Loading...
Vulnerability management tools for security scanning, penetration testing, bug bounty programs, and vulnerability assessment.
Browse 662 vulnerability management tools
Agentless platform for continuous security control monitoring & gap analysis.
Automated fuzz & penetration testing tool for automotive ECUs and software.
AI-driven platform that unifies & prioritizes vuln findings across cloud tools.
CTEM platform offering attack surface visibility, AI insights & risk prioritization.
Automated IoT device security assessment tool with fuzzing & vuln testing.
Runtime tool that identifies truly exploitable open-source vulns in production.
Automated binary vulnerability analysis without source code for IT and OT/ICS.
AI platform that finds, triages, and auto-remediates vulnerabilities end-to-end.
CTEM execution platform unifying asset, vuln, and control data for exposure mgmt.
Managed vuln scanning & remediation service covering enterprise IT environments.
Managed DAST service scanning web apps and APIs for vulnerabilities.
Centralized VM platform for product security teams with SBOM and compliance support.
Autonomous pentesting platform that discovers, exploits & maps attack paths.
Integrated bug bounty, pentest, feature testing & VDP platform.
Managed bug bounty platform with triage, validation, and flat-fee pricing.
Managed VDP for receiving, triaging & responding to researcher vuln reports.
Vulnerability & threat mgmt platform with managed remediation services.
VMaaS platform unifying cloud, endpoint & OT vuln scans with CVE prioritization.
On-demand cyber posture assessment and threat exposure management tool.
Next-Gen VM platform for vulnerability mgmt and attack surface management.
VM platform combining ASM, vuln scanning, and phishing simulation.
VM platform covering network scanning, web app security, and phishing simulation.
662 tools across 5 specializations · 309 free, 353 commercial
Bug Bounty Platforms
Bug bounty platforms that connect organizations with security researchers for crowdsourced vulnerability discovery and responsible disclosure.
Exposure Management
Exposure management solutions for identifying, prioritizing, and remediating security exposures across the entire attack surface.
Penetration Testing
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
Common questions about Vulnerability Management tools, selection guides, pricing, and comparisons.
Vulnerability scanning is automated, runs continuously, and identifies known CVEs and misconfigurations across your infrastructure at scale. Penetration testing is manual, performed periodically (quarterly or annually), and involves skilled testers attempting to exploit vulnerabilities, chain findings, and demonstrate real-world impact. Scanning finds what is vulnerable; pen testing proves what is exploitable.
Prioritize based on exploitability and business impact, not just CVSS score. Consider: is there a known exploit in the wild (CISA KEV catalog), is the asset internet-facing, what data does it hold, and can the vulnerability be chained with others. Risk-based vulnerability management tools combine these factors to rank vulnerabilities by actual risk to your organization.
Vulnerability management focuses on identifying and patching software vulnerabilities (CVEs). Exposure management takes a broader view, encompassing vulnerabilities, misconfigurations, identity weaknesses, and attack path analysis to understand and reduce your overall exposure to attacks. It asks "how could an attacker reach our critical assets?" rather than just "what CVEs do we have?"