Dockerscan alternatives
Looking for an alternative tool to replace Dockerscan? During the review of Dockerscan we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.
Top 3
- Anchore Engine (container analysis and inspection)
- DFWFW (firewall management for iptables with Docker)
- Dagda (vulnerability scanner for Docker containers)
These tools are ranked as the best alternatives to Dockerscan.
Alternatives (by score)
Anchore Engine
Introduction
Anchore is a tool to help with discovering, analyzing and certifying container images. These images can be stored both on-premises or in the cloud. The tooling is mainly focused on developer so that perform analysis on their container images. Typical actions include running queries, creating reports, or set up policies for a continuous integration and deployment pipeline.
Project details
Anchore Engine is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + Commercial support available
- + More than 1000 GitHub stars
- + The source code of this software is available
Typical usage
- System hardening
DFWFW (Docker Firewall Framework)
Introduction
DFWFW, short of Docker Firewall Framework, offers easy administration of the iptables rules of Docker containers. It updates using event streams.Project details
DFWFW is written in Perl.
Strengths and weaknesses
- + The source code of this software is available
- - Full name of author is unknown
Typical usage
- Firewall management
Dagda
Introduction
The main reasons to use Dagda is the detection of vulnerable or malicious components within your containerized environment.
Project details
Dagda is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Malware detection
- Malware scanning
- Vulnerability management
- Vulnerability scanning
Docker Bench (by Aqua)
Introduction
Docker Bench is one of the tools that can be used to perform a security analysis on Docker and its configuration. It can find common configuration flaws that may impose risks to other containers or the host itself.
Project details
Docker Bench (by Aqua) is written in Golang.
Strengths and weaknesses
- + The source code of this software is available
- - No releases on GitHub available
Typical usage
- Configuration audit
Docker Bench for Security
Introduction
Docker Bench for Security is a small security scanner to perform several tests that are part of the Docker CIS benchmark.Project details
Docker Bench for Security is written in shell script.
Strengths and weaknesses
- + More than 25 contributors
- + Screen output is colored
- + More than 3000 GitHub stars
- + The source code of this software is available
Typical usage
- Application security
- Configuration audit
- Security assessment
Lynis
Introduction
Lynis is an open-source security auditing tool that is available since 2007 and created by Michael Boelen. Its primary goal is to evaluate the security defenses of systems running Linux or other flavors of Unix. It provides suggestions to install, configure, or correct any security measures.
Project details
Lynis is written in shell script.
Strengths and weaknesses
- + The source code is easy to read and understand
- + More than 100 contributors
- + More than 8000 GitHub stars
- + Tool is easy to use
- + Available as package (simplified installation)
- + Commercial support available
- + Used language is shell script
- + Very low number of dependencies
- + Project is mature (10+ years)
- + The source code of this software is available
Typical usage
- IT audit
- Penetration testing
- Security assessment
- System hardening
- Vulnerability scanning
bane
Introduction
Bane is a tool to create AppArmor profiles. This helps to secure applications by setting restrictions on resources they access or modify. A strict policy may help to prevent privilege escalation attacks.
Project details
bane is written in Golang.
Strengths and weaknesses
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Application security
- Security monitoring
- System hardening
subuser
Introduction
A tool like subuser can useful to test software from untrusted sources.
Project details
subuser is written in Python.
Strengths and weaknesses
- + More than 10 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Software testing
Metasploit Framework
Introduction
Metasploit is a framework that consists of tools to perform security assignments. It focuses on the offensive side of security and leverages exploit modules.Project details
Metasploit Framework is written in Ruby.
Strengths and weaknesses
- + More than 400 contributors
- + More than 9000 stars
- + Many maintainers
- + The source code of this software is available
- + Supported by a large company
- + Well-known tool
Typical usage
- Penetration testing
- Security assessment
- Vulnerability scanning
OWTF (Offensive Web Testing Framework)
Introduction
OWTF is short for Offensive Web Testing Framework and it is one of the many OWASP projects to improve security.
Project details
OWTF is written in Python.
Strengths and weaknesses
- + More than 25 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Typical usage
- Penetration testing
- Security assessment
Pyersinia
Introduction
Pyersinia is a tool like Yersinia and can perform network attacks such as spoofing ARP, DHCP DoS , STP DoS, and more. It is written in Python and uses Scapy.Project details
Pyersinia is written in Python.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Network analysis
- Penetration testing
- Security assessment
RouterSploit
Introduction
RouterSploit is a framework to exploit embedded devices such as cameras and routers. It can be used during penetration testing to test the security of a wide variety of devices. RouterSploit comes with several modules to scan and exploit the devices. The tool helps in all steps, like from credential testing to deploying a payload to perform an exploitation attempt.
Project details
RouterSploit is written in Python.
Strengths and weaknesses
- + More than 50 contributors
- + More than 6000 GitHub stars
- + The source code of this software is available
Typical usage
- Penetration testing
- Self-assessment
- Software testing
- Vulnerability scanning
evilredis
Introduction
Evilredis tool is an offensive security program for pentesting Redis databases. It can scan the target and perform different actions, like shutting down a Redis instance.
Project details
evilredis is written in Node.js.
Strengths and weaknesses
- + The source code of this software is available
Typical usage
- Security assessment
- Vulnerability scanning
Some relevant tool missing as an alternative to Dockerscan? Please contact us with your suggestion.