Category:Vulnerability Scanning Tools

Revision as of 06:03, 23 February 2010 by Vishal Garg (talk | contribs)

Jump to: navigation, search
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


Web Application Vulnerability Scanners are the automated tools that scan web applications to look for known security vulnerabilities such as cross-site scripting, SQL injection, command execution, directory traversal and insecure server configuration. A large number of both commercial and open source tools are available and and all these tools have their own strengths and weaknesses.

Here we will provide a listing of vulnerability scanning tools currently available in the market. The plan is to extend this listing to provide information about each tool's strengths and weaknesses to enable you to make an informed decision about the selection of a particular tool to meet your requirements.

Disclaimer: OWASP does not endorse any of the Vendors or Scanning Tools by listing them in the table below. We have made every effort to put this information as acurately as possible. If you the vendor of a tool below and think that the information provided below is incomplete or incorrect, please send an e-mail to our mailing list and we will make every effort to correct this information.

Tools Listing

Name Owner Licence Platforms
Acunetix WVS Acunetix Commercial / Free (Limited Capability) Windows
Cenzic Hailstorm Cenzic Commercial Windows
N-Stealth N-Stalker Commercial Windows
Nikto CIRT Open Source Unix/Linux
HP WebInspect HP Commercial Windows
Wikto Sensepost Open Source Windows
Rational AppScan IBM Commercial Windows
NTOSpider NT OBJECTives Commercial Windows
Parasoft WebKing Parasoft Commercial Windows / Linux / Solaris
SecurityQA Toolbar
Burp Suite
MileScan Web Security Auditor
Retina Web Security Scanner eEye Digital Security Commercial / Free Trial Windows
ScanDo KaVaDo Inc Commercial Windows
Whitehat Sentinel WhiteHat Security Commercial N/A


This category currently contains no pages or media.