Search Results for "external vulnerability scanner"

Showing 76 open source projects for "external vulnerability scanner"

View related business solutions
  • Eurekos LMS - Build a Smarter Customer Icon
    Eurekos LMS - Build a Smarter Customer

    The Eurekos customer training LMS makes it easy to deliver product training that retains more customers and transforms partners into advocates.

    Eurekos is a purpose-built LMS that engages customers throughout the entire learning journey from pre-sales, to onboarding, and everything after.
  • Scheduling for Home Care Software Icon
    Scheduling for Home Care Software

    Home care agency owners, schedulers, nurses, managers, and caregivers searching for a solution to improve their operations

    Find the right caregiver for any client fast! Our database matches your caregivers with clients by skills, location, and availability. Monitor your leads and referral sources, with a complete history of your activities. You can even link your website to AdaCare's database. Keep records of all your staff, names, addresses, phone numbers, available hours, CEUs, and license expirations. Our "instant timecard" replaces paperwork, and sends alerts if caregivers are late. Less work, and better documentation. Your caregivers can sign in to view their schedules, calendars, maps, and more. Help your caregivers and your office staff. Print and export hours and mileage, for easier billing and payroll. Plus, reports and charts for managing your business. Secure and reliable, and you can work from anywhere, home, office, or in the field. Your caregivers can log in from home and print their own schedules and maps.
  • 1
    theHarvester

    theHarvester

    E-mails, subdomains and names

    theHarvester is a very simple to use, yet powerful and effective tool designed to be used in the early stages of a penetration test or red team engagement. Use it for open source intelligence (OSINT) gathering to help determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using multiple public data sources.
    Downloads: 47 This Week
    Last Update:
    See Project
  • 2
    syft

    syft

    CLI tool and library for generating a Software Bill of Materials

    CLI tool and library for generating a Software Bill of Materials from container images and filesystems. syft is a CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. Exceptional for vulnerability detection when used with a scanner like Grype. Generates SBOMs for container images, filesystems, archives, and more to discover packages and libraries. Supports OCI, Docker and Singularity image formats. Linux distribution identification...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    nuclei

    nuclei

    Fast and customizable vulnerability scanner based on simple YAML

    Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks. We have a dedicated repository that houses various type of vulnerability templates contributed by more than 300 security...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 4
    Brakeman

    Brakeman

    A static analysis security vulnerability scanner for Ruby on Rails app

    Brakeman is a free vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development. Brakeman now uses the parallel gem to read and parse files in parallel. By default, parallel will split the reading/parsing into a number of separate processes based on number of CPUs. In testing, this has dramatically improved speed for large code bases, around 35% reduction in overall scan time...
    Downloads: 8 This Week
    Last Update:
    See Project
  • Redefine the way your organization pursues opportunity and manages risk. Icon
    Make the right business decisions with an easy to use solution that provides a comprehensive integrated approach to governance, risk and compliance.
  • 5
    grype

    grype

    A vulnerability scanner for container images and filesystems

    A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Works with Syft, the powerful SBOM (software bill of materials) tool for container images and filesystems. Scan the contents of a container image or filesystem to find known vulnerabilities. Find vulnerabilities for major operating system packages. Find vulnerabilities for language-specific packages. You can also choose another destination directory and release version for the installation...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Trivy

    Trivy

    Find vulnerabilities, misconfigurations, secrets, SBOM in containers

    Trivy is the most popular open source security scanner, reliable, fast, and easy to use. Use Trivy to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks,and more. Trivy is praised by professionals from organizations worldwide. Are you a Trivy fan as well? We’d love to hear from you! Trivy detects vulnerabilities from a wide array of operating systems and programming languages, across different versions, and vulnerability sources. Detect...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Agentic Security

    Agentic Security

    Agentic LLM Vulnerability Scanner / AI red teaming kit

    The open-source Agentic LLM Vulnerability Scanner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Vuls

    Vuls

    Agentless vulnerability scanner for Linux/FreeBSD

    Vuls is open-source, agent-less vulnerability scanner based on information from NVD, OVAL, etc. Vuls uses multiple vulnerability databases NVD, JVN, OVAL, RHSA/ALAS/ELSA/FreeBSD-SA and Changelog. Vuls v0.5.0 now possible to detect vulnerabilities that patches have not been published from distributors. Remote scan mode is required to only setup one machine that is connected to other scan target servers via SSH. If you don't want the central Vuls server to connect to each server by SSH, you can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Kubescape

    Kubescape

    Kubescape is an open-source Kubernetes security platform for your IDE

    An open-source Kubernetes security platform for your clusters, CI/CD pipelines, and IDE that seperates out the security signal from the scanner noise. Kubescape is an open-source Kubernetes security platform, built for use in your day-to-day workflow, by fitting into your clusters, CI/CD pipelines and IDE. It serves as a one-stop-shop for Kubernetes security and includes vulnerability and misconfiguration scanning. You can run scans via the CLI, or add the Kubescape Helm chart, which gives...
    Downloads: 0 This Week
    Last Update:
    See Project
  • End-to-End Accounts Payable Automation with AI Icon
    End-to-End Accounts Payable Automation with AI

    Enterprises looking for a cognitive process automation platform to create multifunctional cognitive agents to automate their processes

    Unlock the highest levels of straight-through processing (STP) and streamline your AP workflows with Neil, an AI Accounts Payable Executive, your one-stop solution to all your AP woes! From monitoring emails across channels to processing invoices to running n-way matches to the final entry into the ERP and everything in between, Neil handles it all—single-handedly, without human intervention.
  • 10
    Tsunami

    Tsunami

    Network security scanner for detecting severity vulnerabilities

    Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. When security vulnerabilities or misconfigurations are actively exploited by attackers, organizations need to react quickly in order to protect potentially vulnerable assets. As attackers increasingly invest in automation, the time window to react to a newly released, high severity vulnerability is usually measured in hours. This poses...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Mailu

    Mailu

    Insular email distribution - mail server as Docker images

    Mailu is a simple yet full-featured mail server as a set of Docker images. It is free software (both as in free beer and as in free speech), open to suggestions and external contributions. The project aims at providing people with an easily setup, easily maintained and full-featured mail server while not shipping proprietary software nor unrelated features often found in popular groupware. Security, enforced TLS, DANE, MTA-STS, Letsencrypt!, outgoing DKIM, anti-virus scanner, Snuffleupagus...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Security Code Scan

    Security Code Scan

    Vulnerability Patterns Detector for C# and VB.NET

    Detects various security vulnerability patterns. SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), XML eXternal Entity Injection (XXE), etc. Inter-procedural taint analysis for input data. Continuous Integration (CI) support for GitHub and GitLab pipelines. Stand-alone runner or through MSBuild for custom integrations. Analyzes .NET and .NET Core projects in the background (IntelliSense) or during a build. Works with Visual Studio 2019 or higher. Visual Studio...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Product Key Scanner

    Product Key Scanner

    Scan Windows registry to find product keys of Windows & MSFT products

    Product Key Scanner is a tool that scans the Registry of Windows Operating system and finds the product keys of Windows and other Microsoft products. You can scan the Registry of your current running system, as well as you can scan the Registry from external hard drive plugged to your computer. When scanning the product keys of your current running system, you can also search product key stored in BIOS, and search product keys by using WMI.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Digna Web Scanner

    Digna Web Scanner

    A tool to check web apps for vulnerabilty

    This web application scanner is a powerful tool designed to identify potential security vulnerabilities in websites with full GUI (no need to cli). It currently performs checks for: SQL Injection (SQLi): Detects vulnerabilities that could allow attackers to inject malicious SQL code and manipulate the database. XSS Cross-site-scripting: Detect vulnerability that allow attackers to inject client-side scripts into web pages Cross-Site Request Forgery (CSRF): Helps discover...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    uniCenta POS

    uniCenta POS

    uniCenta oPOS - dynamically evolving POS project

    Keep up-to-date with the latest news - Visit uniCenta's main site https://unicenta.com/about-unicenta-opos/unicenta-news/ uniCenta oPOS v5.0 is the latest community release. Get the latest uniCenta oPOS 5.2 if you would like to make a contribution and support the project or need business support help. uniCenta oPOS 5.2 has API integration and numerous improvements. Please see the changelog here: https://unicenta.com/support/changelog-unicenta-opos/ uniCenta oPOS is a...
    Leader badge
    Downloads: 651 This Week
    Last Update:
    See Project
  • 16
    Wapiti

    Wapiti

    Wapiti is a web-application vulnerability scanner

    Wapiti is a vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, XXE injections, CRLF injections, Server Side Request Forgery, Open Redirects... It use the Python 3 programming language.
    Leader badge
    Downloads: 38 This Week
    Last Update:
    See Project
  • 17
    SecurityInfinity Cybersecurity

    SecurityInfinity Cybersecurity

    Secure your website in 10 minutes in one click.

    Secure your website in 10 minutes in one click. AI enabled cybersecurity suite for vulnerability assessment and realtime analytics. Assess your website, cloud platform and identify vulnerabilities now.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    QuickPlay

    QuickPlay

    Retro-Gaming Multi-Emulator Frontend. Frontend-of-Frontends

    Welcome to the QuickPlay homepage. QuickPlay - MAME Edition is a powerful Windows universal emulator frontend, which has support for countless emulators, systems, game sets and other emulation frontend projects. Its main focus is on being user friendly, simple to set up, yet thorough: its a combined searchable library for all of your retro-gaming...It has a novel Emulator Finder system that takes the hassle out of initial setup and ongoing maintainance
    Leader badge
    Downloads: 38 This Week
    Last Update:
    See Project
  • 19
    Network IP Tools

    Network IP Tools

    Network IP Tools

    Speed Scan- is a simple portable network range scanner with a few extra tools that is fairly quick. https://sourceforge.net/projects/network-ip-tools/files/Speed%20Scan/ Speed Scan II- is a basic bare bones Network/TCP/UDP scanner that is very quick. https://sourceforge.net/projects/network-ip-tools/files/Speed%20Scan/ Speed Scan use instructions: 12-25-2018 Very simple netstat script added to General Discussion. https://sourceforge.net/p/network-ip-tools/discussion/general/thread...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 20
    TraceMAC - Traceroute for MAC addresses

    TraceMAC - Traceroute for MAC addresses

    TraceMAC is a command-line Layer 2 traceroute for Cisco switches

    ... with Cisco switches: Catalyst: 2960,3560,3750,4948,6509,9200,9300,9500 (All protocols) Nexus: C9332C, 93180YC-EX (NX-OS SSH) Express 500 (HTTP) FYI: It uses Nbtscan.exe (NetBIOS) as a alternative method to discover the mac address of a host and now seems that it is considered a malware. Anyway it is just a simple network tool that can scan the network similar to NMAP or Angry IP Scanner, etc...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21
    Sn1per

    Sn1per

    Attack Surface Management Platform | Sn1perSecurity LLC

    Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize, reduce, and manage risk. With Sn1per Professional, you can discover the attack surface and continuously monitor it for changes. It integrates with the leading open source and commercial security testing tools for a unified view of your data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    django-summernote

    django-summernote

    Simply integrate Summernote editor with Django project

    Summernote is a simple WYSIWYG editor. Django-summernote allows you to embed Summernote into Django very handy. Support admin mixins and widgets. Although Post model has several TextField, only the content field will have SummernoteWidget. Apply summernote to all TextField in the model. Please mind, that the widget does not provide any escaping. If you expose the widget to external users without taking care of this, it could potentially lead to an injection vulnerability. Therefore you can use...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ESP8266 Deauther Version 2

    ESP8266 Deauther Version 2

    Affordable WiFi hacking platform for testing and learning

    ..., is used to disconnect devices from their WiFi network. No one seems to care about this huge vulnerability in the official 802.11 WiFi standard, so I took action and enabled everyone who has less than 10 USD to spare to recreate this project. I hope it raises more attention on the issue. In 2009 the WiFi Alliance actually fixed the problem (see 802.11w), but only a few companies implemented it into their devices and software.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 24
    Vision nmap's CPE to CVE conversor

    Vision nmap's CPE to CVE conversor

    Nmap's XML result parse and NVD's CPE correlation to search CVE.

    Nmap's XML result parse and NVD's CPE correlation to search CVE. https://github.com/CoolerVoid/Vision2
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Wfuzz

    Wfuzz

    Web application fuzzer

    Wfuzz provides a framework to automate web applications security assessments and could help you to secure your web applications by finding and exploiting web application vulnerabilities. Wfuzz it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload. A payload in Wfuzz is a source of data. This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web...
    Downloads: 19 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next