Vulnerability Management
Tools for identifying, prioritizing, and remediating security vulnerabilities in systems and applications.
Explore 166 curated tools and resources
RELATED TASKS
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
LATEST ADDITIONS
kube-hunter hunts for security weaknesses in Kubernetes clusters.
Deliberately vulnerable web application for security professionals to practice attack techniques.
A fuzzer for detecting open redirect vulnerabilities
Script to find exploits for vulnerable software packages on Linux systems using an exploit database.
DOM-based XSS vulnerability scanner
Web server scanner for identifying security vulnerabilities.
OWASP Project for making vulnerability management easier.
A wargame designed to test your hacking skills and knowledge
Audits JavaScript projects for known vulnerabilities and outdated package versions using OSS Index v3 REST API.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.
An extensible, heuristic-based vulnerability scanning tool for installed npm packages.
A collection of 132 exploits added to Packet Storm in April 2024
A tool for scanning websites with open .git repositories and dumping their content for Bug Hunting/Pentesting Purposes.