Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Greenbone Vulnerability Management (GVM) Framework

Compare

  Analyzed about 13 hours ago

The Greenbone Vulnerability Management (GVM) is a framework of several services: - The Greenbone Vulnerability Manager (gvmd) is the central service that consolidates plain vulnerability scanning into a full vulnerability management solution. - The Greenbone Security Assistant (GSA) is the web ... [More] interface of GVM. - The main scanner OpenVAS Scanner is a full-featured scan engine that executes a continuously updated and extended feed of Network Vulnerability Tests (NVTs). - Complementary to the web interface, GVM-Tools allows batch processing / scripting via the Greenbone Management Protocol (GMP). [Less]

533K lines of code

32 current contributors

1 day since last commit

15 users on Open Hub

Very High Activity
4.28571
   
I Use This
Licenses: AGPL3_or_..., GNU_Gener..., gpl

Nikto

Compare

  Analyzed about 18 hours ago

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. Scan items and plugins are frequently ... [More] updated and can be automatically updated (if desired). [Less]

4.48K lines of code

16 current contributors

about 2 months since last commit

5 users on Open Hub

Low Activity
2.5
   
I Use This

OWASP Nettacker

Compare

  Analyzed 1 day ago

Automated Penetration Testing Framework OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP ... [More] SYN, ACK, ICMP and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests. [Less]

19.5K lines of code

2 current contributors

about 1 month since last commit

3 users on Open Hub

Moderate Activity
5.0
 
I Use This

OWASP Juice Shop

Compare

Claimed by Open Web Application Securi... Analyzed 1 day ago

OWASP Juice Shop is probably the most modern and sophisticated insecure web application! It can be used in security trainings, awareness demos, CTFs and as a guinea pig for security tools! Juice Shop encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws found in real-world applications!

77.8K lines of code

34 current contributors

2 days since last commit

2 users on Open Hub

High Activity
5.0
 
I Use This

OWASP-Testing-Guide (WSTG)

Compare

  Analyzed about 3 hours ago

The OWASP Testing Guide includes a “best practice” penetration testing framework which users can implement in their own organizations. The Testing Guide also includes a “low level” penetration testing guide that describes techniques for testing the most common web application and web service ... [More] security issues. Today the Testing Guide is the standard to perform Web Application Penetration Testing, and many companies around the world have adopted it. It is vital to maintain an updated project that represents the state of the art for WebAppSec. [Less]

3.11K lines of code

24 current contributors

about 1 month since last commit

1 users on Open Hub

Moderate Activity
0.0
 
I Use This

Inguma

Compare

  Analyzed about 21 hours ago

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in Python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, and some exploits. Inguma is pivoting to become a more general open-source intelligence tool similar to Maltego.

58.1K lines of code

1 current contributors

almost 5 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

ArchPwn

Compare

  Analyzed about 11 hours ago

ArchPwn is a security based Linux Live CD/DVD system that aims to be a fully working swiss army knife for pentesting purpose (GPL licensed). It's based on the famous ArchLinux distrubution, and inherits from this her philosphy.

38.8K lines of code

0 current contributors

over 13 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This

PathTraverser

Compare

  Analyzed about 22 hours ago

Path Traverser simulates a real Path Traversal attack with the actual files. It operates as a middleman between the web application to its host server, which gives the abillity to test the actual files as found in the host server against the application, according to their relevant path.

1.74K lines of code

0 current contributors

over 8 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This