Anchore Engine alternatives
Looking for an alternative tool to replace Anchore Engine? During the review of Anchore Engine we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Alternatives (by score)
Dagda
Introduction
The main reasons to use Dagda is the detection of vulnerable or malicious components within your containerized environment.
Project details
Dagda is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Malware detection
- Malware scanning
- Vulnerability management
- Vulnerability scanning
bane
Introduction
Bane is a tool to create AppArmor profiles. This helps to secure applications by setting restrictions on resources they access or modify. A strict policy may help to prevent privilege escalation attacks.
Project details
bane is written in Golang.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Application security
- Security monitoring
- System hardening
Lynis
Introduction
Lynis is an open-source security auditing tool that is available since 2007 and created by Michael Boelen. Its primary goal is to evaluate the security defenses of systems running Linux or other flavors of Unix. It provides suggestions to install, configure, or correct any security measures.
Project details
Lynis is written in shell script.
Strengths and weaknesses
- + The source code is easy to read and understand
- + More than 100 contributors
- + More than 8000 GitHub stars
- + Tool is easy to use
- + Available as package (simplified installation)
- + Commercial support available
- + Used language is shell script
- + Very low number of dependencies
- + Project is mature (10+ years)
- + The source code of this software is available
Typical usage
- IT audit
- Penetration testing
- Security assessment
- System hardening
- Vulnerability scanning
Docker Bench (by Aqua)
Introduction
Docker Bench is one of the tools that can be used to perform a security analysis on Docker and its configuration. It can find common configuration flaws that may impose risks to other containers or the host itself.
Project details
Docker Bench (by Aqua) is written in Golang.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Configuration audit
Docker Bench for Security
Introduction
Docker Bench for Security is a small security scanner to perform several tests that are part of the Docker CIS benchmark.Project details
Docker Bench for Security is written in shell script.
Strengths and weaknesses
- + More than 25 contributors
- + Screen output is colored
- + More than 3000 GitHub stars
- + The source code of this software is available
Typical usage
- Application security
- Configuration audit
- Security assessment
OpenSCAP
Introduction
The OpenSCAP project provides a wide variety of hardening guides, configuration baselines, and tools to test for vulnerabilities and configuration issues. It uses SCAP as the protocol to store the underlying data.
Project details
OpenSCAP is written in C.
Strengths and weaknesses
- + More than 25 contributors
- + The source code of this software is available
- + Supported by a large company
Typical usage
- Security assessment
- Vulnerability scanning
Clair
Introduction
The tool has been created by CoreOS and can scan containers of different formats. It analyzes them and determines available security weaknesses in the container.
Project details
Clair is written in Golang.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Security assessment
- Vulnerability scanning
DFWFW (Docker Firewall Framework)
Introduction
DFWFW, short of Docker Firewall Framework, offers easy administration of the iptables rules of Docker containers. It updates using event streams.Project details
DFWFW is written in Perl.
Strengths and weaknesses
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Firewall management
Dockerscan
Introduction
Dockerscan is a Docker toolkit for security analysis which includes attacking tools. It is more focused on side of the offensive than defensive.Project details
Dockerscan is written in Python.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Information gathering
- Security assessment
- Vulnerability scanning
subuser
Introduction
A tool like subuser can useful to test software from untrusted sources.
Project details
subuser is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Software testing
Archery
Introduction
Archery is a tool that helps to collect data about vulnerabilities within an environment. Instead of focusing on the actual scanning, it allows managing findings in a web-based interface. This includes options like reporting, searching, and dashboards. It can interact with other tools, including the well-known vulnerability scanners.
Project details
Archery is written in Python.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Penetration testing
- Vulnerability management
- Vulnerability scanning
- Vulnerability testing
AutoNessus (autonessus)
Introduction
This tool is useful to time scans, for example by having it run outside of business hours, and stop when the day starts.
Note: originally another tool was named AutoNessus. That is now Seccubus.
Project details
AutoNessus is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Vulnerability scanning
CMSeeK
Introduction
CMSeeK is a security scanner for content management systems (CMS). It can perform a wide range of functions starting from the detection of the CMS, up to vulnerability scanning. The tool claims to support over 100 different CMS tools, with extensive support for the commonly used ones like Drupal, Joomla, and WordPress.
The scans performed by CMSeeK include version detection. It can also do enumeration of users, plugins, and themes. This might be useful to see what users or components are available. The tool includes admin page discovery, file discovery, and directory listing. Anything that might be useful to a penetration test or security assessment, might be displayed.
Project details
CMSeeK is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Penetration testing
- Software exploitation
- Software identification
- Vulnerability scanning
Damn Small FI Scanner (DSFS)
Introduction
NoneProject details
Damn Small FI Scanner is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Security assessment
- Vulnerability scanning
Damn Small JS Scanner (DSJS)
Introduction
NoneProject details
Damn Small JS Scanner is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
Jackhammer
Introduction
The tool uses RBAC (Role Based Access Control) with different levels of access. Jackhammer uses several tools to do dynamic and static code analysis (e.g. for Java, Ruby, Python, and Nodejs). It checks also for vulnerabilities in libraries. Due to its modular architecture, it can use several scanners out of the box, with options to add your own.
The Jackhammer project was initially added to GitHub on the 8th of May, 2017.
Project details
Jackhammer is written in Ruby.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Collaboration
- Information sharing
JoomScan
Introduction
JoomScan could be used to test your Joomla installation or during security assessments. As it has a primary focus on Joomla, it may provide better results than generic vulnerability scanners.
Project details
JoomScan is written in Perl.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Vulnerability scanning
- Vulnerability testing
LFI Suite
Introduction
This tool is a useful addition to the pentesting toolbox of security professionals. It can help discover and exploit any local file inclusion weakness in applications. Upon success, a reverse shell can be used to get access to the system.
Project details
LFI Suite is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Penetration testing
- Web application analysis
Nikto
Introduction
Nikto helps with performing security scans against web servers and to search for vulnerabilities in web applications.
Project details
Nikto is written in Perl.
Strengths and weaknesses
- + The source code of this software is available
- + Well-known tool
Typical usage
- Penetration testing
- Security assessment
- Web application analysis
Nmap
Introduction
Nmap is short for "Network Mapper". It is a free and open source utility for network discovery and security auditing. It was release in September of 1997 by Gordon Lyon, commonly known under his pseudonym "Fyodor".
Project details
Nmap is written in C, C++, Lua, Python.
Strengths and weaknesses
- + Project is mature (10+ years)
- + The source code of this software is available
- + Well-known author
- + Well-known tool
- - Software usage is restricted (e.g. commercially)
Typical usage
- Network scanning
- Vulnerability scanning
OpenVAS
Introduction
OpenVAS is an open source vulnerability scanner that emerged from when Nessus became closed source in October of 2005.
Project details
OpenVAS is written in C.
Strengths and weaknesses
- + The source code of this software is available
- + Well-known tool
Typical usage
- Penetration testing
- Security assessment
- Vulnerability scanning
Safety
Introduction
When having applications deployed in your environment, not all of those may be installed via a package manager. When your infrastructure grows, it becomes even harder to know which tools are properly patched and which ones are not. For Python applications, this is where Safety comes in that can help scan installed software components via pip. It will also look at any of the dependencies that are installed.
Project details
Safety is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
- Security monitoring
- Vulnerability scanning
Seccubus
Introduction
Supported engines and tools:
- Nessus
- OpenVAS
- Nmap
- Nikto
- Medusa
- Qualys SSL labs
- SkipFish
- SSLyze
- testssl.sh
- ZAP
Project details
Tulpar
Introduction
Tulpar is a vulnerability scanner that can be used to test new or existing web applications. In the former case, it could be helpful to test a new project before it is deployed into production. This could be done by the developer or a security professional. If some web application is already in production, then it might be a good tool to perform regular testing on known vulnerabilities. In this case, it is typically a pentester or security specialist that does the testing.
Project details
Tulpar is written in Python.
Strengths and weaknesses
- + The source code of this software is available
- - Minimal or no documentation available
Typical usage
- Application security
- Application testing
- Web application analysis
VScan
Introduction
Vscan is a security tool to perform vulnerability scanning with Nmap. It leverages NSE scripts to provide some flexibility in terms of vulnerability detection and exploitation.Project details
VScan is written in shell script.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Backdoor detection
- Vulnerability scanning
Some relevant tool missing as an alternative to Anchore Engine? Please contact us with your suggestion.