Category:Vulnerability Scanning Tools

Description
Web Application Vulnerability Scanners are the automated tools that scan web applications to look for known security vulnerabilities such as cross-site scripting, SQL injection, command execution, directory traversal and insecure server configuration. A large number of both commercial and open source tools are available and and all these tools have their own strengths and weaknesses.

Here we will provide a listing of vulnerability scanning tools currently available in the market. The plan is to extend this listing to provide information about each tool's strengths and weaknesses to enable you to make an informed decision about the selection of a particular tool to meet your requirements.

Disclaimer: The tools listing in the table below has been presented in an alphabetical order. OWASP does not endorse any of the Vendors or Scanning Tools by listing them in the table below. We have made every effort to put this information as accurately as possible. If you are the vendor of a tool below and think that this information is incomplete or incorrect, please send an e-mail to our mailing list and we will make every effort to correct this information.

Tools Listing

















 * }