Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/VicariusInc/vicarius-nmap
nmap scripts (nse files) to identify vulnerabilities
https://github.com/VicariusInc/vicarius-nmap
Last synced: 22 days ago
JSON representation
nmap scripts (nse files) to identify vulnerabilities
- Host: GitHub
- URL: https://github.com/VicariusInc/vicarius-nmap
- Owner: VicariusInc
- License: gpl-3.0
- Created: 2022-03-27T09:48:33.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-11-06T13:42:22.000Z (about 1 month ago)
- Last Synced: 2024-11-06T14:26:41.666Z (about 1 month ago)
- Language: Lua
- Size: 150 MB
- Stars: 26
- Watchers: 5
- Forks: 8
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - VicariusInc/vicarius-nmap - nmap scripts (nse files) to identify vulnerabilities (Lua)
README
# vicarius-nmap
Get instant visibility into your organization’s network with a comprehensive scan that provides detailed information about the devices on the network, vulnerabilities, and more at the time of the scan.
Vicarius’ vulnerability scan is an NSE (Nmap scripting engine) used to detect vulnerabilities. It is based on vulscan - https://github.com/scipag/vulscan.
The Nmap option -sV enables version detection per service, which is used to determine flaws according to the identified product. The data is looked up in an offline CVE database that is up to date with MITRE-CVE (https://cve.mitre.org) as of November 2022.
Installation:
Please copy the vicarius-vulnerability-scan.nse file into the Nmap scripts folder:
\scripts\vicarius-vulnerability-scan.nseUnzip and copy the cve.csv file into a sub-folder named vicarius-vulnerability-scan:
\scripts\vicarius-vulnerability-scan\cve.csvUsage:
Run the following minimal command to initiate a simple vulnerability scan:
nmap -sV --script=vicarius-vulnerability-scan.nse www.example.comDISCLAIMER
Keep in mind that this kind of derivative vulnerability scanning heavily relies on the confidence of the version detection of Nmap, the amount of documented vulnerabilities, and the accuracy of pattern matching. The existence of potential flaws is not verified with additional scanning or exploiting techniques.# For an easy process of analyzing the NMAP scan results and managing your network risk - try uploading the scan output into Topia!
![topia_mock_scan (1)](https://user-images.githubusercontent.com/46711777/164996050-3c871d7d-8c74-4211-b3fd-6e239346dcda.png)