Exploit Database


apt install exploitdb

serachsploit name version Recherche d’exploits connues (de Exploit-DB).

serachsploit -x 4401 Affiche l’exploit 4401.

Web Vulnerability Scan


nikto -h [TARGET_IP] Web vuln scan.

nikto -h http://[TARGET_IP]:[TARGET_PORT]/path -id myUser:myPass Web vuln scan with credential and login page.


wpscan --url [TARGET_IP] -e u,vp,vt
Scan Wordpress.

-e vp Enumerate Vulnerable Plugins.

-e vt Enumerate Vulnerable Themes.

-e cb Enumerate Config Backups.

-e dbe Enumerate DB Exports.

-e u Enumerate Users.

Graphical Interface Scanners



docker run -p 8834:8834 --name nessus tenableofficial/nessus
Start Nessus scanner.

The scanner will be accessible at:

To use the scanner, you need to create an account.
You can create a free Nessus Essentials account here: https://fr.tenable.com/products/nessus/nessus-essentials

Greenbone Vulnerability Manager


curl -f -L https://greenbone.github.io/docs/latest/_static/docker-compose-22.4.yml -o docker-compose.yml
Download Docker Copose file.

docker-compose -f docker-compose.yml -p greenbone-community-edition up
Start Greenbone scanner.

docker-compose -f docker-compose.yml -p greenbone-community-edition down
Stop Greenbone scanner.

The scanner will be accessible with default credentials (admin:admin) at: