Vulnerability Management for Security Audit
Tools for identifying, prioritizing, and remediating security vulnerabilities in systems and applications. Task: Security Audit
Explore 13 curated tools and resources
RELATED TASKS
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
LATEST ADDITIONS
A centralized vulnerability lifecycle management platform that tracks security issues from discovery to closure with real-time status updates.
A tool for scanning and identifying potential security risks in GitHub organizations, users, and repositories.
Web server scanner for identifying security vulnerabilities.
An extensible, heuristic-based vulnerability scanning tool for installed npm packages.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
Patch-level verification tool for bundler to check for vulnerable gems and insecure sources.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
A Docker analysis tool for identifying potential security vulnerabilities and weaknesses in Docker environments
A tool to capture all the git secrets by leveraging multiple open source git searching tools.
Powerful PowerShell script for identifying missing software patches for local privilege escalation vulnerabilities.
Open source security auditing tool to search and dump system configuration.
A BloodHoundAD Report Engine for Security Teams to identify Active Directory security vulnerabilities and harden common configuration vulnerabilities and oversights.
Simple script to check a domain's email protections and identify vulnerabilities.