{"id":13510419,"url":"https://github.com/scipag/vulscan","last_synced_at":"2025-05-14T16:04:37.405Z","repository":{"id":38238548,"uuid":"84558222","full_name":"scipag/vulscan","owner":"scipag","description":"Advanced vulnerability scanning with Nmap NSE","archived":false,"fork":false,"pushed_at":"2024-09-11T04:12:49.000Z","size":14056,"stargazers_count":3581,"open_issues_count":7,"forks_count":679,"subscribers_count":134,"default_branch":"master","last_synced_at":"2025-04-03T05:08:45.345Z","etag":null,"topics":["exploit","lua","lua-script","nmap","nmap-scan-script","nmap-scripts","nse","nsescript","penetration-testing","security","security-audit","security-scanner","vulnerability","vulnerability-assessment","vulnerability-database-entry","vulnerability-databases","vulnerability-detection","vulnerability-identification","vulnerability-scanners","vulnerability-scanning"],"latest_commit_sha":null,"homepage":"https://www.computec.ch/projekte/vulscan/","language":"Lua","has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/scipag.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"COPYING.TXT","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"securityfocus.csv","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2017-03-10T12:34:02.000Z","updated_at":"2025-04-03T01:21:06.000Z","dependencies_parsed_at":"2022-07-12T17:13:14.466Z","dependency_job_id":"7f8e5fc0-bb26-49e2-a321-dbdfec8eeaae","html_url":"https://github.com/scipag/vulscan","commit_stats":{"total_commits":80,"total_committers":12,"mean_commits":6.666666666666667,"dds":"0.16249999999999998","last_synced_commit":"a87aa9775d305deabd353c0c3fd8abf4b5cc0d8c"},"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/scipag%2Fvulscan","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/scipag%2Fvulscan/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/scipag%2Fvulscan/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/scipag%2Fvulscan/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/scipag","download_url":"https://codeload.github.com/scipag/vulscan/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248197464,"owners_count":21063619,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["exploit","lua","lua-script","nmap","nmap-scan-script","nmap-scripts","nse","nsescript","penetration-testing","security","security-audit","security-scanner","vulnerability","vulnerability-assessment","vulnerability-database-entry","vulnerability-databases","vulnerability-detection","vulnerability-identification","vulnerability-scanners","vulnerability-scanning"],"created_at":"2024-08-01T02:01:38.263Z","updated_at":"2025-04-10T09:50:04.379Z","avatar_url":"https://github.com/scipag.png","language":"Lua","readme":"# vulscan - Vulnerability Scanning with Nmap\n\n\u003cp align=\"center\"\u003e\n\u003cimg src=\"./logo.png\" width=\"300px\"\u003e\n\u003c/p\u003e\n\n## Introduction\n\nVulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the identified product. The data is looked up in an offline version of VulDB.\n\n![Nmap NSE Vulscan](https://www.computec.ch/projekte/vulscan/introduction/screenshot.png)\n\n## Installation\n\nPlease install the files into the following folder of your Nmap installation:\n\n    Nmap\\scripts\\vulscan\\*\n\nClone the GitHub repository like this:\n\n    git clone https://github.com/scipag/vulscan scipag_vulscan\n    ln -s `pwd`/scipag_vulscan /usr/share/nmap/scripts/vulscan\n\n## Usage\n\nYou have to run the following minimal command to initiate a simple vulnerability scan:\n\n    nmap -sV --script=vulscan/vulscan.nse www.example.com\n\n## Vulnerability Database\n\nThere are the following pre-installed databases available at the moment:\n\n* scipvuldb.csv - https://vuldb.com\n* cve.csv - https://cve.mitre.org\n* securityfocus.csv - https://www.securityfocus.com/bid/\n* xforce.csv - https://exchange.xforce.ibmcloud.com/\n* expliotdb.csv - https://www.exploit-db.com\n* openvas.csv - http://www.openvas.org\n* securitytracker.csv - https://www.securitytracker.com (end-of-life)\n* osvdb.csv - http://www.osvdb.org (end-of-life)\n\n## Single Database Mode\n\nYou may execute vulscan with the following argument to use a single database:\n\n    --script-args vulscandb=your_own_database\n\nIt is also possible to create and reference your own databases. This requires to create a database file, which has the following structure:\n\n    \u003cid\u003e;\u003ctitle\u003e\n\nJust execute vulscan like you would by refering to one of the pre-delivered databases. Feel free to share your own database and vulnerability connection with me, to add it to the official repository.\n\n## Update Database\n\nThe vulnerability databases are updated and assembled on a regularly basis. To support the latest disclosed vulnerabilities, keep your local vulnerability databases up-to-date.\n\nTo automatically update the databases, simply set execution permissions to the `update.sh` file and run it:\n\n    chmod 744 update.sh\n    ./update.sh\n\nIf you want to manually update your databases, go to the following web site and download these files:\n\n* https://www.computec.ch/projekte/vulscan/download/cve.csv\n* https://www.computec.ch/projekte/vulscan/download/exploitdb.csv\n* https://www.computec.ch/projekte/vulscan/download/openvas.csv\n* https://www.computec.ch/projekte/vulscan/download/osvdb.csv\n* https://www.computec.ch/projekte/vulscan/download/scipvuldb.csv\n* https://www.computec.ch/projekte/vulscan/download/securityfocus.csv\n* https://www.computec.ch/projekte/vulscan/download/securitytracker.csv\n* https://www.computec.ch/projekte/vulscan/download/xforce.csv\n\nCopy the files into your vulscan folder:\n\n    /vulscan/\n\n## Version Detection\n\nIf the version detection was able to identify the software version and the vulnerability database is providing such details, also this data is matched.\n\nDisabling this feature might introduce false-positive but might also eliminate false-negatives and increase performance slighty. If you want to disable additional version matching, use the following argument:\n\n    --script-args vulscanversiondetection=0\n\nVersion detection of vulscan is only as good as Nmap version detection and the vulnerability database entries are. Some databases do not provide conclusive version information, which may lead to a lot of false-positives (as can be seen for Apache servers).\n\n## Match Priority\n\nThe script is trying to identify the best matches only. If no positive match could been found, the best possible match (with might be a false-positive) is put on display.\n\nIf you want to show all matches, which might introduce a lot of false-positives but might be useful for further investigation, use the following argument:\n\n    --script-args vulscanshowall=1\n\n## Interactive Mode\n\nThe interactive mode helps you to override version detection results for every port. Use the following argument to enable the interactive mode:\n\n    --script-args vulscaninteractive=1\n\n## Reporting\n\nAll matching results are printed one by line. The default layout for this is:\n\n    [{id}] {title}\\n\n\nIt is possible to use another pre-defined report structure with the following argument:\n\n    --script-args vulscanoutput=details\n    --script-args vulscanoutput=listid\n    --script-args vulscanoutput=listlink\n    --script-args vulscanoutput=listtitle\n\nYou may enforce your own report structure by using the following argument (some examples):\n\n    --script-args vulscanoutput='{link}\\n{title}\\n\\n'\n    --script-args vulscanoutput='ID: {id} - Title: {title} ({matches})\\n'\n    --script-args vulscanoutput='{id} | {product} | {version}\\n'\n\nSupported are the following elements for a dynamic report template:\n\n* {id} - ID of the vulnerability\n* {title} - Title of the vulnerability\n* {matches} - Count of matches\n* {product} - Matched product string(s)\n* {version} - Matched version string(s)\n* {link} - Link to the vulnerability database entry\n* \\n - Newline\n* \\t - Tab\n\nEvery default database comes with an url and a link, which is used during the scanning and might be accessed as {link} within the customized report template. To use custom database links, use the following argument:\n\n    --script-args \"vulscandblink=http://example.org/{id}\"\n\n## Disclaimer\n\nKeep in mind that this kind of derivative vulnerability scanning heavily relies on the confidence of the version detection of nmap, the amount of documented vulnerabilities and the accuracy of pattern matching. The existence of potential flaws is not verified with additional scanning nor exploiting techniques.\n","funding_links":[],"categories":["\u003ca id=\"a76463feb91d09b3d024fae798b92be6\"\u003e\u003c/a\u003e侦察\u0026\u0026信息收集\u0026\u0026子域名发现与枚举\u0026\u0026OSINT","Lua","Security","Lua (24)","Содержание:","\u003ca id=\"170048b7d8668c50681c0ab1e92c679a\"\u003e\u003c/a\u003e工具","vulnerability-scanners","System"],"sub_categories":["\u003ca id=\"94c01f488096fafc194b9a07f065594c\"\u003e\u003c/a\u003enmap","Sensor and Acuator Interfaces","Утилиты","Security"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fscipag%2Fvulscan","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fscipag%2Fvulscan","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fscipag%2Fvulscan/lists"}