AIMultiple ResearchAIMultiple ResearchAIMultiple Research
We follow ethical norms & our process for objectivity.
This research is not funded by any sponsors.
AppSec
Updated on May 9, 2025

Top 10 Open source / Free DAST Tools Compared in 2025

We relied on our research on vulnerability scanning tools and DAST to pick leading open source DAST tools & free versions of proprietary DAST software. See our rationale by following the links on product names:

Open source Dast ToolsBest for
1.
Reliable overall DAST performance
2.
Server scanning
3.
Web application testing
4.
Network vulnerability assessment
5.
Lightweight web vulnerability scanning
Show More (5)
6.
Embedded systems
7.
Web application security monitoring
8.
Vulnerability assessment for small environments
9.
Pentesting
10.
Open source API projects
1.
OWASP Zap logo
Reliable overall DAST performance
2.
Nikto logo
Server scanning
3.
Arachni logo
Web application testing
4.
OpenVAS logo
Network vulnerability assessment
5.
Wapiti logo
Lightweight web vulnerability scanning
6.
Code Intelligence Fuzz logo
Embedded systems
7.
Indusface WAS logo
Web application security monitoring
8.
Tenable Nessus Essentials logo
Vulnerability assessment for small environments
9.
PortSwigger Burp Suite logo
10.
StackHawk logo
Open source API projects

As the cost and number of cyberattacks increase, businesses increasingly adopt DAST tools to improve their security posture.

Open source or free DAST software are the lowest cost entry point to DAST software and may be suitable for 

  • SMEs
  • businesses starting their cybersecurity journey
  • businesses that are looking for additional DAST tools to complement their cybersecurity posture

If you are part of such a business, explore free DAST tools.

If you already used a free DAST tool and found that it failed to identify vulnerabilities or identified many false positives, check out proprietary DAST software for more enterprise-grade solutions.

Free DAST tools

Last Updated at 04-21-2024
ProductLicenseStars on GitHubLimitations of free edition

ZAP

Open source1

12kNot applicable
Nikto

Open source2

8kNot applicable
Arachni

Open source3

4kNot applicable
OpenVAS

Open source4

3kNot applicable
Wapiti

Open source5

1kNot applicable
Code Intelligence FuzzProprietaryNot applicableFree for open source projects
Indusface WASProprietaryNot applicableDetails and remediation for 5 vulnerabilities shared
Nessus EssentialsProprietaryNot applicableLimited functionality and allows scanning up to 16 IP addresses per scanner
PortSwigger Burp SuiteProprietaryNot applicableLimited functionality
StackHawkProprietaryNot applicableFree for open source projects and free to use on a single application.

Sorting: According to number of stars on GitHub.

Sources: The OWASP organization maintains a list of DAST tools, many with free versions (check the “License” column).6

Inclusion criteria for: 

  • Open source projects: 900+ stars on GitHub
  • Proprietary software: Must be a free-to-use package provided by a DAST software provider

ZAP

Zed Attack Proxy (ZAP) is the open source DAST tool with the most GitHub stars and most comprehensive scope. It includes both automated scanning for vulnerabilities and tools to assist experts in their manual web app pen testing and REST API testing.

As a former OWASP project, ZAP is an actively maintained, community-driven dynamic application security testing tool, offering documentation and a range of add-ons. 

ZAP can act as a transparent proxy, actively intercepting traffic between your browser and web applications for real-time analysis. Alternatively, it can be leveraged for in-depth vulnerability assessments, actively scanning web applications based on a set of predefined rules.

Nikto

Nikto is an open-source DAST tool that performs server vulnerability scans and tests against web servers for multiple items, including dangerous files/CGIs, outdated server software, misconfigurations and other problems 

Cons:

Nikto lacks a graphical user interface and operates solely from the command line.

Arachni

Though Arachni has an impressive list of capabilities, it had’t been updated for a year as of July/2024. It is getting outdated as the maintainers launched another DAST project.7

Arachni stands out for its modular design, allowing you to extend its functionalities through plugins. Additionally, its advanced crawling capabilities effectively navigate complex web applications, uncovering hidden functionalities that might harbor vulnerabilities. This flexibility caters to diverse testing needs.

Arachni maintains user sessions during scans, mimicking real-world user behavior, allowing session management. This provides a more comprehensive picture of your application’s security flaws to identify vulnerabilities that might only be exposed during authenticated sessions.

Potential drawbacks of Arachni

  • Deep scans may require significant system resources; ensure adequate capacity for optimal Arachni performance.

OpenVAS


OpenVAS (Open Vulnerability Assessment Scanner) is an open-source vulnerability scanner designed to detect security issues in computer systems and networks. It works by scanning systems for known vulnerabilities, misconfigurations, and outdated software. Part of the Greenbone Vulnerability Management (GVM) framework, OpenVAS provides tools for both small-scale and enterprise-level security assessments, making it widely used for identifying and mitigating security risks.

Wapiti

Wapiti scans web traffic for threats (passively) or hunts vulnerabilities (actively) using predefined rules. Wapiti lets users write custom scripts to handle specific vulnerabilities, extending its scanning capabilities.

Proprietary tools that are free for open source projects

Code Intelligence Fuzz

CI Fuzz is a command line tool for fuzz testing, focused on embedded applications in automotive and medical devices.

StackHawk

StackHawk is the most established free testing tool focused solely on API testing since few testing solutions focus solely on API testing. Open source API developers can freely use their solution for testing.

Proprietary tools with free community editions

For more on these tools, see Tenable Nessus alternatives or a full list of DAST tools.

Other free application security tools

DAST is one part of the application security landscape. Application security can be bolstered without additional expenses with Free static application security testing (SAST) tools

Benefits of open-source DAST tools

They provide a fast and cost-effective way to address the present threat from external actors by offering testing capabilities accessible to organizations of all sizes and budgets:

  • Open-source DAST tools have lower upfront costs.
  • They can be rapidly deployed since the user can skip the purchase process and start using the tool from day one.
  • Some open source tools also require less configuration and therefore can be deployed more quickly compared to commercial tools.
  • Though they don’t come with dedicated support, open-source DAST tools benefit from active user communities. These communities provide readily accessible resources (tutorials, documentation) and facilitate knowledge sharing. This fosters a supportive environment for new users to get started quickly and troubleshoot challenges efficiently. 

Recommendations for choosing an open-source DAST tool 

You can easily try out these solutions in test runs on your company’s applications and compare alternatives. It is important to measure these for different solutions:

  • % of correctly identified vulnerabilities
  • % of false positives in all identified vulnerabilities
  • Remediation guidance: How useful is the tool in describing how to resolve issues?
  • Integrations: Explore integration with other security tools or CI/CD pipelines within your development environment. This automates workflows and strengthens your application’s overall security posture.
  • Run time: If you will integrate the DAST solution in your software development pipeline, speed is essential for developer productivity
  • Resource management: Deep scanning features can significantly increase the demand on your system’s processing power, memory, and storage. Ensure your system has adequate resources to avoid performance bottlenecks during testing.
  • Customization options: Many open-source DAST tools offer a high degree of customization. This allows you to tailor your testing process to your application’s unique needs, focusing on areas most vulnerable to external threats based on complexity.

Reasons for investing in a DAST solution

Whether you use a SaaS solution or opt for on-premises DAST software, the power of these tools lies in their ability to identify issues like authentication problems and misconfigurations, which can often slip through static application security testing (SAST) and manual review of source code. 

Failing to encrypt sensitive data in transit creates a common vulnerability, exposing even large corporations to potential breaches. Organizations face three main attack vectors: 

  • compromised credentials
  • phishing scams
  • vulnerability exploitation

These attack vectors against unencrypted data transmissions leave organizations vulnerable to:

  • Financial theft: hackers can intercept sensitive information like credit card numbers or bank account details, leading to direct financial losses.
  • Customer privacy violations: Exposure of personally identifiable information (PII) like names, addresses, or social security numbers can trigger regulatory fines and damage customer trust.
  • Operational disruptions: Data breaches can disrupt critical operations, causing downtime and lost productivity.

DAST actively tests an application’s ability to protect user sessions, preventing attackers from hijacking them to access sensitive data, by manipulating session tokens or cookies.

It actively verifies strong password policies, account lockout mechanisms, and authorization controls to prevent unauthorized access to sensitive financial information.

More on DAST & AppSec testing

Share This Article
MailLinkedinX
Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 55% of Fortune 500 every month.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE and NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and resources that referenced AIMultiple.

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.

Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.

Next to Read

Comments

Your email address will not be published. All fields are required.

0 Comments