Tsunami
Apache-2.0๐ Network Recon ยท Java
Tsunami is a network security scanner developed by Google designed for detecting high-severity vulnerabilities with high confidence at scale. It operates in two phases: first scanning for open ports and services using nmap/ncrack integration, then running vulnerability detection plugins against discovered services. Tsunami focuses on minimizing false positives and only reports vulnerabilities it can verify. Its plugin system allows community contributions for new vulnerability checks. Designed for enterprise-scale networks where manual verification of every finding is impractical.
Installation
$ git clone https://github.com/google/tsunami-security-scanner.git && cd tsunami-security-scanner && ./gradlew shadowJarUse Cases
- Large-scale network vulnerability detection
- Automated verification of high-severity vulnerabilities
- Continuous security scanning of enterprise infrastructure
- Service discovery and fingerprinting at scale
Tags
Details
- Category
- ๐ Network Recon
- Language
- Java
- Repository
- google/tsunami-security-scanner
- License
- Apache-2.0
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
Nmap
C/C++The gold standard network scanner. Host discovery, port scanning, service/version detection, OS fingerprinting.
Compare Tsunami vs NmapNuclei
GoFast vulnerability scanner driven by YAML templates. Thousands of community-contributed detection templates.
Compare Tsunami vs NucleiMore in Network Recon
Nmap
C/C++The gold standard network scanner. Host discovery, port scanning, service/version detection, OS fingerprinting.
Masscan
CInternet-scale port scanner. Transmits 10 million packets per second. Asynchronous, stateless scanning.
RustScan
RustBlazing fast port scanner that pipes into Nmap. Scans all 65k ports in 3 seconds flat.
Shodan CLI
PythonCommand-line interface for Shodan, the search engine for internet-connected devices.
Wireshark
C/C++The world's foremost network protocol analyzer. Deep packet inspection for hundreds of protocols.
Responder
PythonLLMNR/NBT-NS/mDNS poisoner and rogue authentication server. Captures NTLMv1/v2 hashes on the network.