All Projects â†’ olacabs â†’ Jackhammer

olacabs / Jackhammer

Licence: other
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.

Programming Languages

java
68154 projects - #9 most used programming language

Projects that are alternatives of or similar to Jackhammer

Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+22.43%)
Mutual labels:  penetration-testing, vulnerability-scanners, security-scanner, vulnerability-assessment, vulnerability-management, penetration-testing-framework
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-45.5%)
Mutual labels:  network-security, application-security, vulnerability-assessment, vulnerability-management, penetration-testing-framework
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+1297.16%)
Mutual labels:  vulnerability-scanners, security-scanner, vulnerability-assessment, vulnerability-management
Vulscan
Advanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+264.14%)
Mutual labels:  penetration-testing, vulnerability-scanners, security-scanner, vulnerability-assessment
Vanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-29.07%)
Mutual labels:  penetration-testing, vulnerability-scanners, vulnerability-assessment, penetration-testing-framework
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-92.89%)
Mutual labels:  penetration-testing, vulnerability-management, vulnerability-scanners, penetration-testing-framework
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+1551.03%)
Mutual labels:  penetration-testing, vulnerability-scanners, vulnerability-assessment, vulnerability-management
Patrowlengines
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-74.41%)
Mutual labels:  vulnerability-scanners, security-scanner, vulnerability-management
Androl4b
A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
Stars: ✭ 908 (+43.44%)
Mutual labels:  penetration-testing, application-security, mobile-security
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+453.4%)
Mutual labels:  penetration-testing, network-security, application-security
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+1343.44%)
Mutual labels:  vulnerability-scanners, security-scanner, vulnerability-assessment
Nettacker
Automated Penetration Testing Framework
Stars: ✭ 982 (+55.13%)
Mutual labels:  penetration-testing, vulnerability-scanners, penetration-testing-framework
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-42.65%)
Mutual labels:  vulnerability-scanners, security-scanner, vulnerability-management
Patrowldocs
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-83.41%)
Mutual labels:  vulnerability-scanners, security-scanner, vulnerability-management
Purify
All-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-88.63%)
Mutual labels:  vulnerability-scanners, vulnerability-assessment, vulnerability-management
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-83.73%)
Mutual labels:  penetration-testing, vulnerability-scanners, vulnerability-assessment
Intrigue Core
Discover Your Attack Surface!
Stars: ✭ 1,013 (+60.03%)
Mutual labels:  penetration-testing, vulnerability-scanners, security-scanner
Ossa
Open-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+25.75%)
Mutual labels:  vulnerability-scanners, security-scanner, application-security
Openvas Scanner
Open Vulnerability Assessment Scanner - Scanner for Greenbone Vulnerability Management (GVM)
Stars: ✭ 1,056 (+66.82%)
Mutual labels:  vulnerability-scanners, vulnerability-assessment, vulnerability-management
Wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+511.85%)
Mutual labels:  penetration-testing, application-security, vulnerability-assessment

Jackhammer:

One Security vulnerability assessment/management tool to solve all the security team problems.

What is Jackhammer?

Jackhammer is a collaboration tool built with an aim of bridging the gap between Security team vs dev team, QA team and being a facilitator for TPM to understand and track the quality of the code going into production. It could do static code analysis and dynamic analysis with inbuilt vulnerability management capability. It finds security vulnerabilities in the target applications and it helps security teams to manage the chaos in this new age of continuous integration and continuous/multiple deployments.

It completely works on RBAC (Role Based Access Control). There are cool dashboards for individual scans and team scans giving ample flexibility to collaborate with different teams. It is totally built on pluggable architecture which can be integrated with any open source/commercial tool.

Jackhammer uses the OWASP pipeline project to run multiple open source and commercial tools against your code,web app, mobile app, cms (wordpress), network.

Key Features:

  • Provides unified interface to collaborate on findings
  • Scanning (code) can be done for all code management repositories
  • Scheduling of scans based on intervals # daily, weekly, monthly
  • Advanced false positive filtering
  • Publish vulnerabilities to bug tracking systems
  • Keep a tab on statistics and vulnerability trends in your applications
  • Integrates with majority of open source and commercial scanning tools
  • Users and Roles management giving greater control
  • Configurable severity levels on list of findings across the applications
  • Built-in vulnerability status progression
  • Easy to use filters to review targeted sets from tons of vulnerabilities
  • Asynchronous scanning (via sidekiq) that scale
  • Seamless Vulnerability Management
  • Track statistics and graph security trends in your applications
  • Easily integrates with a variety of open source, commercial and custom scanning tools

Supported Vulnerability Scanners:

Static Analysis:

   * license required      ** commercial license required

Finding hard coded secrets/tokens/creds:

  • Trufflehog (Slightly modified/extended for better result and integration as of May 2017)

Webapp:

Mobile App:

  • Androbugs (Slightly modified/extended for better result and integration as of May 2017)
  • Androguard (Slightly modified/extended for better result and integration as of May 2017)

Wordpress:

  • WPScan (Slightly modified/extended for better result and integration as of May 2017)

Network:

Adding Custom (other open source/commercial /personal) Scanners:

You can add any scanner to jackhammer within 10-30 minutes. Check the links/video

Quick Start and Installation

See our Quick Start/Installation Guide if you want to try out Jackhammer as quickly as possible using Docker Compose.

Run the following commands for local setup (corporate mode):
 git clone https://github.com/olacabs/jackhammer
 sh ./docker-build.sh

Default credentials for local setup:

username: [email protected]

password: j4ckh4mm3r

(For single user mode)
sh ./docker-build.sh SingleUser

do signup for access

Restarting Jackhammer

docker-compose stop
docker-compose rm
docker-compose up -d

User Guide

The User Guide will give you an overview of how to use Jackhammer once you have things up and running.

Demo

Demo Environment Link:

https://jch.olacabs.com/

Default credentials:

username: [email protected]

password: [email protected]

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].