Spaghetti alternatives

Looking for an alternative tool to replace Spaghetti? During the review of Spaghetti we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Arachni (web application scanner)
  2. Wapiti (vulnerability scanner for web applications)
  3. WhatWeb (website analyzer and fingerprinting tool)

These tools are ranked as the best alternatives to Spaghetti.

Alternatives (by score)

74

Arachni

Introduction

Arachni is framework written in Ruby with focus on evaluating the security of web applications. Typical users include security professionals and system administrators.

The tooling is free and open source. Besides Linux, it also runs on macOS and Microsoft Windows.

Project details

Arachni is written in Ruby.

Strengths and weaknesses

  • + More than 1000 GitHub stars
  • + The source code of this software is available

    Typical usage

    • Penetration testing
    • Security assessment
    • Web application analysis

    Arachni review

    74

    Wapiti

    Introduction

    Wapiti is typically used to audit web applications.

    Project details

    Wapiti is written in Python.

    Strengths and weaknesses

    • + The source code of this software is available
    • + Well-known tool

      Typical usage

      • Application fuzzing
      • Vulnerability scanning
      • Web application analysis

      Wapiti review

      89

      WhatWeb

      Introduction

      WhatWeb can be used stealthy and fast to determine what technologies are used on a particular website or web application. This process called fingerprinting can tell a lot about how it was build and possible weaknesses it might have. The tool can be used in different levels, from stealthy to very aggressive. This last one is useful in penetration tests or during development.

      Project details

      WhatWeb is written in Ruby.

      Strengths and weaknesses

      • + More than 25 contributors
      • + More than 1000 GitHub stars
      • + The source code of this software is available

        Typical usage

        • Reconnaissance
        • Web application analysis

        WhatWeb review

        93

        ZAP (Zed Attack Proxy)

        Introduction

        ZAP is an intercepting proxy of web traffic. You will need to configure your browser to connect to the web application you wish to test through ZAP.

        Note: Zed Attack Proxy, or ZAP, is also known as zaproxy.

        Project details

        ZAP is written in Java.

        Strengths and weaknesses

        • + More than 50 contributors
        • + More than 2000 GitHub stars
        • + Many maintainers
        • + The source code of this software is available
        • - Many reported issues are still open

        Typical usage

        • Penetration testing
        • Security assessment
        • Software testing
        • Web application analysis

        ZAP review

        74

        Nikto

        Introduction

        Nikto helps with performing security scans against web servers and to search for vulnerabilities in web applications.

        Project details

        Nikto is written in Perl.

        Strengths and weaknesses

        • + The source code of this software is available
        • + Well-known tool

          Typical usage

          • Penetration testing
          • Security assessment
          • Web application analysis

          Nikto review

          93

          WordPress Exploit Framework (WPXF)

          Introduction

          This framework is a tool that can be used as part of the pentesters toolbox. When running the tool, you will have to define a host, exploit, and payload. The tool is less friendly for beginners, but more experienced pentesters will find no difficulty in using it.

          Project details

          WordPress Exploit Framework is written in Ruby.

          Strengths and weaknesses

          • + More than 500 GitHub stars
          • + The source code of this software is available
          • - Has longer learning curve

          Typical usage

          • Penetration testing
          • Security assessment
          • Vulnerability scanning

          WordPress Exploit Framework review

          60

          Wordstress

          Introduction

          WordPress is a popular choice among content management systems (CMS). Powering many websites and blogs, it is also a popular target. So regular updates and security testing can help to reduce the risk. WordStress can help with this testing.

          Project details

          Wordstress is written in Ruby.

          Strengths and weaknesses

          • + The source code of this software is available

            Typical usage

            • Application security
            • Vulnerability scanning
            • Web application analysis

            Wordstress review

            64

            Jackhammer

            Introduction

            The tool uses RBAC (Role Based Access Control) with different levels of access. Jackhammer uses several tools to do dynamic and static code analysis (e.g. for Java, Ruby, Python, and Nodejs). It checks also for vulnerabilities in libraries. Due to its modular architecture, it can use several scanners out of the box, with options to add your own.

            The Jackhammer project was initially added to GitHub on the 8th of May, 2017.

            Project details

            Jackhammer is written in Ruby.

            Strengths and weaknesses

            • + The source code of this software is available

              Typical usage

              • Collaboration
              • Information sharing

              Jackhammer review

              64

              shcheck (Security Header Check)

              Introduction

              This simple tool is a good option to test if advised HTTP headers are available on web application and websites. It can be used as a defensive measure during development, or offensive to find weaknesses in existing applications.

              Project details

              shcheck is written in Python.

              Strengths and weaknesses

              • + Very low number of dependencies
              • + The source code of this software is available
              • - No releases on GitHub available

              Typical usage

              • Application security
              • Web application analysis

              shcheck review

              64

              SQLMate

              Introduction

              SQLMate is to be used for security assessments. It can discover admin panels of websites, which might be a way to break into a web application. It also has the option for dorking, which means it can find possible vulnerable targets to a particular attack.

              Project details

              SQLMate is written in Python.

              Strengths and weaknesses

              • + The source code of this software is available
              • - No releases on GitHub available

              SQLMate review

              93

              Wfuzz

              Introduction

              Wfuzz is a fuzzing tool written in Python. Tools like Wfuzz are typically used to test web applications and how they handle both expected as unexpected input.

              Project details

              Wfuzz is written in Python.

              Strengths and weaknesses

              • + More than 1000 GitHub stars
              • + The source code of this software is available

                Typical usage

                • Application fuzzing
                • Application security
                • Application testing
                • Web application analysis

                Wfuzz review

                60

                wig (WebApp Information Gatherer)

                Introduction

                Tools like wig are used to discover what particular software is used to power a web application.

                Project details

                wig is written in Python.

                Strengths and weaknesses

                • + The source code of this software is available
                • - No updates for a while
                • - Full name of author is unknown

                wig review

                64

                CMSmap

                Introduction

                CMSmap helps saving time in the process of detecting what CMS is used for a given web application. It performs reconnaissance and can do additional vulnerability scanning.

                Project details

                CMSmap is written in Python.

                Strengths and weaknesses

                • + The source code of this software is available

                  Typical usage

                  • Application testing
                  • Information gathering
                  • Vulnerability scanning
                  • Web application analysis

                  CMSmap review

                  100

                  Archery

                  Introduction

                  Archery is a tool that helps to collect data about vulnerabilities within an environment. Instead of focusing on the actual scanning, it allows managing findings in a web-based interface. This includes options like reporting, searching, and dashboards. It can interact with other tools, including the well-known vulnerability scanners.

                  Project details

                  Archery is written in Python.

                  Strengths and weaknesses

                  • + More than 500 GitHub stars
                  • + The source code of this software is available

                    Typical usage

                    • Penetration testing
                    • Vulnerability management
                    • Vulnerability scanning
                    • Vulnerability testing

                    Archery review

                    68

                    Dagda

                    Introduction

                    The main reasons to use Dagda is the detection of vulnerable or malicious components within your containerized environment.

                    Project details

                    Dagda is written in Python.

                    Strengths and weaknesses

                    • + The source code of this software is available

                      Typical usage

                      • Malware detection
                      • Malware scanning
                      • Vulnerability management
                      • Vulnerability scanning

                      Dagda review

                      88

                      LFI Suite

                      Introduction

                      This tool is a useful addition to the pentesting toolbox of security professionals. It can help discover and exploit any local file inclusion weakness in applications. Upon success, a reverse shell can be used to get access to the system.

                      Project details

                      LFI Suite is written in Python.

                      Strengths and weaknesses

                      • + The source code of this software is available
                      • - Full name of author is unknown

                      Typical usage

                      • Penetration testing
                      • Web application analysis

                      LFI Suite review

                      96

                      OpenVAS

                      Introduction

                      OpenVAS is an open source vulnerability scanner that emerged from when Nessus became closed source in October of 2005.

                      Project details

                      OpenVAS is written in C.

                      Strengths and weaknesses

                      • + The source code of this software is available
                      • + Well-known tool

                        Typical usage

                        • Penetration testing
                        • Security assessment
                        • Vulnerability scanning

                        OpenVAS review

                        97

                        Safety

                        Introduction

                        When having applications deployed in your environment, not all of those may be installed via a package manager. When your infrastructure grows, it becomes even harder to know which tools are properly patched and which ones are not. For Python applications, this is where Safety comes in that can help scan installed software components via pip. It will also look at any of the dependencies that are installed.

                        Project details

                        Safety is written in Python.

                        Strengths and weaknesses

                        • + More than 10 contributors
                        • + The source code of this software is available

                          Typical usage

                          • Penetration testing
                          • Security assessment
                          • Security monitoring
                          • Vulnerability scanning

                          Safety review

                          64

                          salt-scanner

                          Introduction

                          Salt-scanner is Linux vulnerability scanner based on Salt Open and Vulners audit API. It has Slack notifications and JIRA integration.

                          Project details

                          salt-scanner is written in Python.

                          Strengths and weaknesses

                          • + The source code of this software is available
                          • - No releases on GitHub available

                          Typical usage

                          • Penetration testing
                          • Security assessment
                          • Vulnerability scanning

                          salt-scanner review

                          84

                          arch-audit

                          Introduction

                          Arch-audit is a small utility that scans the system for known vulnerabilities on Arch Linux. It can be used by users of the Linux distribution to know when to update and what packages have weaknesses. With Arch Linux being a rolling distribution, this may improve the interval or timing of software patching.

                          Project details

                          arch-audit is written in Rust.

                          Strengths and weaknesses

                          • + The source code of this software is available

                            Typical usage

                            • Software management
                            • Vulnerability scanning

                            arch-audit review

                            81

                            detectem

                            Introduction

                            Detectem can be a good early vulnerability detection system. By scanning regularly the dependencies of web applications, old versions of tools can be detected and upgraded. This tool is also helpful for penetration tests to find out what kind of software components are used.

                            Project details

                            detectem is written in Python.

                            Strengths and weaknesses

                            • + The source code of this software is available

                              Typical usage

                              • Application security
                              • Application testing
                              • Reconnaissance
                              • Vulnerability scanning

                              detectem review

                              70

                              graudit

                              Introduction

                              Analysis of source code helps to find programming flaws including those that can lead to software vulnerabilities. Graudit helps to uncover these by searching through the files and discover possible flaws. The tool supports languages like ASP, C, Perl, PHP, Python, and others.

                              Project details

                              graudit is written in shell script.

                              Strengths and weaknesses

                              • + The source code is easy to read and understand
                              • + Tool is easy to use
                              • + Used language is shell script
                              • + The source code of this software is available
                              • - No releases on GitHub available

                              Typical usage

                              • Code analysis

                              graudit review

                              100

                              Intrigue Core

                              Introduction

                              Intrigue Core provides a framework to measure the attack surface of an environment. This includes discovering infrastructure and applications, performing security research, and doing vulnerability discovery.

                              Intrigue also allows enriching available data and perform OSINT research (open source intelligence). The related scans include DNS subdomain brute-forcing, email harvesting, IP geolocation, port scanning, and using public search engines like Censys, Shodan, and Bing.

                              Project details

                              Intrigue Core is written in Ruby.

                              Strengths and weaknesses

                              • + More than 500 GitHub stars
                              • + The source code of this software is available

                                Typical usage

                                • Asset discovery
                                • Attack surface measurement
                                • Intelligence gathering
                                • OSINT research
                                • Penetration testing
                                • Security assessment

                                Intrigue Core review

                                85

                                Pocsuite

                                Introduction

                                Pocsuite is a remote vulnerability testing and development framework. It can be used by penetration testers and vulnerability researchers.

                                Project details

                                Pocsuite is written in Python.

                                Strengths and weaknesses

                                • + More than 10 contributors
                                • + More than 1000 GitHub stars
                                • + The source code of this software is available

                                  Typical usage

                                  • Vulnerability development
                                  • Vulnerability testing

                                  Pocsuite review

                                  60

                                  Pompem

                                  Introduction

                                  Pompem is written in Python and helps pentesters to search public sources for vulnerability information and a related exploit.

                                  Sources

                                  • CXSecurity
                                  • National Vulnerability Database
                                  • PacketStorm security
                                  • Vulners
                                  • WPScan Vulnerability Database
                                  • ZeroDay

                                  Project details

                                  Pompem is written in Python.

                                  Strengths and weaknesses

                                  • + The source code of this software is available

                                    Typical usage

                                    • Vulnerability scanning

                                    Pompem review

                                    Some relevant tool missing as an alternative to Spaghetti? Please contact us with your suggestion.