Browse Vulnerability Scanning Tool Categories
Start with the scanner type you need, then open the category page built around that workflow.
This page is the category index for the directory. Use it when you already know whether you are researching DAST, SAST, SCA, API, container, cloud, or network security products and want a tighter shortlist.
Need a broader search?
Search by vendor, tool name, or testing approach if you want to compare products across multiple categories.
Security Tool Categories
Browse category hubs that group comparable tools together instead of mixing unrelated scanners on one page.
AI & ML
6 toolsExplore AI & ML vulnerability scanning and application security tools for testing web apps, APIs, and related environments. Compare products …
Explore AI & MLAI Security Solutions
8 toolsBrowse AI security solutions built to support vulnerability scanning and application security workflows. Compare tools for deployment fit, coverage, automation, …
Explore AI Security SolutionsAPI Discovery Tools
1 toolsAPI discovery tools help security and engineering teams identify APIs, monitor traffic, and reduce blind spots across modern application environments. …
Explore API Discovery ToolsAPI Fuzzing
2 toolsBrowse API fuzzing tools built to help teams test endpoints for security issues during development and release workflows. Compare options …
Explore API FuzzingAPI Security Solutions
38 toolsBrowse API security solutions that help teams identify weaknesses in APIs and related application surfaces. Compare tools for scanning, discovery, …
Explore API Security SolutionsAPI Security Testing
8 toolsExplore API security testing tools for discovering vulnerabilities in APIs and related application workflows. Compare solutions for scanning, automated testing, …
Explore API Security TestingAPI Testing
1 toolsCompare API testing tools built for vulnerability scanning, fuzzing, and application security workflows. Use this directory to review options, understand …
Explore API TestingAPI Traffic Monitoring
1 toolsExplore API traffic monitoring tools designed to help teams observe API behavior, uncover exposed endpoints, and support ongoing security review. …
Explore API Traffic MonitoringApplication Security
65 toolsBrowse application security tools for identifying vulnerabilities in web apps and APIs. Compare options for automated scanning, DAST, and security …
Explore Application SecurityAttack Surface Management
1 toolsAttack surface management tools help teams discover exposed assets, monitor risk, and prioritize issues across external-facing environments. Use this category …
Explore Attack Surface ManagementAutomated Pentesting Tools
16 toolsBrowse automated pentesting tools for application security teams that need faster vulnerability discovery and repeatable testing. Compare options for web …
Explore Automated Pentesting ToolsAutomated Remediation Tools
1 toolsBrowse automated remediation tools that help teams identify vulnerabilities, track risk, and support faster response across modern environments. Compare options …
Explore Automated Remediation ToolsAutomated Security Testing
27 toolsBrowse automated security testing tools for web applications, APIs, and related attack surfaces. Compare open-source and commercial options by deployment …
Explore Automated Security TestingAutomated Testing Tools
7 toolsBrowse automated testing tools that support vulnerability scanning and application security workflows. Compare options by coverage, deployment model, and how …
Explore Automated Testing ToolsAutomated Threat Detection
8 toolsBrowse automated threat detection tools designed to help teams identify vulnerabilities, misconfigurations, and other security risks across applications and environments. …
Explore Automated Threat DetectionAutomated Vulnerability Management
7 toolsBrowse automated vulnerability management tools designed to help teams find, track, and prioritize security issues across applications and connected environments. …
Explore Automated Vulnerability ManagementAutomated Vulnerability Scanning
25 toolsBrowse automated vulnerability scanning tools for web applications, APIs, and related environments. Compare products by deployment model, testing approach, and …
Explore Automated Vulnerability ScanningAutomation Frameworks
1 toolsBrowse automation frameworks used for vulnerability scanning and application security testing. Compare tools by coverage, workflow fit, and the types …
Explore Automation FrameworksAutomation Tools
2 toolsBrowse automation tools used for vulnerability scanning and application security across API, cloud-native, and DevSecOps workflows. Compare products for discovery, …
Explore Automation ToolsBinary Analysis Tools
1 toolsBrowse binary analysis tools used for vulnerability detection, static analysis, and security testing. Compare options for developer workflows, compliance needs, …
Explore Binary Analysis ToolsCI/CD Security Solutions
4 toolsExplore CI/CD security solutions that help teams find vulnerabilities earlier in the delivery pipeline. Compare tools for application security testing, …
Explore CI/CD Security SolutionsCI/CD Security Tools
3 toolsBrowse CI/CD security tools that help teams find vulnerabilities earlier in the delivery pipeline. Compare options for scanning, alerting, and …
Explore CI/CD Security ToolsCloud Compliance Tools
2 toolsBrowse cloud compliance tools that help teams monitor cloud environments, identify misconfigurations, and support ongoing compliance efforts. Compare options by …
Explore Cloud Compliance ToolsCloud Native Security
2 toolsBrowse cloud native security tools built to help teams assess risk, scan for vulnerabilities, and monitor modern workloads. Compare options …
Explore Cloud Native SecurityCloud Security Solutions
45 toolsExplore cloud security solutions for scanning, monitoring, and securing modern applications and cloud environments. Compare tools that help teams assess …
Explore Cloud Security SolutionsCode Quality Tools
1 toolsBrowse code quality tools that help teams inspect code for defects, security issues, and maintainability concerns. Compare options by analysis …
Explore Code Quality ToolsCommunity-Driven Security Tools
5 toolsExplore community-driven security tools used for vulnerability scanning and application security testing. Compare open-source options by scan style, customization, deployment …
Explore Community-Driven Security ToolsCompliance Monitoring Tools
48 toolsBrowse compliance monitoring tools that help security teams identify vulnerabilities, review configuration issues, and support ongoing control checks. Compare options …
Explore Compliance Monitoring ToolsContainer Security
2 toolsBrowse container security tools designed to help teams identify vulnerabilities, misconfigurations, and exposure across modern application environments. Use this directory …
Explore Container SecurityContinuous API Testing
4 toolsContinuous API testing tools help teams find security weaknesses as APIs change, not just during one-off reviews. Compare products that …
Explore Continuous API TestingContinuous Integration Tools
5 toolsBrowse continuous integration tools that help teams add security and quality checks into the build process. Compare options for dependency …
Explore Continuous Integration ToolsContinuous Monitoring Solutions
6 toolsContinuous monitoring solutions help teams keep watch on web applications, APIs, and exposed assets between manual reviews. Compare tools that …
Explore Continuous Monitoring SolutionsContinuous Security Monitoring
39 toolsBrowse continuous security monitoring tools that help teams identify vulnerabilities, misconfigurations, and exposure across applications and APIs. Compare products by …
Explore Continuous Security MonitoringContinuous Security Tools
9 toolsBrowse continuous security tools for vulnerability scanning and application security. Compare products that support ongoing testing, monitoring, and vulnerability discovery …
Explore Continuous Security ToolsContinuous Testing
1 toolsBrowse continuous testing tools that support vulnerability scanning and application security across modern delivery pipelines. Use this category to compare …
Explore Continuous TestingContinuous Threat Exposure Management
1 toolsBrowse Continuous Threat Exposure Management tools that help teams identify exposure across assets, prioritize risk, and support faster remediation. Use …
Explore Continuous Threat Exposure ManagementCross-Platform Security Tools
2 toolsBrowse cross-platform security tools for application security and vulnerability testing. Compare options that support different workflows, deployment needs, and testing …
Explore Cross-Platform Security ToolsCyber Threat Detection
2 toolsCompare cyber threat detection tools for discovering vulnerabilities, monitoring risk, and supporting application security workflows. Review products side by side …
Explore Cyber Threat DetectionCybersecurity Solutions
30 toolsBrowse cybersecurity solutions for vulnerability scanning and application security in one place. Compare tools for web app testing, API security, …
Explore Cybersecurity SolutionsData Protection Tools
2 toolsBrowse data protection tools that help identify sensitive data exposure, leaked credentials, and security issues across applications and environments. Use …
Explore Data Protection ToolsDevSecOps Solutions
13 toolsBrowse DevSecOps solutions that help teams find and manage application and infrastructure risks earlier in the delivery cycle. Compare tools …
Explore DevSecOps SolutionsDynamic Application Security Testing
44 toolsExplore dynamic application security testing tools for web applications and APIs. Compare products that help identify vulnerabilities during runtime testing, …
Explore Dynamic Application Security TestingEmbedded Systems Testing
1 toolsBrowse embedded systems testing tools for teams that need to evaluate software behavior, security, and compliance in connected or resource-constrained …
Explore Embedded Systems TestingEnterprise Security
3 toolsCompare enterprise security tools built for vulnerability scanning, application security, and ongoing risk visibility. Review products side by side to …
Explore Enterprise SecurityEthical Hacking Tools
2 toolsBrowse ethical hacking tools for vulnerability scanning, web application testing, and security testing workflows. Use this category to compare options …
Explore Ethical Hacking ToolsExternal Network Scanning
1 toolsBrowse external network scanning tools built to help security teams identify exposed assets, open ports, and other internet-facing risks. Use …
Explore External Network ScanningFuzzing Tools
2 toolsExplore fuzzing tools used to test applications and APIs for security weaknesses before release. Compare options by workflow fit, deployment …
Explore Fuzzing ToolsIDE Security Tools
1 toolsExplore IDE security tools that help teams find and address issues earlier in the development workflow. Compare options for vulnerability …
Explore IDE Security ToolsMCP Security Solutions
1 toolsBrowse MCP security solutions to compare tools that help identify exposure, monitor activity, and support protection across modern application and …
Explore MCP Security SolutionsMobile Security Tools
1 toolsBrowse mobile security tools to compare options for app analysis, vulnerability discovery, and security testing. Use this category to narrow …
Explore Mobile Security ToolsNetwork Security Solutions
6 toolsBrowse network security solutions that help identify vulnerabilities, misconfigurations, and security risks across networks and applications. Compare tools by deployment …
Explore Network Security SolutionsOSINT Tools
1 toolsBrowse OSINT tools used to collect and analyze publicly available information for security research, exposure discovery, and threat monitoring. Compare …
Explore OSINT ToolsOpen Source Security Tools
11 toolsBrowse open source security tools for vulnerability scanning, web application testing, and security assessment. Compare options by use case, deployment …
Explore Open Source Security ToolsPenetration Testing as a Service
2 toolsCompare Penetration Testing as a Service tools for ongoing security testing, vulnerability discovery, and reporting. Use this category to review …
Explore Penetration Testing as a ServicePosture Management Solutions
1 toolsBrowse posture management solutions that help security teams discover assets, monitor risk, and evaluate exposure across modern environments. Compare tools …
Explore Posture Management SolutionsProactive Security Solutions
4 toolsBrowse proactive security solutions built to help teams find and address vulnerabilities earlier in the development and security lifecycle. Compare …
Explore Proactive Security SolutionsProactive Security Tools
8 toolsBrowse proactive security tools that help teams find weaknesses earlier, monitor exposed assets, and support application security workflows. Compare options …
Explore Proactive Security ToolsReal-Time Threat Detection
2 toolsBrowse real-time threat detection tools for teams that need ongoing visibility into security risk. Compare options for alerting, continuous monitoring, …
Explore Real-Time Threat DetectionRisk Assessment Tools
3 toolsBrowse risk assessment tools for discovering vulnerabilities, evaluating application security, and supporting ongoing monitoring. Compare commercial SaaS options by scanning …
Explore Risk Assessment ToolsRisk Management Tools
28 toolsBrowse risk management tools that help teams find and prioritize application and infrastructure weaknesses. Compare products for vulnerability scanning, API …
Explore Risk Management ToolsRisk-Based Vulnerability Management
1 toolsCompare risk-based vulnerability management tools for scanning, prioritization, and ongoing exposure tracking. Use this category to evaluate software that helps …
Explore Risk-Based Vulnerability ManagementRuntime Protection Tools
2 toolsExplore runtime protection tools for monitoring live applications, APIs, and exposed attack paths. Compare products that support continuous scanning, discovery, …
Explore Runtime Protection ToolsSecurity Automation
6 toolsBrowse security automation tools that support vulnerability scanning and application security workflows. Compare options for continuous monitoring, DevSecOps integration, and …
Explore Security AutomationSecurity Automation Tools
18 toolsBrowse security automation tools built to help teams discover risks, test applications, and monitor exposure across modern environments. Use this …
Explore Security Automation ToolsSecurity Testing Frameworks
3 toolsBrowse security testing frameworks used to support vulnerability discovery, API fuzzing, and application security testing. Compare tools by deployment fit, …
Explore Security Testing FrameworksSecurity Testing Tools
21 toolsBrowse security testing tools for finding web and application weaknesses before attackers do. Compare options for vulnerability scanning, black-box testing, …
Explore Security Testing ToolsService Virtualization
1 toolsService virtualization tools help teams simulate dependent systems so testing can continue when services are unavailable, costly, or hard to …
Explore Service VirtualizationSoftware Composition Analysis
4 toolsBrowse Software Composition Analysis tools to compare how they help identify dependency vulnerabilities and support application security workflows. Use this …
Explore Software Composition AnalysisSoftware Development Tools
1 toolsBrowse software development tools that help teams identify security issues and improve code quality during development. Compare options for static …
Explore Software Development ToolsStatic Application Security Testing
6 toolsStatic Application Security Testing tools analyze source code, binaries, or compiled artifacts to help identify security issues before release. Use …
Explore Static Application Security TestingThreat Detection Solutions
12 toolsBrowse threat detection solutions built to help security teams identify risks across applications, infrastructure, and cloud environments. Compare tools by …
Explore Threat Detection SolutionsThreat Exposure Management
1 toolsCompare threat exposure management tools that help teams discover vulnerabilities, monitor risk, and prioritize remediation across applications and environments. Review …
Explore Threat Exposure ManagementThreat Intelligence
2 toolsBrowse threat intelligence tools to compare products that help teams monitor risks, detect suspicious activity, and support security operations. Use …
Explore Threat IntelligenceThreat Intelligence Solutions
2 toolsBrowse threat intelligence solutions for teams that need to collect, enrich, and act on security signals. Compare tools for OSINT, …
Explore Threat Intelligence SolutionsThreat Management Solutions
1 toolsBrowse threat management solutions for teams evaluating vulnerability scanning and application security tools. Compare options for detection, testing, automation, and …
Explore Threat Management SolutionsVulnerability Assessment Tools
33 toolsBrowse vulnerability assessment tools for discovering web, application, and network weaknesses before attackers do. Compare scanners by deployment model, coverage, …
Explore Vulnerability Assessment ToolsVulnerability Management
23 toolsExplore vulnerability management tools that help security teams find and prioritize weaknesses across applications, networks, and infrastructure. Compare products by …
Explore Vulnerability ManagementVulnerability Management Solutions
9 toolsBrowse vulnerability management solutions designed to help teams find, track, and prioritize security issues across applications and infrastructure. Compare tools …
Explore Vulnerability Management SolutionsVulnerability Management Tools
26 toolsBrowse vulnerability management tools for scanning, prioritization, and ongoing visibility across applications, APIs, and infrastructure. Compare products by deployment model, …
Explore Vulnerability Management ToolsVulnerability Scanning
2 toolsBrowse vulnerability scanning tools for discovering web, network, and application weaknesses. Compare options by deployment, licensing, automation, and the types …
Explore Vulnerability ScanningVulnerability Testing Tools
1 toolsBrowse vulnerability testing tools for scanning, testing, and assessing security issues across applications and systems. Compare options by deployment, testing …
Explore Vulnerability Testing ToolsWeb Security Tools
19 toolsBrowse web security tools for scanning websites, web apps, and related attack surfaces. Compare options for automated vulnerability discovery, WordPress …
Explore Web Security ToolsWiFi Security Solutions
1 toolsBrowse WiFi Security Solutions to compare tools for wireless security, vulnerability discovery, and risk assessment. Review options by deployment, coverage, …
Explore WiFi Security SolutionsDAST Tools
117 toolsExplore DAST tools that test applications from the outside while they are running. Compare options for web apps and APIs, …
Explore DAST ToolsSAST Tools
6 toolsExplore SAST tools that analyze source code for security issues before release. Compare options for language coverage, developer workflow fit, …
Explore SAST ToolsCMS Security Scanners
2 toolsCompare CMS security scanners built to identify common weaknesses in content management systems, from plugin and theme issues to misconfigurations …
Explore CMS Security ScannersIAST Tools
0 toolsBrowse IAST tools designed to support interactive application security testing during application execution. Use this category to compare solutions, review …
Explore IAST ToolsContainer Security Scanners
1 toolsCompare container security scanners built to help teams inspect Docker images and Kubernetes environments for security issues. Review tools for …
Explore Container Security ScannersSCA Tools
0 toolsBrowse SCA tools to compare software composition analysis options for identifying risks in open source and third-party dependencies. Use this …
Explore SCA ToolsAPI Scanners
2 toolsExplore API scanners built to help teams discover exposed endpoints, test API behavior, and identify security issues before they reach …
Explore API ScannersNetwork Security Scanners
5 toolsBrowse network security scanners used to identify vulnerabilities across networks, systems, and infrastructure. Compare tools by deployment model, reporting depth, …
Explore Network Security ScannersMobile Security Scanners
1 toolsBrowse mobile security scanners for evaluating mobile applications before release. Compare tools that help teams identify vulnerabilities, misconfigurations, and other …
Explore Mobile Security ScannersCloud Security Scanners
0 toolsCloud security scanners help teams assess cloud infrastructure and cloud-native applications for misconfigurations, exposure, and other security issues. Use this …
Explore Cloud Security ScannersPenetration Testing Tools
9 toolsBrowse penetration testing tools used to support web, API, and network security assessments. Compare options for manual testing, automated scanning, …
Explore Penetration Testing ToolsWeb Application Security
40 toolsBrowse web application security tools designed to help teams find and assess common application risks before release. Compare scanners and …
Explore Web Application SecurityOpen Source Vulnerability Scanners
0 toolsBrowse open source vulnerability scanners for security teams that want flexible, community-driven tools for vulnerability assessment and testing. Compare options …
Explore Open Source Vulnerability ScannersFree Vulnerability Scanners
0 toolsExplore free vulnerability scanners for discovering common security issues without a license fee. Compare options based on scan coverage, ease …
Explore Free Vulnerability ScannersPCI DSS Scanners
0 toolsBrowse PCI DSS scanners and related payment security tools in one place. Use this category to compare options for vulnerability …
Explore PCI DSS ScannersISO 27001 Scanners
0 toolsBrowse ISO 27001 scanners and related compliance tools in one place. Compare options for evaluating security controls, finding gaps, and …
Explore ISO 27001 Scanners