Find Vulnerability Scanning Tools by Security Workflow

Explore 128 published tools across 120 categories. Compare web application scanners, code analysis platforms, dependency scanners, API security tools, cloud security scanners, and network testing products in one searchable directory.

Published tools
128

A single place to research scanner categories, vendors, and product detail pages.

Security categories
120

Browse dedicated pages for DAST, SAST, SCA, API, container, cloud, and network security.

Why this page is different

Many search results lump very different security products together. This directory is organized around actual testing workflows, which makes it easier to compare like-for-like tools instead of mixing scanners with unrelated platforms.

Search the directory the way buyers search

Start with a vendor, product name, or scanner type, then move into category pages when you need a tighter comparison set.

Browse Popular Vulnerability Scanning Categories

Each category page focuses on a different security job, so you can compare products that solve the same problem instead of scanning through mixed lists.

AI & ML

Common search: AI & ML

Explore AI & ML vulnerability scanning and application security tools for testing web apps, APIs, and related environments. Compare products by deployment model, supported vulnerability types, compliance needs, …

AI Security Solutions

Common search: AI Security Solutions

Browse AI security solutions built to support vulnerability scanning and application security workflows. Compare tools for deployment fit, coverage, automation, and how well they align with development and …

API Discovery Tools

Common search: API Discovery Tools

API discovery tools help security and engineering teams identify APIs, monitor traffic, and reduce blind spots across modern application environments. Compare options based on discovery coverage, scanning approach, …

API Fuzzing

Common search: API Fuzzing

Browse API fuzzing tools built to help teams test endpoints for security issues during development and release workflows. Compare options by deployment model, automation fit, and the types …

API Security Solutions

Common search: API Security Solutions

Browse API security solutions that help teams identify weaknesses in APIs and related application surfaces. Compare tools for scanning, discovery, testing, and ongoing monitoring to find options that …

API Security Testing

Common search: API Security Testing

Explore API security testing tools for discovering vulnerabilities in APIs and related application workflows. Compare solutions for scanning, automated testing, and risk assessment to find software that fits …

How to compare vulnerability scanning tools

Vulnerability scanning is not one narrow product category. Security teams often need different tools for running applications, source code, open source dependencies, APIs, containers, cloud assets, or external infrastructure.

That is why this directory separates DAST, SAST, SCA, API, container, cloud, and network security into dedicated hubs. It is faster to compare products with a shared purpose than to rely on generic list pages that blend incompatible tools into one ranking.

Start with the surface you want to test, then narrow your shortlist by deployment model, license type, vendor, and the workflows your team already supports.

Use this directory to answer four practical questions

Which scanner type matches the assets you need to test?
Do you need open source, free, freemium, or commercial licensing?
Which tools fit your deployment model: cloud, SaaS, hybrid, or on-premise?
Which vendors appear consistently in the categories your team actually uses?

Common security workflows covered by the directory

Use category pages to separate application testing, software supply chain risk, and infrastructure exposure.

Application Security Testing

Review DAST, SAST, IAST, CMS, and API security tools when you need to find flaws in web apps, source code, or running services before release.

Software Supply Chain Risk

Use software composition analysis and dependency-focused scanners to understand open source exposure, package risk, and remediation priorities.

Cloud and Infrastructure Exposure

Compare container, cloud, network, and external attack-surface tools when the goal is broader asset visibility beyond a single application.

Start with the category that matches your risk surface

Browse by category when you already know the testing method, or search the full directory when you want to compare vendors and products across multiple workflows.