Home / Threat Intelligence and Detection / Vulnerability Scanning and Management

Vulnerability Scanning and Management

Proactive vulnerability scanning and management to detect and mitigate cyber threats effectively.

Try these 222 AI Vulnerability Scanning and Management Tools

Eskive
Free

Eskive View Eskive

Eskive is a leading Brazilian cybersecurity awareness and education platform designed to empower users and fortify organizations against evolving cyber threats. By meticulously measuring collected data and transforming it into actionable insights, Eskive provides a strategic framework to mitigate human-factor risks. Our platform integrates advanced phishing simulations and diverse attack sensors to accurately identify user-based vulnerabilities and deliver comprehensive, didactic reports to management, illuminating your company's current security posture and susceptibility to specific attack vectors.

Comprehensive Cybersecurity Awareness Training
Realistic Phishing Simulation Capabilities
Advanced Attack Vector Assessment
ESNC
Free

ESNC View ESNC

ESNC provides advanced vulnerability management and real-time SAP security monitoring, empowering global enterprises to proactively identify, prioritize, and remediate SAP security risks. With a proven track record of discovering critical vulnerabilities impacting diverse SAP industry solutions, ESNC helps organizations protect sensitive business data and critical business processes from sophisticated cyber threats. Their expertise ensures robust application security and compliance, safeguarding your most valuable SAP assets.

Comprehensive SAP Vulnerability Management
Real-time SAP Security Monitoring
Prioritization of Security Tasks
Etalon Cyber
Free

Etalon Cyber View Etalon Cyber

Etalon Cyber delivers comprehensive cybersecurity, combining 24/7 AI-powered threat monitoring with expert manual penetration testing to proactively safeguard your digital assets. Our advanced detection algorithms and real-world attack simulations identify and mitigate vulnerabilities before they can be exploited, ensuring robust protection. Complement your security posture with our secure, cloud-based backup and instant recovery solutions, designed to protect your critical data against any unforeseen event.

24/7 AI-powered network monitoring
Real-time threat and vulnerability detection
Advanced detection algorithms
Exodus Intelligence
Free

Exodus Intelligence View Exodus Intelligence

Exodus Intelligence is the premier provider of exclusive zero-day vulnerability intelligence, offering in-depth exploit analysis, proactive defensive guidance, and critical vulnerability research trends. Our actionable vulnerability intelligence data feed delivers detailed insights into zero-day exploits, their associated risks, and expert-backed mitigation strategies, empowering organizations to proactively strengthen their security defenses. By combining the deep expertise of our seasoned research team with data from a robust external vulnerability research acquisition program, we deliver timely, accurate, and relevant security intelligence critical for informed decision-making and enhanced security posture.

Exclusive Zero-Day Vulnerability Intelligence
Actionable Exploits and Defensive Guidance
Proprietary Vulnerability Research
Exploit Database (EDB)
Free

Exploit Database (EDB) View Exploit Database (EDB)

The Exploit Database (EDB) is a comprehensive, CVE-compliant archive of publicly available exploits and associated vulnerable software, meticulously curated for penetration testers and vulnerability researchers. It serves as an invaluable repository of actionable exploit code and proof-of-concepts, distinct from advisories, enabling security professionals to rapidly acquire and utilize critical data for testing and validation. Maintained by Offensive Security, EDB is a non-profit public service dedicated to advancing information security.

CVE-compliant exploit archive
Publicly available exploits and vulnerable software
Focus on actionable exploit code and proof-of-concepts
Finite State
Free

Finite State View Finite State

Finite State empowers product security teams to proactively defend the critical devices we depend on daily. Our market-leading platform provides comprehensive software threat, vulnerability, and risk management for connected devices and embedded systems, including IoT, medical, and OT/ICS. We deliver cutting-edge cybersecurity solutions to ensure the resilience and security of your connected ecosystem.

Comprehensive Software Threat Assessment
Advanced Vulnerability Management
Holistic Risk Mitigation
FireCompass
Free

FireCompass View FireCompass

FireCompass is a comprehensive SaaS platform empowering CISOs and Security Teams with continuous attack surface assessment and management. By indexing the global internet, including deep, dark, and surface web layers, FireCompass uncovers your organization's complete digital footprint and identifies previously unknown external risks. Its advanced AI/ML algorithms, powered by a proprietary Big Data platform, deliver near real-time insights into shadow IT, external exposures, and third-party vendor risks, enabling proactive attack surface reduction.

Continuous External Attack Surface Management (EASM)
Global Internet Indexing (Surface, Deep, Dark Web)
Automated Asset Discovery and Inventory
Firmus
Free

Firmus View Firmus

Firmus is Malaysia's foremost provider of expert penetration testing services, meticulously assessing the resilience of your digital assets against sophisticated cyber threats. Our elite team employs advanced techniques, mirroring those of adversaries, to probe your network, infrastructure, and servers for exploitable weaknesses. We deliver actionable insights into vulnerabilities, the potential impact of exploitation, and adherence to security policies, empowering your organization to proactively fortify its defenses through our hybrid approach of automated and manual testing.

Comprehensive external and internal penetration testing
Expert simulation of real-world cyberattacks
In-depth vulnerability identification and analysis
Frenos
Free

Frenos View Frenos

Frenos is an AI-powered platform that simulates adversarial attack paths to proactively identify the most probable threats organizations face. By pinpointing effective adversary tactics, techniques, and procedures (TTPs), Frenos empowers cybersecurity teams to prioritize critical risk mitigation efforts, optimizing resource allocation and safeguarding valuable assets. Developed in collaboration with leaders from five critical infrastructure sectors, Frenos offers tailored solutions for securing all sixteen critical infrastructure sectors, protecting everything from financial systems to energy grids.

AI-driven adversarial attack path simulation
Identification of probable adversary TTPs
Prioritization of proactive risk mitigation
G DATA CyberDefense
Free

G DATA CyberDefense View G DATA CyberDefense

G DATA CyberDefense, the originator of antivirus software, provides comprehensive cybersecurity solutions for businesses of all sizes, critical infrastructures, and individual users globally. Leveraging state-of-the-art AI and expert services, we proactively identify network vulnerabilities, deliver award-winning security software, and offer robust protection against evolving cyber threats, including specialized training and incident response.

Proactive Threat Detection and Prevention
AI-Powered Security Software
Network Vulnerability Assessment
GFI Software
Free

GFI Software View GFI Software

GFI Software empowers IT professionals, system administrators, and executives to comprehensively monitor, manage, and secure their IT infrastructures. Our award-winning solutions address critical areas of network security, computer security, and email infrastructure management, ensuring robust protection against vulnerabilities, malware, and unauthorized access. From automated patching and vulnerability scanning to advanced email security, faxing, and document DRM, GFI enables organizations to achieve and maintain compliance while optimizing IT operations and safeguarding sensitive data.

Comprehensive IT infrastructure monitoring and management
Award-winning network and computer security solutions
Automated vulnerability scanning and patch deployment
Glasstrail
Free

Glasstrail View Glasstrail

Glasstrail empowers organizations to proactively identify and manage vulnerabilities within their attack surface, mitigating risks before they can be exploited by adversaries. By providing robust attack surface monitoring, clear board reporting, and streamlined cyber insurance underwriting, Glasstrail enhances organizational resilience. Elevate your security posture and achieve greater peace of mind knowing your defenses are fortified against emerging threats.

Comprehensive Attack Surface Monitoring
Actionable Vulnerability Management
Clear and Concise Board Reporting
GlitchSecure
Free

GlitchSecure View GlitchSecure

GlitchSecure provides continuous security testing to proactively identify and remediate vulnerabilities across your products and infrastructure. Our real-time, offensive security approach mimics malicious hacker tactics, ensuring your defenses are robust against emerging threats. Move beyond static, annual assessments to a dynamic, ongoing security posture that safeguards your evolving digital assets.

Real-time continuous security testing
Proactive vulnerability identification
Infrastructure and product security
Greenbone Networks
Free

Greenbone Networks View Greenbone Networks

Greenbone Networks provides a comprehensive enterprise vulnerability analysis solution designed to integrate seamlessly into your existing security and GRC strategies. The Greenbone Security Manager (GSM) offers robust Vulnerability Assessment, Vulnerability Intelligence, and Threat Management capabilities, supporting both dedicated and virtual appliance deployments. It proactively identifies policy and regulatory non-compliance, enhances third-party integrations, and leverages open standards to automate vulnerability lifecycle management and strengthen overall security posture.

Comprehensive Vulnerability Assessment and Management
Integrated Vulnerability Intelligence and Threat Management
Seamless GRC Strategy Integration
Guardian360
Free

Guardian360 View Guardian360

Guardian360 delivers comprehensive security intelligence for your applications and IT infrastructure through continuous, round-the-clock scanning and live reporting. Our platform ensures rapid detection of emergent vulnerabilities and provides immediate response from Intermax and Guardian360 security specialists, safeguarding your digital assets against evolving threats. Guardian360 integrates seamlessly with leading solutions like Resecurity for endpoint protection and ZenGRC for streamlined GRC, offering a unified approach to cybersecurity.

Continuous security scanning of applications and IT infrastructure
Real-time, live reporting for up-to-the-minute insights
24/7 network monitoring for comprehensive coverage
Hack The Box
Free

Hack The Box View Hack The Box

Hack The Box is the premier online platform for honing and validating penetration testing expertise. Engage with a global community of cybersecurity professionals through a continuously updated library of challenges, ranging from realistic simulations to Capture The Flag-style exercises. Elevate your team's capabilities through hands-on training, recruit top-tier talent, and discover cybersecurity service providers worldwide.

Extensive library of continuously updated practical hacking challenges
Simulates real-world penetration testing scenarios
CTF-style challenges for diverse skill development
HackerOne
Free

HackerOne View HackerOne

HackerOne is the leading platform for hacker-powered security, built by a team of passionate hackers and security leaders dedicated to making the internet safer. We empower organizations to proactively identify and remediate vulnerabilities by securely connecting them with a vast global community of ethical hackers. Leverage our industry-standard platform to receive comprehensive vulnerability reports, conduct discreet security assessments, and scale bug bounty programs to effectively defend against cyber threats before they are exploited.

Industry-standard hacker-powered security platform
Global ethical hacker community access
Secure vulnerability reporting and management
Hackuity
Free

Hackuity View Hackuity

Hackuity addresses the overwhelming challenge of managing enterprise software vulnerabilities, which remain a primary source of security incidents. This advanced technology solution unifies and normalizes disparate vulnerability data from all assessment tools, penetration tests, and audit results into a single, accurate cockpit. By orchestrating all security assessment practices and enriching findings with threat intelligence, Hackuity empowers cybersecurity professionals to proactively reduce cyber risk, significantly improve their security posture, and demonstrate tangible ROI.

Centralized vulnerability data aggregation
Normalization of diverse security tool outputs
Orchestration of automated and manual assessments
Hadrian
Free

Hadrian View Hadrian

Hadrian revolutionizes offensive security through advanced automation, delivering unparalleled speed and scalability. By emulating a hacker's mindset, Hadrian uncovers critical risks across an organization's entire digital attack surface, mapping vulnerabilities and providing actionable insights for robust defense. Move beyond scheduled, reactive testing; Hadrian's proactive, event-based scanning offers continuous security validation for thousands of digital assets, ensuring your defenses are always fortified against emerging threats.

Automated attack surface mapping
Continuous vulnerability scanning
Event-based security testing
Halo Security
Free

Halo Security View Halo Security

Halo Security is a leading external attack surface management (EASM) platform designed for speed, scalability, and comprehensive visibility into your internet-facing assets. Empowering security leaders, Halo Security provides a holistic solution to proactively identify and mitigate risks from an attacker's viewpoint, significantly strengthening your organization's overall external security posture. Backed by a team with a proven track record previously as TrustedSite Security, they offer robust solutions for attack surface management, penetration testing, and vulnerability scanning to a global customer base.

Comprehensive External Attack Surface Visibility
Scalable and Rapid Deployment
Attacker-Centric Risk Assessment
HashDit
Free

HashDit View HashDit

HashDit is a premier security solution dedicated to fostering a safe and trustworthy environment within the BNB Chain ecosystem. We empower both protocol users and smart contract developers with timely threat intelligence, meticulous code auditing, and instant project analysis to mitigate risks and enhance security.

Real-time Threat Intelligence
Comprehensive Smart Contract Auditing
Instant Project Risk Analysis
HeroDevs
Free

HeroDevs View HeroDevs

Ensure the continued security, compliance, and operational integrity of your deprecated open-source software with HeroDevs, the industry-leading provider of long-term support. We proactively safeguard your critical technologies against emerging threats and vulnerabilities long after official end-of-life, offering immediate remediation and expert guidance. Partner with HeroDevs, trusted by global leaders like Google and Microsoft, to maintain robust security and operational continuity for your essential, yet unsupported, open-source dependencies.

Long-Term Support for Deprecated Open-Source Software
Proactive Security Patching and Updates
Vulnerability Remediation and Risk Assessment
Holm Security
Free

Holm Security View Holm Security

Holm Security elevates vulnerability assessment by delivering a next-generation cloud-based platform designed for universal accessibility. Our Vulnerability Management Platform (VMP) proactively identifies and analyzes security weaknesses across networks, websites, and even human elements within your IT environment, empowering organizations to mitigate risks before they are exploited. Gain comprehensive control and actionable insights through user-friendly reports, intelligent prioritization, and integrated management tools, ensuring robust and continuous security posture.

Cloud-based Vulnerability Management Platform (VMP)
Network and website vulnerability assessment
Human vulnerability testing and risk analysis
Horizon3.ai
Free

Horizon3.ai View Horizon3.ai

Horizon3.ai revolutionizes security assessment by providing continuous, attacker-driven validation of your security posture. Our autonomous platform, NodeZero, proactively identifies exploitable vulnerabilities and ineffective controls without the need for manual configuration, agents, or consultants. By emulating real-world attack paths, we enable organizations to prioritize remediation efforts on the most critical security gaps and achieve true, ongoing security effectiveness.

Autonomous penetration testing and red teaming
Continuous security posture validation
Exploitable vulnerability identification