Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Greenbone Vulnerability Management (GVM) Framework

Compare

  Analyzed 8 months ago

The Greenbone Vulnerability Management (GVM) is a framework of several services: - The Greenbone Vulnerability Manager (gvmd) is the central service that consolidates plain vulnerability scanning into a full vulnerability management solution. - The Greenbone Security Assistant (GSA) is the web ... [More] interface of GVM. - The main scanner OpenVAS Scanner is a full-featured scan engine that executes a continuously updated and extended feed of Network Vulnerability Tests (NVTs). - Complementary to the web interface, GVM-Tools allows batch processing / scripting via the Greenbone Management Protocol (GMP). [Less]

498K lines of code

32 current contributors

8 months since last commit

15 users on Open Hub

Activity Not Available
4.28571
   
I Use This
Licenses: GNU_Gener..., gpl, gpl3_or_l...

Nikto

Compare

  Analyzed about 23 hours ago

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. Scan items and plugins are frequently ... [More] updated and can be automatically updated (if desired). [Less]

9.87K lines of code

16 current contributors

10 days since last commit

5 users on Open Hub

Moderate Activity
2.5
   
I Use This

OWASP Nettacker

Compare

  Analyzed about 18 hours ago

Automated Penetration Testing Framework OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP ... [More] SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests. [Less]

47.6K lines of code

2 current contributors

16 days since last commit

2 users on Open Hub

Moderate Activity
5.0
 
I Use This

ArchPwn

Compare

  Analyzed about 12 hours ago

ArchPwn is a security based Linux Live CD/DVD system that aims to be a fully working swiss army knife for pentesting purpose (GPL licensed). It's based on the famous ArchLinux distrubution, and inherits from this her philosphy.

38.8K lines of code

0 current contributors

almost 10 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

Inguma

Compare

  Analyzed 8 months ago

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in Python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, and some exploits. Inguma is pivoting to become a more general open-source intelligence tool similar to Maltego.

58.1K lines of code

1 current contributors

about 1 year since last commit

1 users on Open Hub

Activity Not Available
0.0
 
I Use This

OWASP Juice Shop

Compare

Claimed by Open Web Application Securi... Analyzed 4 months ago

An intentionally insecure RIA suitable for pen testing and security awareness trainings written in Node, Express and Angular.

59.1K lines of code

34 current contributors

4 months since last commit

1 users on Open Hub

Activity Not Available
5.0
 
I Use This

OWASP-Testing-Guide (WSTG)

Compare

  Analyzed 1 day ago

The OWASP Testing Guide includes a “best practice” penetration testing framework which users can implement in their own organizations. The Testing Guide also includes a “low level” penetration testing guide that describes techniques for testing the most common web application and web service ... [More] security issues. Today the Testing Guide is the standard to perform Web Application Penetration Testing, and many companies around the world have adopted it. It is vital to maintain an updated project that represents the state of the art for WebAppSec. [Less]

2.02K lines of code

24 current contributors

13 days since last commit

0 users on Open Hub

High Activity
0.0
 
I Use This

lazyfoot

Compare

  No analysis available

Basically a tool that utilizes other tools. It saves me time.

0 lines of code

0 current contributors

0 since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: gpl3_or_l...

PathTraverser

Compare

  Analyzed 4 days ago

Path Traverser simulates a real Path Traversal attack with the actual files. It operates as a middleman between the web application to its host server, which gives the abillity to test the actual files as found in the host server against the application, according to their relevant path.

1.74K lines of code

0 current contributors

almost 5 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This