Faraday is an open-source vulnerability management platform with 6.2k GitHub stars and 1k forks. It orchestrates 80+ security tools, normalizes their output, and deduplicates findings into a single management interface.

The company behind Faraday, Infobyte, has been around since 2004. Headquartered in Miami with a research lab in Buenos Aires. Customers include Accenture, Volkswagen, Telefonica, Santander, BBVA, HSBC, KPMG, Lufthansa, AT&T, and Vercel.
GitHub: infobyte/faraday | Latest Release: v5.19.0 (January 2026)
What is Faraday?
Faraday started as a tool for penetration testers who needed a single place to collect results from multiple scanners. It has since grown into a vulnerability management platform used by security operations teams, red teams, and managed security service providers.
Key features
Tool integrations
Faraday normalizes data from 80+ security tools:
| Category | Tools |
|---|---|
| Vulnerability scanners | Nessus, OpenVAS, Qualys |
| SAST/DAST | OWASP ZAP, Burp Suite, Semgrep |
| Network | Nmap, Masscan |
| Pentesting | Metasploit, Nuclei |
| Cloud/containers | Trivy, AWS tools |
All findings get normalized into a common format with automatic deduplication.

Agents Dispatcher
For large or distributed environments, Agents Dispatcher runs remote scans without installing the full Faraday stack on every machine:
- Lightweight agents for scheduled or on-demand scanning
- Horizontal scaling across multiple environments
- Automatic result import back to the central instance
- Works with any supported scanner

Ticketing integration
| System | Integration type |
|---|---|
| Jira | Direct ticket sync with bidirectional updates |
| ServiceNow | Vulnerability ticket creation |
| GitLab | Issue creation from findings |
| SolarWinds | Integration available |
Additional products
Beyond the open-source core, Faraday offers several commercial products:
| Product | What it does |
|---|---|
| Faraday Enrichment | Smart scoring that prioritizes vulnerabilities using contextual data |
| Faraday CART | Continuous automated attack testing |
| Faraday OPS | External attack surface mapping and monitoring |
| Faraday Labs | Offensive security research services |
| Red Team Services | Application, network, hardware, and physical security assessments |

Authentication and deployment
| Feature | Options |
|---|---|
| Authentication | 2FA, LDAP, SAML |
| Deployment | Cloud or on-premises |
| API | RESTful API for automation |
| CLI | faraday-cli for terminal workflows |

Integrations
Getting started
docker compose up -d from the Faraday repository. The web UI launches on port 5985 with PostgreSQL as the backend.CLI usage
# Install Faraday CLI
pip install faraday-cli
# Connect to your Faraday instance
faraday-cli auth -f https://your-faraday-instance -u admin
# Import scan results
faraday-cli tool report /path/to/nessus-report.nessus -w my-workspace
# List vulnerabilities
faraday-cli vuln list -w my-workspace --severity critical
When to use Faraday
Faraday is the go-to choice for offensive security teams, pentesting firms, and MSSPs that need centralized vulnerability management from hands-on testing alongside automated scanning. Its roots in the pentesting world show — the interface and workflows are designed around how security assessors actually work.
If your focus is purely on development pipeline security (SAST/SCA in CI/CD), tools like DefectDojo or Jit are a better fit. Faraday shines when offensive security testing is a big part of your program.

Comments
Powered by Giscus — comments are stored in GitHub Discussions.