
Acunetix
Web vulnerability scanner for automated security testing of websites and web apps
Discover top open-source software, updated regularly with real-world adoption signals.

Unified vulnerability scanner for CI/CD pipelines and DevOps teams
ArcherySec aggregates open‑source scanners (OpenVAS, ZAP, Burp, Nmap, Nikto) into a single platform, offering REST APIs, JIRA integration, and CI/CD control for internal web and network vulnerability management.

When teams consider Archery, these hosted platforms usually appear on the same shortlist.
Looking for a hosted option? These are the services engineering teams benchmark against before choosing open source.
CI/CD gate for web application releases
Automated scans block deployments when critical vulnerabilities are detected, preventing insecure code from reaching production.
Periodic internal network assessment
Scheduled Nmap and OpenVAS scans provide continuous visibility of asset exposure and generate consolidated reports.
Authenticated web scanning with Selenium
Deep testing of login‑protected areas uncovers privilege escalation and session management flaws.
JIRA ticket automation
Findings are automatically turned into JIRA issues, streamlining remediation tracking and assignment.
Clone the repository, run `setup.sh` on Linux/macOS or `setup.bat` on Windows, or use the provided Docker images (`archerysec/archerysec` or `archerysec/archerysec:alpine`).
OpenVAS, OWASP ZAP, Burp Suite (via REST API), SSLScan, Nikto, and Nmap with the Vulners NSE script.
Yes, but it is intended for internal use only. Secure the signup and API endpoints and avoid exposing the service publicly.
Use the REST API or Docker‑Compose to trigger scans, retrieve results, and enforce build failures based on severity thresholds.
Yes, ArcherySec can perform authenticated web scans and Selenium‑driven interactions to test protected resources.
Project at a glance
StableLast synced 4 days ago