Ravenscan

Ravenscan

Self-hosted network and web security scanner. Discover hosts, audit services, detect CVEs and web vulnerabilities — all from a single Go binary with an embedded web UI.

What Ravenscan does

Ravenscan discovers hosts, identifies services, detects known vulnerabilities (CVE, CISA KEV), audits misconfigured protocols (SSH, TLS, SMB, RDP, LDAP, Kubernetes, Docker, DNS, FTP, SNMP, NTP) and delivers actionable reports with scoring, attack paths and remediation plans.

Who is it for?

  • MSPs / Managed IT — regular client audits, ready-to-deliver PDF/HTML reports
  • CISOs / IT leads — continuous attack surface monitoring, regression detection
  • Pentest consultants — rapid first sweep before a deep engagement
  • DevOps / SRE — post-deployment segmentation and exposure checks
  • SMBs — affordable alternative to commercial scanners, self-hosted

How it works

The scan pipeline runs in order:

  1. Discovery — host discovery (ICMP/TCP/ARP) then port discovery (1–65535 configurable)
  2. Service detection — banner grabbing, protocol fingerprinting
  3. Protocol audits — 13+ modules: SSH, TLS/SSL, HTTP(S), SMB, RDP, LDAP, Kubernetes, Docker, DNS, FTP, NTP, SNMP, default credentials
  4. Vulnerability matching — embedded CVE database + CISA KEV enrichment
  5. Web vulnerabilities — SQLi, XSS, open redirects, security headers, TLS misconfigurations
  6. Analysis — scoring (0–100, grade A–F), attack paths, compliance mapping (ISO 27001, NIST CSF, CIS v8, PCI DSS 4.0, HIPAA, SOC 2)
  7. Report — HTML, JSON, JSONL, Markdown, PDF, TXT

Architecture

Frontend (React/TypeScript, go:embed)
    |  REST /api/v1
Server (Go, single binary ~25 MB)
    |-- SQLite  (history, baselines, trends)
    |-- VulnDB  (embedded CVE + CISA KEV)
    |-- Licence engine (RSA-2048 signed)
  • Static Go binary, no CGO, no external dependencies
  • React/TypeScript UI embedded via go:embed
  • SQLite (pure Go) for local persistence

Quick start

  1. Install the CodeRaft Dashboard
    Linux / macOS
    $ curl -fsSL https://install.coderaft.io | bash
    Windows (PowerShell)
    $ irm https://install.coderaft.io/win | iex
  2. Start
    Start
    $ cd coderaft && ./start.sh
  3. Activate — Open http://localhost:3000 and complete the Setup Wizard (licence key validation)
  4. Scan — Enter a target (IP, CIDR, hostname), choose a profile (quick / standard / full), launch the scan

Comparison

Ravenscan Nessus/Qualys nmap + scripts
Modern web UI Yes Yes No
Single binary, offline Yes No Yes
Attack path analysis Yes Partial No
REST API Yes Yes No
Self-hosted Yes No Yes