Browse Vulnerability Scanning Tool Categories

Start with the scanner type you need, then open the category page built around that workflow.

This page is the category index for the directory. Use it when you already know whether you are researching DAST, SAST, SCA, API, container, cloud, or network security products and want a tighter shortlist.

128
Security Tools
120
Categories
0.1
Avg Rating

Need a broader search?

Search by vendor, tool name, or testing approach if you want to compare products across multiple categories.

Security Tool Categories

Browse category hubs that group comparable tools together instead of mixing unrelated scanners on one page.

AI & ML
6 tools

Explore AI & ML vulnerability scanning and application security tools for testing web apps, APIs, and related environments. Compare products …

Explore AI & ML
AI Security Solutions
8 tools

Browse AI security solutions built to support vulnerability scanning and application security workflows. Compare tools for deployment fit, coverage, automation, …

Explore AI Security Solutions
API Discovery Tools
1 tools

API discovery tools help security and engineering teams identify APIs, monitor traffic, and reduce blind spots across modern application environments. …

Explore API Discovery Tools
API Fuzzing
2 tools

Browse API fuzzing tools built to help teams test endpoints for security issues during development and release workflows. Compare options …

Explore API Fuzzing
API Security Solutions
38 tools

Browse API security solutions that help teams identify weaknesses in APIs and related application surfaces. Compare tools for scanning, discovery, …

Explore API Security Solutions
API Security Testing
8 tools

Explore API security testing tools for discovering vulnerabilities in APIs and related application workflows. Compare solutions for scanning, automated testing, …

Explore API Security Testing
API Testing
1 tools

Compare API testing tools built for vulnerability scanning, fuzzing, and application security workflows. Use this directory to review options, understand …

Explore API Testing
API Traffic Monitoring
1 tools

Explore API traffic monitoring tools designed to help teams observe API behavior, uncover exposed endpoints, and support ongoing security review. …

Explore API Traffic Monitoring
Application Security
65 tools

Browse application security tools for identifying vulnerabilities in web apps and APIs. Compare options for automated scanning, DAST, and security …

Explore Application Security
Attack Surface Management
1 tools

Attack surface management tools help teams discover exposed assets, monitor risk, and prioritize issues across external-facing environments. Use this category …

Explore Attack Surface Management
Automated Pentesting Tools
16 tools

Browse automated pentesting tools for application security teams that need faster vulnerability discovery and repeatable testing. Compare options for web …

Explore Automated Pentesting Tools
Automated Remediation Tools
1 tools

Browse automated remediation tools that help teams identify vulnerabilities, track risk, and support faster response across modern environments. Compare options …

Explore Automated Remediation Tools
Automated Security Testing
27 tools

Browse automated security testing tools for web applications, APIs, and related attack surfaces. Compare open-source and commercial options by deployment …

Explore Automated Security Testing
Automated Testing Tools
7 tools

Browse automated testing tools that support vulnerability scanning and application security workflows. Compare options by coverage, deployment model, and how …

Explore Automated Testing Tools
Automated Threat Detection
8 tools

Browse automated threat detection tools designed to help teams identify vulnerabilities, misconfigurations, and other security risks across applications and environments. …

Explore Automated Threat Detection
Automated Vulnerability Management
7 tools

Browse automated vulnerability management tools designed to help teams find, track, and prioritize security issues across applications and connected environments. …

Explore Automated Vulnerability Management
Automated Vulnerability Scanning
25 tools

Browse automated vulnerability scanning tools for web applications, APIs, and related environments. Compare products by deployment model, testing approach, and …

Explore Automated Vulnerability Scanning
Automation Frameworks
1 tools

Browse automation frameworks used for vulnerability scanning and application security testing. Compare tools by coverage, workflow fit, and the types …

Explore Automation Frameworks
Automation Tools
2 tools

Browse automation tools used for vulnerability scanning and application security across API, cloud-native, and DevSecOps workflows. Compare products for discovery, …

Explore Automation Tools
Binary Analysis Tools
1 tools

Browse binary analysis tools used for vulnerability detection, static analysis, and security testing. Compare options for developer workflows, compliance needs, …

Explore Binary Analysis Tools
CI/CD Security Solutions
4 tools

Explore CI/CD security solutions that help teams find vulnerabilities earlier in the delivery pipeline. Compare tools for application security testing, …

Explore CI/CD Security Solutions
CI/CD Security Tools
3 tools

Browse CI/CD security tools that help teams find vulnerabilities earlier in the delivery pipeline. Compare options for scanning, alerting, and …

Explore CI/CD Security Tools
Cloud Compliance Tools
2 tools

Browse cloud compliance tools that help teams monitor cloud environments, identify misconfigurations, and support ongoing compliance efforts. Compare options by …

Explore Cloud Compliance Tools
Cloud Native Security
2 tools

Browse cloud native security tools built to help teams assess risk, scan for vulnerabilities, and monitor modern workloads. Compare options …

Explore Cloud Native Security
Cloud Security Solutions
45 tools

Explore cloud security solutions for scanning, monitoring, and securing modern applications and cloud environments. Compare tools that help teams assess …

Explore Cloud Security Solutions
Code Quality Tools
1 tools

Browse code quality tools that help teams inspect code for defects, security issues, and maintainability concerns. Compare options by analysis …

Explore Code Quality Tools
Community-Driven Security Tools
5 tools

Explore community-driven security tools used for vulnerability scanning and application security testing. Compare open-source options by scan style, customization, deployment …

Explore Community-Driven Security Tools
Compliance Monitoring Tools
48 tools

Browse compliance monitoring tools that help security teams identify vulnerabilities, review configuration issues, and support ongoing control checks. Compare options …

Explore Compliance Monitoring Tools
Container Security
2 tools

Browse container security tools designed to help teams identify vulnerabilities, misconfigurations, and exposure across modern application environments. Use this directory …

Explore Container Security
Continuous API Testing
4 tools

Continuous API testing tools help teams find security weaknesses as APIs change, not just during one-off reviews. Compare products that …

Explore Continuous API Testing
Continuous Integration Tools
5 tools

Browse continuous integration tools that help teams add security and quality checks into the build process. Compare options for dependency …

Explore Continuous Integration Tools
Continuous Monitoring Solutions
6 tools

Continuous monitoring solutions help teams keep watch on web applications, APIs, and exposed assets between manual reviews. Compare tools that …

Explore Continuous Monitoring Solutions
Continuous Security Monitoring
39 tools

Browse continuous security monitoring tools that help teams identify vulnerabilities, misconfigurations, and exposure across applications and APIs. Compare products by …

Explore Continuous Security Monitoring
Continuous Security Tools
9 tools

Browse continuous security tools for vulnerability scanning and application security. Compare products that support ongoing testing, monitoring, and vulnerability discovery …

Explore Continuous Security Tools
Continuous Testing
1 tools

Browse continuous testing tools that support vulnerability scanning and application security across modern delivery pipelines. Use this category to compare …

Explore Continuous Testing
Continuous Threat Exposure Management
1 tools

Browse Continuous Threat Exposure Management tools that help teams identify exposure across assets, prioritize risk, and support faster remediation. Use …

Explore Continuous Threat Exposure Management
Cross-Platform Security Tools
2 tools

Browse cross-platform security tools for application security and vulnerability testing. Compare options that support different workflows, deployment needs, and testing …

Explore Cross-Platform Security Tools
Cyber Threat Detection
2 tools

Compare cyber threat detection tools for discovering vulnerabilities, monitoring risk, and supporting application security workflows. Review products side by side …

Explore Cyber Threat Detection
Cybersecurity Solutions
30 tools

Browse cybersecurity solutions for vulnerability scanning and application security in one place. Compare tools for web app testing, API security, …

Explore Cybersecurity Solutions
Data Protection Tools
2 tools

Browse data protection tools that help identify sensitive data exposure, leaked credentials, and security issues across applications and environments. Use …

Explore Data Protection Tools
DevSecOps Solutions
13 tools

Browse DevSecOps solutions that help teams find and manage application and infrastructure risks earlier in the delivery cycle. Compare tools …

Explore DevSecOps Solutions
Dynamic Application Security Testing
44 tools

Explore dynamic application security testing tools for web applications and APIs. Compare products that help identify vulnerabilities during runtime testing, …

Explore Dynamic Application Security Testing
Embedded Systems Testing
1 tools

Browse embedded systems testing tools for teams that need to evaluate software behavior, security, and compliance in connected or resource-constrained …

Explore Embedded Systems Testing
Enterprise Security
3 tools

Compare enterprise security tools built for vulnerability scanning, application security, and ongoing risk visibility. Review products side by side to …

Explore Enterprise Security
Ethical Hacking Tools
2 tools

Browse ethical hacking tools for vulnerability scanning, web application testing, and security testing workflows. Use this category to compare options …

Explore Ethical Hacking Tools
External Network Scanning
1 tools

Browse external network scanning tools built to help security teams identify exposed assets, open ports, and other internet-facing risks. Use …

Explore External Network Scanning
Fuzzing Tools
2 tools

Explore fuzzing tools used to test applications and APIs for security weaknesses before release. Compare options by workflow fit, deployment …

Explore Fuzzing Tools
IDE Security Tools
1 tools

Explore IDE security tools that help teams find and address issues earlier in the development workflow. Compare options for vulnerability …

Explore IDE Security Tools
MCP Security Solutions
1 tools

Browse MCP security solutions to compare tools that help identify exposure, monitor activity, and support protection across modern application and …

Explore MCP Security Solutions
Mobile Security Tools
1 tools

Browse mobile security tools to compare options for app analysis, vulnerability discovery, and security testing. Use this category to narrow …

Explore Mobile Security Tools
Network Security Solutions
6 tools

Browse network security solutions that help identify vulnerabilities, misconfigurations, and security risks across networks and applications. Compare tools by deployment …

Explore Network Security Solutions
OSINT Tools
1 tools

Browse OSINT tools used to collect and analyze publicly available information for security research, exposure discovery, and threat monitoring. Compare …

Explore OSINT Tools
Open Source Security Tools
11 tools

Browse open source security tools for vulnerability scanning, web application testing, and security assessment. Compare options by use case, deployment …

Explore Open Source Security Tools
Penetration Testing as a Service
2 tools

Compare Penetration Testing as a Service tools for ongoing security testing, vulnerability discovery, and reporting. Use this category to review …

Explore Penetration Testing as a Service
Posture Management Solutions
1 tools

Browse posture management solutions that help security teams discover assets, monitor risk, and evaluate exposure across modern environments. Compare tools …

Explore Posture Management Solutions
Proactive Security Solutions
4 tools

Browse proactive security solutions built to help teams find and address vulnerabilities earlier in the development and security lifecycle. Compare …

Explore Proactive Security Solutions
Proactive Security Tools
8 tools

Browse proactive security tools that help teams find weaknesses earlier, monitor exposed assets, and support application security workflows. Compare options …

Explore Proactive Security Tools
Real-Time Threat Detection
2 tools

Browse real-time threat detection tools for teams that need ongoing visibility into security risk. Compare options for alerting, continuous monitoring, …

Explore Real-Time Threat Detection
Risk Assessment Tools
3 tools

Browse risk assessment tools for discovering vulnerabilities, evaluating application security, and supporting ongoing monitoring. Compare commercial SaaS options by scanning …

Explore Risk Assessment Tools
Risk Management Tools
28 tools

Browse risk management tools that help teams find and prioritize application and infrastructure weaknesses. Compare products for vulnerability scanning, API …

Explore Risk Management Tools
Risk-Based Vulnerability Management
1 tools

Compare risk-based vulnerability management tools for scanning, prioritization, and ongoing exposure tracking. Use this category to evaluate software that helps …

Explore Risk-Based Vulnerability Management
Runtime Protection Tools
2 tools

Explore runtime protection tools for monitoring live applications, APIs, and exposed attack paths. Compare products that support continuous scanning, discovery, …

Explore Runtime Protection Tools
Security Automation
6 tools

Browse security automation tools that support vulnerability scanning and application security workflows. Compare options for continuous monitoring, DevSecOps integration, and …

Explore Security Automation
Security Automation Tools
18 tools

Browse security automation tools built to help teams discover risks, test applications, and monitor exposure across modern environments. Use this …

Explore Security Automation Tools
Security Testing Frameworks
3 tools

Browse security testing frameworks used to support vulnerability discovery, API fuzzing, and application security testing. Compare tools by deployment fit, …

Explore Security Testing Frameworks
Security Testing Tools
21 tools

Browse security testing tools for finding web and application weaknesses before attackers do. Compare options for vulnerability scanning, black-box testing, …

Explore Security Testing Tools
Service Virtualization
1 tools

Service virtualization tools help teams simulate dependent systems so testing can continue when services are unavailable, costly, or hard to …

Explore Service Virtualization
Software Composition Analysis
4 tools

Browse Software Composition Analysis tools to compare how they help identify dependency vulnerabilities and support application security workflows. Use this …

Explore Software Composition Analysis
Software Development Tools
1 tools

Browse software development tools that help teams identify security issues and improve code quality during development. Compare options for static …

Explore Software Development Tools
Static Application Security Testing
6 tools

Static Application Security Testing tools analyze source code, binaries, or compiled artifacts to help identify security issues before release. Use …

Explore Static Application Security Testing
Threat Detection Solutions
12 tools

Browse threat detection solutions built to help security teams identify risks across applications, infrastructure, and cloud environments. Compare tools by …

Explore Threat Detection Solutions
Threat Exposure Management
1 tools

Compare threat exposure management tools that help teams discover vulnerabilities, monitor risk, and prioritize remediation across applications and environments. Review …

Explore Threat Exposure Management
Threat Intelligence
2 tools

Browse threat intelligence tools to compare products that help teams monitor risks, detect suspicious activity, and support security operations. Use …

Explore Threat Intelligence
Threat Intelligence Solutions
2 tools

Browse threat intelligence solutions for teams that need to collect, enrich, and act on security signals. Compare tools for OSINT, …

Explore Threat Intelligence Solutions
Threat Management Solutions
1 tools

Browse threat management solutions for teams evaluating vulnerability scanning and application security tools. Compare options for detection, testing, automation, and …

Explore Threat Management Solutions
Vulnerability Assessment Tools
33 tools

Browse vulnerability assessment tools for discovering web, application, and network weaknesses before attackers do. Compare scanners by deployment model, coverage, …

Explore Vulnerability Assessment Tools
Vulnerability Management
23 tools

Explore vulnerability management tools that help security teams find and prioritize weaknesses across applications, networks, and infrastructure. Compare products by …

Explore Vulnerability Management
Vulnerability Management Solutions
9 tools

Browse vulnerability management solutions designed to help teams find, track, and prioritize security issues across applications and infrastructure. Compare tools …

Explore Vulnerability Management Solutions
Vulnerability Management Tools
26 tools

Browse vulnerability management tools for scanning, prioritization, and ongoing visibility across applications, APIs, and infrastructure. Compare products by deployment model, …

Explore Vulnerability Management Tools
Vulnerability Scanning
2 tools

Browse vulnerability scanning tools for discovering web, network, and application weaknesses. Compare options by deployment, licensing, automation, and the types …

Explore Vulnerability Scanning
Vulnerability Testing Tools
1 tools

Browse vulnerability testing tools for scanning, testing, and assessing security issues across applications and systems. Compare options by deployment, testing …

Explore Vulnerability Testing Tools
Web Security Tools
19 tools

Browse web security tools for scanning websites, web apps, and related attack surfaces. Compare options for automated vulnerability discovery, WordPress …

Explore Web Security Tools
WiFi Security Solutions
1 tools

Browse WiFi Security Solutions to compare tools for wireless security, vulnerability discovery, and risk assessment. Review options by deployment, coverage, …

Explore WiFi Security Solutions
DAST Tools
117 tools

Explore DAST tools that test applications from the outside while they are running. Compare options for web apps and APIs, …

Explore DAST Tools
SAST Tools
6 tools

Explore SAST tools that analyze source code for security issues before release. Compare options for language coverage, developer workflow fit, …

Explore SAST Tools
CMS Security Scanners
2 tools

Compare CMS security scanners built to identify common weaknesses in content management systems, from plugin and theme issues to misconfigurations …

Explore CMS Security Scanners
IAST Tools
0 tools

Browse IAST tools designed to support interactive application security testing during application execution. Use this category to compare solutions, review …

Explore IAST Tools
Container Security Scanners
1 tools

Compare container security scanners built to help teams inspect Docker images and Kubernetes environments for security issues. Review tools for …

Explore Container Security Scanners
SCA Tools
0 tools

Browse SCA tools to compare software composition analysis options for identifying risks in open source and third-party dependencies. Use this …

Explore SCA Tools
API Scanners
2 tools

Explore API scanners built to help teams discover exposed endpoints, test API behavior, and identify security issues before they reach …

Explore API Scanners
Network Security Scanners
5 tools

Browse network security scanners used to identify vulnerabilities across networks, systems, and infrastructure. Compare tools by deployment model, reporting depth, …

Explore Network Security Scanners
Mobile Security Scanners
1 tools

Browse mobile security scanners for evaluating mobile applications before release. Compare tools that help teams identify vulnerabilities, misconfigurations, and other …

Explore Mobile Security Scanners
Cloud Security Scanners
0 tools

Cloud security scanners help teams assess cloud infrastructure and cloud-native applications for misconfigurations, exposure, and other security issues. Use this …

Explore Cloud Security Scanners
Penetration Testing Tools
9 tools

Browse penetration testing tools used to support web, API, and network security assessments. Compare options for manual testing, automated scanning, …

Explore Penetration Testing Tools
Web Application Security
40 tools

Browse web application security tools designed to help teams find and assess common application risks before release. Compare scanners and …

Explore Web Application Security
Open Source Vulnerability Scanners
0 tools

Browse open source vulnerability scanners for security teams that want flexible, community-driven tools for vulnerability assessment and testing. Compare options …

Explore Open Source Vulnerability Scanners
Free Vulnerability Scanners
0 tools

Explore free vulnerability scanners for discovering common security issues without a license fee. Compare options based on scan coverage, ease …

Explore Free Vulnerability Scanners
PCI DSS Scanners
0 tools

Browse PCI DSS scanners and related payment security tools in one place. Use this category to compare options for vulnerability …

Explore PCI DSS Scanners
ISO 27001 Scanners
0 tools

Browse ISO 27001 scanners and related compliance tools in one place. Compare options for evaluating security controls, finding gaps, and …

Explore ISO 27001 Scanners