Best Zenmap Alternatives in 2025
Find the top alternatives to Zenmap currently available. Compare ratings, reviews, pricing, and features of Zenmap alternatives in 2025. Slashdot lists the best Zenmap alternatives on the market that offer competing products that are similar to Zenmap. Sort through Zenmap alternatives below to make the best choice for your needs
-
1
Kiuwan
11 RatingsSecurity Solutions for Your DevOps Process Automate scanning your code to find and fix vulnerabilities. Kiuwan Code Security is compliant with the strictest security standards, such OWASP or CWE. It integrates with top DevOps tools and covers all important languages. Static application security testing and source analysis are both effective, and affordable solutions for all sizes of teams. Kiuwan provides a wide range of essential functionality that can be integrated into your internal development infrastructure. Quick vulnerability detection: Simple and quick setup. You can scan your area and receive results in minutes. DevOps Approach to Code Security: Integrate Kiuwan into your Ci/CD/DevOps Pipeline to automate your security process. Flexible Licensing Options. There are many options. One-time scans and continuous scanning. Kiuwan also offers On-Premise or Saas models. -
2
Crashtest Security
Crashtest Security
€35 per month 5 RatingsCrashtest Security, a SaaS-based security vulnerability scanner, allows agile development teams to ensure continuous security even before reaching Production. Our state-of the-art dynamic application security test (DAST), integrates seamlessly into your development environment and protects multipage and JavaScript applications, as well microservices and APIs. Crashtest Security Suite can be set up in minutes. You will also have advanced crawling options and the ability to automate your security. Crashtest Security can help you keep your code and customers safe by allowing you to see vulnerabilities in the OWASP Top 10. -
3
Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
-
4
Runecast
Runecast Solutions
Runecast is an enterprise IT platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. Your team can do more with less via a single platform that checks all your cloud infrastructure, for increased visibility, security, and time-saving. Security teams benefit from simplified vulnerability management and regulatory compliance, across multiple standards and technologies. Operations teams are able to reduce operational overheads and increase clarity, enabling you to be proactive and return to the valuable work you want to be doing. -
5
Arachni
Arachni
Arachni is a Ruby framework that allows administrators and penetration testers to evaluate the security of modern web applications. It is modular, feature-rich, and high-performance. It is free and open-source, so you can review the source code. It is multi-platform and supports all major operating systems (MS Windows OS X, Mac OS X, and Linux). It is distributed via portable packages that allow for immediate deployment. It can be used for a variety of purposes, including a command-line scanner utility, a global high-performance grid of scanners, a Ruby library that allows for scripted audits, and a multi-user multiscan web collaboration platform. Its simple REST API makes integration easy. It can also support complex web applications that make heavy use JavaScript, HTML5, DOM manipulation, and AJAX thanks to its integrated browser environment. -
6
Nmap is an open-source software project that aims to dispel the stereotype of poorly documented open-source software. It provides a comprehensive set documentation for installing and using Nmap. This page links to Insecure.Org documentation as well as generous contributions by other parties. Nmap Network Scanning, the official guide to Nmap Security Scanner is a free and open source utility that millions of people use for network discovery, administration and security auditing. This book is suitable for all levels of security and networking professionals, from beginners to advanced hackers to explaining basic port scanning techniques. The 42-page reference guide explains each Nmap option and feature, while the rest of this book shows how to use those features to solve real-world problems. Diagrams and examples show real communication over the wire.
-
7
urlscan.io
urlscan.io
$500 per monthurlscan.io offers a free service for scanning and analyzing websites. When a URL has been submitted to urlscan.io an automated process will browse the URL as if it were a regular user, and record any activity created by this page navigation. This includes the domains, IPs, and resources (JavaScripts, CSSs, etc.). The information requested from these domains as well as the page itself is also included. urlscan.io takes a screenshot of the webpage and records the DOM, JavaScript global variables and cookies created by the site, among other observations. If the site targets users of any of the 900+ brands tracked by urlscan.io then it will be highlighted in the scan results as potentially malicious. Our mission is to enable anyone to confidently and easily analyze unknown and potentially malignant websites. You can use urlscan.io in the same way you would use malware sandboxes to analyze suspicious files. -
8
Scuba Database Vulnerability Scanner. Scuba is a free tool that reveals hidden security risks. Check enterprise databases for potential vulnerabilities and misconfigurations. Know the risks to your database. Get advice on how to address identified issues. Scuba is available for Windows, Mac and Linux (x32) and Linux (x64). It offers over 2,300 assessment tests for Oracle and Microsoft SQL, SAP Sybase and IBM DB2 as well as MySQL. Scuba scans enterprise databases for security flaws and configuration flaws. It is free and allows you to identify potential security risks. It contains more than 2,300 assessments for Oracle, Microsoft SQL Server and SAP Sybase. Scuba scans can be performed from any Windows, Mac, or Linux client. A typical Scuba scan takes between 2 and 3 minutes depending on the size of your database, users, groups, and network connection. There are no other requirements or pre-installation.
-
9
WebReaver
Websecurify
WebReaver is an easy-to-use, fully-automated web application security security test tool for Mac, Windows, and Linux. It is suitable for both novice and advanced users. WebReaver lets you quickly test any web application for a wide range of vulnerabilities, including SQL Injection, local or remote file Includes, command Injection and cross-site scripting. You can also test for the less serious ones like information leakage, variety of session and headers problems, and more. Automated security testing technologies such as those that rely on scanning, fuzzyzing, and sending arbitrary malicious information to detect security defects can cause serious damage to the web applications they are being used against. It is recommended that automated tests be performed only against systems in pre-production, testing, or demo environments. -
10
garak
garak
FreeGarak checks to see if we can make an LLM fail in a manner that we don't like. Garak checks for hallucinations, data leakage and prompt injection, misinformation generation, toxicity, jailbreaks and other weaknesses. We love developing garak and are always looking to add new features. Garak is a command line tool. It's developed for Linux and OSX. You can download it from PyPI. The standard pip versions of garak are updated periodically. Garak has its dependencies. You can install garak within its own Conda environment. Garak needs to know which model to scan. By default, it will use all the probes that it knows to scan the model using the vulnerability detectors suggested by each probe. Garak will print progress bars for each probe as it generates. Once the generation has been completed, a row will be displayed evaluating each probe's results for each detector. -
11
Indusface WAS
Indusface
$49 per monthGet the most thorough application security audit today. With its automated scans and manual pen-testing, Indusface WAS ensures that no OWASP Top10, business intelligence vulnerabilities or malware are missed. Indusface web app scanning guarantees developers that they can quickly fix vulnerabilities. This proprietary scanner was built with single-page applications and js frameworks in mind. It provides intelligent crawling and complete scanning. Get extensive web app scanning for vulnerabilities and malware using the most recent threat intelligence. For a thorough security audit, we can provide support on a functional understanding to identify logical flaws. -
12
VulnSign is an online vulnerability scan that is fully automated, configurable by customers and offers advanced features. VulnSign can scan all types of web applications, regardless of their technology. It uses a Chrome-based crawling engine to identify vulnerabilities in legacy, custom-built, modern HTML5, Web 2.0, and Single Page Applications (SPA) applications. It also offers vulnerability checks for popular frameworks. VulnSign's vulnerability scanner is easy to use. Most of the pre-scan configuration can also be automated. It's a complete vulnerability management solution that supports multiple users and integrates well with other systems. To test it, you only need to specify the URL and credentials (to scan password-protected websites) and launch a vulnerability scanner.
-
13
Hakware Archangel
Hakware
$100 3 RatingsHakware Archangel, an Artificial Intelligence-based vulnerability scanner and pentesting instrument, is called Hakware Archangel. The Archangel scanner allows organizations to monitor their systems, networks, and applications for security flaws with advanced Artificial Intelligence continuously testing your environment. -
14
Infiltrator
Infiltration Systems
Infiltrator, a free, intuitive, and easy-to-use network security scanner, can quickly scan your network computers for vulnerabilities, exploits, or information enumerations. Infiltrator allows you to catalog a wide range of information about scanned computers, including installed software, shared files, users, drives and hotfixes. It also provides information on NetBios, SNMP information, open ports, and other information. Infiltrator will audit each computer's security policies and passwords, and alert you when necessary changes should be made. The report generator can generate a clean, easy-to-read report from all results. Infiltrator includes over 15 powerful network utilities that allow you to scan, scan, enumerate, and gain access to machines. You will also find utilities such as ping sweep, whois searchups, email trace, brute force cracking tools and share scanning. Network enumerating is also included. -
15
Intruder
Intruder
Intruder, an international cyber security company, helps organisations reduce cyber exposure by providing an easy vulnerability scanning solution. The cloud-based vulnerability scanner from Intruder finds security holes in your digital estate. Intruder protects businesses of all sizes with industry-leading security checks and continuous monitoring. -
16
Alibaba Cloud Security Scanner
Alibaba
Cloud Security Scanner uses data, white-hat penetration testing, machine learning, and machine learning to provide a comprehensive security solution for domains, websites, and other online assets. To protect your brand reputation and prevent financial loss, CSS can detect web vulnerabilities, illicit content, website destruction, and backdoors. Cloud Security Scanner thoroughly detects all risks to your website, online assets, and web vulnerabilities. It also detects weak passwords, website defacement and Trojan attacks. The system scans all source codes, text, images, and other data for vulnerabilities. WTI developed the system through penetration testing. WTI has integrated multi-layer verification rules to ensure high vulnerability detection accuracy. To accurately detect content risks, the system uses model-based analysis and comprehensive decision making. Ask our experts any questions regarding the scanning results. -
17
Nikto
CIRT.net
Nikto, an Open Source (GPL), web server scanner, performs extensive tests against web servers for multiple items. It checks for over 6700 potentially hazardous files/programs, outdated versions of more than 1250 servers, as well as version-specific problems on more than 270 servers. It will also check for server configuration items, such as multiple index files and HTTP server options. It will also attempt to identify any installed web servers or software. Scan items and plugins can be automatically updated. Nikto is not intended to be a stealthy tool. It will quickly test a web server and make it visible in log files and to an IPS/IDS. If you're interested in giving it a shot (or testing your IDS system), LibWhisker supports anti-IDS methods. While not all checks are a security issue, most are. -
18
ManageEngine Vulnerability Manager Plus
ManageEngine
$695 per user per yearSoftware for enterprise vulnerability management. Vulnerability manager Plus is an integrated threat management software that provides comprehensive vulnerability scanning, assessment and remediation across all endpoints within your network from a single console. You can scan and find vulnerable areas on all your remote and local office endpoints, as well as roaming devices. Use attacker-based analytics to identify areas most likely to be exploited. Reduce the risk of security loopholes being exploited in your network and prevent new ones from developing. Prioritize vulnerabilities based upon their vulnerability, severity, age, affected systems count, and the availability of a fix. You can download, test, and automatically deploy patches to Windows, Mac, Linux and more than 250 third-party apps with an integrated patching module, all without additional cost. -
19
BurpGPT
Aegis Cyber Ltd
$100.07 per yearBurpGPT, our Burp Suite Extension, integrates OpenAI’s LLMs to provide advanced vulnerability scanning and traffic based analysis. It also supports local LLMs including custom-trained, ensuring greater privacy and more accurate outcomes according to your needs. With user-friendly documentation, you can easily integrate Burp GPT in your security testing workflows. Burp GPT was developed by application security experts and represents the cutting edge of web security testing. Burp GPT is constantly improved based on feedback from users, ensuring that it meets changing security testing needs. Burp GPT was developed to improve the efficiency and precision of application security testing. Its intuitive interface and advanced language processing capabilities enhance security testing for both novices and experienced testers. BurpGPT allows you to perform complex technical tasks. -
20
It scans web sites and web apps to identify and analyze security vulnerabilities. Network Scanner identifies and assists in fixing network vulnerabilities. It analyzes the source code to identify and fix security flaws and weak points. This online tool allows you to evaluate your company's compliance with GDPR. Your employees will benefit from this unique learning opportunity and you can avoid the increasing number of phishing attacks. Consulting activity to assist companies with management, control, and risk evaluation.
-
21
Brakeman
Brakeman
Brakeman is a security scanner for Ruby on Rails applications. Brakeman scans your application's source code, which is a different approach to other web security scanners. Brakeman does not require you to set up your entire application stack in order to use it. Brakeman scans your application code and generates a report detailing all security issues found. Once Brakeman is installed, it doesn't require any configuration or setup. Simply run it. Brakeman is a program that only requires source code. You can create a new application using rails new and then run Brakeman to check it. Brakeman doesn't rely on spidering sites for all pages. This allows it to provide a more comprehensive coverage of an application. This includes pages that may not yet be live. Brakeman can detect security flaws before they are exploitable. Brakeman was specifically designed for Ruby on Rails applications. It can check configuration settings for best practice. -
22
PHP Secure
PHP Secure
PHP Secure is an online code scanner that scans your PHP code to find critical security vulnerabilities. Online scanner for free: - Quickly find web app vulnerabilities - Provides explicit reports and recommends fixes for vulnerabilities - No special knowledge is required to use the product. - Reduces risks, saves money, and increases productivity PHP Secure Scanner can be used to analyze sites built on Php, Laravel framework, CMS Wordpress Drupal and Joomla. PHP Secure detects and blocks the most dangerous and common types of attacks. -SQL injection vulnerabilities Command Injection -Cross-Site Scripting (XSS) Vulnerabilities -PHP Serialize Injections Remote Code Executions -Double Escaping -Directory Crossing ReDos (Regular Expression of Denial of Services) -
23
Pentest-Tools.com
Pentest-Tools.com
$85 per monthGet a hacker’s perspective on your web apps, network, and cloud. Pentest-Tools.com helps security teams run the key steps of a penetration test, easily and without expert hacking skills. Headquartered in Europe (Bucharest, Romania), Pentest-Tools.com makes offensive cybersecurity tools and proprietary vulnerability scanner software for penetration testers and other infosec pros. Security teams use our toolkit to identify paths attackers can use to compromise your organization so you can effectively reduce your exposure to cyberattacks. > Reduce repetitive pentesting work > Write pentest reports 50% faster > Eliminate the cost of multiple scanners What sets us apart is we automatically merge results from our entire toolkit into a comprehensive report that’s ready to use – and easy to customize. From recon to exploitation, automatic reports capture all your pivotal discoveries, from attack surface exposures to big “gotcha” bugs, sneaky misconfigs, and confirmed vulnerabilities. -
24
Frontline.Cloud
Fortra
Digital Defense is a cloud native company. The Cloud platform continues to provide organizations with a robust and easy-to-use security solution that can be trusted to deliver unsurpassed results. It also reduces the administrative burden associated premise or hybrid solutions. Digital Defense was the original SaaS security platform. This was long before cloud security services were popular and before other companies had the chance to adopt it. Frontline.Cloud security Software as a Service (SaaS), supports multiple systems, including Frontline Vulnerability Management™, Frontline Pen Testing™, Frontline Pen Test™, Frontline Web Application Scanning™, Frontline WAS™, and a new offering Frontline Active Sweep(Frontline ATS™. -
25
Mageni
Mageni Security
$39 per monthMageni offers a free vulnerability scanning platform and management platform that will help you find, prioritize, remediate, and manage vulnerabilities. -
26
VulScan
RapidFire Tools, a Kaseya Company
$99 per monthDiscover, prioritize, and manage internal and exterior vulnerabilities. VulScan's vulnerability scanning helps you harden your networks and protect them against evolving threats. VulScan provides a powerful tool to automate and complete vulnerability scanning. It detects and prioritises the weaknesses that hackers could exploit, empowering users to harden networks and create an extra layer of security. Flexible network scanning options will help you protect the networks that you manage. Vulscan offers on-premise internal network scanners, computer based discovery agents, remotely internal scanning via proxy, and hosted external scans for comprehensive vulnerability management. -
27
HostedScan
HostedScan
$ 29 per month 1 RatingSecurity risks can be identified by scanning networks, servers, or websites. Dashboards, alerts, and reporting can help you manage your risks. Schedule vulnerability management into your information security program. Alert your team immediately if a new port is opened or a new threat is identified. Reduce the noise. Only new or unexpected risks will be alerted. Run scans on targets and programmatically get the results. HostedScan can be embedded into your products and services. -
28
SecurityMetrics Perimeter Scan
SecurityMetrics
$99.00/one-time Comprehensive Vulnerability Assessment for Network Security. Vulnerability scans and network scanners can identify top cybersecurity risks like misconfigured firewalls, malware hazards and remote access vulnerabilities. They can be used to help with cyber security and compliance mandates such as PCI Compliance (PCI DSS), and HIPAA. You can add and remove targets using your Perimeter Scan Portal. Mass uploading scan targets and groups can be done. To make it easier to manage scan targets by location, network type or unique circumstances in your organization, you can group and label them. You can run port scans on the most sensitive targets more often, test in scope PCI targets every quarter, or test designated IPs following changes to your network. Vulnerability scanning reports include the target, vulnerability type, and service (e.g. https, MySQL, etc.). ), and the severity (low, medium, or high) of each vulnerability. -
29
Edgescan
Edgescan
Validated web application vulnerability scanning available on-demand, whenever you need it, and scheduled as frequently as you need. Our rich dashboard provides superior security intelligence and allows for continuous validation, trending, and metrics. The vulnerability scanning and validation service can be used as often as you wish. Retest on-demand. Edgescan can also notify you via SMS/email/Slack and Webhook if a vulnerability is discovered. Server Vulnerability Assessment (Scanning & Validation) covers over 80,000 tests. This tool is designed to ensure that your deployment, whether it's in the cloud or on-premise, is secure and securely configured. Experts validate and rate vulnerabilities and make them available via the dashboard for reporting and tracking. Edgescan is an approved scanning vendor (ASV) and provides continuous, verified vulnerability assessments. This exceeds the requirements of the PCI DSS. -
30
OpenVAS
Greenbone Networks
OpenVAS is a fully-featured vulnerability scanner. It can perform unauthenticated and authenticated testing as well as various high-level and lower-level industrial protocols. Performance tuning is available for large-scale scans. There is also an internal programming language that can be used to implement any vulnerability test. The scanner retrieves the tests to detect vulnerabilities from a feed with a long history and daily update. OpenVAS was developed by Greenbone Networks and has been moving forward since 2006. The scanner is part of the commercial vulnerability management product Greenbone Enterprise Appliance. It forms the Greenbone Vulnerability Management along with other Open Source modules. -
31
ScanFactory
ScanFactory
$50ScanFactory provides real-time security monitoring of all external assets. It uses 15+ of the most trusted security tools and a large database of exploits to scan the entire network infrastructure. Its vulnerability scanner stealthily maps your entire external attack surface and is extended with top-rated premium plugins, custom wordslists, and a plethora vulnerability signatures. Its dashboard allows you to review all vulnerabilities that have been sorted by CVSS. The dashboard also contains enough information to reproduce, understand, and remediate the issue. It can also export alerts to Jira and TeamCity, Slack, and WhatsApp. -
32
Nsauditor Network Security Auditor
Nsasoft
$69 one-time payment 1 RatingNsauditor network security auditor is a powerful tool that scans networks and hosts for potential vulnerabilities and provides security alerts. Vulnerability Scanning Software and Network Security Auditing Software Nsauditor network auditor scans the enterprise network for any possible hacker methods and generates a report. Network Security Auditing Software, Vulnerability Scaner Network Security Auditing Software, and VulnerabilityScanner Nsauditor Network Auditing Software significantly reduces the cost of managing enterprise networks. This software allows IT personnel and system administrators to gather information from all computers on the network without installing any server-side programs and creates a report detailing potential problems. -
33
Hacker Target
Hacker Target
$10 per monthHosted vulnerability scanners simplify the security assessment process. From vulnerability identification to attack surface discovery, host vulnerability scanners provide actionable network intelligence that can be used for IT and security operations. Proactively search for security weaknesses. From vulnerability identification to attack surface discovery, pivot. Trusted open-source tools can help you find security holes. Access tools used by security professionals and penetration testers around the globe. Analyze vulnerabilities from an attacker's perspective. Simulating real-world security events, testing vulnerabilities, and incident response. Open source intelligence and tools can help you discover the attack surface. Improved visibility will help protect your network. Last year, over 1 million scans were performed. Since 2007, our vulnerability scanners have been launching security packets. You must find security problems to fix them. Identify the problem, remediate the risk, and then test again to confirm. -
34
Website security is made easy by automatically detecting and fixing threats. Protect your website, reputation, visitors, and website from cyberthreats automatically Comprehensive website security software protects you website from malicious cyber threats. This includes protection for your website code and web applications. You will receive website scans daily, automated malware removal and vulnerability/CMS patches. There will also be a web application firewall that blocks harmful traffic from reaching your site. Our website security scan instantly scans your website for malware, viruses, and other cyber threats. It also alerts you to any issues. Your website will be protected from malicious content by automatically detecting it and removing it. Our vulnerability scanner allows you to quickly check for vulnerabilities in your CMS before they are exploited.
-
35
Security Rangers
Security Rangers
Our security tools and integrations will save you time and protect you from vulnerabilities. Our Security Rangers can help you with any questions. Our Security Rangers will help you complete your certification. Our industry knowledge and professional partnerships will help you get the best policies. We can also help you tailor them for your company and team. Your team will be assigned a Security Ranger. We will guide you through the process of implementing policies and controls, gathering proof, and maintaining compliance. Our automated scans and certified penetration testers can detect vulnerabilities. Continuous vulnerability scanning is the best way to protect your data without compromising deployment and speed to market. -
36
DigitSec S4
DigitSec
S4 enables Salesforce DevSecOps to be established in the CI/CD pipeline within less than an hour. S4 empowers developers with the ability to identify and fix vulnerabilities before they reach production, which could lead to data breaches. Secure Salesforce during development reduces risk, and speeds up deployment. Our patented SaaS Security scanner™, S4 for Salesforce™, automatically assesses Salesforce's security posture. It uses its full-spectrum continuous app security testing (CAST), platform that was specifically designed to detect Salesforce vulnerabilities. Interactive Runtime Testing, Software Composition Analysis and Cloud Security Configuration Review. Our static application security testing engine (SAST) is a core feature in S4. It automates scanning and analysis for custom source code within Salesforce Orgs including Apex, VisualForce and Lightning Web Components and related-JavaScript. -
37
StackHawk
StackHawk
$99 per monthStackHawk checks your services, APIs, and applications for security vulnerabilities. It also looks for exploitable open-source security bugs. Today's engineering teams rely on automated test suites in CI/CD. Why should application security be any other? StackHawk was designed to find vulnerabilities in your pipeline. Built for developers is more that a slogan. It is the ethos behind StackHawk. Application security has changed left. Developers need a tool to review and fix security issues. StackHawk allows application security to keep up with today's engineering teams. You can quickly find vulnerabilities in pull requests and push out fixes while the security tools of yesterday are still waiting for you to run a manual scan. Developers love this security tool, powered by the most widely used open-source security scanner. -
38
Probely is a web security scanner for agile teams. It allows continuous scanning of web applications. It also lets you manage the lifecycle of vulnerabilities found in a clean and intuitive web interface. It also contains simple instructions for fixing the vulnerabilities (including snippets code). Using its full-featured API it can be integrated into development pipelines (SDLC) or continuous integration pipelines, to automate security testing. Probely empowers developers to become more independent. This solves the security team's scaling problem that is often undersized compared to development teams. It provides developers with a tool to make security testing more efficient, which allows security teams to concentrate on more important activities. Probely covers OWASP TOP10, thousands more, and can be used for checking specific PCI-DSS and ISO27001 requirements.
-
39
ZeroPath
ZeroPath
AI-powered code scanning can be used to identify and fix broken authentications, logic bugs, outdated dependency, and much more. ZeroPath is easy to set up and provides continuous human-level application protection, PR reviews, etc. ZeroPath can be set up in less than 2 minutes with your existing CI/CD. Supports Github GitLab and Bitbucket. ZeroPath reports fewer false-positives and finds more bugs than comparables. Find broken authentication and logic bugs. ZeroPath releases a press release instead of reporting bugs when it is confident that it will not break your application. Make sure your products are secure, without slowing development. -
40
BinaryEdge
BinaryEdge
$10 per monthWe scan the internet and create threat intelligence streams that are real-time. Reports that show what is connected to it are also created. What is your Internet Attack Surface There are many internet-exposed assets that organizations have, some of which they don't even know exist. Every day, hackers are able to target more companies because they expose their servers and services online. The complexity of today's rapidly growing universe of sensors, cloud, remote access and IoT devices has made it difficult to secure these services without constant monitoring from both within and outside the organization. To acquire, classify, and correlate different types data, we have created a distributed platform of honeypots and scanners. All of these datapoints are used to match digital assets to organizations, allowing us a global view of all known and unknown assets. -
41
Wiz
Wiz
Wiz is a new approach in cloud security. It finds the most important risks and infiltration vectors across all multi-cloud environments. All lateral movement risks, such as private keys that are used to access production and development environments, can be found. You can scan for vulnerabilities and unpatched software in your workloads. A complete inventory of all services and software within your cloud environments, including version and package details, is available. Cross-reference all keys on your workloads with their privileges in your cloud environment. Based on a complete analysis of your cloud network, including those behind multiple hops, you can see which resources are publicly available to the internet. Compare your industry best practices and baselines to assess the configuration of cloud infrastructure, Kubernetes and VM operating system. -
42
Intelligent Discovery
Ldaptive
$199 per monthIntelligent Discovery makes it easy to manage your AWS security. Our industry-leading AWS vulnerability scanning tool and remediation tool allow you to quickly identify potential threats without slowing down your infrastructure. You can prevent attackers from exploiting weaknesses by proactively identifying, resolving and mitigating security threats using a user-friendly interface. Automate Security Auditing, Security Log Management and Customize Controls, plus many other features! -
43
Vega
Subgraph
Vega is able to help you identify and validate SQL Injection, cross site scripting, inadvertently revealed sensitive information, as well as other vulnerabilities. It runs on Linux, OS X and Windows. Vega can help identify vulnerabilities such as reflected cross-site, stored cross-site, blind SQL injections, remote file include, and shell injection. Vega can also check for SSL security settings and identify opportunities to improve the security of your TLS server. Vega also includes an automated scanner that can perform quick tests, and an intercepting proxy that can be used for tactical inspection. The Vega scanner detects SQL injection and other vulnerabilities. Vega has a website crawler that powers its automated scanner. Vega can log in to websites automatically when provided with user credentials. -
44
Qwiet AI
Qwiet AI
FreeThe Fastest Code Analysis. 40X faster scan speeds so developers don't have to wait long for results after submitting a pull request. The Most Accurate Result. Qwiet AI is the only AI with the highest OWASP benchmark score. This is more than triple the commercial average, and more than twice the second highest score. Developer-Centric Security Processes. 96% of developers say that disconnected security and developer workflows hinder their productivity. Implementing developer-centric AppSec workflows decreases mean-time-to-remediation (MTTR), typically by 5X - enhancing both security and developer productivity. Automated Business Logic Flaws in Dev. Identify vulnerabilities unique to your codebase before they reach production. Achieve compliance. Maintain and demonstrate compliance with privacy and security regulations such as SOC 2 PCI-DSS GDPR and CCPA. -
45
Defense.com
Defense.com
$30 per node per monthCyber threats can be controlled. Defense.com helps you identify, prioritize, and track all security threats. Cyber threat management made easier. All your cyber threat management needs are covered in one place: detection, protection, remediation and compliance. Automated tracking and prioritized threats help you make intelligent decisions about your security. Follow the steps to improve your security. When you need help, consult with experienced cyber and compliance experts. Easy-to-use tools can help you manage your cyber security and integrate with your existing security investments. Live data from penetration tests and VA scans, threat information, and other sources all feed into a central dashboard that shows you where your risks are and how severe they are. Each threat has its own remediation advice, making it easy for you to make security improvements. You will receive powerful threat intelligence feeds that are tailored to your attack surface. -
46
PDQ Detect
PDQ
$18/device Avoid wasting your time on vulnerabilities which will not have a meaningful impact on your organization. PDQ Detect prioritizes the highest-risk vulnerabilities to help you secure your Windows Apple and Linux devices. Get your continuous remediation program rolling by: 1. Full visibility of the attack surface -- Scan your on-prem assets, remote assets, and internet-facing resources to gain full visibility in real-time. 2. PDQ Detect is a machine-learning-based tool that prioritizes risks based on context. 3. Effective remediation and reporting -- Get clear remediation measures, prioritized according to impact and exploitability. Use automated or custom reports. -
47
Hacker AI
Hacker AI
FreeHacker AI is an artificial Intelligence system that scans source code for security vulnerabilities that could be exploited or hacked by hackers. Organizations can identify these vulnerabilities and take steps to fix them or prevent security breaches. Hacker AI was created by a French company located in Toulouse, which uses a GPT-3 method. Please zip your project source code and upload it. You will receive the vulnerability report via email within 10 minutes. Hacker AI is still in beta and the results it produces are not useful without guidance from a cybersecurity expert with code analysis background. We don't sell or use your source code for malicious purposes. It is strictly used to detect vulnerabilities. You can request a non-disclosure agreement from us if necessary. A private instance can also be requested. -
48
Strobes RBVM
Strobes Security
$999Strobes is a one stop shop for security stakeholders to ensure their enterprise is protected against cyber attacks and security issues. From viewing all security threats for each asset in the dashboard, to supporting integrations using leading scanners and bug bounty tool tools, Strobes is your one-stop shop solution. -
49
OUTSCAN
Outpost24
Outpost24 Netsec solutions can be used to identify, categorize and manage network-attached Information Technology assets. They also report on security vulnerabilities like insecure system configurations and missing security updates. Customers can choose how often they want to assess their IT assets. Assessments are used to inform support operations teams about recommendations for remediation or mitigation. After the vulnerability has been fixed, users can re-evaluate the IT asset to confirm that it is still vulnerable. Security teams use the results to assess compliance and reduce enterprise risk. Customers of Outpost24 pay an annual subscription for Netsec. The service scope is determined by the number and frequency of IP addresses that need to be assessed and, optionally, the number of HIAB virtual devices that have been licensed. -
50
PT Application Inspector
Positive Technologies
PT Application Inspector is a source code analyzer that provides high-quality analysis and easy tools to automatically confirm vulnerabilities. This allows security specialists and developers to work more efficiently and speed up the process of creating reports. Combining static, dynamic, as well as interactive application security testing (SAST+ DAST+ IAST) yields unparalleled results. PT Application Inspector only identifies the real vulnerabilities, so you can concentrate on the issues that really matter. Special features such as automatic vulnerability verification, filtering and incremental scanning for each vulnerability, as well interactive data flow diagrams (DFDs) for each vulnerability, make remediation much faster. Reduce vulnerabilities in the final product, and reduce the cost of fixing them. Analyze the software at the very beginning of its development.