A free and open-source scanner that identifies installed components, extensions, and files in Joomla CMS websites.
Joomla Scan is a free, open-source security tool designed to scan Joomla CMS websites and identify installed components, extensions, and files. It helps security professionals and administrators discover potentially vulnerable or outdated components by checking against a database of over 600 Joomla extensions and locating version-revealing files.
Security researchers, penetration testers, and Joomla administrators who need to audit Joomla installations for security vulnerabilities and exposed components.
It provides a specialized, focused scanner for Joomla CMS that goes beyond generic web scanners, offering a comprehensive component database and file discovery features specifically tailored for Joomla's structure.
A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Includes a database of over 600 Joomla components and extensions, specifically tuned for accurate Joomla reconnaissance, as highlighted in the features list.
Supports configurable threads (default 10) for faster scanning, improving performance during penetration tests, per the usage arguments.
Locates version-identifying files like Readme and Manifest, plus sensitive files such as robots.txt and error_log, aiding in information leakage detection.
Offers straightforward usage with minimal arguments (e.g., -u for URL, -t for threads), making it easy to deploy for quick scans.
Last updated in 2016 with planned features like Joomla version detection and vulnerable component database unimplemented, reducing relevance for current threats.
The database is frozen at 686 entries from 2016, missing newer extensions and vulnerabilities, which limits accuracy for modern Joomla sites.
Focuses only on discovery without exploitation capabilities or advanced scanning features, requiring additional tools for full security assessments.