Search results
Results from the WOW.Com Content Network
Octarine, a startup that helps automate security of Kubernetes workloads, released an open-source scanning tool today. As Ocatrine's head of product Julien Sobrier points out, there are 30 ...
Assured Compliance Assessment Solution (ACAS) is a software set of information security tools used for vulnerability scanning and risk assessment by agencies of the United States Department of Defense (DoD). [1] It performs automated vulnerability scanning and device configuration assessment.
OpenVAS (Open Vulnerability Assessment Scanner, originally known as GNessUs) is the scanner component of Greenbone Vulnerability Management (GVM), a software framework of several services and tools offering vulnerability scanning and vulnerability management.
Linux, Windows Free or Cost Yes Proxmox Virtual Environment: Proxmox Server Solutions Complete actively developed Open-source AGPLv3 Linux, Windows, other operating systems are known to work and are community supported Free Yes Rocks Cluster Distribution: Open Source/NSF grant All in one actively developed
ProGet currently supports a growing list of package managers, including NuGet, Chocolatey, Bower, npm, Maven, Dart/Flutter, Rust (Cargo), PowerShell, RubyGems, Helm for Kubernetes, Debian, Python, and Visual Studio Extensions (.vsix). ProGet also supports Docker containers, Jenkins build artifacts (through a plugin) and vulnerability scanning.
Lynis is an extensible security audit tool for computer systems running Linux, FreeBSD, macOS, OpenBSD, Solaris, and other Unix derivatives.It assists system administrators and security professionals with scanning a system and its security defenses, with the final goal being system hardening.
ZMap is a free and open-source security scanner that was developed as a faster alternative to Nmap. ZMap was designed for information security research and can be used for both white hat and black hat purposes. The tool is able to discover vulnerabilities and their impact, and detect affected IoT devices.
The SAINT scanner, screens every live system on a network for TCP and UDP services. For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service , or gain sensitive information about the network.