Yasuo is a Ruby-based network scanning tool designed to identify vulnerable third-party web applications and web front-ends during security assessments. The tool focuses on discovering commonly exploited applications such as Apache Tomcat administrative interfaces, JBoss jmx-console, Hudson Jenkins, and other web-based management systems that may contain publicly known vulnerabilities. Yasuo scans networks to locate web applications that could be susceptible to various attack vectors including remote code execution (RCE), malicious file uploads, SQL injection, and remote/local file inclusion vulnerabilities. The scanner is built to quickly identify potentially compromised targets by checking for applications with known security flaws that are documented in exploit databases. Yasuo serves as a reconnaissance tool for penetration testers and security professionals conducting internal assessments, external assessments, and red team engagements to identify vulnerable web applications that could provide entry points into target systems.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.
An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
Simple script to check a domain's email protections and identify vulnerabilities.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
A LinkedIn reconnaissance tool for gathering information about companies and individuals on the platform.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.