Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
To learn more about this, visit our documentation.
It relies heavily on its plugin system to provide basic scanning capabilities. All publicly available to this plugins are hosted in a separate google/tsunami-security-scanner-plugins repository.
Current Status
Quick Start
To quickly get started with its scans,
nmap >= 7.80 ncrack >= 0.7bash -c "$(curl -sfL https://raw.githubusercontent.com/google/tsunami-security-scanner/master/quick_start.sh)"The quick_start.sh script performs the following tasks:
$HOME/tsunami/repos directory.jar files into $HOME/tsunami/plugins directory.$HOME/tsunami directory.tsunami.yaml example config into $HOME/tsunami directory.127.0.0.1 using the previously generated artifacts.Contributing
Read how to contribute to Tsunami.
Disclaimers
It is not an official Google product.
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…