Loading...
Vulnerability management tools for security scanning, penetration testing, bug bounty programs, and vulnerability assessment.
Browse 662 vulnerability management tools
Risk and exposure mgmt platform for IT, IoT, OT, and XIoT cyber assets
AI-powered CTEM platform with threat validation and attack simulation
AI-driven threat exposure mgmt platform with EASM, IASM, and ESPM capabilities
End-to-end vulnerability management service with scanning and remediation
Automated patch management for OS and third-party apps across endpoints
Exposure management platform for cyber-physical systems (CPS) security
Crowdsourced security platform for bug bounty, pentesting, and vuln disclosure
Managed vulnerability disclosure program platform for coordinated reporting
Vulnerability disclosure program platform for external security reporting
Vulnerability mgmt solution that prioritizes vulnerabilities based on context
Healthcare-focused vuln mgmt platform for medical device security & risk prioritization
AI-powered vuln mgmt platform for prioritization & remediation workflows
AI-powered vulnerability intelligence database with real-time threat context
Autonomous AI system for continuous penetration testing and exploit validation
Automated patch management software for fixing software vulnerabilities
Endpoint vulnerability scanning and assessment for businesses and MSPs
Agent-based server security monitoring with vulnerability and compliance scanning
Continuous automated pentesting platform for ongoing security assessment
Risk-based vulnerability mgmt for networks & cloud with threat intel scoring
Platform for continuous attack surface monitoring and vulnerability remediation
Integrated platform for ASM, PTaaS, and RBVM for threat exposure mgmt.
Vulnerability mgmt platform for medical device manufacturers with FDA compliance
Platform for unified exposure mgmt across IT assets and security tools
662 tools across 5 specializations · 309 free, 353 commercial
Bug Bounty Platforms
Bug bounty platforms that connect organizations with security researchers for crowdsourced vulnerability discovery and responsible disclosure.
Exposure Management
Exposure management solutions for identifying, prioritizing, and remediating security exposures across the entire attack surface.
Penetration Testing
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
Common questions about Vulnerability Management tools, selection guides, pricing, and comparisons.
Vulnerability scanning is automated, runs continuously, and identifies known CVEs and misconfigurations across your infrastructure at scale. Penetration testing is manual, performed periodically (quarterly or annually), and involves skilled testers attempting to exploit vulnerabilities, chain findings, and demonstrate real-world impact. Scanning finds what is vulnerable; pen testing proves what is exploitable.
Prioritize based on exploitability and business impact, not just CVSS score. Consider: is there a known exploit in the wild (CISA KEV catalog), is the asset internet-facing, what data does it hold, and can the vulnerability be chained with others. Risk-based vulnerability management tools combine these factors to rank vulnerabilities by actual risk to your organization.
Vulnerability management focuses on identifying and patching software vulnerabilities (CVEs). Exposure management takes a broader view, encompassing vulnerabilities, misconfigurations, identity weaknesses, and attack path analysis to understand and reduce your overall exposure to attacks. It asks "how could an attacker reach our critical assets?" rather than just "what CVEs do we have?"