Vulnerability Assessment

Vulnerability assessment tools for comprehensive security scanning, risk prioritization, and remediation guidance.

Explore 29 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Maze AI Agents Logo

AI agents investigate cloud vulnerabilities and automate remediation workflows

0
Faraday Logo

A vulnerability management platform that centralizes security assessment workflows, integrates multiple security tools, and provides collaboration features for security teams.

0
StrikeOne Logo

StrikeOne is a vulnerability management platform with AI capabilities that helps organizations identify, prioritize, and remediate security vulnerabilities through attack surface management, vulnerability management, and cybersecurity posture assessment.

0
OpenVAS Logo

OpenVAS is an open-source vulnerability scanner that provides extensive testing capabilities for identifying security weaknesses in networks and systems.

2
Tenable Web App Scanning Logo

Tenable One Exposure Management Platform is a comprehensive platform for vulnerability management and exposure management.

0
RoboShadow Logo

Automated vulnerability assessment and remediation platform

10
SecurityVulnerability.io Logo

SecurityVulnerability.io simplifies the process of collecting, enriching, and presenting vulnerability information for both human and machine consumption.

0
Git-Vuln-Finder Logo

A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages

0
aemscan Logo

A tool for scanning Adobe Experience Manager instances for potential security vulnerabilities

0
DefectDojo Logo

OWASP Project for making vulnerability management easier.

0
Linux Exploit Suggester (LES) Logo

A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.

0
CloudJack Logo

Assesses AWS accounts for subdomain hijacking via Route53/CloudFront

0
ThreatMapper Logo

A runtime threat management and attack path enumeration tool for cloud-native environments

0
is-my-node-vulnerable Logo

Check for known vulnerabilities in your Node.js installation.

0
CVE Logo

The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

0
Android Vulnerability Test Suite Logo

A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.

0
LUNAR Lockdown UNix Auditing and Reporting Logo

A shell script-based Unix security auditing tool that generates scored compliance reports based on CIS frameworks and provides lockdown capabilities with rollback functionality.

0
Mana Security Logo

Mana Security is a macOS-focused vulnerability management tool that continuously monitors 100+ applications for security vulnerabilities and tracks patching performance against community benchmarks.

0
Windows Exploit Suggester Logo

Compares target's patch levels against Microsoft vulnerability database and detects missing patches.

0
Sherlock PowerShell Script Logo

Powerful PowerShell script for identifying missing software patches for local privilege escalation vulnerabilities.

0
MetaHub Logo

MetaHub is an open-source vulnerability management tool that provides impact-contextual analysis of security findings in AWS environments through automated contextualization, ownership identification, and prioritization scoring.

0
DueDLLigence Logo

An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.

0
CVE Ape Logo

CVE Ape is an open source tool that creates a local CVE database from the National Vulnerability Database for offline vulnerability searching by package name, vendor, or OS components.

0
IntelligenceX Logo

Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.

0