{"id":13459455,"url":"https://github.com/sullo/nikto","last_synced_at":"2026-02-12T00:10:05.892Z","repository":{"id":5628223,"uuid":"6836299","full_name":"sullo/nikto","owner":"sullo","description":"Nikto web server scanner","archived":false,"fork":false,"pushed_at":"2026-02-01T03:03:57.000Z","size":4905,"stargazers_count":10024,"open_issues_count":1,"forks_count":1402,"subscribers_count":280,"default_branch":"master","last_synced_at":"2026-02-01T12:59:30.481Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Perl","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/sullo.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"COPYING","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null},"funding":{"patreon":"sullo"}},"created_at":"2012-11-24T04:24:29.000Z","updated_at":"2026-02-01T11:12:18.000Z","dependencies_parsed_at":"2023-02-12T16:00:33.616Z","dependency_job_id":"83967096-4f81-4eb3-8419-99917332e999","html_url":"https://github.com/sullo/nikto","commit_stats":{"total_commits":976,"total_committers":74,"mean_commits":13.18918918918919,"dds":0.5061475409836065,"last_synced_commit":"fed0c5cab5ed00c4b8f07a781a8fcde25fe3bce2"},"previous_names":[],"tags_count":5,"template":false,"template_full_name":null,"purl":"pkg:github/sullo/nikto","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sullo%2Fnikto","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sullo%2Fnikto/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sullo%2Fnikto/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sullo%2Fnikto/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/sullo","download_url":"https://codeload.github.com/sullo/nikto/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/sullo%2Fnikto/sbom","scorecard":{"id":858057,"data":{"date":"2025-08-11","repo":{"name":"github.com/sullo/nikto","commit":"3c647e37ef684d88047781c7da50a7a150fef4c5"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.8,"checks":[{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Maintained","score":10,"reason":"8 commit(s) and 17 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Code-Review","score":1,"reason":"Found 3/26 approved changesets -- score normalized to 1","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Info: topLevel 'contents' permission set to 'read': .github/workflows/docker-build-push.yaml:9","Warn: topLevel 'packages' permission set to 'write': .github/workflows/docker-build-push.yaml:10","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"License","score":9,"reason":"license file detected","details":["Info: project has a license file: COPYING:0","Warn: project license file does not contain an FSF or OSI license."],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Vulnerabilities","score":10,"reason":"0 existing vulnerabilities detected","details":null,"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"Packaging","score":10,"reason":"packaging workflow detected","details":["Info: Project packages its releases by way of GitHub Actions.: .github/workflows/docker-build-push.yaml:13"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/docker-build-push.yaml:18: update your workflow using https://app.stepsecurity.io/secureworkflow/sullo/nikto/docker-build-push.yaml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-build-push.yaml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/sullo/nikto/docker-build-push.yaml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-build-push.yaml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/sullo/nikto/docker-build-push.yaml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-build-push.yaml:32: update your workflow using https://app.stepsecurity.io/secureworkflow/sullo/nikto/docker-build-push.yaml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/docker-build-push.yaml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/sullo/nikto/docker-build-push.yaml/master?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating alpine:3.20.3 to alpine:3.20.3@sha256:1e42bbe2508154c9126d48c2b8a75420c3544343bf86fd041fb7527e017a4b4a","Info:   0 out of   1 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   4 third-party GitHubAction dependencies pinned","Info:   0 out of   1 containerImage dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'master'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 7 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}}]},"last_synced_at":"2025-08-24T00:27:04.367Z","repository_id":5628223,"created_at":"2025-08-24T00:27:04.367Z","updated_at":"2025-08-24T00:27:04.367Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29350218,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-11T20:11:40.865Z","status":"ssl_error","status_checked_at":"2026-02-11T20:10:41.637Z","response_time":97,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T09:01:22.978Z","updated_at":"2026-02-12T00:10:03.849Z","avatar_url":"https://github.com/sullo.png","language":"Perl","readme":"\nnikto\n=====\n[![alt text](https://cirt.net/images/patreon.png \"Become a patron of Nikto!\")](https://www.patreon.com/sullo)\n\n\nNikto web server scanner  - https://cirt.net/Nikto2 \n\nFull documentation - https://github.com/sullo/nikto/wiki\n\nRun normally:\n\n~~~\ngit clone https://github.com/sullo/nikto\n# Main script is in program/\ncd nikto/program\n# Run using the shebang interpreter\n./nikto.pl -h http://www.example.com\n# Run using perl (if you forget to chmod)\nperl nikto.pl -h http://www.example.com\n~~~\n\nRun as a Docker container:\n\n~~~bash\ngit clone https://github.com/sullo/nikto.git\ncd nikto\ndocker build -t sullo/nikto .\n# Call it without arguments to display the full help\ndocker run --rm sullo/nikto\n# Basic usage\ndocker run --rm sullo/nikto -h http://www.example.com\n# To save the report in a specific format, mount /tmp as a volume:\ndocker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json\n~~~\n\nBasic usage:\n\n```\n   Options:\n       -ask+               Whether to ask about submitting updates\n                               yes   Ask about each (default)\n                               no    Don't ask, don't send\n                               auto  Don't ask, just send\n       -Cgidirs+           Scan these CGI dirs: \"none\", \"all\", or values like \"/cgi/ /cgi-a/\"\n       -config+            Use this config file\n       -Display+           Turn on/off display outputs:\n                               1     Show redirects\n                               2     Show cookies received\n                               3     Show all 200/OK responses\n                               4     Show URLs which require authentication\n                               D     Debug output\n                               E     Display all HTTP errors\n                               P     Print progress to STDOUT\n                               S     Scrub output of IPs and hostnames\n                               V     Verbose output\n       -dbcheck           Check database and other key files for syntax errors\n       -followredirects   Follow 3xx redirects to new location\n       -evasion+          Encoding technique:\n                               1     Random URI encoding (non-UTF8)\n                               2     Directory self-reference (/./)\n                               3     Premature URL ending\n                               4     Prepend long random string\n                               5     Fake parameter\n                               6     TAB as request spacer\n                               7     Change the case of the URL\n                               8     Use Windows directory separator (\\)\n                               A     Use a carriage return (0x0d) as a request spacer\n                               B     Use binary value 0x0b as a request spacer\n        -Format+           Save file (-o) format:\n                               csv   Comma-separated-value\n                               htm   HTML Format\n                               msf+  Log to Metasploit\n                               nbe   Nessus NBE format\n                               txt   Plain text\n                               xml   XML Format\n                               (if not specified the format will be taken from the file extension passed to -output)\n       -Help              Extended help information\n       -host+             Target host\n       -IgnoreCode        Ignore Codes--treat as negative responses\n       -id+               Host authentication to use, format is id:pass or id:pass:realm\n       -key+              Client certificate key file\n       -list-plugins      List all available plugins, perform no testing\n       -maxtime+          Maximum testing time per host\n       -mutate+           Guess additional file names:\n                               1     Test all files with all root directories\n                               2     Guess for password file names\n                               3     Enumerate user names via Apache (/~user type requests)\n                               4     Enumerate user names via cgiwrap (/cgi-bin/cgiwrap/~user type requests)\n                               5     Attempt to brute force sub-domain names, assume that the host name is the parent domain\n                               6     Attempt to guess directory names from the supplied dictionary file\n       -mutate-options    Provide information for mutates\n       -nointeractive     Disables interactive features\n       -nolookup          Disables DNS lookups\n       -noslash           Strip trailing slash from URL (e.g., '/admin/' to '/admin')\n       -nossl             Disables the use of SSL\n       -no404             Disables nikto attempting to guess a 404 page\n       -output+           Write output to this file ('.' for auto-name)\n       -Pause+            Pause between tests (seconds, integer or float)\n       -Plugins+          List of plugins to run (default: ALL)\n       -port+             Port to use (default 80)\n       -RSAcert+          Client certificate file\n       -root+             Prepend root value to all requests, format is /directory\n       -Save              Save positive responses to this directory ('.' for auto-name)\n       -ssl               Force ssl mode on port\n       -Tuning+           Scan tuning:\n                               1     Interesting File / Seen in logs\n                               2     Misconfiguration / Default File\n                               3     Information Disclosure\n                               4     Injection (XSS/Script/HTML)\n                               5     Remote File Retrieval - Inside Web Root\n                               6     Denial of Service\n                               7     Remote File Retrieval - Server Wide\n                               8     Command Execution / Remote Shell\n                               9     SQL Injection\n                               0     File Upload\n                               a     Authentication Bypass\n                               b     Software Identification\n                               c     Remote Source Inclusion\n                               x     Reverse Tuning Options (i.e., include all except specified)\n       -timeout+          Timeout for requests (default 10 seconds)\n       -Userdbs           Load only user databases, not the standard databases\n                               all   Disable standard dbs and load only user dbs\n                               tests Disable only db_tests and load udb_tests\n       -until             Run until the specified time or duration\n       -update            Update databases and plugins from CIRT.net\n       -useproxy          Use the proxy defined in nikto.conf\n       -usecookies        Use cookies from responses in future requests\n       -Version           Print plugin and database versions\n       -vhost+            Virtual host (for Host header)\n              + requires a value\n```\n\nLicense\n=======\nCopyright (C) 2001 Chris Sullo\n\nThis program is free software; you can redistribute it and/or\nmodify it under the terms of the GNU General Public License\nas published by the Free Software Foundation; version 2\nof the License only.\n\nThis program is distributed in the hope that it will be useful,\nbut WITHOUT ANY WARRANTY; without even the implied warranty of\nMERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the\nGNU General Public License for more details.\n\nYou should have received a copy of the GNU General Public License\nalong with this program; if not, write to\nFree Software Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.\n","funding_links":["https://patreon.com/sullo","https://www.patreon.com/sullo"],"categories":["Perl","Uncategorized","\u003ca id=\"8f92ead9997a4b68d06a9acf9b01ef63\"\u003e\u003c/a\u003e扫描器\u0026\u0026安全扫描\u0026\u0026App扫描\u0026\u0026漏洞扫描","others","DAST","Miscellaneous","Weapons","Инструменты","Security Tools","Tools","Perl (22)","Application Security","扫描器、资产收集、子域名","\u003ca id=\"132036452bfacf61471e3ea0b7bf7a55\"\u003e\u003c/a\u003e工具","Application Recommendation","Red Team","Using AI for Pentesting","BUG BOUNTY / SECURITY RESEARCH","Security","Pentesting","Network Vulnerability Scanners","Programming/Comp Sci/SE Things","API \u0026 Dynamic Testing (DAST)"],"sub_categories":["Uncategorized","\u003ca id=\"de63a029bda6a7e429af272f291bb769\"\u003e\u003c/a\u003e未分类-Scanner","Vulnerability Scanners","Tools","Динамические анализаторы приложений (DAST)","Web Application Testing","DAST","网络服务_其他","Web Application Pentesting","🔒 Cybersecurity","Reconaissance","Monitoring/Scanning","Vulnerability Scanning","Security tools","ARM","Web Vulnerability Scanners","Subdomain/DNS Stuff","Runtime Security"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsullo%2Fnikto","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fsullo%2Fnikto","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fsullo%2Fnikto/lists"}