The goal of Purify to be an easy-in-use and efficient tool to simplify a workflow of managing vulnerabilities delivered from various tools.
Purify is designed to analyze the report of any tool, if the report is in JSON or XML format. This means you don’t need any special plug-ins to process reports from your selection of tools.
Purify is able to remove duplicate results among various vulnerability scanners or tools. In addition, it can combine several results of the same tool based on some fields and it is fully configurable (no coding required). Purify does all this work to reduce the headache of the analyst.
Collect all security findings in one place, review/validate/track them, collaborate, get notifications(Slack), export them into tracking systems(Jira) and so on.
Built With
Features
Currently, Purify supports Slack and Jira. Also, there is SMTP module, but it is not use at the moment.
List of packages used for these modules:
Deployment With Nginx and MongoDB
docker-compose -f docker-compose.tests.yml up --build
Also Read – Guardedbox : Online Client-Side Manager For Secure Storage & Secrets Sharing
// ./docker-compose.yml
// if you want local mongodb
Mongo:
********
environment:
MONGO_INITDB_ROOT_USERNAME: root
MONGO_INITDB_ROOT_PASSWORD: example
// update local path to the .env file (see api/.env.example)
API:
*****
env_file:
-.env.custom
// update local paths to certificate and key files
Nginx:
*******
volumes:
– /path/to/cert:/etc/nginx/ssl/cert
– /path/to/key:/etc/nginx/ssl/key
– ./nginx.prod.conf:/etc/nginx/nginx.conf
Nginx
You can edit nginx config file to adjust it for your needs. There is a config example which is used by default, but in order to use it, you will need to change server_name options.
Start
docker-compose up -d
SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…
The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…
The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…
The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…
Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…