Dockerscan alternatives

Looking for an alternative tool to replace Dockerscan? During the review of Dockerscan we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Anchore (container analysis and inspection)
  2. bane (AppArmor profile generator)
  3. Dagda (vulnerability scanner for Docker containers)

These tools are ranked as the best alternatives to Dockerscan.

Alternatives (by score)

100

Anchore

Introduction

Anchore is a tool to help with discovering, analyzing and certifying container images. These images can be stored both on-premises or in the cloud. The tooling is mainly focused on developer so that perform analysis on their container images. Typical actions include running queries, creating reports, or set up policies for a continuous integration and deployment pipeline.

Project details

Anchore is written in Python.

Strengths and weaknesses

  • + More than 10 contributors
  • + Commercial support available
  • + The source code of this software is available

    Typical usage

    • System hardening

    Anchore review

    68

    bane

    Introduction

    Bane is a tool to create AppArmor profiles. This helps to secure applications by setting restrictions on resources they access or modify. A strict policy may help to prevent privilege escalation attacks.

    Project details

    bane is written in Golang.

    Strengths and weaknesses

    • + More than 500 GitHub stars
    • + The source code of this software is available

      Typical usage

      • Application security
      • Security monitoring
      • System hardening

      bane review

      68

      Dagda

      Introduction

      The main reasons to use Dagda is the detection of vulnerable or malicious components within your containerized environment.

      Project details

      Dagda is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Malware detection
        • Malware scanning
        • Vulnerability management
        • Vulnerability scanning

        Dagda review

        64

        DFWFW (Docker Firewall Framework)

        Introduction

        DFWFW, short of Docker Firewall Framework, offers easy administration of the iptables rules of Docker containers. It updates using event streams.

        Project details

        DFWFW is written in Perl.

        Strengths and weaknesses

        • + The source code of this software is available
        • - Full name of author is unknown

        Typical usage

        • Firewall management

        DFWFW review

        64

        Docker Bench (by Aqua)

        Introduction

        Docker Bench is one of the tools that can be used to perform a security analysis on Docker and its configuration. It can find common configuration flaws that may impose risks to other containers or the host itself.

        Project details

        Docker Bench (by Aqua) is written in Golang.

        Strengths and weaknesses

        • + The source code of this software is available
        • - No releases on GitHub available

        Typical usage

        • Configuration audit

        Docker Bench (by Aqua) review

        60

        Docker Bench for Security

        Introduction

        Docker Bench for Security is a small security scanner to perform several tests that are part of the Docker CIS benchmark.

        Project details

        Docker Bench for Security is written in shell script.

        Strengths and weaknesses

        • + More than 25 contributors
        • + Screen output is colored
        • + More than 3000 GitHub stars
        • + The source code of this software is available

          Typical usage

          • Application security
          • Configuration audit
          • Security assessment

          Docker Bench for Security review

          100

          Lynis

          Introduction

          Lynis is an open source security auditing tool that is available since 2007 and created by Michael Boelen. Its primary goal is to evaluate the security defenses of systems running Linux or other flavors of Unix. It provides suggestions to install, configure, or correct any security measures.

          Project details

          Lynis is written in shell script.

          Strengths and weaknesses

          • + More than 50 contributors
          • + Commercial support available
          • + More than 4000 GitHub stars
          • + Used language is shell script
          • + Very low number of dependencies
          • + Project is mature (10+ years)
          • + The source code of this software is available

            Typical usage

            • IT audit
            • Penetration testing
            • Security assessment
            • System hardening
            • Vulnerability scanning

            Lynis review

            70

            subuser

            Introduction

            A tool like subuser can useful to test software from untrusted sources.

            Project details

            subuser is written in Python.

            Strengths and weaknesses

            • + More than 10 contributors
            • + More than 500 GitHub stars
            • + The source code of this software is available

              Typical usage

              • Software testing

              subuser review

              60

              evilredis

              Introduction

              Evilredis tool is an offensive security program for pentesting Redis databases. It can scan the target and perform different actions, like shutting down a Redis instance.

              Project details

              evilredis is written in Node.js.

              Strengths and weaknesses

              • + The source code of this software is available

                Typical usage

                • Security assessment
                • Vulnerability scanning

                evilredis review

                74

                Metasploit Framework

                Introduction

                Metasploit is a framework that consists of tools to perform security assignments. It focuses on the offensive side of security and leverages exploit modules.

                Project details

                Metasploit Framework is written in Ruby.

                Strengths and weaknesses

                • + More than 400 contributors
                • + More than 9000 stars
                • + Many maintainers
                • + The source code of this software is available
                • + Supported by a large company
                • + Well-known tool

                  Typical usage

                  • Penetration testing
                  • Security assessment
                  • Vulnerability scanning

                  Metasploit Framework review

                  88

                  OWTF (Offensive Web Testing Framework)

                  Introduction

                  OWTF is short for Offensive Web Testing Framework and it is one of the many OWASP projects to improve security.

                  Project details

                  OWTF is written in Python.

                  Strengths and weaknesses

                  • + More than 25 contributors
                  • + More than 500 GitHub stars
                  • + The source code of this software is available

                    Typical usage

                    • Penetration testing
                    • Security assessment

                    OWTF review

                    64

                    Pyersinia

                    Introduction

                    Pyersinia is a tool like Yersinia and can perform network attacks such as spoofing ARP, DHCP DoS , STP DoS, and more. It is written in Python and uses Scapy.

                    Project details

                    Pyersinia is written in Python.

                    Strengths and weaknesses

                    • + The source code of this software is available

                      Typical usage

                      • Network analysis
                      • Penetration testing
                      • Security assessment

                      Pyersinia review

                      72

                      RouterSploit

                      Introduction

                      RouterSploit is a framework to exploit embedded devices such as cameras and routers. It can be used during penetration testing to test the security of a wide variety of devices. RouterSploit comes with several modules to scan and exploit the devices. The tool helps in all steps, like from credential testing to deploying a payload to perform an exploitation attempt.

                      Project details

                      RouterSploit is written in Python.

                      Strengths and weaknesses

                      • + More than 50 contributors
                      • + More than 6000 GitHub stars
                      • + The source code of this software is available

                        Typical usage

                        • Penetration testing
                        • Self-assessment
                        • Software testing
                        • Vulnerability scanning

                        RouterSploit review

                        Some relevant tool missing as an alternative to Dockerscan? Please contact us with your suggestion.