w3af is an open source web application security scanner that helps developers and penetration testers identify and exploit vulnerabilities in their web applications. The scanner can identify 200+ vulnerabilities, including Cross-Site Scripting, SQL injection, and OS commanding. Contributions are welcome, and the project is sponsored by Holm Security for automated vulnerability assessment.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Automated contextual security findings enrichment and impact evaluation tool for vulnerability management.
A presentation about the OWASP Top 10, a list of the most critical security risks to web applications.
A remediation operations platform that streamlines vulnerability management by connecting security findings to fixing teams through automated workflows.
A small script to check a list of domains against open redirect vulnerability
CSET is a free software tool for identifying vulnerabilities in enterprise and industrial control cyber systems.
A tool that automatically audits website security by crawling an entire website and identifying vulnerabilities
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.
Donate to your favorite open-source projects and charities using PayPal
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.