Application Security for Vulnerability Detection
Application security tools and solutions for securing web applications, mobile apps, and software throughout the development lifecycle. Task: Vulnerability Detection
Explore 122 curated cybersecurity tools, with 15,216 visitors searching for solutions
FEATURED
- Home
- Categories
- Application Security
- Vulnerability Detection
RELATED TASKS
DAST solution for automated web app vulnerability testing and discovery
DAST solution for automated web app vulnerability testing and discovery
DAST tool for detecting web app vulnerabilities like SQL injection and XSS
DAST tool for detecting web app vulnerabilities like SQL injection and XSS
Web application firewall for Magento/Adobe Commerce stores
SAST tool for finding code quality & security defects in large-scale software
SAST tool for finding code quality & security defects in large-scale software
AI-driven API pentesting platform with schema-aware testing and fuzzing
AI-driven API pentesting platform with schema-aware testing and fuzzing
Unified white-box and black-box testing platform for exploitable risks
Unified white-box and black-box testing platform for exploitable risks
Open source vulnerability intelligence engine analyzing 270M+ components
Open source vulnerability intelligence engine analyzing 270M+ components
DAST scanner for web apps and APIs with OWASP Top 10 vulnerability detection
DAST scanner for web apps and APIs with OWASP Top 10 vulnerability detection
SAST tool that identifies vulnerabilities in source code across 30+ languages
SAST tool that identifies vulnerabilities in source code across 30+ languages
AI-driven SCA tool for open-source dependency vulnerability detection & remediation
AI-driven SCA tool for open-source dependency vulnerability detection & remediation
Web application vulnerability scanner with automated authentication support
Web application vulnerability scanner with automated authentication support
Software supply chain security platform for SDLC infrastructure protection
Software supply chain security platform for SDLC infrastructure protection
AI-powered SAST tool for code vulnerability detection and automated fixing
AI-powered SAST tool for code vulnerability detection and automated fixing
SAST and SCA platform for code security analysis with taint analysis
SAST and SCA platform for code security analysis with taint analysis
IDE plugin for real-time code quality and security issue detection
IDE plugin for real-time code quality and security issue detection
SCA tool with proof-based validation and runtime analysis for open-source risks
SCA tool with proof-based validation and runtime analysis for open-source risks
Automated API security testing tool integrated into CI/CD pipelines
Automated API security testing tool integrated into CI/CD pipelines
Reverse engineering service for identifying vulnerabilities in software
Reverse engineering service for identifying vulnerabilities in software
Manual secure code review service with continuous SAST and zero-day detection
Manual secure code review service with continuous SAST and zero-day detection
SCA tool for identifying vulnerable third-party libraries and dependencies
SCA tool for identifying vulnerable third-party libraries and dependencies
Enterprise DAST platform for web apps, APIs, business logic, and LLM security
Enterprise DAST platform for web apps, APIs, business logic, and LLM security
AI-powered AppSec platform for DAST, IAST, and API security testing
AI-powered AppSec platform for DAST, IAST, and API security testing
AI-powered SAST tool for scanning code vulnerabilities with low false positives
AI-powered SAST tool for scanning code vulnerabilities with low false positives
Detects, validates, and remediates secrets in code and pipelines
Detects, validates, and remediates secrets in code and pipelines
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs