Showing 510 open source projects for "scanning"

View related business solutions
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    ZXingLite

    ZXingLite

    Simplified version of ZXing, optimized to scan codes to generate QR

    ZXingLite for Android is a simplified and extremely fast version of ZXing. Based on the ZXing library, it optimizes the functions of scanning codes and generating QR codes/barcodes. The scanning interface fully supports customization, and one line of code can also use the default scanning function. In short, everything you want is here. By inheriting CaptureActivity or CaptureFragment and customizing the layout. (Applicable to most scenarios, and you don’t need to care about the code scanning related logic, you need to override the getLayoutId method when customizing the layout) Implementation examples: CustomCaptureActivity and QRCodeActivity. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Raccoon

    Raccoon

    High-performance reconnaissance and vulnerability scanning tool

    Raccoon is a high-performance offensive security tool designed to assist with reconnaissance and vulnerability scanning during penetration testing and security assessments. It automates several common reconnaissance tasks, allowing security professionals to quickly gather information about a target system or web application. The tool combines multiple scanning techniques into a single workflow, helping users identify potential weaknesses, exposed services, and accessible resources on a target host. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Iris

    Iris

    2-photon scanning software

    Iris is a LabVIEW package, developed at the Keller Lab (Basel FMI), for running 2-photon microscopes. It is supplied with auxiliary software for recording additional experimental parameters, such as behavioral states. Iris is freely available. You may modify it as you wish and use it as you wish, so long as you comply with the licence terms (see below). However, please note that we are **unable to offer any guarantee of support**. There are two exceptions to this. 1) If you find a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ClamAV

    ClamAV

    Antivirus engine for detecting trojans, viruses and malware

    ...Originally designed for Unix environments and email security, it has evolved into a flexible antimalware toolkit capable of identifying millions of viruses, worms, trojans, and other threats. The software includes a command-line scanner, an automatically updating signature database, and a scalable multi-threaded daemon that enables high-performance scanning in production environments. ClamAV is widely used in mail gateways, file servers, and security pipelines because it can inspect compressed archives, common document formats, and executable files. Its bytecode signature system allows advanced detection logic while ensuring signatures are trusted and securely distributed.
    Downloads: 53 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 5
    discover

    discover

    Automation framework for reconnaissance and penetration testing tasks

    Discover is a collection of custom Bash scripts designed to automate many common tasks involved in penetration testing workflows. The project brings together a variety of security testing functions into a single framework that simplifies reconnaissance, scanning, and enumeration processes. It provides a menu-driven interface that allows security professionals to quickly launch different tools and scripts without manually executing each command. The framework helps streamline activities such as information gathering, network scanning, and web application testing during security assessments. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    bettercap

    bettercap

    The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks

    bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.
    Downloads: 51 This Week
    Last Update:
    See Project
  • 7
    Open Source Point of Sale

    Open Source Point of Sale

    Open Source Point of Sale is a web based point of sale application

    Open Source Point of Sale (OSPOS) is a free and open-source point-of-sale system for small and medium-sized businesses. It helps manage sales, inventory, and customer data through a user-friendly web interface. OSPOS is highly customizable and supports barcode scanning, multi-language support, and detailed reporting, making it ideal for retail stores, restaurants, and small businesses seeking an affordable POS solution.
    Downloads: 91 This Week
    Last Update:
    See Project
  • 8
    User Scanner

    User Scanner

    Scan usernames and emails across many platforms from the CLI

    ...It helps users quickly determine whether a specific username or email is already associated with accounts on social networks, developer platforms, creator communities, gaming services, and other sites. user-scanner is useful for security researchers, investigators, and analysts performing open source intelligence, as well as individuals or businesses looking for a unique username across multiple services. By scanning many platforms in a single command, it simplifies the process of checking account existence and identifying a digital footprint. user-scanner uses a modular architecture where each platform is implemented as a small validator module that determines whether a username exists or is available.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 9
    Dockle

    Dockle

    Container Image Linter for Security

    Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start. You can install dockle with the asdf version manager with this plugin, which automates the process of installing (and switching between) various versions of github release binaries. With asdf already installed, run commands to install dockle. You can scan your built image with Dockle in Travis CI/CircleCI. Though, you can ignore the specified target checkpoints by using .dockleignore file. Or,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 10
    GitLab

    GitLab

    Please open new issues in our issue tracker on GitLab

    ...It supports extensive automation via pipelines, runners, webhooks, and a comprehensive REST/GraphQL API, enabling complex workflows like canary deployments, feature flagging, and security scanning as part of merge request gates.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 11
    Fapro

    Fapro

    Fake Protocol Server

    Fapro is an open-source asset discovery and vulnerability scanning tool developed by Fofa Pro. It assists in identifying and managing network assets, detecting potential vulnerabilities, and enhancing overall security posture
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A.I.G

    A.I.G

    Full-stack AI Red Teaming platform

    AI-Infra-Guard is a powerful open-source security platform from Tencent’s Zhuque Lab designed to assess the safety and resilience of AI infrastructures, codebases, and components through automated scanning and evaluation tools. It brings together AI infrastructure vulnerability scanning, MCP server risk analysis, and jailbreak evaluation into a unified workflow so that enterprises and individuals can identify critical security issues without relying on external services. Users can deploy it via Docker or scripts to get a modern web UI that guides them through tasks like scanning third-party frameworks for known CVEs and experimenting with prompt security against attack vectors. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Kubescape

    Kubescape

    Kubescape is an open-source Kubernetes security platform for your IDE

    ...Targeted at the DevSecOps practitioner or platform engineer, it offers an easy-to-use CLI interface, flexible output formats, and automated scanning capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Mini QR

    Mini QR

    Create & scan cute qr codes easily

    ...Because QR reliability matters as much as looks, it exposes practical settings like error correction levels so you can balance data density with scannability, especially when adding a logo or encoding larger payloads. The scanning side supports camera-based scanning and image uploads, and it recognizes common QR content types such as URLs, emails, phone numbers, SMS messages, Wi-Fi credentials, and other structured payloads so the next action is obvious. It also supports workflows for producing many codes at once by importing CSV data and exporting batches.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 15
    Harness

    Harness

    Harness Open Source is an end-to-end developer platform

    ...It offers pipeline-as-code YAML definitions, AI-optimized builds, policy-driven governance, multi-environment deployment templates (canary, blue/green), and integrated security scanning.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    Nikto

    Nikto

    Web server vulnerability scanner for security assessments

    ...It’s widely used by penetration testers and security professionals for auditing web applications and infrastructure. Nikto supports multiple output formats and can integrate with other tools for automated scanning workflows.
    Downloads: 102 This Week
    Last Update:
    See Project
  • 17
    Bandit

    Bandit

    Bandit is a tool designed to find common security issues in Python

    Bandit is a tool designed to find common security issues in Python code. To do this, Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files, it generates a report. Bandit was originally developed within the OpenStack Security Project and later rehomed to PyCQA.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 18
    XX-Net

    XX-Net

    A web proxy tool

    XX-Net is an easy-to-use, anti-censorship web proxy tool from China. It includes GAE_proxy and X-Tunnel, with support for multiple platforms.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 19
    nuclei

    nuclei

    Fast and customizable vulnerability scanner based on simple YAML

    Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks. We have a dedicated repository that houses various type of vulnerability templates contributed by more than 300 security researchers and engineers. ...
    Downloads: 43 This Week
    Last Update:
    See Project
  • 20
    Trivy

    Trivy

    Find vulnerabilities, misconfigurations, secrets, SBOM in containers

    Trivy is the most popular open source security scanner, reliable, fast, and easy to use. Use Trivy to find vulnerabilities & IaC misconfigurations, SBOM discovery, Cloud scanning, Kubernetes security risks,and more. Trivy is praised by professionals from organizations worldwide. Are you a Trivy fan as well? We’d love to hear from you! Trivy detects vulnerabilities from a wide array of operating systems and programming languages, across different versions, and vulnerability sources. Detect common misconfigurations with Trivy, using the same familiar tool and workflow that you already have in place for vulnerabilities. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 21
    FDUPES

    FDUPES

    FDUPES is a program for identifying or deleting duplicate files

    FDUPES is a lightweight command-line utility that helps users find and optionally delete duplicate files within specified directories by comparing file contents, which can be extremely useful for cleaning up storage clutter or organizing large collections of files. It works by scanning directories and subdirectories, identifying sets of files with identical content through size and hash comparisons, and then listing them together so users can examine duplicates. Once duplicates are identified, the tool offers interactive deletion options where users can choose which copy to keep and which to remove, or apply flags to automate deletion while preserving a single instance. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 22
    Argus

    Argus

    Python toolkit for OSINT and reconnaissance with 135+ modules

    ...The tool enables users to collect data about networks, domains, web applications, and infrastructure in an organized and efficient manner. Argus includes a modular architecture with more than 130 modules that support activities such as DNS analysis, port scanning, web application inspection, and threat intelligence lookups. Its interactive CLI allows users to browse available modules, configure targets, run scans, and review results from within a unified interface. The project aims to reduce the complexity of using multiple separate reconnaissance tools by bringing them together in one streamlined platform. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 23
    Monkey Code

    Monkey Code

    Enterprise-grade AI programming assistant designed for R&D collab

    ...The system includes a comprehensive management panel that allows teams to audit, monitor, and control how AI participates in coding workflows, ensuring accountability and governance at scale. MonkeyCode also integrates automated code security scanning to detect vulnerabilities in both human-written and AI-generated code, reinforcing secure development practices.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Space Radar Electron

    Space Radar Electron

    Disk And Memory Space Visualization App built with Electron & d3.js

    ...It allows for drilldown of directories, breadcrumbs and navigation. Space Radar works fast, and is cross-platform. Currently, there are many developments being planned for Space Radar, including more targets for scanning, coloring by file types, filtering hidden files and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    BBOT

    BBOT

    The recursive internet scanner for hackers

    BBOT is an advanced open-source reconnaissance automation framework designed to streamline large-scale OSINT and attack surface discovery workflows. It operates as a modular and recursive scanning tool that can enumerate subdomains, perform port scans, gather metadata, and collect web intelligence through a unified command-line interface. The project emphasizes extensibility, allowing users to create or integrate custom modules that expand the scope of reconnaissance tasks without modifying the core engine. BBOT is particularly valuable for security researchers and red teamers who need to automate multi-stage discovery processes across complex infrastructures. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB