Vulnerability Management

Vulnerability management tools for security scanning, penetration testing, bug bounty programs, and vulnerability assessment.

Explore 165 curated cybersecurity tools, with 15,370 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

Synack Vulnerability Management Solutions Logo

Human-driven vuln discovery & assessment with patch verification

0
Synack Vulnerability Disclosure Program Logo

Platform for responsible disclosure of security vulnerabilities

0
Synack Managed VDP Logo

Managed vulnerability disclosure program with triage and researcher coordination

0
Synack Application Penetration Testing Logo

PTaaS platform for web, mobile, cloud app pentesting by global researchers

0
ImmuniWeb® AI Platform Logo

AI-powered web security testing platform for vulnerability and compliance scanning

0
ImmuniWeb ImmuniWeb® AI Platform Logo

AI-powered platform for SSL/TLS security testing and compliance assessment

0
ImmuniWeb® Continuous Penetration Testing Logo

Continuous pentesting service monitoring web apps & APIs for code changes

0
Synack PTaaS Platform Logo

Continuous penetration testing platform with managed security researchers

0
Synack Sara Logo

AI-powered autonomous penetration testing platform with multi-agent system

1
Synack Active Offense Logo

AI-powered PTaaS platform with continuous attack surface discovery and exploit validation

1
Vulnetic AI Hacking Agent Logo

Vulnetic AI is the most capable autonomous hacking agent on the market.

0
iScan Advanced Scanning Tool Logo

Scans repositories for exposed secrets, API keys, and credentials for bug bounty

0
Pentera Core Logo

Automated penetration testing platform that validates internal network security

0
Fortra VM Logo

Risk-based vulnerability management platform for scanning and prioritization

0
CrowdStrike Falcon Exposure Management Logo

Attack surface visibility and vulnerability management platform

0
Trend Micro Cyber Risk Exposure Management Logo

Continuous cyber risk exposure management and mitigation platform

0
XYGATE Aegis Scan Logo

Automated vulnerability scanning for HPE NonStop systems

0
Maze AI Agents Logo

AI agents investigate cloud vulnerabilities in context and automate remediation

0
Internacious Website and Email Security Scan Logo

Web and email security scanner that checks 16 critical security points in 60 seconds

1
Dradis Community Edition (CE) Logo

Open-source platform for pentest reporting and security team collaboration

1
Pentesting Payloads Logo

A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.

0
ZeroThreat Continuous Pentesting Logo

Automated pentesting for web apps & APIs with continuous vulnerability scanning

0
Siemba Continuous Threat Exposure Management Logo

CTEM platform combining pentesting, DAST, and attack surface mapping

0
weSecretFinder Logo

A Python script that scans file systems to identify hardcoded credentials, API keys, and other sensitive secrets using configurable regex patterns.

1

Vulnerability Management Tools - FAQ

Common questions about Vulnerability Management tools including selection guides, pricing, and comparisons.

Vulnerability management tools for security scanning, penetration testing, bug bounty programs, and vulnerability assessment.

Have more questions? Browse our categories or search for specific tools.