search
Join or Log In

Vulnerability Assessment

Browse 40 cybersecurity tools tagged with "Vulnerability Assessment"

Kali

Kali

language

Vulnerability Assessment

Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

4.7(2)
Attack-Defense Online Lab

Attack-Defense Online Lab

language

Vulnerability Assessment

Attack-Defense Online Lab on SecurityListing: Hands-on cybersecurity training and testing platform with 1800+ labs

4.7(2)
Miggo Predictive Vulnerability Database

Miggo Predictive Vulnerability

language

Threat Intelligence Platforms

Miggo Predictive Vulnerability Database on SecurityListing: Vulnerability intelligence database with CVE analysis and prioritization

4.7(2)
Hackuity Vulnerability Management

Hackuity Vulnerability Management

language

Risk Assessment

Hackuity Vulnerability Management on SecurityListing: Automated vulnerability management platform with deduplication and prioritization

4.7(2)
IntelligenceX

IntelligenceX

language

Vulnerability Assessment

IntelligenceX on SecurityListing: Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.

4.7(2)
Burp Suite Professional

Burp Suite Professional

language

Vulnerability Assessment

Burp Suite Professional on SecurityListing: A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.

4.5(3)
eShield IT Services

eShield IT Services

United Arab Emirates flag

Cloud Security

eShield IT Services is a cybersecurity company based in the United Arab Emirates that provides security, privacy, and regulatory compliance services. It specializes in data protection law, PCI DSS and

4.5(3)
Maze AI Agents

Maze AI Agents

language

Risk Assessment

Maze AI Agents on SecurityListing: AI agents investigate cloud vulnerabilities in context and automate remediation

4.5(1)
PosixSpawn

PosixSpawn

United Arab Emirates flag

Application Security

PosixSpawn specializes in protecting companies from cyber attacks and performing security research on a wide range of software and devices. It provides defensive information security solutions globall

4.5(1)
Black Cell

Black Cell

United Arab Emirates flag

Cloud Security

Black Cell is a cybersecurity firm focused on protecting critical infrastructures in the Middle East, offering offensive security, cloud security, compliance, and integrated security services. The com

4.5(1)
Bluechip Gulf

Bluechip Gulf

United Arab Emirates flag

Data Protection

Bluechip Gulf is an Abu Dhabi–based IT services provider offering IT consulting, 24/7 IT support, networking, cybersecurity, data center, and managed services for businesses of varying sizes. The comp

4.5(1)
CAPEC

CAPEC

language

Threat Intelligence Platforms

CAPEC on SecurityListing: CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.

4.5(1)
BeSECURE Vulnerability Management

BeSECURE Vulnerability Management

language

Threat Intelligence Platforms

BeSECURE Vulnerability Management on SecurityListing: A vulnerability assessment and management tool that uses patented technology to accurately identify vulnerabilities and prioritize them by risk.

4.5(1)
DeepStrike Penetration Testing

DeepStrike Penetration Testing

language

Penetration Testing

DeepStrike Penetration Testing on SecurityListing: Manual penetration testing service simulating real-world attacks

4.5(1)
EnProbe Cybersecurity

EnProbe Cybersecurity

language

Vulnerability Assessment

EnProbe Cybersecurity on SecurityListing: Cloud-based vulnerability assessment tool for web application security

4.5(1)
Conviso Vuln Intelligence

Conviso Vuln Intelligence

language

Risk Assessment

Conviso Vuln Intelligence on SecurityListing: Risk-based vuln mgmt platform centralizing findings from multiple scanners

4.5(1)
OpenVAS

OpenVAS

language

Vulnerability Assessment

OpenVAS on SecurityListing: OpenVAS is an open-source vulnerability scanner that provides extensive testing capabilities for identifying security weaknesses in networks and systems.

4.5(1)
Alien Vault Ossim

Alien Vault Ossim

language

Vulnerability Assessment

Alien Vault Ossim on SecurityListing: AlienVault OSSIM provides an all-in-one security management solution with asset discovery, vulnerability assessment, and SIEM capabilities.

4.5(1)
Paros

Paros

language

Vulnerability Assessment

Paros on SecurityListing: A Java based HTTP/HTTPS proxy for assessing web application vulnerability with various useful features.

4.5(1)
OpenTekware

OpenTekware

EG flag

Data Protection

OpenTekware is a global information security services company that delivers comprehensive cybersecurity consulting and managed security offerings. With over a decade of experience, the firm works with

4.5(1)
DefectDojo

DefectDojo

language

Vulnerability Assessment

DefectDojo on SecurityListing: OWASP Project for making vulnerability management easier.

4.3(2)
CVE

CVE

language

Vulnerability Assessment

CVE on SecurityListing: The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

3.9(2)
Forebrook

Forebrook

United Arab Emirates flag

Cloud Security

Forebrook is a Dubai-based cybersecurity and IT governance consulting firm that is vendor-independent. The company specializes in information security assessments, IT risk assessments, ISMS design and

3.8(1)
CoordinatedTechnology

CoordinatedTechnology

United Arab Emirates flag

Cloud Security

CoordinatedTechnology is a cyber security firm focused on helping organizations securely pursue digital transformation. Based in Ras Al Khaimah, United Arab Emirates, the company provides services acr

3.8(1)
Faraday All-in-One

Faraday All-in-One

language

Penetration Testing

Faraday All-in-One on SecurityListing: All-in-one platform for vuln mgmt, red team ops, and attack surface mgmt

3.8(1)
IM Security Global

IM Security Global

EG flag

Cloud Security

IM Security Global is a cybersecurity and IT security company serving the MENA region with a focus on enterprise security solutions. The company offers services across cyber security, networking, and

3.8(1)
AWVS

AWVS

language

Vulnerability Assessment

AWVS on SecurityListing: A hosted web application security testing tool that enables security researchers to register, activate their accounts, and scan web applications for vulnerabilities.

MMA Infosec

MMA Infosec

United Arab Emirates flag

Network Security

MMA Infosec is a cybersecurity firm with over two decades of experience in network and cyber security. The company focuses on transforming customers from reactive to resilient, aiming to move beyond m

Twinfosec

Twinfosec

United Arab Emirates flag

Application Security

Twinfosec is a cybersecurity solutions provider offering comprehensive information security services, including penetration testing, vulnerability assessment, VAPT, IT governance, risk and compliance,

Penetration Testing Middle East

Penetration Testing Middle

United Arab Emirates flag

GRC

Penetration Testing Middle East is a Dubai-based cybersecurity consultancy specializing in technical security assessments and penetration testing. The company offers services across the UAE, including

RapidFire Tools Network Detective Pro

RapidFire Tools Network

language

Risk Assessment

RapidFire Tools Network Detective Pro on SecurityListing: IT risk mgmt toolkit for network assessment, vuln scanning & compliance

Nucleus Vulnerability Intelligence Platform

Nucleus Vulnerability Intelligence

language

Risk Assessment

Nucleus Vulnerability Intelligence Platform on SecurityListing: Centralized vuln intelligence platform with aggregation and risk prioritization

Trickest Vulnerability Scanning

Trickest Vulnerability Scanning

language

Dynamic Application Security Testing

Trickest Vulnerability Scanning on SecurityListing: Customizable vulnerability scanning platform for infrastructure and applications

SecurityVulnerability.io

SecurityVulnerability.io

language

Vulnerability Assessment

SecurityVulnerability.io on SecurityListing: SecurityVulnerability.io simplifies the process of collecting, enriching, and presenting vulnerability information for both human and machine consumption.

RoboShadow Vulnerability Scanner

RoboShadow Vulnerability Scanner

language

Vulnerability Assessment

RoboShadow Vulnerability Scanner on SecurityListing: Vulnerability scanner for internal & external network security assessment

StrikeOne Vulnerability Management

StrikeOne Vulnerability Management

language

Vulnerability Assessment

StrikeOne Vulnerability Management on SecurityListing: Vulnerability management platform for SDLC integration and risk mitigation

Webhacking.kr

Webhacking.kr

language

Vulnerability Assessment

Webhacking.kr on SecurityListing: Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.

RoboShadow

RoboShadow

language

Vulnerability Assessment

RoboShadow on SecurityListing: Automated vulnerability assessment and remediation platform

Vulnetic AI Hacking Agent

Vulnetic AI Hacking

language

Penetration Testing

Vulnetic AI Hacking Agent on SecurityListing: Vulnetic AI is the most capable autonomous hacking agent on the market.

XYGATE Aegis Scan

XYGATE Aegis Scan

language

Risk Assessment

XYGATE Aegis Scan on SecurityListing: Automated vulnerability scanning for HPE NonStop systems