Home / Threat Defense / Vulnerability Management

Vulnerability Management

Proactively identify and fix security weaknesses to prevent cyber threats and protect your assets.

Try these 172 AI Vulnerability Management Tools

JS-Scan
Free

JS-Scan View JS-Scan

An automated web application security scanner that evaluates JavaScript library vulnerabilities and HTTP security headers to assess website security posture.

KICS
Free

KICS View KICS

Script to find exploits for vulnerable software packages on Linux systems using an exploit database.

Krypton
Free

Krypton View Krypton

A tool to find and search for registered CVEs, creating a local CVE database for offline use.

kube-hunter
Free

kube-hunter View kube-hunter

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

Lambda-Proxy
Free

Lambda-Proxy View Lambda-Proxy

A free and open-source tool for identifying vulnerabilities in Joomla-based websites.

LeakIX
Free

LeakIX View LeakIX

A comprehensive database of exploits and vulnerabilities for researchers and professionals

LinkedInt
Free

LinkedInt View LinkedInt

Cloud-based service for testing and analyzing Android and iOS apps for malware, vulnerabilities, and security threats.

Linkedin2username
Free

Linkedin2username View Linkedin2username

A comprehensive database of exploits and vulnerabilities for researchers and professionals

Linux Exploit Suggester 2
Free

Linux Exploit Suggester 2 View Linux Exploit Suggester 2

iOS application for testing iOS penetration testing skills in a legal environment.

Linux Exploit Suggester
Free

Linux Exploit Suggester View Linux Exploit Suggester

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

Linux Exploit Suggester (LES)
Free

Linux Exploit Suggester (LES) View Linux Exploit Suggester (LES)

A multithreaded vulnerability scanner for web-based applications

Linux Soft Exploit Suggester
Free

Linux Soft Exploit Suggester View Linux Soft Exploit Suggester

A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

MCIR
Free

MCIR View MCIR

A tool for scanning and identifying potential security risks in GitHub organizations, users, and repositories.

MetaHub
Free

MetaHub View MetaHub

The Node.js Bug Bounty Program is a program aimed at identifying and fixing security vulnerabilities in the Node.js ecosystem.

Metasploitable3
Free

Metasploitable3 View Metasploitable3

Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.

Mobile Sandbox
Free

Mobile Sandbox View Mobile Sandbox

SecurityVulnerability.io simplifies the process of collecting, enriching, and presenting vulnerability information for both human and machine consumption.

Nessus Professional
Free

Nessus Professional View Nessus Professional

A tool that checks for hijackable packages in NPM and Python Pypi registries

NMAP
Free

NMAP View NMAP

A tool to run YARA rules against node_module folders to identify suspicious scripts

Node.js Bug Bounty Program
Free

Node.js Bug Bounty Program View Node.js Bug Bounty Program

A non-profit organization focused on improving the security of software through resources and training.

NoSQLMap
Free

NoSQLMap View NoSQLMap

A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.