Showing 31 open source projects for "scanning"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    discover

    discover

    Automation framework for reconnaissance and penetration testing tasks

    Discover is a collection of custom Bash scripts designed to automate many common tasks involved in penetration testing workflows. The project brings together a variety of security testing functions into a single framework that simplifies reconnaissance, scanning, and enumeration processes. It provides a menu-driven interface that allows security professionals to quickly launch different tools and scripts without manually executing each command. The framework helps streamline activities such as information gathering, network scanning, and web application testing during security assessments. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Mantis

    Mantis

    Automated framework for asset discovery and vulnerability scanning

    Mantis is an open source security framework designed to automate the workflow of asset discovery, reconnaissance, and vulnerability scanning for organizations and security teams. Mantis operates through a command line interface and accepts targets such as top level domains, IP addresses, or network ranges as input. From these inputs, it automatically discovers associated digital assets including subdomains and SSL certificates, allowing users to map the attack surface of a system. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    reNgine

    reNgine

    Automated framework for web application reconnaissance and scanning

    ...It provides a streamlined workflow for penetration testers, bug bounty hunters, and security teams who need to perform reconnaissance efficiently and at scale. The platform integrates multiple open-source reconnaissance tools into a unified environment with a configurable scanning engine and an intuitive web interface. reNgine focuses on improving traditional reconnaissance workflows by organizing collected data in a database and correlating results to make them easier to analyze. This approach helps security professionals avoid manually searching through scattered files and instead work with structured, searchable reconnaissance data. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    reconFTW

    reconFTW

    Automated framework for domain reconnaissance and vulnerability scans.

    ...The tool streamlines the reconnaissance phase of security assessments by orchestrating numerous specialized tools to gather intelligence about a target domain. It performs multiple discovery and analysis tasks such as subdomain enumeration, OSINT collection, and vulnerability scanning in an automated workflow. The framework integrates many external security utilities and coordinates them to produce comprehensive reconnaissance results efficiently. Its modular design allows users to customize the process, enabling or disabling modules and adjusting settings according to their needs. reconFTW also provides configuration options for API keys, execution preferences, and tool paths through a dedicated configuration file. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    GitHound

    GitHound

    Search GitHub for leaked API keys, credentials, and exposed secrets

    GitHound is a reconnaissance and security scanning tool designed to search GitHub for exposed secrets such as API keys, credentials, and other sensitive tokens. It works by combining GitHub search queries (often called “GitHub dorks”) with pattern matching techniques to locate potential secrets across public repositories. Instead of scanning only a limited set of repositories, the tool leverages GitHub’s Code Search API to analyze results from across the entire public GitHub ecosystem, including repositories and Gists. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Tookie-OSINT

    Tookie-OSINT

    Username OSINT tool for discovering accounts across many websites

    Tookie-OSINT is an open source intelligence tool designed to help security researchers, ethical hackers, and investigators discover online accounts associated with a specific username. It automates the process of searching for usernames across multiple websites, making it easier to identify a person's presence on different platforms. By entering a target username, Tookie-OSINT scans a list of supported sites and checks whether the username exists on those platforms. This approach removes the...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Qodo Cover

    Qodo Cover

    AI tool that generates tests to improve code coverage quickly

    ...Internally, Qodo Cover uses a modular architecture that includes components for prompt generation, AI interaction, coverage analysis, and test validation. It supports scanning entire repositories to automatically detect test files, gather relevant context, and extend test suites accordingly.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    airgeddon

    airgeddon

    This is a multi-use bash script for Linux systems

    airgeddon is an alive project growing day by day. Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing. DoS over wireless networks using different methods (mdk3, mdk4, aireplay-ng). "DoS Pursuit mode" is available to avoid AP channel hopping (available also on DoS performed on Evil Twin attacks). Full support for 2.4Ghz and 5Ghz bands. Assisted WPA/WPA2 personal networks Handshake file and PMKID capturing. Cleaning and optimizing Handshake captured...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 9
    lynis

    lynis

    Security auditing tool for Linux, macOS, and UNIX-based system

    Lynis is a battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open source software with the GPL license and available since 2007. Since Lynis is flexible, it is used for several different purposes. Typical use cases for Lynis include security auditing, compliance testing (e.g. PCI, HIPAA, SOx), penetration testing, vulnerability...
    Downloads: 5 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Inventory

    Inventory

    Asset inventory dataset for public bug bounty program targets

    Trickest Inventory is an open source dataset and workflow collection designed to provide an extensive asset inventory for public bug bounty programs. The repository tracks and organizes security-relevant assets for more than 800 companies participating in public vulnerability disclosure and bug bounty initiatives. It collects information such as DNS records and web server data, helping security researchers better understand the attack surface of these programs. It aims to streamline...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    EMBA

    EMBA

    The firmware security analyzer

    EMBA is designed as the central firmware analysis tool for penetration testers and product security teams. It supports the complete security analysis process starting with firmware extraction, doing static analysis and dynamic analysis via emulation and finally generating a web report. EMBA automatically discovers possible weak spots and vulnerabilities in firmware. Examples are insecure binaries, old and outdated software components, potentially vulnerable scripts, or hard-coded passwords....
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    secator

    secator

    Automated framework for running pentesting tools and workflows

    Secator is a task and workflow runner designed to streamline security assessments by integrating many well-known penetration testing and reconnaissance tools into a unified framework. It acts as a centralized automation platform that helps security professionals run tasks, workflows, and scans more efficiently from a single command-line interface. It supports dozens of established security tools and organizes them into structured workflows, enabling users to perform complex reconnaissance...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Metabigor

    Metabigor

    Command-line OSINT and reconnaissance tool without API keys

    ...It can also enrich IP information with service, port, and vulnerability data using Shodan InternetDB while remaining accessible without authentication keys. In addition, it provides utilities that coordinate network scanning workflows by acting as a wrapper for tools like rustscan, masscan, and nmap.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    AppInstall (formerly Swiftinstall)

    AppInstall (formerly Swiftinstall)

    Installer, uninstaller, cleaner, antivirus all in one app for Linux

    ...Support for AppImage apps as native applications. Automatic cleanup of unnecessary files to keep your system tidy. Dependency fixing without terminal commands. Built-in antivirus scanning for extra security. Open source (GPL v3), lightweight, with no telemetry and no ads. SwiftInstall simplifies Linux package management for users of all levels, offering a user-friendly graphical alternative to traditional installer tools.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    Sudomy

    Sudomy

    Sudomy is a subdomain enumeration tool to collect subdomains

    Sudomy is a subdomain enumeration tool to collect subdomains and analyze domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Easy, light, fast and powerful. Bash script (controller) is available by default in almost all Linux distributions. By using bash script multiprocessing feature, all processors will be utilized optimally. Subdomain enumeration process can be achieved by using active method or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    BlackWidow

    BlackWidow

    Python web scanner for OSINT gathering and OWASP vulnerability fuzzing

    BlackWidow is a Python-based web application scanning tool designed to crawl target websites and collect open-source intelligence (OSINT) while identifying potential security vulnerabilities. It functions as a web spider that systematically explores a site to gather valuable information such as URLs, dynamic parameters, subdomains, email addresses, and phone numbers associated with the target domain.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 17
    PWMScan

    PWMScan

    A Web-based genome-wide Position Weight Matrix (PWM) Scanner

    PWMScan is used to scan a position weight matrix (PWM) against a genome or, in general, a large set of DNA sequences. The PWM is the most commonly used mathematical model to describe the DNA binding specificity of a transcription factor (TF). A PWM contains scores for each base at each position of the binding site. The TF binding score for a given k-mer sequence is then obtained by simply adding up the base-specific scores at respective positions of the binding site. PWMScan takes as...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 18
    Gitrob

    Gitrob

    Scans GitHub repositories for potentially sensitive files

    Gitrob is an open source reconnaissance tool designed to identify potentially sensitive files that have been committed to public GitHub repositories. It helps security professionals, researchers, and organizations detect accidental data exposure by scanning repositories associated with specific GitHub users or organizations. The tool works by cloning repositories and analyzing their commit history to search for files that match predefined signatures of sensitive data. These signatures are used to flag items such as credentials, private keys, configuration files, and other materials that may expose confidential information. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    RC-EXPLOITER

    RC-EXPLOITER

    Brute-forcing WAN/LAN services

    The author does not hold any responsibility about the bad use of this script remember that attacking targets without prior consent is illegal and punish by law, this script as build to show how msf resource files can automated tasks. Scanning WAN networks In search of targets may take 10 to 15 minutes depending of your network connection, and will search In 1024 random hosts For the selected service/port, also the File 'brute.txt' may be edited to insert new entrys, or we can provide the full path to another dicionary File to be used In brute-forcing services. Additional tool settings can be configured just by editing 'settings' file (nano settings) before running the tool, settings like: use decoys (scanning WAN networks) OR spoof mac address (change mac address and ip address), can only be config before running the tool. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Lynis

    Lynis

    System/security auditing tool for hardening and securing Linux/Unix

    ...Beside security related information it will also scan for general system information, installed packages and possible configuration errors. This software aims in assisting automated auditing, hardening, software patch management, vulnerability and malware scanning of Unix/Linux based systems. It can be run without prior installation, so inclusion on read only storage is possible (USB stick, cd/dvd). Lynis assists auditors in performing Basel II, GLBA, HIPAA, PCI DSS and SOx (Sarbanes-Oxley) compliance audits, by automation of control testing. Extended support for companies is available
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Penetration-Testing-Toolkit v1.0

    A web interface for various penetration testing tools

    Penetration-Testing-Toolkit is a web based project to automate Scanning a network,Exploring CMS, Generating Undectable metasploit payload, DNS-Queries, IP related informations, Information Gathering, Domain related info etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    rPem3D

    rPem3D

    PET/PEM image reconstruction based on MLEM

    Various utilities useful for handling PET data esp. of stationary planar PEM, including fully 3D ML-EM based image reconstruction, real time viewing of scanning image and the KDE based GUI for scanning, viewing and image reconstruction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Tool to automatically fire regular security scans with Nessus. Compare results of the current scan with the previous scan and report on the delta in a web interface. Main objective of the tool is to make repeated scans more efficient. Not affiliated
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Randirplay

    Generates a playlist of files in directories in random directory order

    ...Preserves the alphebetical ordering within directories but lists directories in a random order. Enables you to create a music playlist of random albums if you keep albums in separate directories. lots of directory scanning configuration options and size limiting. Will also produce a playlist to fit the free space on a specified device. Good for grabbing a random selection of albums to transfer to your device or just to be able to play albums in a random order if your device doesn't have this feature. You can also use it to generate separate playlists for separate directories by running it multiple times in another script (this is my current use for it in my Android device).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    broodROM Configurator

    broodROM Configurator

    broodROM Configurator

    BETA 4 Changelog (https://sourceforge.net/p/brconfigurator/wiki/Changelogs/) broodROM Configurator, the easy way of configurating broodROM. Only compatible with Samsung Galaxy S Plus with broodROM installed. If you don't have broodROM and you want to use broodROM Configurator use the /nocheck parameter
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB