Home / Threat Intelligence and Detection / Vulnerability Scanning and Management

Vulnerability Scanning and Management

Proactive vulnerability scanning and management to detect and mitigate cyber threats effectively.

Try these 222 AI Vulnerability Scanning and Management Tools

Hubble
Free

Hubble View Hubble

Hubble is the Next-Generation Cyber Asset Visibility Platform, acquired by NetSPI in 2024, designed to overcome the limitations of legacy systems and incomplete CAASM solutions. It delivers a unified, actionable, and comprehensive view of all your assets and their interdependencies, enabling proactive vulnerability management and a significant reduction in threat exposure across your dynamic attack surface.

Comprehensive Cyber Asset Visibility
Unified Asset Inventory
Actionable Insights and Analytics
Infiltrate
Free

Infiltrate View Infiltrate

INFILTRATE is the premier deep-technical conference dedicated exclusively to the cutting edge of offensive security. This elite event showcases groundbreaking research and advanced techniques in computer and network exploitation, vulnerability discovery, and advanced malware protocols, offering unparalleled insights for practitioners. INFILTRATE rigidly prioritizes rigorous technical content over policy or high-level discussions, making it an essential gathering for offensive security professionals seeking the most advanced and thought-provoking knowledge.

Focus on advanced offensive security techniques
Groundbreaking research presentations
Exclusive computer and network exploitation methods
Informer
Free

Informer View Informer

Informer is a comprehensive attack surface management platform that seamlessly integrates continuous live asset discovery, automated vulnerability scanning, and expert penetration testing. Gain unparalleled visibility into your internet-facing assets, automate security testing with adjustable frequency, and receive real-time vulnerability data to accelerate remediation. Our expert penetration testing team complements the platform by performing in-depth assessments across external infrastructure, web applications, physical security, and social engineering tactics, empowering your organization to make faster, data-driven security decisions.

Continuous Live Asset Discovery
Automated Vulnerability Scanning
Expert-Led Penetration Testing (External, Web, Physical, Phishing)
INFRA Security & Vulnerability Scanner
Free

INFRA Security & Vulnerability Scanner View INFRA Security & Vulnerability Scanner

INFRA is a comprehensive and automated platform designed for advanced ethical hacking, vulnerability assessment, and penetration testing. Its intuitive interface supports the entire VAPT lifecycle, from initial information gathering and web application fuzzing to database scanning and automated exploitation. By streamlining complex security tasks, INFRA empowers organizations to proactively identify and mitigate vulnerabilities, ensuring robust cybersecurity posture and compliance.

Complete Vulnerability Assessment and Penetration Testing (VAPT)
Automated Information Gathering and Reconnaissance
Web Application Fuzzing and Analysis
Inspectiv
Free

Inspectiv View Inspectiv

Inspectiv provides a comprehensive, turn-key solution for continuous security vulnerability identification and assurance. By integrating intelligence from crowdsourced security testing and proprietary scanning, Inspectiv proactively uncovers application exploit threats and sensitive data exposures. Our dedicated, hands-on triage team validates all findings, offering real-time remediation guidance to empower security teams and significantly reduce organizational risk.

Continuous vulnerability management
Crowdsourced and proprietary scanning intelligence
Proactive threat identification
Interpres Security
Free

Interpres Security View Interpres Security

Interpres Security empowers CISOs and security practitioners to proactively reduce threat exposure through its automated Threat Exposure Management Platform. By analyzing the intricate interplay between adversarial tactics, defensive capabilities, and exploitable vulnerabilities, Interpres Security prioritizes critical actions and optimizes security environments for continuous exposure management. Acquired by CyberProof in 2024, Interpres Security's legacy continues to shape the future of advanced threat defense.

TTP-based threat intelligence operationalization
Automated continuous exposure monitoring
Dynamic analysis of defensive and adversarial capabilities
Intigriti
Free

Intigriti View Intigriti

Intigriti is Europe's premier bug bounty and vulnerability disclosure platform, uniting organizations with a vast global network of ethical hackers to proactively strengthen their cybersecurity defenses. Our innovative crowdsourced security model empowers businesses to uncover critical vulnerabilities often missed by traditional methods, leveraging the collective expertise of a diverse community. Intigriti's unique pay-for-results approach ensures cost-effectiveness, as you only compensate researchers for validated discoveries, driving efficient and impactful security testing.

Global community of ethical hackers
Proactive vulnerability discovery
Crowdsourced security programs
Intruder
Free

Intruder View Intruder

Intruder is a leading vulnerability management platform designed to automate the detection of security weaknesses across your web applications and infrastructure. By continuously scanning for misconfigurations, outdated software, and common vulnerabilities, Intruder empowers security teams to proactively strengthen their defenses and reduce their attack surface. Seamlessly integrate Intruder into your security workflow to gain clear, actionable insights and effectively manage your organization's cybersecurity posture.

Automated vulnerability scanning
Continuous security monitoring
Web application security assessment
IONIX
Free

IONIX View IONIX

IONIX, formerly Cyberpion, is a leading Attack Surface Management (ASM) solution leveraging Connective Intelligence to uncover and prioritize exploitable vulnerabilities across your entire digital footprint and its interconnected supply chain. Our innovative approach provides unparalleled visibility into every internet-facing asset and connection, focusing on the most critical risks to your business. IONIX empowers organizations with the tools for rapid remediation of exploitable threats, significantly reducing overall attack surface risk.

Connective Intelligence for comprehensive attack surface mapping
Discovery and continuous monitoring of all internet-facing assets
Prioritization of exploitable risks based on business impact
Irregular
Free

Irregular View Irregular

Irregular (formerly Pattern Labs) is the premier frontier security lab dedicated to fortifying advanced AI before deployment. We engineer next-generation defenses by simulating and monitoring real-world AI security scenarios through high-fidelity research platforms, proactively uncovering vulnerabilities and ensuring the safe, secure integration of increasingly powerful AI technologies into the market. By anticipating emerging threats, Irregular empowers organizations to confidently leverage AI, safeguarding against future risks.

Vulnerability discovery in advanced AI systems
Pre-release AI security fortification
High-fidelity AI security research platforms
Kali Linux
Free

Kali Linux View Kali Linux

Kali Linux is a leading Debian-based open-source operating system meticulously engineered for advanced information security professionals. It offers a comprehensive suite of pre-installed tools and utilities for penetration testing, security research, digital forensics, and reverse engineering, enabling IT and security teams to efficiently and effectively assess system vulnerabilities from initial reconnaissance to final reporting. Kali Linux significantly streamlines the setup and configuration process, allowing professionals to deploy and utilize powerful security tools immediately, optimizing workflows and enhancing operational readiness.

Extensive collection of security tools
Debian-based for stability and compatibility
Optimized for rapid deployment and use
Kenna Security
Free

Kenna Security View Kenna Security

Kenna Security, now part of Cisco, is a leading risk intelligence and vulnerability management platform designed to empower organizations with prioritized insights for effective remediation. By integrating vast amounts of vulnerability scan data from leading tools with multiple external threat intelligence feeds, Kenna provides a unified view of your actual risk exposure. This enables security teams to proactively identify and address the most critical vulnerabilities, significantly strengthening the company's overall security posture and reducing attack surface.

Risk-based prioritization of vulnerabilities
Integration with leading vulnerability scanners (Qualys, Nessus, Rapid7, etc.)
Enrichment with multiple threat intelligence feeds
Keysight Technologies
Free

Keysight Technologies View Keysight Technologies

Keysight Technologies empowers organizations to proactively secure their digital landscape with advanced breach and attack simulation (BAS) solutions. Built on decades of threat intelligence and security testing expertise, Keysight Threat Simulator enables continuous validation of network defenses by safely emulating real-world attack vectors within production environments. This allows security teams to precisely measure risk, identify vulnerabilities, and implement targeted remediation strategies to stay ahead of evolving cyber threats.

Breach and Attack Simulation (BAS)
Continuous Security Validation
Real-world Attack Emulation
Koi Security
Free

Koi Security View Koi Security

Koi Security provides a unified platform to gain complete control and visibility over all self-provisioned enterprise software. Specializing in managing the inherent risks of unmanaged software adoption, Koi empowers security teams to scan, assess, and enforce policies across any software ecosystem at scale. Our solution ensures your organization can leverage diverse software tools securely and efficiently, mitigating exploitation vulnerabilities discovered in marketplaces.

Unified Platform for Self-Provisioned Software Management
Organization-Wide Software Visibility and Assessment
Policy Enforcement Across All Software Ecosystems
KOS-CERT
Free

KOS-CERT View KOS-CERT

KOS-CERT serves as the national Computer Incident Response Team for the Republic of Kosovo, dedicated to fortifying the security of its electronic communication networks, services, and users. By proactively identifying and mitigating security threats, coordinating incident response, and disseminating timely vulnerability information, KOS-CERT empowers the nation to effectively navigate and overcome evolving cybersecurity challenges, ensuring a more secure digital landscape.

National Computer Incident Response Team for Kosovo
Safeguarding electronic communication networks and services
Protecting users within the Republic of Kosovo
Lansweeper
Free

Lansweeper View Lansweeper

Lansweeper is a comprehensive IT Asset Management platform designed to empower organizations with complete visibility and control over their IT environments. By providing accurate, real-time insights into every device, user, and software asset, Lansweeper enables businesses to proactively manage risks, optimize resource allocation, and bolster their cybersecurity posture. Its core strength lies in delivering the critical "see and secure" foundation essential for robust cyber hygiene and efficient IT operations.

Complete IT Asset Discovery
Real-time Network Monitoring
Software Inventory and Usage Tracking
LogicalTrust
Free

LogicalTrust View LogicalTrust

LogicalTrust is your dedicated partner in fortifying your digital defenses. Our expert security testing specialists meticulously identify vulnerabilities across your web applications, mobile apps, and critical infrastructure, providing actionable, step-by-step remediation guidance and strategic security posture improvements. We empower your organization to proactively combat evolving cyber threats and prevent costly breaches.

Comprehensive Website and Mobile Application Security Testing
Advanced Penetration Testing Services
In-depth Security Audits and Source Code Analysis
LUCY Security
Free

LUCY Security View LUCY Security

LUCY empowers organizations to proactively bolster their IT and cybersecurity defenses by simulating real-world threats. This comprehensive platform uniquely addresses both human vulnerabilities and system weaknesses through integrated phishing simulations, awareness training, and technology assessments. Leverage LUCY's intuitive templates and wizards, built upon extensive cybersecurity expertise, to rapidly deploy targeted campaigns and fortify your security posture against evolving cyber threats.

Comprehensive phishing simulation capabilities
Integrated cybersecurity awareness training modules
Advanced technology assessment tools
Malleum
Free

Malleum View Malleum

Malleum, formerly Red Canari, are premier specialists in penetration testing and comprehensive security assessments. We emulate sophisticated threat actor tactics, leveraging our deep research and intelligence-driven methodology to uncover hidden vulnerabilities. Our expert services are tailored to protect critical sectors like healthcare, finance, and defense, enabling proactive remediation and significantly reducing your organization's exposure to real-world cyber threats.

Advanced Penetration Testing
Sophisticated Vulnerability Discovery
Intelligence-Driven Methodology
Maveris
Free

Maveris View Maveris

Maveris, now part of Harmonia, is a leading IT and cybersecurity firm dedicated to empowering organizations to build secure digital foundations that rapidly advance their objectives. We specialize in delivering robust cybersecurity solutions, innovative digital transformation, advanced software engineering, and seamless infrastructure modernization. Our intelligence-driven cybersecurity approach equips clients to proactively identify threats, understand vulnerabilities, optimize defenses, and ensure swift incident response in an ever-evolving threat landscape.

Intelligence-Driven Cybersecurity
Digital Solutions & Transformation
Expert Software Engineering
Maze
Free

Maze View Maze

Maze empowers security teams to proactively address cloud vulnerabilities with advanced AI Agents. Mimicking expert security engineer workflows, Maze precisely identifies critical vulnerabilities, eliminates false positives, and streamlines remediation through one-click actions. Our platform injects essential context into security decision-making, fostering collaboration between security and engineering to demonstrably enhance your organization's risk posture and operational efficiency in cloud and application environments.

AI-powered vulnerability investigation and resolution
Replication of expert security engineer workflows
Accurate identification of critical vulnerabilities
Melius CyberSafe
Free

Melius CyberSafe View Melius CyberSafe

Melius CyberSafe delivers a world-class SaaS platform for continuous cybersecurity improvement. Our solution integrates advanced vulnerability scanning, penetration testing, and AI-driven brute force simulation to proactively identify and address risks. Beyond just detection, we provide actionable insights and automated patching assistance, ensuring your business remains protected against evolving cyber threats.

Continuous vulnerability scanning and penetration testing
AI-powered brute force attack simulation
Automated patching policy monitoring and assistance
Modux
Free

Modux View Modux

Modux is a leading provider of advanced cyber security services, specializing in cyber intelligence, analytics, and expert penetration testing. As a CESG-approved CHECK company, we deliver comprehensive security assurance for UK government accredited schemes, leveraging deep expertise from Big 4 and CESG-rooted backgrounds to identify critical vulnerabilities in applications and networks. Our elite red team, recognized globally for its extensive experience with FTSE 100 companies, simulates sophisticated attack vectors used by both external adversaries and insider threats, utilizing a blend of cutting-edge commercial and proprietary tools for unparalleled security assessments.

CESG-approved CHECK company for accredited security assurance
Expert penetration testing for applications and networks
World-class red team exercises simulating real-world threats
MrLooquer
Free

MrLooquer View MrLooquer

MrLooquer is a comprehensive asset discovery and attack surface management solution designed to provide organizations with a clear understanding of their internet-facing assets and associated risks. By automatically identifying and analyzing both IPv4 and IPv6 infrastructure, MrLooquer quantifies your organization's exposure to cyber threats and enables accurate risk management across your entire digital perimeter. Seamlessly integrate with cloud environments using lambda functions for continuous, automated analysis that empowers IT and security teams to enhance efficiency and collaboration.

Automated internet-wide asset discovery (IPv4/IPv6)
Comprehensive attack surface analysis
Accurate attack exposure quantification