Search Results for "security scanner" - Page 2

Showing 257 open source projects for "security scanner"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Cut Cloud Costs with Google Compute Engine Icon
    Cut Cloud Costs with Google Compute Engine

    Save up to 91% with Spot VMs and get automatic sustained-use discounts. One free VM per month, plus $300 in credits.

    Save on compute costs with Compute Engine. Reduce your batch jobs and workload bill 60-91% with Spot VMs. Compute Engine's committed use offers customers up to 70% savings through sustained use discounts. Plus, you get one free e2-micro VM monthly and $300 credit to start.
    Try Compute Engine
  • 1
    Digna Web Scanner

    Digna Web Scanner

    A tool to check web apps for vulnerabilty

    This web application scanner is a powerful tool designed to identify potential security vulnerabilities in websites with full GUI (no need to cli). It currently performs checks for: SQL Injection (SQLi): Detects vulnerabilities that could allow attackers to inject malicious SQL code and manipulate the database. XSS Cross-site-scripting: Detect vulnerability that allow attackers to inject client-side scripts into web pages Cross-Site Request Forgery (CSRF): Helps discover vulnerabilities that could allow attackers to trick users into performing unintended actions on a website. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Mailu

    Mailu

    Insular email distribution - mail server as Docker images

    ...The project aims at providing people with an easily setup, easily maintained and full-featured mail server while not shipping proprietary software nor unrelated features often found in popular groupware. Security, enforced TLS, DANE, MTA-STS, Letsencrypt!, outgoing DKIM, anti-virus scanner, Snuffleupagus, block malicious attachments. Antispam, auto-learn, greylisting, DMARC and SPF, anti-spoofing. Freedom, all FOSS components, no tracker included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Gitleaks

    Gitleaks

    Protect and discover secrets using Gitleaks

    Gitleaks is a fast, lightweight, portable, and open-source secret scanner for git repositories, files, and directories. With over 6.8 million docker downloads, 11.2k GitHub stars, 1.7 million GitHub Downloads, thousands of weekly clones, and over 400k homebrew installs, gitleaks is the most trusted secret scanner among security professionals, enterprises, and developers. Gitleaks-Action is our official GitHub Action.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 4
    IP Availability Scanner

    IP Availability Scanner

    Fast IP and Port Scanner

    This utility efficiently scans IP addresses and gathers host names and MAC addresses. It offers the capability to export scan results and includes features for port scanning of selected hosts. Enhanced with a multithreaded framework, the tool delivers increased speed, supporting functionalities like trigger actions and banner grabbing during port scans. For more advanced options, right-click on the displayed grids. This context menu includes options for port scanning, copying results, and...
    Downloads: 17 This Week
    Last Update:
    See Project
  • $300 in Free Credit for Your Google Cloud Projects Icon
    $300 in Free Credit for Your Google Cloud Projects

    Build, test, and explore on Google Cloud with $300 in free credit. No hidden charges. No surprise bills.

    Launch your next project with $300 in free Google Cloud credit—no hidden charges. Test, build, and deploy without risk. Use your credit across the Google Cloud platform to find what works best for your needs. After your credits are used, continue building with free monthly usage products. Only pay when you're ready to scale. Sign up in minutes and start exploring.
    Start Free Trial
  • 5
    Cloud Scanner of Death
    Cloud Scanner of Death is a professional-grade cloud security assessment tool designed to identify vulnerabilities, misconfigurations, and compliance issues across AWS, Azure, and Google Cloud Platform (GCP) environments. The tool provides comprehensive security scanning with detailed reporting and remediation guidance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    Deepfence SecretScanner can find unprotected secrets in container images or file systems. Secrets are any kind of sensitive or private data that gives authorized users permission to access critical IT infrastructure (such as accounts, devices, networks, cloud based services), applications, storage, databases, and other kinds of critical data for an organization. For example, passwords, AWS access IDs, AWS secret access keys, Google OAuth Key etc. are secrets. Secrets should be strictly kept...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Full Stack Computer Scanner

    Full Stack Computer Scanner

    Scans the entire computer device "stack" (hardware, software, comms)

    The Full Stack Computer Scanner by KCJ Tech Solutions is a Windows-based diagnostic application (proprietary freeware) designed to provide broad, read-only system visibility. It uses built-in Windows capabilities to surface meaningful diagnostic information across multiple system layers. To support transparency and independent evaluation, the project includes clear documentation, architecture disclosure, and detailed explanations of each scan area. For users who want expert...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 8
    kube-bench

    kube-bench

    Checks whether Kubernetes is deployed

    kube-bench is a tool that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark. Trivy, the all-in-one cloud-native security scanner, can be deployed as a Kubernetes Operator inside a cluster. Both, the Trivy CLI, and the Trivy Operator support CIS Kubernetes Benchmark scanning among several other features. There are multiple ways to run kube-bench. You can run kube-bench inside a pod, but it will need access to the host's PID namespace in order to check the running processes, as well as access to some directories on the host where config files and other files are stored.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 9
    Coraza

    Coraza

    OWASP Coraza WAF is a golang modsecurity compatible firewall library

    Coraza is an open-source, enterprise-grade, high-performance Web Application Firewall (WAF) ready to protect your beloved applications. It is written in Go, supports ModSecurity SecLang rulesets and is 100% compatible with the OWASP Core Rule Set. Coraza is a drop-in alternative to replace the soon-to-be abandoned Trustwave ModSecurity Engine and supports industry-standard SecLang rule sets. Coraza runs the OWASP Core Rule Set (CRS) to protect your web applications from a wide range of...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Easily Host LLMs and Web Apps on Cloud Run Icon
    Easily Host LLMs and Web Apps on Cloud Run

    Run everything from popular models with on-demand NVIDIA L4 GPUs to web apps without infrastructure management.

    Run frontend and backend services, batch jobs, host LLMs, and queue processing workloads without the need to manage infrastructure. Cloud Run gives you on-demand GPU access for hosting LLMs and running real-time AI—with 5-second cold starts and automatic scale-to-zero so you only pay for actual usage. New customers get $300 in free credit to start.
    Try Cloud Run Free
  • 10
    Network Security Toolkit (NST)

    Network Security Toolkit (NST)

    A network security analysis and monitoring toolkit Linux distribution.

    Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 42 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available...
    Leader badge
    Downloads: 184 This Week
    Last Update:
    See Project
  • 11

    Antivirus Live CD

    4MLinux fork including ClamAV scanner

    Antivirus Live CD is an official 4MLinux fork including the ClamAV scanner. It's designed for users who need a lightweight live CD, which will help them to protect their computers against viruses. Ethernet, WiFi, PPP and PPPoE are supported by Antivirus Live CD to enable automatic updates of its virus signature databases. All partitions are mounted during the boot process so that they can be scanned by ClamAV. The Antivirus Live CD ISO images are fully compatible with UNetbootin, which can...
    Leader badge
    Downloads: 278 This Week
    Last Update:
    See Project
  • 12

    AsyncPortScanner

    Cross-platform asynchronous port scanner written in Nim.

    Fast cross-platform asynchronous port scanner written in Nim.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Wapiti

    Wapiti

    Wapiti is a web-application vulnerability scanner

    Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections, Server Side Request Forgery, Open Redirects... It use the Python 3 programming language.
    Leader badge
    Downloads: 49 This Week
    Last Update:
    See Project
  • 14

    dir-aka

    The Dir-aka Vulnerability Scanner is a Python-based security tool

    The Dir-aka Vulnerability Scanner is a Python-based security tool designed for cybersecurity professionals and system administrators to analyze and secure web servers against unauthorized access. This tool identifies sensitive files and folders on a target web server, filters content by file extensions, and highlights potential misconfigurations or vulnerabilities in publicly accessible directories.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    USB Paranoiac

    USB Paranoiac

    USB Security Scanner on Linux

    This program allows you to examine suspicious USB storage devices before plugging them into your Windows computer. This is not an antivirus; it does not have heuristic or automatic detection-cleanup features. Just so you know, executable files are worth your attention. You decide whether they're dangerous or not. https://github.com/shampuan/USB-Paranoiac
    Downloads: 10 This Week
    Last Update:
    See Project
  • 16
    Cyrethium

    Cyrethium

    Cyrethium GNU/Linux Debian Based Privacy and Security Focused OS

    This project is no longer maintained. Using it may be unsafe due to outdated kernel/packages !!!! Cyrethium is a Debian-based Linux distribution focused on privacy and security. It can route all incoming and outgoing internet traffic through the Tor network. DNSCrypt-Proxy and I2P Router are pre-configured. It provides strong protection against browser attacks with custom hardened Firefox variants. The distribution hosts a wide range of tools designed from scratch for Cyrethium and...
    Leader badge
    Downloads: 125 This Week
    Last Update:
    See Project
  • 17

    SikkerBox

    SikkerBox is a secure two-factor authentication (2FA) application, etc

    ...IP Location Lookup: Determine the geographical location of any IP address, includes the function of automatically obtaining the user’s public IP WiFi Scanner: Analyze nearby WiFi networks, including signal strength, channels, and security information Ping Diagnostic: Test connectivity to domains or IP addresses Whois Lookup: Query registration information for any domain name DNS Reverse Lookup: Find hostnames associated with IP addresses More features:Stay tuned for more features
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    key-elf

    key-elf

    Forensic tool to recover lost BTC private keys.

    A powerful utility to hunt down Bitcoin private keys from deleted wallet.dat files or damaged hard drives. If you accidentally deleted your Bitcoin Core wallet or formatted your disk, this tool can help. It bypasses the file system and scans the raw data directly, looking for the unique "fingerprint" (ASN.1 signature) of Bitcoin private keys to recover them from the digital wreckage.The Graphical User Interface (GUI) is the advanced/premium version. If needed, please visit:...
    Leader badge
    Downloads: 41 This Week
    Last Update:
    See Project
  • 19
    PE Scanner
    PE Scanner is a software for catching / modifying / analysis of portable executable (patform: Windows XP & above). Also, all PEiD's plugins are compatible to be load and run.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    LAN Assess

    Python Security Scanner

    Scans, logs, and writes out findings, saves to sqlite, meant to be run on a kali dist. ./lan_assess.py run --config config.toml --engagement test --dry-run ./lan_assess.py export --db ./runs/test-customer/run.db --out ./exports/test-customer ad-hoc, or via cron: 0 * * * * /opt/lan_assess/lan_assess.py run --config /opt/lan_assess/config.toml --engagement acme-jan2026 --base-dir /opt/lan_assess >> /opt/lan_assess/cron.log 2>&1 PROBLEMS: 1. If you get errors about arp-scan: Either...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SafeUtils

    SafeUtils

    110+ developer tools as native MacOS, Linux & Windows desktop apps.

    Tools: https://safeutils.com/barcode-generator https://safeutils.com/color-picker https://safeutils.com/qr-code-generator https://safeutils.com/qr-code-scanner https://safeutils.com/word-counter https://safeutils.com/base-64-decoder https://safeutils.com/diff-checker https://safeutils.com/hex-to-ascii https://safeutils.com/json-formatter https://safeutils.com/lorem-ipsum-generator https://safeutils.com/random-generator https://safeutils.com/time-converter https://safeutils.com/...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    DragonOS
    *Until you install the operating system, the default user = live / no password. DragonOS Noble (24.04) DragonOS FocalX (22.04) and DragonOS Focal (20.04) are out-of-the-box Lubuntu based x86_64 operating systems for anyone interested in software defined radios. All source installed software is located in the /usr/src directory while the remaining software was installed by package managers. What is DragonOS and why do you want it? The shortest distance between two points is a...
    Leader badge
    Downloads: 2,946 This Week
    Last Update:
    See Project
  • 23
    Securonis has been discontinued, a new distro renamed to Cyrethium. Please follow https://cyrethium.org for more details
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    LabMACOSX
    LabMACOSX: Is a laboratory of applications written in Applescript language. Brutosx is brutus.pl remote login and password bruteforce cracker inserted inside the application Brutosx (need only of Net::Telnet Perl module are required get them at CPAN, while the list of users and passwords, and the service is inserted inside the application). SSHOSX is ssh application client to establish an ssh connection from client to server, Nmaposx is nmap port scanner invoked from the application Nmaposx...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    AWA-Core

    AWA-Core

    Full application for factory, process engineer and Automation..

    IT'S HERE-----FINALLY. AWA-Core 2026 is here with a totally new architecture. The core is now in Client/Server architecture and open to other applications (including yours). New interfaces for the server and client sides. Please, go to our youTube channel to see many tutorials about this new release. Don't waste your time trying things and clicking everywhere. Wait for our tutorials, install AWA-Core on a single PC or in a complete C/S architecture (Servers provided) and run...
    Downloads: 20 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.