• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
  • / yourpost
home / News / vuls: Vulnerability Scanner for Linux / FreeBSD

vuls: Vulnerability Scanner for Linux / FreeBSD

28/05/2020 11:12 by Anastasis Vasileiadis

For a system administrator, having to do a security analysis of his system and software updates on a daily basis can be a burden.

vuls abstract - vuls: Vulnerability Scanner for Linux / FreeBSD

To avoid wasting time and being more productive at work, it is common for a system administrator to choose not to use the automatic update option provided by the package manager and to perform the update manually. This leads to the following problems.

  • A system administrator should be constantly on the lookout for new vulnerabilities in NVD (National Vulnerability Database) or similar databases.
  • It is not possible for the system administrator to monitor the entire operating system if there is a large amount of software on the server.
  • It is expensive to perform an analysis to identify the servers affected by new vulnerabilities. It is possible for a server to be compromised during the analysis.

vuls motivation - vuls: Vulnerability Scanner for Linux / FreeBSD

 

Vuls is a tool created to solve the problems listed above. It has the following features.

  • Informs users about system-related vulnerabilities.
  • Informs users about affected servers.
  • Vulnerability detection is done automatically to avoid any breach.
  • The report is generated on a regular basis using CRON or other methods. for vulnerability management.

General characteristics

  • Performs Scan to find vulnerabilities in Linux/ FreeBSD Server
  • Scans software that is not included in the operating system package management
  • It has impeccable architecture
  • No approval required before scanning to AWS
  • It has automatic creation of a configuration file template
  • Notification is possible via email and Slack
  • The scan result is visible in programs such as the TUI Viewer in the terminal or UI Web (VulsRepo).

Application Screenshots

3y9zrf950agiko7klg8abvyck - vuls: Vulnerability Scanner for Linux / FreeBSD

demo - vuls: Vulnerability Scanner for Linux / FreeBSD

vuls slack en - vuls: Vulnerability Scanner for Linux / FreeBSD

 

You can download the program from here

vuls: Vulnerability Scanner for Linux / FreeBSD was last modified: May 28, 2020, 11: 12 am by Anastasis Vasileiadis

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: linux, Vulnerability Scanner, vuls

You May Also Like

The method of Sealing in Kali Linux
Qubes OS the most secure Linux distribution (for a few)
Red Hat free for developers and small businesses

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Windows 10 May 2020 Update download the new Media Creation Tool Windows 10 May 2020 Update new Media Creation Tool
Next Post: Windows 10 May 2020 Update BSODs attention Windows 10 May 2020 Update BSODs attention »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loading Cancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.