scanning
![Grype](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/06152010/grype-scanner-1500-400x200.webp)
Grype: Open-source vulnerability scanner for container images, filesystems
Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials (SBOM) …
![Sniffnet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31182750/sniffnet-1500-400x200.webp)
Sniffnet: Free, open-source network monitoring
Sniffnet is a free, open-source network monitoring tool to help you easily track your Internet traffic. What sets it apart is its strong focus on user experience. Unlike most …
![Nmap](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/09173702/nmap-1500-400x200.webp)
Nmap 7.95 released: New OS and service detection signatures
Nmap is a free, open-source tool for network discovery and security auditing. It’s valued by systems and network administrators for network inventory, managing service …
![WebCopilot](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/18184315/webcopilot-1500-400x200.webp)
WebCopilot: Open-source automation tool enumerates subdomains, detects bugs
WebCopilot is an open-source automation tool that enumerates a target’s subdomains and discovers bugs using various free tools. It simplifies the application security …
![Lynis](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/13174935/lynis-open_source-1500-400x200.webp)
Lynis: Open-source security auditing tool
Lynis is a comprehensive open-source security auditing tool for UNIX-based systems, including Linux, macOS, and BSD. Hardening with Lynis Lynis conducts a thorough security …
![Quicmap](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/06124241/quicmap-1500-400x200.webp)
Quicmap: Fast, open-source QUIC protocol scanner
Quicmap is a fast, open-source QUIC service scanner that streamlines the process by eliminating multiple tool requirements. It effectively identifies QUIC services, the …
![RiskInDroid](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/29100746/riskindroid-1500-400x200.webp)
RiskInDroid: Open-source risk analysis of Android apps
RiskInDroid (Risk Index for Android) is an open-source tool for quantitative risk analysis of Android applications based on machine learning techniques. How RiskInDroid works …
![TruffleHog](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/13134910/trufflehog-1400-400x200.jpg)
TruffleHog: Open-source solution for scanning secrets
TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I …
![Isaac Evans](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/17115957/isaac_evans-2-semgrep-400x200.jpg)
Custom rules in security tools can be a game changer for vulnerability detection
In this Help Net interview, Isaac Evans, CEO at Semgrep, discusses the balance between speed and thoroughness in CI/CD pipeline security scanning. Stressing the need to avoid …
![Nemesis](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/08084843/nemesis-specterops-1400-400x200.jpg)
Nemesis: Open-source offensive data enrichment and analytic pipeline
Nemesis is a centralized data processing platform that ingests, enriches, and performs analytics on offensive security assessment data (i.e., data collected during penetration …
![Kubescape](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101030/kubescape1-400x200.jpg)
Kubescape open-source project adds Vulnerability Exploitability eXchange (VEX) support
With its innovative feature for generating reliable Vulnerability Exploitability eXchange (VEX) documents, Kubescape became the first open-source project to provide this …
![Vigil LLM security scanner](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/26162334/vigil-llm-security-scanner-400x200.jpg)
Vigil: Open-source LLM security scanner
Vigil is an open-source security scanner that detects prompt injections, jailbreaks, and other potential threats to Large Language Models (LLMs). Prompt injection arises when …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege