This article needs to be updated. The reason given is: The OpenVAS framework got renamed to Greenbone Vulnerability Management (GVM) and OpenVAS (now Open Vulnerability Assessment Scanner) is now only a part of it. The article should be updated to reflect this change..(May 2020)
|Developer(s)||Greenbone Networks GmbH|
21.4.4 / 22 February 2022
OpenVAS (Open Vulnerability Assessment System, originally known as GNessUs) is the scanner component of Greenbone Vulnerability Manager (GVM), a software framework of several services and tools offering vulnerability scanning and vulnerability management.
All Greenbone Vulnerability Manager products are free software, and most components are licensed under the GNU General Public License (GPL). Plugins for Greenbone Vulnerability Manager are written in the Nessus Attack Scripting Language, NASL.
Greenbone Vulnerability Manager began under the name of OpenVAS, and before that the name GNessUs, as a fork of the previously open source Nessus scanning tool, after its developers Tenable Network Security changed it to a proprietary (closed source) license in October 2005. OpenVAS was originally proposed by pentesters at SecuritySpace, discussed with pentesters at Portcullis Computer Security and then announced by Tim Brown on Slashdot.
There is a daily updated feed of Network Vulnerability Tests (NVTs) - over 50,000 in total (as of July 2020).
The OpenVAS protocol structure aims to be well-documented to assist developers. The OpenVAS Compendium is a publication of the OpenVAS Project that delivers documentation on OpenVAS.
- Kali Linux
- Kismet (software)
- List of free and open-source software packages
- Metasploit Project
- ZMap (software)
- "Tags". Archived from the original on 22 February 2022.
- "GMV tools - Glossary". Greenbone Networks GmbH.
- LeMay, Renai (2005-10-06). "Nessus security tool closes its source". CNet.
- Portcullis Computer Security
- Log from SPI board meeting
- "About Greenbone Community Feed (GCF)". 10 January 2019.