Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
DISCLAIMER
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanners making it one of the best.
$ docker-compose up -d && docker exec -it nettacker-nettacker-1 /bin/bash
# poetry run python nettacker.py -i owasp.org -s -m port_scan
.data/nettacker.db
(sqlite)..data/results
docker-compose
will share your nettacker folder, so you will not lose any data after docker-compose down
docker logs nettacker_nettacker_1
.We’re grateful to the organizations, community projects, and individuals who adopt and rely on OWASP Nettacker for their security workflows.
If you’re using OWASP Nettacker in your organization or project, we’d love to hear from you! Feel free to add your details to the ADOPTERS.md file by submitting a pull request or reach out to us via GitHub issues. Let’s showcase how Nettacker is making a difference in the security community!
See ADOPTERS.md for details.