Alternatives to Gecko Security
Compare Gecko Security alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Gecko Security in 2026. Compare features, ratings, user reviews, pricing, and more from Gecko Security competitors and alternatives in order to make an informed decision for your business.
-
1
Aikido Security
Aikido Security
Secure your code, cloud, and runtime in one central system. Aikido’s all-in-one security platform is loved by developers and security teams alike with full security visibility, insight in what matters most, and fast/automatic vulnerability fixes. Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - AI Pentests - Automated Compliance Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more. -
2
ZeroPath
ZeroPath
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with advanced program analysis to find and automatically fix vulnerabilities. ZeroPath provides complete security coverage: 1. AI-powered SAST for business logic flaws & broken authentication 2. SCA with reachability analysis 3. Secrets detection and validation 4. Infrastructure as Code 5. Automated patch generation. any more... ZeroPath delivers 2x more real vulnerabilities with 75% fewer false positives. Our research team has been successful in finding vulns like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce. Trusted by 750+ companies and performing 200k+ code scans monthly. -
3
Astra Pentest
Astra Security
Astra’s Pentest is a comprehensive penetration testing solution with an intelligent automated vulnerability scanner coupled with in-depth manual pentesting. On top of 10000+ tests including security checks for all CVEs mentioned in the OWASP top 10, and SANS 25, the automated scanner also conducts all tests required to comply with ISO 27001, HIPAA, SOC2, and GDPR. Astra offers an interactive pentest dashboard that the user can use to visualize vulnerability analyses, assign vulnerabilities to team members, and collaborate with security experts. And if the users don’t want to get back to the dashboard every time they want to use the scanner or assign a vulnerability to a team member, they can simply use the integrations with CI/CD platforms, Slack, and Jira. -
4
GlitchSecure
GlitchSecure
Continuous Security Testing for SaaS Companies - Built by Hackers Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you. We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year. Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year. Let us help you sleep better at night.Starting Price: $6,600 per year -
5
CoinGecko
CoinGecko
CoinGecko provides a fundamental analysis of the crypto market. In addition to tracking price, volume and market capitalization, CoinGecko tracks community growth, open-source code development, major events and on-chain metrics. CoinGecko also offers crypto portfolio management tools so crypto traders can manage their cryptocurrency and DeFi trading portfolios. -
6
Hacker AI
Hacker AI
Hacker AI is an artificial intelligence system that scans source code to identify potential security weaknesses that may be exploited by hackers or malicious actors. By identifying these vulnerabilities, organizations can take steps to fix the issues and prevent security breaches. Hacker AI is created by a French company based in Toulouse that uses a GPT-3 model. Please compress your project source code into a single Zip archive and upload it. Check your email, as you will receive the vulnerability detection report within 10 minutes. The Hacker AI is in the beta phase and the results it provides are not useful without the guidance of a cybersecurity expert with a background in code analysis. We do not sell or use your code source for malicious purposes. It is strictly used for the detection of vulnerabilities. If necessary, you can request a dedicated non-disclosure agreement (NDA) from us. You can also request a private instance.Starting Price: Free -
7
Voice Gecko
Voice Gecko
Voice Gecko is a desktop dictation tool that transforms speech into accurate text across nearly any application, ideal for emails, coding, AI prompts, or note-taking. With a simple global shortcut, you begin speaking, and the words appear instantly, either on your clipboard or directly pasted in your active window. A persistent GeckoBar stays accessible so you can start and stop recording at any time, minimizing context-switching and letting you stay in flow. It supports a custom dictionary for industry terms, names, and code snippets, ensures your words are accurately transcribed, and keeps a searchable history of all dictations so nothing is lost. The software emphasizes privacy, raw audio stays on your machine (or uses local models when possible), and no recordings are uploaded unless necessary. Click the GeckoBar or use your shortcut to begin capturing your speech.Starting Price: $4.79 per month -
8
GeckoTerminal
CoinGecko
Launched in 2021 by the team behind CoinGecko, GeckoTerminal is a platform that allows users to track real-time crypto prices, trading volume, transactions, liquidity data, and more on decentralized exchanges across all blockchains. We provide price tracking and advanced charting tool for traders. Traders are able to view real-time market data of cryptocurrencies traded on decentralized exchanges and use our interactive charting tool for technical analysis purposes. Users can compare DEX rankings based on total value locked, 24-hour trading volume, transactions, total pools and tokens. We help users to identify the most popular cryptocurrency pairings on GeckoTerminal that are currently gaining traction and popularity.Starting Price: Free -
9
Cyber Chief
Cyber Chief
The best way to keep hackers out is to first understand the security vulnerabilities they see in your software and network infrastructure. Thankfully, not only can Cyber Chief show you the vulnerabilities that hackers will exploit, it will show your developers how those vulnerabilities should be fixed. You can help your development team build the in-house capability you need to ensure your SaaS application has near zero security holes at every release. With Cyber Chief's on-demand vulnerability testing and best-practice, but easy-to-implement vulnerability fixes, your team will take control of securing your application. SaaS teams often put off application security activities because of a perception that it slows them down. Cyber Chief now helps you shift left with AppSec and turn it into smaller, more manageable chunks of work. This helps you ship new products & features as fast as ever, but with the extra advantage of added security.Starting Price: $96 per month -
10
CoinSniper
CoinSniper
Did ever you wonder where people find the best new cryptocurrency projects, coins and tokens like Doge and Shiba Inu? They use websites like CoinSniper. Cryptocurrency projects are listed here before CoinMarketCap, CoinGecko and major exchanges. Find the best crypto moonshots on our website. -
11
Hacktrophy
Hacktrophy
Remove the security vulnerabilities of your website or mobile app before you become a target of cyber attack. In cooperation with ethical hackers, we will look for the security vulnerabilities of your site or app. The goal is to protect your sensitive data from black-hat hackers. Together we set test goals and conditions of testing, as well as rewards for security vulnerabilities found. Ethical hackers start testing. If they find a vulnerability, they send you a report that we will review. You fix the vulnerability and the hacker gets a reward. Security specialists continue looking for vulnerabilities until the credit is over or the package expires. Testing of IT security by a community of ethical hackers from around the world. Testing proceeds until your budget for ethical hacker rewards is spent. Possibility to define your own testing objectives and procedures. We will help you set the appropriate amount of rewards for ethical hackers. -
12
eGECKO
CSS AG
Standardise your commercial operating cycles to fulfill the growing demands of banks, auditors and others - at the push of a button. When making decisions, benefit from fast and direct access to all relevant company data and their individual evaluations. Shorten HR routines and establish transparent and precise data to strengthen your most important assets - your employees. Get started with eGECKO's product portfolio and our all-in-one ERP solutions for selected industries. eGECKO covers all business requirements, starting from accounting with integrated financial accounting, as well as asset accounting and group management for internationally active corporations, comprehensive human resources management, including efficient payroll and salary accounting, candidate management, time recording, travel expense accounting, to corporate planning and project controlling. -
13
AppSecure Security
AppSecure Security
Anticipate and prevent system attacks from the most sophisticated adversaries with AppSecure’s offensive security stance. Discover critical exploitable vulnerabilities and continuously patch them with our advanced security solutions. Continuously fortify your security posture and uncover concealed vulnerabilities from a hacker’s perspective. Evaluate the efficacy of your security team’s readiness posture, detection, and response measures to tenacious hacker attacks on your network’s susceptible pathways. Identify and redress the key security lapses with our balanced approach that tests your APIs in accordance with the OWASP paradigm, along with tailored test cases for preventing any recurrences. Pentest as a service offers continuous, expert-led security testing to identify and remediate vulnerabilities, enhancing your website’s defenses against evolving cyber threats and making it secure, compliant, and reliable. -
14
DigitSec S4
DigitSec
S4 establishes Salesforce DevSecOps in the CI/CD pipeline in under an hour. S4 empowers developers to find & fix vulnerabilities before production where they can lead to a data breach. Securing Salesforce during development reduces risk and accelerates the pace of deployment. S4 for Salesforce™, our patented SaaS Security Scanner™, automatically assesses Salesforce security posture with its full-spectrum continuous application security testing (CAST) platform purpose-built to detect Salesforce vulnerabilities with its four integrated scans for fast and effortless detection. Static Source Code Analysis (SAST), Interactive Runtime Testing (IAST), Software Composition Analysis (SCA), and Cloud Security Configuration Review. Our static application security testing (SAST) engine is a core feature of S4, providing automated scanning and analysis of all custom source code in your Salesforce Org including Apex, VisualForce, Lightning Web Components, and related-JavaScript. -
15
EnProbe
Entersoft Security
Revolutionize your security strategy with the world's most advanced cybersecurity and application security product - engineered for the challenges of today and the future. Accessibility is one of the most celebrated characteristics of cloud computing, however, it also lays claim to its greatest vulnerability. With the Cloud, our data has the potential to be accessed from any device, at any time and from any place. This opens up numerous possibilities for hackers to recognize vulnerabilities before successfully taking advantage of them. EnProbe is a lightning fast, cloud based vulnerability assessment tool designed to help developers, entrepreneurs and administrators identify security vulnerabilities in their website. -
16
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
-
17
Hackrate
Hackrate
Check us out at hckrt.com! 🔐 Hackrate Ethical Hacking Platform is a crowdsourced security testing platform that connects businesses with ethical hackers to find and fix security vulnerabilities. Hackrate's platform is designed to be easy to use for both businesses and ethical hackers. Hackrate's platform is a valuable tool for businesses of all sizes. By crowdsourcing their security testing, businesses can gain access to a large pool of experienced ethical hackers who can help them find and fix security vulnerabilities quickly and efficiently. If you are looking for a way to improve the security of your business's systems and applications, then Hackrate Ethical Hacking Platform is a great option to consider.Starting Price: €250/month -
18
PT Application Inspector
Positive Technologies
PT Application Inspector is the only source code analyzer providing high-quality analysis and convenient tools to automatically confirm vulnerabilities — significantly speeding up the work with reports and simplifying teamwork between security specialists and developers. The combination of static, dynamic, and interactive application security testing (SAST + DAST + IAST) delivers unparalleled results. PT Application Inspector pinpoints only real vulnerabilities so you can focus on the problems that actually matter. Accurate detection, automatic vulnerability verification, filtering, incremental scanning, and an interactive data flow diagram (DFD) for each vulnerability are special features that make remediation so much quicker. Minimize vulnerabilities in the final product and the costs of fixing them. Perform analysis at the earliest stages of software development. -
19
Halborn
Halborn
Using deep security inspection and the latest offensive security tactics, we work to find critical vulnerabilities in applications before they are exploited. We use hands-on assessment by our team of dedicated ethical hackers to simulate the latest activities and techniques used by threat actors. We pentest everything from web apps to wallets and layer1 blockchains. Halborn provides an exceedingly thorough analysis of a blockchain application’s smart contracts in order to correct design issues, errors in the code, or identify security vulnerabilities. We perform both manual analysis and automated testing to make sure your smart contract application or DeFi platform is ready for mainnet. Get your security and development processes automated to save you time and money. Our expertise is in automated scanning, CI/CD Pipeline development, Infrastructure as Code, Cloud Deployment, SAST/DAST integration, and experience to help build an effective DevSecOps culture. -
20
Ethiack
Ethiack
We keep you safe by combining AI automated pentesting and elite ethical hacking for both in-depth and in-breadth security testing. It’s not just your code, third-party services, APIs, and external tools all pose a risk to your organization. We give you a complete view of your entire digital exposure so you can understand its weak points. Scanners flag too many false positives and pentests are not frequent enough. Automated pentesting fixes this. It reports less than 0.5% false positives and over 20% of its findings are impactful. We have a pool of world-class ethical hackers ready for human hacking events. To join, they go through an extensive process of background checks and those that get accepted go on to find the most critical vulnerabilities in your assets. Our team has won world-class awards and found vulnerabilities on Shopify, Verizon, Steam, and many more. Add the TXT record to your DNS and start your 30-day free trial.Starting Price: €1,790 per year -
21
CyStack Platform
CyStack Security
WS provides the ability to scan web apps from outside the firewall, giving you an attacker's perspective; helps detect OWASP Top 10 and known vulnerabilities and constantly monitoring your IPs for other security threats. The team of CyStack pen-testers conducts hypothetical attacks on a customer's applications to discover security weaknesses that could expose applications to cyberattack. As a result, the technical team can fix those vulnerabilities before hackers find and exploit them. Crowdsourced Pen-test is the combination of certified experts and community of researchers. CyStack deploys, operates, and manages the Bug Bounty program on behalf of enterprises to attract a community of experts to find vulnerabilities in technology products such as Web, Mobile, Desktop applications, APIs or IoT devices. This service is a perfect solution for companies that are interested in the Bug Bounty model. -
22
Nsauditor Network Security Auditor is a powerful network security tool designed to scan networks and hosts for vulnerabilities, and to provide security alerts. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditor checks enterprise network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Network Security Auditing Software and Vulnerability Scanner Network Security Auditing Software and Vulnerability Scanner Nsauditor network auditing software significantly reduces the total cost of network management in enterprise environments by enabling IT personnel and systems administrators gather a wide range of information from all the computers in the network without installing server-side applications on these computers and create a report of potential problems that were found.Starting Price: $69 one-time payment
-
23
Inspectiv
Inspectiv
Identify complex security vulnerabilities and sensitive data exposures to reduce risk of security incidents and provide assurance to your customers. Bad actors are constantly finding new ways to compromise companies' systems, and new vulnerabilities are reintroduced every time a company pushes new code/product. Inspectiv's vigilant security researchers ensure your security testing evolves as the security landscape evolves. Fixing web and mobile application security vulnerabilities can be challenging, but the right guidance can help expedite remediation. Inspectiv simplifies the process of receiving and escalating vulnerability disclosures, and provides your team with clear, concise, and actionable vulnerability reports. Each vulnerability report demonstrates impact and provides clear remediation steps. Reports provide high level translation of risk to execs, detail to your engineers, and auditable references that integrate with ticketing systems. -
24
Hacker Target
Hacker Target
Simplify the security assessment process with hosted vulnerability scanners. From attack surface discovery to vulnerability identification, actionable network intelligence for IT & security operations. Proactively hunt for security weakness. Pivot from attack surface discovery to vulnerability identification. Find security holes with trusted open source tools. Get access to tools used by penetration testers and security professionals around the world. Hunt vulnerabilities from the attackers perspective. Simulating real world security events, testing vulnerabilities and incident response. Discover the attack surface with tools and open source intelligence. Protect your network with improved visibility. Over 1 million scans performed last year. Our vulnerability scanners have been launching packets since 2007. Fixing security issues requires you find them. Identify the issue, re-mediate the risk and test again to be sure.Starting Price: $10 per month -
25
Comodo HackerProof
Comodo
Comodo revolutionizes the way you test your website's security. Learn more about this innovative technology to protect your visitors, only available through Comodo. Comodo's exclusive Corner of Trust technology ensures consistent placement of the HackerProof TrustLogo® throughout your website. The Comodo HackerProof exclusive Point to Verify technology invites more interaction, building trust for your web site. Comodo's exclusive, patent pending technologies enable you to present your credentials on your website instead of navigating off to a vendor site and potentially losing sales. Not vulnerable to popup blockers -- Comodo's patent-pending technology uses rollover functionality to show visitors that your site is, in fact, trusted. Not Self-Promoting - Unlike other vendors, Comodo does not intrude on your website visitors to take other actions and potentially steal your valuable business. -
26
ObjectSecurity BinLens
ObjectSecurity
Conventional cybersecurity approaches are insufficient to protect today’s IT/OT/ICS software and devices. SBOM generation is limited to detecting only known vulnerabilities in published software. Source code analysis and static application security testing (SAST) produce too many false-positives, slowing down remediation. Network scanning fails in cases where devices are not connected to the network. Unlock deeper security insights with BinLens™— your all-in-one solution for advanced binary analysis. BinLens™ (formerly ObjectSecurity OT.AI Platform) uses an integrated approach, combining multiple techniques to uncover potential zero-days with unmatched precision. Powered by automated symbolic execution, it excels at detecting memory-safety violations and other undefined behaviors in binary programs, delivering a dramatically lower false-positive rate than competing tools. BinLens™ automates key manual reverse engineering tasks like static analysis, disassembly, and decompilation. -
27
Dhound
IDS Global
Your business is linked to critical infrastructure or sensitive data, and you understand the cost of a vulnerability that an attacker can find. You work under security regulations stated by the law to take certain security measures (i.e. SOC2, HIPAA, PCI DSS, etc.) and are required to conduct pentests by a third-party company. Your clients claim partnership only with reliable and secure solutions, and you keep your promises, guaranteeing your system security with the results of penetration testing. Pen test is an imitation of a real hacking attack but performed by security knights who fight for your web security with noble intentions. We conduct Penetration testing (also known as pen test or ethical hacking) so you can breathe out and be confident your system in safe hands. Unlike vulnerability assessment, ethical hacking at Dhound not just seeks vulnerabilities. It would be too easy for us. To stay ahead of adversaries, we apply hackers’ mindset and techniques but no worry!Starting Price: $30 per month -
28
StackHawk
StackHawk
StackHawk tests your running applications, services, and APIs for security vulnerabilities that your team has introduced as well as exploitable open source security bugs. Automated test suites in CI/CD are the norm for today’s engineering teams. Why should application security be any different? StackHawk is built to check for vulnerabilities in your pipeline. Built for developers is more than a tagline. It is the ethos of StackHawk. Application security has shifted left and developers need a tool for reviewing and fixing security findings. With StackHawk, application security can keep up with the pace of today’s engineering teams. Find vulnerabilities at the pull request and quickly push out fixes, all while yesterday’s security tools are waiting for someone to kick off a manual scan. A security tool that developers love to use, powered by the world’s most widely used open source security scanner.Starting Price: $99 per month -
29
BlueGriffon
Disruptive Innovations
The next-gen Web and EPUB Editor based on the rendering engine of Firefox. BlueGriffon® has a long list of famous ancestors and proudly inherits from all of them: Netscape®, Mozilla® Composer and Nvu. It is powered by Gecko, the same rendering engine you can find at the heart of Firefox®, and is filled with tons of powerful features. BlueGriffon® is used by millions of users around the world, including Universities, Governments and even the European Parliament. It is officially recommended by the French Government as the Web Authoring Tool for the French Administration in its effort to rely on and promote Free Software. BlueGriffon® is used by millions of users around the world, including Universities, Governments and even the European Parliament. It is officially recommended by the French Government as the Web Authoring Tool for the French Administration in its effort to rely on and promote Free Software.Starting Price: $87.75 one-time payment -
30
APIsec
APIsec
Hackers are targeting loopholes in API logic. Learn how to secure APIs and prevent breaches and data leaks. APIsec finds critical flaws in API logic that attackers target to gain access to sensitive data. Unlike traditional security solutions that look for common security issues, such as injection attacks and cross-site scripting, APIsec pressure-tests the entire API to ensure no endpoints can be exploited. With APIsec you’ll know about vulnerabilities in your APIs before they get into production where hackers can exploit them. Run APIsec tests on your APIs at any stage of the development cycle to identify loopholes that can unintentionally give attackers access to sensitive data and functionality. Security doesn’t have to slow down Development. APIsec runs at the speed of DevOps, giving you continuous visibility into the security of your APIs. No need to wait for the next scheduled pen-test, APIsec tests are complete in minutes.Starting Price: $500 per month -
31
Indusface WAS
Indusface
Get the most comprehensive application security audit done today. Indusface WAS with its automated scans & manual pen-testing ensures none of the OWASP Top10, business logic vulnerabilities and malware go unnoticed. With zero false positive guarantee and comprehensive report with remediation guidance, Indusface web app scanning ensures developers quickly fixes vulnerabilities. The proprietary scanner built ground up, keeping js framework driven, single page applications in mind to provide complete & intelligent crawling. With latest threat intelligence, get extensive web app scanning for vulnerabilities, and malware. Support on a functional understanding of logical flaws for an in-depth security audit.Starting Price: $49 per month -
32
Hakware Archangel
Hakware
Hakware Archangel is an Artificial Intelligence based vulnerability scanner and pentesting tool. Archangel scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities with advanced Artificial intelligence continuously testing your environment. Why use Archangel? -Identify vulnerabilities before cyber criminals do -Our vulnerability scanning mitigates the risks of a data breach, which will come with a range of costs, including remediation, the loss of customers as a result of reputational damage and fines -Vulnerability scanning is not explicitly required by the GDPR (General Data Protection Regulation) or POPI (Protection Of Personal Information Act), but the -Regulation does require organisations that process personal data to ensure that they have implemented appropriate technical and organisational security measures – which includes identifying vulnerabilities -The international standard for information security, ISO 27001Starting Price: $100 -
33
beSECURE
Beyond Security (Fortra)
A flexible, accurate, low maintenance Vulnerability Assessment and Management solution that delivers solid security improvements. Designed to get you the most accurate and fastest possible improvement in network security customized for your organization’s needs. Continually scan for network and application vulnerabilities. Daily updates and specialized testing methodologies to catch 99.99% of detectable vulnerabilities. Data driven, flexible reporting options to empower remediation teams. *Bug bounty program* for any discovered proven false positives! Complete organizational control. -
34
RedSentry
RedSentry
The quickest, most affordable penetration testing and vulnerability management solutions to help you get compliant and keep all of your assets secure, year around. Our pentest report format is easy to understand and will give you all the information you need to secure your environment. We’ll provide a customized plan of action to help you combat any vulnerabilities, prioritize based on severity, and improve your security posture. Our pentest report format is easy to understand and will give you all the information you need to secure your environment. We’ll provide a customized plan of action to help you combat any vulnerabilities, prioritize based on severity, and improve your security posture. -
35
SlimerJS
SlimerJS
SlimerJS is a free, open source scriptable browser for web developers, allowing interaction with web pages through external JavaScript scripts. It enables tasks such as opening web pages, clicking links, and modifying content, making it useful for functional tests, page automation, network monitoring, screen capture, and web scraping. Unlike PhantomJS, SlimerJS runs on top of Gecko, the browser engine of Mozilla Firefox, instead of WebKit, and can operate in both headless and non-headless modes. APIs of SlimerJS are similar to the APIs of PhantomJS but there are a few differences in their behavior. However, most of the scripts for PhantomJS run perfectly well with SlimerJS right now.Starting Price: Free -
36
Synack
Synack
Comprehensive penetration testing with actionable results. Continuous security scaled by the world’s most skilled ethical hackers and AI technology. We are Synack, the most trusted Crowdsourced Security Platform. What can you expect when you entrust your pentesting to the Synack Crowdsourced Security platform? Become one of the select few SRT members and hack among the best in the world, sharpening your skills and putting them to the test. Hydra is an intelligent AI scanning tool that alerts our SRT members of possible vulnerabilities, changes, or events. In addition to bounties for finding vulnerabilities, Missions provide payment for methodology-based security checks. Trust is earned, and our currency is straightforward. A commitment to protect our customers and their customers. Utter confidentiality. Optional anonymity. Total control over the process. Complete confidence when you need to focus on your business. -
37
Zerocopter
Zerocopter
The leading enterprise application security platform empowered by world’s best ethical hackers. Based on the amount and complexity of the projects your team(s) wants to start, you’re either a starter or an enterprise. Through our platform, you can easily control your security projects, while we manage and validate all the reports your team(s) receives. The best the ethical hacker world has to offer, joining your team in the effort of improving security. Set up your team of superb ethical hackers to search for unknown vulnerabilities in your application. We assist in selecting services, setting up programs, defining scopes and matching you with ethical hackers we vetted rigorously that match your scope. Together, we decide the scope of the Researcher Program, you specify the budget of the Researcher Program, we determine the start date and length of the Program together, and we assemble the best team of ethical hackers to match your scope.Starting Price: €1.000 per month -
38
Coinvote
Coinvote
Coinvote cryptocurrency listing & voting platform - Explore, find and vote for the next rising token. Track the latest NFT, Meme and community coins. You've probably already asked yourself how to be ahead of the others and bet on the rising cryptocurrency first? Thanks to Coinvote and our daily listing of new tokens, be early and find a project that hasn't been listed on major exchanges like CoinMarketCap, CoinGecko and others! Get the latest information from over 10,000 tokens, create your favorite list, add your token or vote for it and make your community grow to attract investors. Coinvote is the #1 community-based platform for crypto-currencies listing & voting. Explore and find the next moon shots of Meme and community coins. Discover the newest NFT, community and DeFi project which is in vogueStarting Price: -
39
VulScan
RapidFire Tools, a Kaseya Company
Discover, prioritize and manage internal and external vulnerabilities. Harden the networks you manage and protect against evolving threats with vulnerability scanning from VulScan. VulScan is a powerful tool for complete and automated vulnerability scanning. It detects and prioritizes the weaknesses that hackers can exploit, empowering you to harden networks of any size or type and creating an extra layer of cybersecurity protection. Protect the networks you manage with flexible network scanning options. Vulscan includes on-prem internal network scanners, computer-based discovery agents, remote internal scanning by proxy, and hosted external scanners for comprehensive vulnerability management.Starting Price: $99 per month -
40
Codex Security
OpenAI
Codex Security is an AI-powered application security agent developed by OpenAI to help teams detect and fix vulnerabilities in software systems. The tool analyzes code repositories to understand the structure, architecture, and potential risk areas within a project. Using this context, it identifies complex security issues that traditional scanning tools might overlook. Codex Security prioritizes vulnerabilities based on their real-world impact, helping security teams focus on the most critical threats. The system also validates findings through sandboxed testing environments to reduce false positives and improve accuracy. Once vulnerabilities are confirmed, it proposes patches and remediation steps that align with the system’s existing behavior. By combining AI reasoning with automated validation, Codex Security helps development teams ship more secure code faster. -
41
Intruder
Intruder
Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases. Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze. -
42
Rafter
Rafter
Rafter is a developer-friendly security scanning platform that lets you detect and address vulnerabilities in your GitHub repositories with a single click or command. It integrates seamlessly via a browser-based dashboard, CLI, or REST API to scan JavaScript, TypeScript, and Python code for a range of issues, including exposed API keys, SQL injection, XSS flaws, insecure dependencies, hardcoded credentials, and authentication weaknesses. Results are clearly categorized into “Errors,” “Warnings,” and “Improvements,” each offering detailed explanations, code locations, remediation steps, and formatted prompts ready to paste into AI coding assistants. You can view findings in JSON or Markdown, automate scans within CI/CD pipelines, and pull scan results directly into your workflows. Whether you prefer no-code, low-code, or full-code environments, Rafter adapts flexibly to your setup, making proactive security early in development effortless and scalable.Starting Price: $39 -
43
bugScout
bugScout
Platform for detecting security vulnerabilities and analyzing code quality of applications. bugScout was born in 2010, with the objective of promoting global application security through audit and DevOps processes. Our purpose is to promote a culture of safe development and thus provide protection for your company’s information, assets and reputation. Designed by ethical hackers and reputable security auditors, bugScout® follows international security rules and standards and is at the forefront of cybercrime techniques to keep our customers’ applications safe and secure. We combine security with quality, offering the lowest false positive rate on the market and the fastest analysis. Lightest platform on the market, 100% integrated with SonarQube. A platform that unites SAST and IAST, promoting the most complete and versatile source code audit on the market for the detection of Application Security Vulnerabilities. -
44
Strike
Strike
Strike is a cybersecurity platform offering premium penetration testing and compliance solutions to help businesses identify and address critical vulnerabilities. By connecting organizations with top ethical hackers, Strike provides tailored assessments based on specific technologies and requirements. It offers real-time reporting, allowing clients to receive immediate notifications upon discovering vulnerabilities, and supports scope adjustments during ongoing tests to align with evolving priorities. Additionally, Strike's services assist in obtaining international certification badges, aiding in compliance with industry standards. With a strategic support team offering continuous assistance and weekly recommendations, Strike ensures organizations receive tailored guidance throughout the testing process. The platform also delivers downloadable, ready-for-compliance reports, facilitating adherence to standards such as SOC2, HIPAA, and ISO 27001. -
45
Gecko Engage
Gecko Labs
Gecko is an engagement platform that transforms the student experience. It provides students and staff with a connected and customizable experience, all under one roof. Put technology and data to work across your organization to help you better engage with students, make more informed decisions and maximize all of your resources. Reach, engage and onboard more of the right students in less time with less effort. Our smart technology can help a small team of two people achieve more than a team of twenty with practical and clever solutions that work for you. -
46
PHP Secure
PHP Secure
PHP Secure is a FREE code scanner that analyzes your PHP code for critical security vulnerabilities. Free online scanner: - Quickly and qualitatively finds web app vulnerabilities - Gives explicit reports and recommendations to fix vulnerabilities - Easy to use and requires no specialized knowledge - Reduces risk, saves budget, and boosts productivity PHP Secure Scanner is suitable for analyzing sites on Php, framework Laravel, and CMS Wordpress, Drupal and Joomla. PHP Secure detects the most common and dangerous types: -SQL injection vulnerabilities -Command Injection -Cross-Site Scripting (XSS) Vulnerabilities -PHP Serialize Injections -Remote Code Executions -Double Escaping -Directory Traversal -Regular Expression Denial of Service (ReDos) -
47
Suavei
Suavei
Suavei Internet Security. Intelligent Threat Management for IoT. We detect your vulnerabilities before hackers do. Today, computer networks have open backdoors everywhere — especially in remote locations — even though a lot of capital is being spent in ineffective, time- and resource-consuming tools and processes to protect them. The number of attached network devices is exploding and each one of them has the potential to undermine even the most rigorous network security practices. Most enterprises have no visibility into 80% of the devices attached to their networks. Current cybersecurity products are clearly not sufficient to curb the increasing threats, in great part because they use old, static, techniques that are outdated and ineffective. In essence, Suavei was borne out of 3 fundamental issues we identified in other active vulnerability scanning products: They don’t identify the devices accurately and reliably. They can’t handle slow network environments. -
48
SecurityMetrics Perimeter Scan
SecurityMetrics
Comprehensive Vulnerability Assessment Scan For Network Security. Vulnerability scans and network scans find top cybersecurity risks such as misconfigured firewalls, malware hazards, remote access vulnerabilities, and can be used for cyber security or compliance mandates like PCI Compliance (PCI DSS) and HIPAA. Add and remove your own targets through your Perimeter Scan Portal. You can mass upload scan targets and groups. You can group and label scan targets to make it easier to manage by location, network type, or unique circumstances at your organization. Run port scans on your most sensitive targets more frequently, test in scope PCI targets quarterly, or test designated IPs after changes to your network with simplicity. Vulnerability scanning reports list the target, vulnerability type, service (e.g., https, MySQL, etc.), and the severity of each vulnerability (low, medium, high).Starting Price: $99.00/one-time -
49
DeepSurface
DeepSurface
DeepSurface helps you make the most of your time so you get the biggest ROI for your activities. Armed with critical knowledge of your as-built digital infrastructure, DeepSurface automates the process of scanning the over 2,000 CVE’s released each month, quickly identifying which vulnerabilities as well as which chains of vulnerabilities pose risk to your environment and which pose no risk – speeding vulnerability analysis so you can focus on what matters most. DeepSurface uses the comprehensive context gathered to create a complete threat model and hacker roadmap that helps you visualize how an attacker would move through your digital infrastructure and where they could cause the most damage. DeepSurface delivers actionable intelligence in the form of a prioritized step-by-step guide of which hosts, patches and vulnerabilities to address first so you can make the most of your time with strategic and precise actions to reduce your cybersecurity risk. -
50
SiteLock
SiteLock
We secure websites by automatically finding and fixing threats. Automatically protect your website, reputation, and visitors against cyberthreats. Comprehensive website security software protects your website from malicious cyber threats. This includes the protection of your site code and web applications. Depending on your website security package, you’ll receive daily website scans, automated malware removal, and vulnerability/CMS patching, as well as a web application firewall to block harmful traffic before it ever reaches your site. Our website security scan instantly checks your website from malware, viruses and other cyber threats and alerts you to found issues. Detect and automatically remove malicious content from your website, creating a safe experience for your customers. Easily check for website vulnerabilities in your CMS with our vulnerability scanner before they are exploited.