Ravenscan
Self-hosted network and web security scanner. Discover hosts, audit services, detect CVEs and web vulnerabilities — all from a single Go binary with an embedded web UI.
What Ravenscan does
Ravenscan discovers hosts, identifies services, detects known vulnerabilities (CVE, CISA KEV), audits misconfigured protocols (SSH, TLS, SMB, RDP, LDAP, Kubernetes, Docker, DNS, FTP, SNMP, NTP) and delivers actionable reports with scoring, attack paths and remediation plans.
Who is it for?
- MSPs / Managed IT — regular client audits, ready-to-deliver PDF/HTML reports
- CISOs / IT leads — continuous attack surface monitoring, regression detection
- Pentest consultants — rapid first sweep before a deep engagement
- DevOps / SRE — post-deployment segmentation and exposure checks
- SMBs — affordable alternative to commercial scanners, self-hosted
How it works
The scan pipeline runs in order:
- Discovery — host discovery (ICMP/TCP/ARP) then port discovery (1–65535 configurable)
- Service detection — banner grabbing, protocol fingerprinting
- Protocol audits — 13+ modules: SSH, TLS/SSL, HTTP(S), SMB, RDP, LDAP, Kubernetes, Docker, DNS, FTP, NTP, SNMP, default credentials
- Vulnerability matching — embedded CVE database + CISA KEV enrichment
- Web vulnerabilities — SQLi, XSS, open redirects, security headers, TLS misconfigurations
- Analysis — scoring (0–100, grade A–F), attack paths, compliance mapping (ISO 27001, NIST CSF, CIS v8, PCI DSS 4.0, HIPAA, SOC 2)
- Report — HTML, JSON, JSONL, Markdown, PDF, TXT
Architecture
Frontend (React/TypeScript, go:embed)
| REST /api/v1
Server (Go, single binary ~25 MB)
|-- SQLite (history, baselines, trends)
|-- VulnDB (embedded CVE + CISA KEV)
|-- Licence engine (RSA-2048 signed) - Static Go binary, no CGO, no external dependencies
- React/TypeScript UI embedded via
go:embed - SQLite (pure Go) for local persistence
Quick start
- Install the CodeRaft Dashboard Linux / macOS$ curl -fsSL https://install.coderaft.io | bashWindows (PowerShell)$ irm https://install.coderaft.io/win | iex
- Start Start$ cd coderaft && ./start.sh
- Activate — Open
http://localhost:3000and complete the Setup Wizard (licence key validation) - Scan — Enter a target (IP, CIDR, hostname), choose a profile (quick / standard / full), launch the scan
Comparison
| Ravenscan | Nessus/Qualys | nmap + scripts | |
|---|---|---|---|
| Modern web UI | Yes | Yes | No |
| Single binary, offline | Yes | No | Yes |
| Attack path analysis | Yes | Partial | No |
| REST API | Yes | Yes | No |
| Self-hosted | Yes | No | Yes |