Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/google/tsunami-security-scanner
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
https://github.com/google/tsunami-security-scanner
Last synced: 5 days ago
JSON representation
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
- Host: GitHub
- URL: https://github.com/google/tsunami-security-scanner
- Owner: google
- License: apache-2.0
- Created: 2020-06-03T16:20:00.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-09-18T18:39:08.000Z (about 2 months ago)
- Last Synced: 2024-10-02T02:07:45.895Z (about 1 month ago)
- Language: Java
- Homepage:
- Size: 735 KB
- Stars: 8,214
- Watchers: 312
- Forks: 888
- Open Issues: 19
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-rainmana - google/tsunami-security-scanner - Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. (Java)
- awesome-repositories - google/tsunami-security-scanner - Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. (Java)
- awesome-list - tsunami-security-scanner
- awesome-hacking-lists - google/tsunami-security-scanner - Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. (Java)
- awesome-starred - google/tsunami-security-scanner - Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. (others)
README
# Tsunami
![build](https://github.com/google/tsunami-security-scanner/workflows/build/badge.svg)
Tsunami is a general purpose network security scanner with an extensible plugin
system for detecting high severity vulnerabilities with high confidence.To learn more about Tsunami, visit our
[documentation](https://google.github.io/tsunami-security-scanner/).Tsunami relies heavily on its plugin system to provide basic scanning
capabilities. All publicly available Tsunami plugins are hosted in a separate
[google/tsunami-security-scanner-plugins](https://github.com/google/tsunami-security-scanner-plugins)
repository.## Current Status
* Currently Tsunami is in 'pre-alpha' release for developer preview.
* Tsunami project is currently under active development. Do expect major API
changes in the future.## Quick Start
To quickly get started with Tsunami scans,
### Traditional install
1. install the following required dependencies:```
nmap >= 7.80
ncrack >= 0.7
```1. start a vulnerable application that can be identified by Tsunami, e.g. an
unauthenticated Jupyter Notebook server. The easiest way is to use a docker
image:
```shell
docker run --name unauthenticated-jupyter-notebook -p 8888:8888 -d jupyter/base-notebook start-notebook.sh --NotebookApp.token=''
```1. execute the following command:
```
bash -c "$(curl -sfL https://raw.githubusercontent.com/google/tsunami-security-scanner/master/quick_start.sh)"
```The `quick_start.sh` script performs the following tasks:
1. Clone the
[google/tsunami-security-scanner](https://github.com/google/tsunami-security-scanner)
and
[google/tsunami-security-scanner-plugins](https://github.com/google/tsunami-security-scanner-plugins)
repos into `$HOME/tsunami/repos` directory.
1. Compile all
[Google Tsunami plugins](https://github.com/google/tsunami-security-scanner-plugins/tree/master/google)
and move all plugin `jar` files into `$HOME/tsunami/plugins` directory.
1. Compile the Tsunami scanner Fat Jar file and move it into `$HOME/tsunami`
directory.
1. Move the `tsunami.yaml` example config into `$HOME/tsunami` directory.
1. Print example Tsunami command for scanning `127.0.0.1` using the previously
generated artifacts.#### Advanced Configuration with Callback Server and Python Language Server
1. execute the following command:
```
bash -c "$(curl -sfL https://raw.githubusercontent.com/google/tsunami-security-scanner/master/quick_start_advanced.sh)"
```### Docker install
1. start a vulnerable application that can be identified by Tsunami, e.g. an
unauthenticated Jupyter Notebook server. The easiest way is to use a docker
image:```shell
docker run --name unauthenticated-jupyter-notebook -p 8888:8888 -d jupyter/base-notebook start-notebook.sh --NotebookApp.token=''
```1. build the docker image for Tsunami:
```shell
docker build -t tsunami .
```1. run the Tsunami image. The logs can be saved to the host machine by mounting
a volume:```shell
docker run --network="host" -v "$(pwd)/logs":/usr/tsunami/logs tsunami
```1. debugging issues with Tsunami container. The tsunami container is based on
Debian. To run debug tools simply exec into the container and install them:```shell
docker exec -it tsunami bash
```## Contributing
Read how to [contribute to Tsunami](docs/contributing.md).
## License
Tsunami is released under the [Apache 2.0 license](LICENSE).
```
Copyright 2019 Google Inc.Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License athttp://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
```## Disclaimers
Tsunami is not an official Google product.