Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
Sign up for free in just a few minutes and ask our top researchers to evaluate the security of your web or mobile app. Decide to run either a bug bounty program or an agile crowdsourced security audit. Choose from our Core of vetted researchers or the whole Crowd. | It is a free, open-source penetration testing tool. It is designed specifically for testing web applications and is both flexible and extensible. |
| - | Open source;
Cross platform (it even runs on a Raspberry Pi!);
Easy to install (using a multi-platform installer builder);
Completely free (no paid for 'Pro' version);
Ease of use a priority;
Comprehensive help pages;
Fully internationalized |
Statistics | |
Stacks 8 | Stacks 81 |
Followers 33 | Followers 45 |
Votes 0 | Votes 0 |

Someone has found a potential security issue with your technology. What happens next? Making certain this discovery leads to a positive outcome for everyone involved is crucial. Replacing an antiquated security@ mailbox with the HackerOne platform brings order and control to an otherwise chaotic process.

Our Crowdcontrol platform safely connects you to a curated community of 8,300 security researchers to securely capture, triage and reward vulnerabilities in your code. Reduce your effort by over 85% and get back to work!

An open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.

At its core, Vulseek combines automated asset discovery and scanning with intelligent risk prioritization, allowing security teams to focus on what truly matters. Its customizable dashboards, real-time alerts, and integrations with popular ticketing systems and SIEMs help ensure vulnerabilities are addressed swiftly and systematically.

Enlist the help of vetted security experts to find bugs and vulnerabilities in your software.

It is a compliance-focused pentesting-as-a-service platform. It allows companies to easily schedule and manage penetration tests, designed for both compliance and security enhancement.

It is a penetration testing tool empowered by ChatGPT. It is designed to automate the penetration testing process. It is built on top of ChatGPT and operates in an interactive mode to guide penetration testers in both overall progress and specific operations.

It is an open-source Java application for network communication proxying for the purpose of penetration testing. It allows penetration testers to set up proxies and interceptors to manage the traffic transmitted between client and server.