Top 15 Nikto Alternative and Similar Softwares | Apr 2024

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers.

1. Cyberwatch

Cyberwatch Cyberwatch is the 1st automated IT vulnerabilities fixer.More than 8000 vulnerabilities are discovered every year.Hackers use them to attack you. Cyberwatch automatically fixes them for you.Our unique technology, automatically finds and fixes your servers vulnerabilities as soon as they are published by the authorities so you can benefit from a......

2. Dependency-Check

Dependency-Check Dependency-Check is a utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities. Currently Java and .NET dependencies are supported.......

3. PatrolServer

PatrolServer Welcome to PatrolServer. We scan your server real-time for outdated software and exploits. All delivered by mail and an easy to use dashboard.......

4. cSploit

cSploit The most complete and advanced IT security professional toolkit on Android.- enumerate local hostsdone- find vulnerabilitiesdone- find exploits for these vulnerabilitiesdone- use those exploits to gain access to the targetdone- crack wifi passwords- install backdoors for later access- Portability: It can run on any UNIX-based system, but for now only......

5. Intruder

Intruder Intruder is a proactive security monitoring platform for internet-facing systems.Cyber threats are ever-changing and require dedicated oversight. Existing services are inadequate, overly complex to configure and operate, and the jargon produced is often confusing, requiring specialist interpretation.Intruder provides a simple cloud based security solution which continually scans your digital assets,......

6. Unified VRM by NopSec

Unified VRM by NopSec NopSec Unified VRM® provides up to a 40% time savings for security teams by eliminating the manual tasks involved with vulnerability risk management. Our cloud-base solution helps you identify, prioritize, proactively manage and report on IT vulnerabilities and security breaches from a single platform.Our Differentiators:1. Adaptive Expert Intelligence - Offers......

7. victims

victims The victims project provides a canonical database of known-vulnerable JAR files, along with tools to compare this database to Java applications in development, release and production environments.......

8. east-tec Eraser

east-tec Eraser Protect your sensitive data and privacy, and securely erase all evidence of your Internet and PC activity. Go beyond any system optimization or cleanup tool, improve your PC performance, and keep it clean and secure! east-tec Eraser has been continuously improved since its launch in 1998, and exceeds government and......

9. Naxsi

Naxsi # What is Naxsi?NAXSI means Nginx Anti XSS & SQL Injection.Technically, it is a third party nginx module, available as a package for many UNIX-like platforms. This module, by default, reads a small subset of simple (and readable) rules containing 99% of known patterns involved in website vulnerabilities. For example,......

10. OnionMail

OnionMail OnionMail is an anonymous and encrypted mail server designed to run on the TOR network without losing the ability to communicate with the Internet. This ensures greater privacy to the users but also protect against eavesdropping of the NSA and others.......

11. Grabber Web Application Scanner

Grabber Web Application Scanner Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website.Grabber is simple, not fast, but portable and really adaptable. This software is designed to scan small websites such as personal sites, forums etc. It is a very small application: it would take too much......

12. SharkSSL

SharkSSL The SSL/TLS and Certificate tutorial for Windows enables you to fast track your understanding of the SSL/TLS protocol, Certificate Management, and secure communication. The download includes many C source code examples, including a secure WebSocket tutorial. You can either compile the examples "as is" or modify them to suite your......

13. Safeplicity

Safeplicity Do you have sensitive files you would like to password-protect but don’t know how? With Safeplicity, you can password-protect AND encrypt all your confidential files in just a few clicks, without any IT skills whatsoever. To protect a folder, you simply right-click on it, choose “Protect with Password” and choose......

14. Lynis

Lynis Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!How it worksLynis......

15. Exploit Pack

Exploit Pack Exploit Pack is an open source project maintained only by me. It has now 5 years in the market. It’s NOT a replacement for metasploit or core impact.It’s a different approach you can use it to conduct a pentest, a real one, not only press enter in the command line.......