Open-Source Tools
Utilities built for real assessment work.
Ridgeback tools are built to solve practical workflow problems for penetration testers, vulnerability managers, and security operators. They are MIT-licensed and available on GitHub.
Cerno
Cerno helps security professionals review Nessus vulnerability findings and orchestrate verification tools from a terminal interface. The name comes from the Latin cernō: to discern or sift through.
Cerno maintains organized databases at ~/.cerno/cerno.db, making it easier to track findings and workflow state across sessions.
- Turn vulnerability scan output into a repeatable verification workflow
- Keep assessment findings organized across multiple review sessions
- Launch follow-up commands without losing context
- Interactive keyboard-driven workflow
- SQLite persistence across sessions
- nmap NSE, NetExec, and custom command orchestration
- CVE extraction and Metasploit module searches
- Large-scale vulnerability assessment organization
- Remediation tracking and post-exploitation intelligence correlation
pipx install git+https://github.com/ridgebackinfosec/cerno.git
Auxiliary
Auxiliary is a collection of dependency-free Python utilities for reconnaissance, list processing, firewall management, and local operational tasks during security assessments.
Tools are available through a unified auxiliary <tool> CLI or individual commands with aux- prefixes.
- Clean up targets, IPs, credentials, or tool output quickly
- Run small assessment helpers without extra dependencies
- Standardize repeatable local operator tasks
- DNS tools and domain controller discovery
- IP extraction and target list normalization
- Gobuster output conversion
- Nessus scope and utility workflows
- Firewall management with dry-run and backups
- Credential splitting, chunking, and other file processing helpers
- Dependency-free scripting and automation support
pipx install git+https://github.com/ridgebackinfosec/auxiliary.git
Want to see the tools in context?
Watch the Cerno webcast or browse recordings for practical offensive security walkthroughs and related field notes.
Contribute
Found a bug, have a feature idea, or want to submit a pull request? Community feedback helps make these tools better for real workflows.