
Qualys VMDR
Risk-based vulnerability management with automated prioritization and patching.
Discover top open-source software, updated regularly with real-world adoption signals.

Agent-less vulnerability scanner for Linux, FreeBSD, containers, and more
Vuls automatically detects vulnerabilities across Linux, FreeBSD, Windows, macOS, containers, and WordPress sites without agents, delivering regular reports and Slack/email alerts for proactive security management.

Vuls is a Go‑based vulnerability scanner designed for system administrators who need continuous, automated security assessments across diverse environments. It supports major Linux distributions, FreeBSD, Windows, macOS, Docker containers, and even WordPress installations, pulling data from NVD, JVN, Red Hat, Debian, Ubuntu, and many other advisory sources.
The tool offers fast non‑root scans, root‑enhanced scans, and offline modes, all without installing agents on target hosts. Scans can be run remotely via SSH, locally on the host, or through a central server that receives JSON results over HTTP. Results are viewable via a terminal UI, web UI, or integrated into CI pipelines, with optional Slack and email notifications. Vuls focuses on detection and reporting; remediation must be performed manually.
Because Vuls produces machine‑readable JSON and supports configuration templates, it fits easily into existing automation frameworks, enabling daily compliance checks, continuous integration testing, and multi‑cloud inventory management.
When teams consider Vuls, these hosted platforms usually appear on the same shortlist.

Risk-based vulnerability management with automated prioritization and patching.

Vulnerability management with live dashboards, unified agent, and risk-based prioritization

Risk-based vulnerability management for continuous discovery, prioritization, and remediation
Looking for a hosted option? These are the services engineering teams benchmark against before choosing open source.
Daily compliance scanning
Automated nightly scans generate reports and Slack alerts, ensuring compliance teams are aware of new CVEs affecting production servers.
CI pipeline security testing
Integrate Vuls into build pipelines to fail builds when newly introduced dependencies contain known vulnerabilities.
Multi‑cloud inventory assessment
Run remote scans across AWS, Azure, and on‑premise instances from a single Vuls server, consolidating results into a unified dashboard.
WordPress site hardening
Detect vulnerable core, theme, and plugin versions, providing actionable findings for site administrators.
No. Vuls operates agent‑less, using SSH or direct command execution to gather package information.
Yes. Offline mode works with pre‑downloaded vulnerability databases for supported distributions.
Linux (most major distros), FreeBSD, Windows, macOS, Docker containers, and WordPress installations.
Results can be viewed in a terminal UI, a web UI, exported as JSON, or sent via email and Slack notifications.
No. Vuls only detects and reports vulnerabilities; remediation must be performed manually.
Project at a glance
ActiveLast synced 4 days ago