write numerous types of captured file formats, including but not limited to Microsoft Network Monitor, Pcap NG, Siffer Pro and others. It supports identifying security issues and troubleshooting networking problems. Also, it is widely used among developers and QA engineers.
Offers statistical insights.
Captures live packet data from the network interface.
Import the packets from text files and color them according to the filters.
Search for packets on different criteria.
Flexible to function on UNIX and Windows.
Wireshark
Is a suite of tools that allows protection by examining WiFi network security. It is suited for testing password strength, monitoring, attacking, cracking and testing the mentioned security type. Requiring heavy scripting, all the tools in the suite are command-line.
Offers better documentation through the wiki and manpages.