Our website uses cookies to enhance your browsing experience.



Network Scan for Bash Vulnerability


  • MD5 f3281f0234f5e15fa53ae3e43af6997e

  • SHA1 5cff23e483dc75c7fd686201f7f33772ee6fd3b2

  • SHA256 31ebbee5b95dbe0cc3aa39b81108262932dcfc008ede974375312c9bcbc9db28


  • MD5 6428bb710af1ef4e43dde88d7493aedd

  • SHA1 1c963b2fe0d9261772e8390de5272464672b64a1

  • SHA256 fb57a8f613d68dcfc5c9b4c73a7305f0899a560856d06e9d18e09712308b1130

Free Bash Vulnerability Scanner

How To Read

Details of usage and reported results can be found in the About section of the tool once it is launched.

How To Install

There is no installer for this tool. Simply unzip the contents of the downloaded ZIP file into a location of your choosing and launch it directly from there. Similarly for uninstalling; simply delete the file(s) you extracted by moving them to the Recycle Bin or permanently deleting them. It is possible there may be a very small number of elements that remain in the Registry. They can be safely ignored or manually deleted by using a registry editing tool (e.g. regedit) and navigating to HKEY_LOCAL_MACHINE\Software\\CrowdStrike or HKEY_CURRENT_USER\Software\CrowdStrike and noting the name of the tool there and removing the branch.