
Nuclei
Fast, template-driven vulnerability scanner with zero false positives
- Stars
- 27,358
- License
- MIT
- Last commit
- 1 hour ago
Static/dynamic analysis and dependency (SCA) scanning for application vulnerabilities.
Application security testing encompasses static analysis (SAST), dynamic analysis (DAST), interactive analysis (IAST), and software composition analysis (SCA). Open-source tools in this space provide code-level vulnerability detection, runtime scanning, and dependency checking without licensing fees. Enterprises typically combine these techniques to catch flaws early in development, validate running applications, and manage third-party component risk. The ecosystem includes both command-line utilities and web-based interfaces that can be embedded in CI/CD pipelines or used for manual assessments.

Fast, template-driven vulnerability scanner with zero false positives

Automated web app security scanner for developers and pentesters

Comprehensive Perl-based web server vulnerability scanner that detects misconfigurations and known exploits

Comprehensive vulnerability scanner for code, containers, and licenses

Detect known vulnerabilities in project dependencies automatically.

Intelligent Ruby scanner for dynamic web application security
Fast, template-driven vulnerability scanner with zero false positives
Nuclei is a high‑performance vulnerability scanner that uses simple YAML templates, supports many protocols, integrates with CI/CD and popular tools, and reduces false positives by simulating real‑world steps.
Measures how well the tool identifies true vulnerabilities across supported languages and frameworks, often expressed as recall or coverage percentages.
Assesses the proportion of reported issues that are not actual security problems, influencing analyst effort and trust in the tool.
Evaluates native plugins, APIs, and CI/CD adapters that allow the tool to fit into existing build, test, and deployment workflows.
Looks at scan speed, resource consumption, and ability to handle large codebases or high-traffic web applications.
Considers the clarity of output formats (e.g., SARIF, JSON), severity ranking, and actionable recommendations for developers.
Most tools in this category support these baseline capabilities.
Web vulnerability scanner for automated security testing of websites and web apps
Automated web application and infrastructure vulnerability scanning platform
Web application security testing platform
Cloud‑native application security platform with SAST, SCA, DAST, and more
Secret scanning tool for detecting exposed credentials in code repositories
Application security platform for vulnerability scanning and testing
Acunetix is a web vulnerability scanner that automatically tests websites and web applications for over 6,500 security vulnerabilities. It features advanced crawling and audit tools to identify issues like SQL injection, XSS, and other exploits, helping organizations remediate web security risks.
Frequently replaced when teams want private deployments and lower TCO.
Run SAST or SCA scans automatically on each commit or pull request to prevent vulnerable code from merging.
Execute DAST or IAST scans against staging environments to validate runtime behavior before production deployment.
Schedule regular SCA scans of build artifacts and container images to detect newly disclosed third-party vulnerabilities.
Leverage tools like ZAP or Nikto for exploratory testing, custom payloads, and manual verification of findings.
Generate standardized reports that map findings to regulatory frameworks such as PCI DSS or OWASP Top 10.
What is the difference between SAST, DAST, and SCA?
SAST examines source or binary code without executing it, DAST interacts with a running application to find runtime issues, and SCA analyzes third-party libraries for known component vulnerabilities.
Can open-source security testing tools be used in production environments?
Yes, many open-source tools (e.g., ZAP, Nikto) support authenticated scans and can be scheduled against production-like environments, but organizations should validate performance and support needs.
How do I choose between an open-source tool and a SaaS offering?
Consider factors such as required language coverage, integration depth, maintenance resources, and whether you need managed updates or dedicated support, which SaaS vendors typically provide.
Do these tools generate standards-based reports?
Most mature open-source scanners export results in SARIF, JSON, or JUnit formats, enabling downstream processing and compliance reporting.
What is the typical false-positive mitigation workflow?
Teams usually tune rule sets, whitelist known benign patterns, and use triage dashboards to suppress recurring false positives before escalating genuine findings.
How frequently should I run SCA scans on my dependencies?
Run SCA scans at every build and schedule additional scans when new CVEs are published for the libraries you use, ensuring timely remediation.