Skip to main content

Installation Guide

Simple Vulnerability Manager can be installed on Windows and Linux systems. The installation process is straightforward and requires minimal configuration.

System Requirements

SVM integrates with multiple security tools. While the core application has minimal requirements, integrated tools may have additional dependencies.

Supported Platforms

  • Windows: Windows 10 or later
  • Linux: Kali Linux, Debian, Ubuntu (including WSL)

Core Dependencies

  • .NET Framework (included with Windows)
  • Administrative privileges for installation
  • Network connectivity for downloading security tools

Installing SVM Core

1

Download the Installer

Download the latest SVM installer from the official GitHub releases page:
https://github.com/simplevulnerabilitymanager/svm/releases
Current Version: v2.1.3
2

Run the Installer

  1. Double-click the downloaded .exe installer
  2. Follow the installation wizard
  3. Accept the license agreement
  4. Choose the installation directory
  5. Complete the installation
3

Launch SVM

After installation, launch SVM:
  • Windows: Use the Start Menu shortcut or run svm.exe
  • Linux: Execute from the installation directory
No additional configuration is required to start using the core features.

Installing Integrated Security Tools

SVM integrates with various security tools. You can install them individually based on your needs.

Linux Tool Installation Script

SVM provides an automated installation script for Linux systems that handles dependencies and tool setup.
The installation script requires root privileges and will install system packages. Review the script before execution in production environments.

Script Usage

sudo ./install_upgrade_tools_remoto.sh [TOOL_NAME]

Available Tools

Arachni
sudo ./install_upgrade_tools_remoto.sh Arachni
Installs Arachni web application scanner with all dependencies including:
  • Ruby gems: watir, selenium-webdriver, arachni-reactor
  • Database libraries: SQLite, PostgreSQL, MySQL
  • Network libraries: curl, libcurl
OpenVAS
sudo ./install_upgrade_tools_remoto.sh OpenVAS
Installs OpenVAS vulnerability scanner including:
  • OpenVAS manager and scanner components
  • Greenbone Security Assistant (web interface)
  • Additional tools: nmap, nikto, hydra, nessus plugins
  • Default credentials: username admin, password OpenVAS
After installation, OpenVAS will be configured to accept remote connections. The web interface listens on your local IP address.
OpenVAS Plugin Updates
sudo ./install_upgrade_tools_remoto.sh OpenVASPlugins
Nmap
sudo ./install_upgrade_tools_remoto.sh Nmap
Nessus Plugin Updates
sudo ./install_upgrade_tools_remoto.sh NessusPlugins
MobSF (Mobile Security Framework)
sudo ./install_upgrade_tools_remoto.sh MobSF
QARK (Quick Android Review Kit)
sudo ./install_upgrade_tools_remoto.sh Qark
ApkTool
sudo ./install_upgrade_tools_remoto.sh ApkTools
Enjarify
sudo ./install_upgrade_tools_remoto.sh Enjarify
AndroBugs Framework
sudo ./install_upgrade_tools_remoto.sh AndroBugs_Framework
Drozer
sudo ./install_upgrade_tools_remoto.sh Drozer
Android SDK
sudo ./install_upgrade_tools_remoto.sh AndroidSDK
Recon-ng
sudo ./install_upgrade_tools_remoto.sh Recon-ng
EyeWitness
sudo ./install_upgrade_tools_remoto.sh EyeWitness
Java
sudo ./install_upgrade_tools_remoto.sh Java
Installs OpenJDK 9 (or OpenJDK 8 as fallback)

Install All Tools

sudo ./install_upgrade_tools_remoto.sh Todas
Installing all tools will take significant time and disk space. Only install tools you need for your security assessments.

Windows Subsystem for Linux (WSL) Setup

For Windows 10 users running SVM tools via WSL:
1

Install WSL

Install Ubuntu 18.04 or Kali Linux from the Microsoft Store
2

Configure SSH Server

sudo apt-get install openssh-server
cd /etc/ssh/
sudo /usr/bin/ssh-keygen -A
sudo service ssh --full-restart
3

Update SSH Configuration

Edit /etc/ssh/sshd_config and add:
sudo nano /etc/ssh/sshd_config
Add the following line:
ListenAddress 0.0.0.0
Restart the SSH service:
sudo service ssh --full-restart
sudo update-rc.d ssh enable
4

Configure Sudo Access (Optional)

To avoid password prompts during scans:
sudo visudo
Add (replace username with your WSL username):
username ALL=(ALL) NOPASSWD: ALL

Post-Installation Verification

1

Launch SVM

Start the SVM application and verify the main interface loads correctly.
2

Check Tool Integration

Verify installed tools are recognized:
  • Navigate to the tools section in SVM
  • Check that installed scanners appear in the available tools list
3

Test Database Access

  • Access the vulnerability database
  • Browse categories: Web Scanners, Service Scanners, Mobile
  • Verify vulnerability descriptions load correctly

Updating SVM

Core Application Updates

Check for updates regularly:
  1. Visit the GitHub Releases page
  2. Download the latest version
  3. Run the installer to upgrade

Security Tool Updates

Linux Script Updates
# Update all scripts
sudo ./update_all_scripts.bat

# Update specific tool plugins
sudo ./install_upgrade_tools_remoto.sh OpenVASPlugins
sudo ./install_upgrade_tools_remoto.sh NessusPlugins
Nmap Script Database
sudo nmap --script-updatedb

Troubleshooting

Error: “You must run this setup script with root privileges.”Solution: Run the script with sudo:
sudo ./install_upgrade_tools_remoto.sh [TOOL_NAME]
Solution: Restart OpenVAS services manually:
sudo service openvas-scanner restart
sudo service openvas-manager restart
sudo service greenbone-security-assistant restart
Or use the Kali shortcut:
sudo openvas-start
Solution:
  1. Verify the tool is installed correctly
  2. Check the installation path matches SVM configuration
  3. Restart SVM to refresh tool detection
Solution:
  • Ensure SSH server is running in WSL
  • Verify firewall rules allow connections
  • Check that ListenAddress is set to 0.0.0.0 in sshd_config

Next Steps

Now that SVM is installed, proceed to the Quick Start Guide to run your first vulnerability scan.

Quick Start Guide

Learn how to create your first project and run a vulnerability scan