Skip to content

A tool dedicated to process, analyze and propagate arbitrary vulnerability scanner reports!

License

Notifications You must be signed in to change notification settings

bwInfoSec/VulnerabilityHub

Repository files navigation

VulnerabilityHub

codecov GitHub branch status GitHub last commit

Enterprise-grade vulnerability management platform with automated scanning, ML-powered predictions, and comprehensive reporting.

Features

  • 🔍 Automated Vulnerability Scanning - Parse and analyze Greenbone/OpenVAS reports
  • 📊 Predictive Analytics - ML-based forecasting of vulnerability trends
  • 📧 Smart Notifications - Magic link delivery with customizable templates
  • 👥 Contact Management - Pluggable import system with conflict resolution
  • 📈 Rich Dashboards - Grafana-powered visualizations
  • 🔐 Secure Access - JWT authentication with role-based permissions

Quick Start

# Clone repository
git clone <repository-url>
cd vulnerability-scanner
mkdir secrets
# generate docker secrets
touch secrets/db_password.txt secrets/db_root_password.txt secrets/grafana_secret.txt secrets/jwt_secret.txt 

# Start services
docker-compose up -d

# Access application
# http://localhost

If you want to include demo data for exploration or showcase purposes, run:

docker exec -it vulnerability-scanner-backend-1 python3 generate_demo_data.py

First Use

Upon first usage or database refresh, no user is available in the backend. Using the frontend you will be requested to setup an initial admin account which you can later on remove if need be.

Documentation

📚 Read the Full Documentation

Key Capabilities

Vulnerability Management

  • Import Greenbone XML reports
  • Track by severity, CVE, host, product
  • Historical trend analysis
  • Automated deduplication

Contact Person System

  • Multi-source import (CSV, Database, Scripts)
  • Conflict resolution for manual changes
  • Self-service profile management
  • Change audit trail

Reporting & Notifications

  • Magic link generation (24h expiry)
  • Customizable email templates
  • Access logging and monitoring
  • Alert system for unaccessed reports

Support

  • Documentation: docs/
  • Issues: GitHub Issues

Local Development

Prerequisites

  • Docker
  • Docker Compose
  • Node.js and npm (for frontend hot-reloading)

Running with Frontend Hot-Reload

For a better frontend development experience with hot-reloading, follow these steps:

  1. Launch Services: Run the following command from the project root to start the backend, database, and other services.

    docker compose up -d
  2. Stop the frontend container:

    docker compose down frontend
  3. Navigate to Frontend Directory:

    cd frontend/app
  4. Install Dependencies:

    npm install
  5. Run the Dev Server:

    npm run dev

The frontend will now be available at http://localhost:5173 (or another port specified by Vite) and will automatically reload when you make changes to the source code. The backend is already configured to run on hot-reload in its containerized form.

About

A tool dedicated to process, analyze and propagate arbitrary vulnerability scanner reports!

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 2

  •  
  •