Loading...
Vulnerability management tools for security scanning, penetration testing, bug bounty programs, and vulnerability assessment.
Browse 662 vulnerability management tools
A Node.js tool that analyzes HTTP security headers on websites to identify missing or problematic security configurations.
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
MCIR is a unified framework for building code injection vulnerability testbeds that combines SQL, XML, shell, and XSS injection testing tools with shared functionality and template-based extensibility.
Fast, smart, effective port scanner with extensive extendability and adaptive learning.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A fast and flexible HTTP enumerator for content discovery and credential bruteforcing
Check for known vulnerabilities in your Node.js installation.
Modular framework for web services penetration testing with support for various attacks.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
A PowerShell toolkit for penetration testing Microsoft Azure environments, providing discovery, configuration auditing, and post-exploitation capabilities.
ROPgadget is a cross-platform command-line tool that searches for ROP gadgets in binary files across multiple architectures to facilitate exploit development and ROP chain construction.
A bash-based framework for discovering and extracting exposed .git repositories from web servers during penetration testing and bug bounty activities.
An open source network penetration testing framework with automatic recon and scanning capabilities.
A utility that attempts to decrypt data from weak RSA public keys and recover private keys using multiple integer factorization algorithms.
Pwntools is a Python CTF framework and exploit development library that provides tools for rapid prototyping and development of exploits and CTF challenge solutions.
Compares target's patch levels against Microsoft vulnerability database and detects missing patches.
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.
A Ruby script that scans networks for vulnerable third-party web applications and front-ends with known exploitable security flaws.
An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.
Modular framework for pentesting Modbus protocol with diagnostic and offensive features.
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
S3Scanner is an open-source tool that scans S3 buckets across S3-compatible APIs to identify misconfigurations and security vulnerabilities.
662 tools across 5 specializations · 309 free, 353 commercial
Bug Bounty Platforms
Bug bounty platforms that connect organizations with security researchers for crowdsourced vulnerability discovery and responsible disclosure.
Exposure Management
Exposure management solutions for identifying, prioritizing, and remediating security exposures across the entire attack surface.
Penetration Testing
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
Common questions about Vulnerability Management tools, selection guides, pricing, and comparisons.
Vulnerability scanning is automated, runs continuously, and identifies known CVEs and misconfigurations across your infrastructure at scale. Penetration testing is manual, performed periodically (quarterly or annually), and involves skilled testers attempting to exploit vulnerabilities, chain findings, and demonstrate real-world impact. Scanning finds what is vulnerable; pen testing proves what is exploitable.
Prioritize based on exploitability and business impact, not just CVSS score. Consider: is there a known exploit in the wild (CISA KEV catalog), is the asset internet-facing, what data does it hold, and can the vulnerability be chained with others. Risk-based vulnerability management tools combine these factors to rank vulnerabilities by actual risk to your organization.
Vulnerability management focuses on identifying and patching software vulnerabilities (CVEs). Exposure management takes a broader view, encompassing vulnerabilities, misconfigurations, identity weaknesses, and attack path analysis to understand and reduce your overall exposure to attacks. It asks "how could an attacker reach our critical assets?" rather than just "what CVEs do we have?"
Based on user ratings and community engagement on CybersecTools, the top-rated Vulnerability Management tools are: