Vulnerability Scanners
Sirius
Open Source Vulnerability Scanner

Nessus

Request free licence: https://www.tenable.com/products/nessus/activation-code

Install package:
dpkg -i Nessus-8.15.1-ubuntu910_amd64.deb
Starting Nessus
sudo systemctl start nessusd.service
Access Nessus:
https://localhost:8834

Export Nessus Scan
$ ./nessus_downloader.rb
Nessus 6 Report Downloader 1.0
Enter the Nessus Server IP: 127.0.0.1
Enter the Nessus Server Port [8834]: 8834
Enter your Nessus Username: admin
Enter your Nessus Password (will not echo):
Getting report list...
Scan ID Name Last Modified Status
------- ---- ------------- ------
1 Windows_basic Aug 22, 2020 22:07 +00:00 completed
Enter the report(s) your want to download (comma separate list) or 'all': 1
Choose File Type(s) to Download:
[0] Nessus (No chapter selection)
[1] HTML
[2] PDF
[3] CSV (No chapter selection)
[4] DB (No chapter selection)
Enter the file type(s) you want to download (comma separate list) or 'all': 3
Path to save reports to (without trailing slash): /assessment_data/inlanefreight/scans/nessus
Downloading report(s). Please wait...
[+] Exporting scan report, scan id: 1, type: csv
[+] Checking export status...
[+] Report ready for download...
[+] Downloading report to: /assessment_data/inlanefreight/scans/nessus/inlanefreight_basic_5y3hxp.csv
Report Download Completed!
OpenVAS
Install on Ubuntu (OsBoxes)
sudo su
$ sudo apt-get update && apt-get -y full-upgrade
$ sudo apt-get install gvm && openvas
$ gvm-setup
Start OpenVAS
gvm-start
Doesn't work on my ubuntu, use Docker: https://greenbone.github.io/docs/latest/22.4/container/index.html
osboxes@osboxes:~/greenbone-community-container$ xdg-open "http://127.0.0.1:9392" 2>/dev/null >/dev/null &
[1] 18911
osboxes@osboxes:~/greenbone-community-container$
Creds - admin::admin

Export result
python3 -m openvasreporting -i report-2bf466b5-627d-4659-bea6-1758b43235b1.xml -f xlsx
stop all containers
$ docker stop $(docker ps -a -q)
Web Apps Scan
BBScan
Nuclei
$ nuclei -update-templates
$ nuclei -u https://example.com -t ~/nuclei-templates/http/miscellaneous/robots-txt.yaml
$ nuclei -l hosts.txt

Reporting
$ nuclei -u https://www.google.com -t http/miscellaneous/robots-txt.yaml -include-rr -markdown-export ./

Custom Templates
CVE Scanning Templates
All Templates
Nuclei AI Prompts
NucleiFuzzer
Rogue - LLM agent
OWASP Nettacker
TerminatorZ
Wapiti - Web Scan
pip install wapiti3
wapiti -u http://83.136.251.133:45582 -l 2

Scant3r
Mantis
GBounty
Lostools
LOXS (LFI, Open Redirect, XSS, SQLi)
Nikto
apt install nikto

reconFTW
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated