The projects used for Threat-Vuln Mgmt
W |
Web Exploitation Framework
Notes:
|
N |
nogotofail
Notes:
|
Arachni
Notes:
excellent command-line options, excellent performance, excellent extensibility, excellent accuracy, excellent integration |
|
G |
Garmr
Notes:
|
M |
mozilla-minion
Notes:
|
B |
buby
Notes:
excellent documentation, excellent performance, excellent integration |
w3af
Notes:
average usability, poor performance, excellent extensibility |
|
OWASP O2 Platform
Notes:
poor usability, poor performance, good extensibility, noble goals |
|
Zed Attack Proxy
Notes:
good usability, average performance, poor extensibility, trumps competition |
|
S |
skipfish
Notes:
excellent command-line options, excellent performance, poor extensibility, dwarfed by competition |
It's a list of software used to accomplish something. LAMP is an example.
To add a project to your stack, click 'Show Recommendations for this Stack' at the top middle of this page and then click 'I use this' on the projects you use.
Show the world what open source projects you use.