Vulnerability scanners play an important part in vulnerability management. See which open source tools are available in this category.
Vulnerability scanners typically come in two variants: local or remote. With the first group, the scanning itself happens on the related device itself. While this requires direct access to the system or device, it often results in a more extensive scan. Remote scanning is commonly used, where the scan happens on a central system. Some vulnerability scanners may be configured to do a hybrid: network-based scanning combined with an authenticated scan to obtain more details.
Vulnerability scanners are typically used for vulnerability management and vulnerability scanning.
Users for these tools include pentesters, security professionals, system administrators.
|Tool||Type||Description||Latest release||Release date||Score|
|Archery||Vulnerability assessment and management||Archery is a Django-based application to perform vulnerability assessments and do vulnerability management.||ARCHERY-v1.0-beta||March 19, 2018||96|
|Bash Scanner||Vulnerable package detection for Linux||Bash Scanner is a security tool that does a quick scan to see if there are vulnerable packages. It uses an external service to validate.||1.2||Nov. 30, 2015||60|
|BDA||Vulnerability scan for Hadoop and Spark||BDA is a security tool to test installations of Hadoop and Spark, often used to store big data sets. Configuration weaknesses and other issues can be detected.||1.0.0||May 28, 2018||85|
|CMSmap||Reconnaissance tool for popular CMS frameworks||CMSmap is a security tool to perform reconnaissance on a web target. It helps with the detection of several popular content management systems (CMS).||Unknown||Unknown||64|
|Dagda||Vulnerability scanner for Docker containers||Dagda is a security tool to perform static analysis of known vulnerabilities, malware and threats in Docker images and containers. It monitors both the Docker daemon and running containers to find anomalies and suspicious activities.||0.6.0||Aug. 25, 2017||68|
|flunym0us||Vulnerability scanner for WordPress and Moodle||Flunym0us is a security scanner for WordPress and Moodle installations. The tool tests the security of the installation by performing enumeration attempts.||Unknown||Unknown||68|
|Intrigue Core||Attack surface discovery||Intrigue Core is a security framework to help with automated attack surface discovery. It can be used both as an offensive or defensive tool.||0.5||July 3, 2018||100|
|JexBoss||JBoss verify and exploitation tool||JexBoss is a security tool to verify and exploit vulnerabilities in JBoss applications. It can be used for security assignments and pentests.||Unknown||Unknown||64|
|Lynis||Security scanner and compliance auditing tool||Lynis is a security auditing tool for systems running Linux, macOS, or Unix. It can be used for security assessments and configuration audits.||2.6.6||July 6, 2018||100|
|Nmap||Network and vulnerability scanner||Nmap is a security scanner that can perform a port scan, network exploration, and determine vulnerabilities||7.70||March 20, 2018||100|
|OpenVAS||Vulnerability scanner||OpenVAS is a framework of several services and tools offering a vulnerability scanning and vulnerability management solution.||5.0.9||March 27, 2018||96|
|Prowler (vuln)||Distributed vulnerability scanner||Prowler is a distributed vulnerability scanner that can run on devices like the Raspberry Pi. It can scan a set of systems and perform the typical tests within vulnerability scanning.||Unknown||Unknown||78|
|Safety||Vulnerability scanner for software dependencies||Safety is a security tool to scan software dependencies and see which ones are possibly vulnerable. See the review and how the tool works.||1.8.2||July 10, 2018||97|
|salt-scanner||Linux vulnerability scanner||Salt-scanner is Linux vulnerability scanner based on Salt Open and Vulners audit API. It has Slack notifications and JIRA integration.||Unknown||Unknown||64|
|Tulpar||Web vulnerability scanner||Tulpar is a security tool to scan web targets for possible vulnerabilities. It checks a wide range of items and attack types for this particular purpose.||Unknown||Unknown||64|
|Vane||WordPress vulnerability scanner||Vane is a forked project of the now non-free popular WordPress vulnerability scanner WPScan.||Unknown||Unknown||64|
|VScan||Vulnerability scanner with Nmap and NSE||Vscan is a security tool to perform vulnerability scanning with Nmap. It leverages NSE scripts to provide some flexibility in terms of vulnerability detection and exploitation.||Unknown||Unknown||64|
|Vuls||Agentless vulnerability scanner||Vuls is a vulnerability scanner for Linux and FreeBSD. It is written in Go, agentless, and can use a remote login to find any software vulnerabilities. It has multiple levels of scanning, from a fast scan up to a deep scan with extensive analysis.||0.4.2||Dec. 1, 2017||93|
|vulscan||Vulnerability scanning with Nmap||Vulscan is a vulnerability scanner which uses the well-known Nmap tool. By enhancing it with offline data from VulDB, it allows for detecting vulnerabilities. The database itself based on information from multiple sources.||Unknown||Unknown||78|
|Wapiti||Vulnerability scanner for web applications||Wapiti is a security tool to perform vulnerability scans on web applications. It uses fuzzing to detect known and unknown paths, among other tests.||3.0.0||Jan. 19, 2018||74|
|Whitewidow||SQL vulnerability scanner||Whitewidow is a security tool to perform automated SQL vulnerability scans. It can be used during penetration tests or for security assessments.||2.0||May 1, 2017||60|
Highlighted tools based on their strenghts
Some of the vulnerability scanners have features that make them stand out among the others. If one of these characteristics are important to you, have a look at these selected tools first.
Other related category: Linux vulnerability scanning tools