Vulnerability Scanners
Network, Web & Recon
An authoritative directory for cybersecurity professionals. High-performance vulnerability scanners, curated tools, and technical intelligence for modern infrastructure deployments.
Popular Scanners
Showing 31 resultsWazuh
An open-source security platform providing unified host-based intrusion detection, vulnerability assessment, compliance auditing, and threat detection across endpoints, servers, and cloud workloads.
Trivy
A comprehensive open-source security scanner for containers, filesystems, Git repositories, and Infrastructure as Code, detecting vulnerabilities, misconfigurations, and exposed secrets.
SonarQube
The most widely deployed platform for continuous code quality and security analysis, performing static analysis across 30+ languages to detect bugs, vulnerabilities, and code smells.
Snyk
Developer security platform providing software composition analysis, static code analysis, container scanning, and IaC security testing integrated into the development workflow.
Semgrep
A fast, open-source static analysis tool that uses lightweight pattern matching to find bugs, security vulnerabilities, and anti-patterns across 30+ programming languages.
Prowler
An open-source cloud security assessment tool that performs automated auditing of AWS, Azure, GCP, and Kubernetes environments against hundreds of security best-practice checks.
MobSF
An automated, all-in-one mobile application security testing framework supporting static and dynamic analysis of Android, iOS, and Windows mobile apps.
Checkov
A static analysis tool for Infrastructure as Code that scans Terraform, CloudFormation, Kubernetes, Helm, ARM, and Serverless configurations for security misconfigurations and compliance violations.
Nexpose
Rapid7's on-premise vulnerability management scanner with Active Risk scoring, continuous asset discovery, and compliance benchmarking across network infrastructure and endpoints.
Metasploit
The world's most widely used penetration testing framework, providing a modular library of 2,600+ exploits, 2,100+ payloads, and 1,300+ auxiliary tools for the full attack lifecycle.
Invicti (Netsparker)
Enterprise-grade DAST platform using proof-based scanning to automatically confirm exploitable vulnerabilities in web applications and APIs with near-zero false positives.
GFI LanGuard
Commercial network security scanner and patch management platform that audits, identifies, and remediates vulnerabilities across Windows, macOS, and Linux endpoints.
Published CVEs Per Year
Source: NIST National Vulnerability Database
Vulnerability
A weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability. — NIST
+34%
Exploitation of vulnerabilities as an initial access step for a data breach grew by 34% in 2025. — Verizon DBIR