An Nmap NSE script that transforms nmap into a vulnerability scanner using offline vulnerability databases.
Vulscan is an Nmap Scripting Engine module that enhances nmap to perform vulnerability scanning by matching service version information against offline vulnerability databases. It transforms nmap from a network discovery tool into a vulnerability assessment tool by identifying potential security flaws based on detected software versions. The project provides multiple pre-installed databases and supports custom databases for flexible vulnerability matching.
Security professionals, penetration testers, and network administrators who use nmap for network reconnaissance and want to integrate vulnerability scanning into their existing workflows without relying on online services.
Developers choose Vulscan because it extends the familiar nmap tool with offline vulnerability scanning capabilities, supports multiple reputable vulnerability databases, and offers customizable reporting and interactive features—all while maintaining the performance and integration benefits of an NSE script.
Advanced vulnerability scanning with Nmap NSE
Includes multiple pre-installed databases like VulDB, CVE, and Exploit-DB, enabling comprehensive vulnerability scanning without internet access, as listed in the README.
Allows users to create their own databases with a simple ID-title structure, facilitating tailored vulnerability matching for specialized environments, as described in the Single Database Mode section.
Leverages nmap's version detection (-sV) to identify services, making it easy to incorporate vulnerability assessment into existing network reconnaissance workflows without additional tools.
Supports customizable output formats with dynamic elements like ID, title, and version, allowing detailed or concise reports based on user preferences, as shown in the Reporting section.
Enables manual adjustment of version detection results per port during scans, increasing accuracy in cases where automated detection is unreliable, as mentioned in the Interactive Mode part.
Relies on nmap's version detection and database accuracy; the README notes that databases like Apache entries can lead to many false-positives without conclusive version info.
Some pre-installed databases such as securitytracker and osvdb are end-of-life, reducing coverage and requiring manual updates via scripts, which may not be automated.
Database updates require running a shell script or manually downloading files, lacking built-in, scheduled updates common in commercial vulnerability scanners.
Disabling version matching might improve speed but increase false-positives, and showing all matches can slow scans, as indicated in the Version Detection and Match Priority sections.
A tool for secrets management, encryption as a service, and privileged access management
An evolving how-to guide for securing a Linux server.
Daemon to ban hosts that cause multiple authentication errors
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.