Alternatives to urlscan.io

Compare urlscan.io alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to urlscan.io in 2026. Compare features, ratings, user reviews, pricing, and more from urlscan.io competitors and alternatives in order to make an informed decision for your business.

  • 1
    Criminal IP ASM
    Criminal IP ASM delivers a threat intelligence-powered approach to attack surface management by combining continuous asset discovery with deep threat analysis across IPs, domains, OSINT, and associated infrastructure. Built on Criminal IP’s advanced scanning and enrichment capabilities, it brings Threat Intelligence context such as vulnerability intelligence, C2 detections, malicious IP/domain correlations, and dark web exposure into every layer of asset discovery in an integrated approach that empowers security teams to proactively identify, prioritize, and mitigate threats before they are exploited.
    Compare vs. urlscan.io View Software
    Visit Website
  • 2
    Bird Eats Bug

    Bird Eats Bug

    Bird Eats Bug

    Catch, report, and fix bugs faster. Screen recording with console logs. Found a bug? Create a screen recording without launching another application. Bird replays automatically include console logs and other technical data (browser, OS, screen size, etc.) to help developers spend less time on bugs and unnecessary back-and-forth. 👇More information about Bird👇 🐦 Who is Bird for? Mainly web development teams: PMs, Engineers, QA and Designers. You can also get much better bug reports if non-technical people in your company start using Bird as well. ⏳Quick setup Takes quite literally 5 minutes. No coding or technical knowledge needed. ⚠️ JavaScript error tracker Bird automatically notifies you about JavaScript errors on the pages of your choice.
    Starting Price: $15/user/month
  • 3
    Crashtest Security

    Crashtest Security

    Crashtest Security

    Crashtest Security is a SaaS-based security vulnerability scanner allowing agile development teams to ensure continuous security before even hitting Production. Our state-of-the-art dynamic application security testing (DAST) solution integrates seamlessly with your dev environment and protects multi-page and JavaScript apps, as well as microservices and APIs. Set up Crashtest Security Suite in minutes, get advanced crawling options, and automate your security. Whether you want to see vulnerabilities within the OWASP Top 10 or you want to go for deep scans, Crashtest Security is here to help you stay on top of your security and protect your code and customers.
    Starting Price: €35 per month
  • 4
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 5
    Cloudflare Page Shield
    Backed by our world-class threat intelligence and machine learning capabilities, Page Shield helps defend against client-side attacks that target vulnerable JavaScript dependencies. Detect and mitigate browser supply chain attacks with machine learning-based protection. Get instant notifications when new scripts are detected, marked as malicious, or loaded from unknown domains. Reduce third-party vendor risk and address client-side requirements like GDPR, PCI, and more. Page Shield simplifies third-party script management by tracking loading resources (like scripts) for potentially malicious additions, connections, or changes. Powered by our threat intelligence and machine learning-based detection, it instantly identifies, reports, and blocks threats, before they reach your website. Block browser-based attacks aimed at your users’ personal and financial information. Monitor JavaScript dependencies and block threats with threat intelligence and machine learning.
  • 6
    Jsmon

    Jsmon

    Jsmon Inc.

    Jsmon is an advanced JavaScript security platform that continuously scans JS files to detect leaked secrets, sensitive information, and potential vulnerabilities. Trusted by thousands of users, it offers 24/7 JS crawling, automated threat detection, and real-time monitoring to protect your domains. Jsmon’s powerful NodeJS analysis engine identifies hardcoded API keys, credentials, and other security risks across millions of JS files and API paths. The platform features AI-powered Ask AI, which instantly translates complex scan results into plain English. Users benefit from automated notifications via Slack, email, or Discord and can track changes in JS files over time. Jsmon also supports integrations and provides detailed reporting in PDF, JSON, and CSV formats.
    Starting Price: $25/month/user
  • 7
    PlayCode

    PlayCode

    PlayCode

    The #1 JavaScript playground and sandbox to write, run and repl it. JavaScript playground is perfect for learning and prototyping javascript sandboxes. Fast and easy to use. Start a JavaScript playground project using ready-to-use templates. JavaScript is one of the most popular languages for web development. It is needed in order to make web pages alive. Today JavaScript can be run not only in the browser but also on the server. Learning, practicing and prototyping is much easier right in the javascript playground because the browser is designed to run javascript. This is the perfect coding IDE. In turn, PlayCode tries to use all the browser features to ensure maximum, comfortable run javascript sandbox. Read, evaluate, print, and loop, a simple pre-configured coding environment that quickly shows the JavaScript execution result. So, you just open PlayCode without installing anything, write code, and JavaScript playground runs your code instantly and shows the result.
    Starting Price: $4.99 per month
  • 8
    Symantec Content Analysis
    Symantec Content Analysis automatically escalates and brokers potential zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs. Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like ProxySG, messaging gateway, or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further.
  • 9
    LinkSentry

    LinkSentry

    LinkSentry

    LinkSentry protects websites and their users from harmful, broken, or unwanted external links through continuous monitoring and advanced scanning. It detects malicious threats like malware, phishing, NSFW content, expired domains, and parked sites in real time. The platform is simple to set up with a JavaScript snippet or WordPress plugin, requiring no technical expertise. Businesses can configure smart policies to customize detection, ensuring full control over link monitoring. Alerts are delivered instantly through Slack or email, alongside detailed dashboards and weekly reports for transparency. By preventing broken or dangerous links from damaging user trust, LinkSentry helps companies safeguard their reputation and revenue.
  • 10
    Akamai Client-Side Protection
    Client-Side Protection helps protect against end-user data exfiltration and shield websites from JavaScript threats. It analyzes script behavior in real-time, provides actionable insights in a single dashboard view, and delivers alerts to mitigate harmful script activity. Designed for PCI DSS v4.0, the solution helps businesses meet new script security requirements and safeguards against client-side attacks. Inject simple scripts into each monitored page without meaningfully impacting performance. Monitor and assess script activity from the browser while machine learning techniques analyze the risk of unauthorized action. Get real-time alerts, with detailed information about mitigation, if an active threat or attack is found. Immediately restrict malicious scripts from accessing and exfiltrating sensitive data on protected pages with one click. Defend your site from client-side threats. Ease compliance with PCI DSS v4.0. Strengthen your web page integrity.
  • 11
    GetScreenshot

    GetScreenshot

    GetScreenshot

    GetScreenshot is a cloud-based, programmable website screenshot API built to let users capture high-quality visual representations of any publicly accessible web page with a simple GET request or integration via tools like Zapier, making it accessible to both no-code and low-code users and ideal for automated workflows and development use cases. It enables developers to perform scalable screenshot capture operations with features such as full-page captures, element-only screenshots, customizable delays, custom CSS and JavaScript injection, and selective hiding of page elements like message clients, cookie banners, or chat widgets to tailor visuals precisely to their needs. Beyond standard PNG and JPG output, GetScreenshot also supports generating PDFs, sending screenshots directly via email, and pushing results to custom endpoints using webhook functionality, giving flexibility for reporting, archiving, monitoring, and automated notification workflows.
    Starting Price: $5 per month
  • 12
    Rafter

    Rafter

    Rafter

    Rafter is a developer-friendly security scanning platform that lets you detect and address vulnerabilities in your GitHub repositories with a single click or command. It integrates seamlessly via a browser-based dashboard, CLI, or REST API to scan JavaScript, TypeScript, and Python code for a range of issues, including exposed API keys, SQL injection, XSS flaws, insecure dependencies, hardcoded credentials, and authentication weaknesses. Results are clearly categorized into “Errors,” “Warnings,” and “Improvements,” each offering detailed explanations, code locations, remediation steps, and formatted prompts ready to paste into AI coding assistants. You can view findings in JSON or Markdown, automate scans within CI/CD pipelines, and pull scan results directly into your workflows. Whether you prefer no-code, low-code, or full-code environments, Rafter adapts flexibly to your setup, making proactive security early in development effortless and scalable.
  • 13
    SiteLock

    SiteLock

    SiteLock

    We secure websites by automatically finding and fixing threats. Automatically protect your website, reputation, and visitors against cyberthreats. Comprehensive website security software protects your website from malicious cyber threats. This includes the protection of your site code and web applications. Depending on your website security package, you’ll receive daily website scans, automated malware removal, and vulnerability/CMS patching, as well as a web application firewall to block harmful traffic before it ever reaches your site. Our website security scan instantly checks your website from malware, viruses and other cyber threats and alerts you to found issues. Detect and automatically remove malicious content from your website, creating a safe experience for your customers. Easily check for website vulnerabilities in your CMS with our vulnerability scanner before they are exploited.
  • 14
    ScreenshotOne

    ScreenshotOne

    ScreenshotOne

    ScreenshotOne is a screenshot API designed for developers to render website screenshots with a simple API call, eliminating the need to manage browser clusters and handle complex scenarios. The platform offers features such as removing ads, blocking cookie banners, and hiding chat widgets to ensure clean screenshots. It supports various customization options, including rendering in dark mode, hiding specific selectors, clicking on elements, and adding custom JavaScript and CSS. ScreenshotOne delivers pixel-perfect quality, accommodating any screen size or predefined device settings, and can capture full-page screenshots with rendered lazy-loaded images. Integration is straightforward, with support for multiple programming languages like Java, Go, Node.js, PHP, Python, Ruby, and C#. The platform also provides no-code integrations with tools such as Zapier, Airtable, and Bubble, allowing users to render website screenshots without writing code.
    Starting Price: $17 per month
  • 15
    Symantec Web Isolation
    Symantec Web Isolation executes web sessions away from endpoints, sending only a safe rendering of information to users’ browsers thereby preventing any website-delivered zero-day malware from reaching your devices. When combined with Symantec Secure Web Gateways, policies drive traffic from uncategorized sites or URLs with suspicious or potentially unsafe risk profiles through Isolation for safe browsing. By integrating with Symantec messaging solutions, Web Isolation isolates links in email to prevent phishing threats and credential attacks. Web Isolation protects against emails with links to malicious websites, so they cannot deliver malware, ransomware and other advanced attacks. It also prevents users from submitting corporate credentials and other sensitive information to unknown and malicious websites by rendering pages in read-only mode.
  • 16
    ScrapBot

    ScrapBot

    ScrapBot

    ScrapBot can navigate, authenticate, extract and insert data in any website. The system uses JavaScript for execute tasks and don't need install servers or any software. The system can control the page accessed by JavaScript and all navigation can be viewed on the software window. The main.js script is executed in a separated frame from navigation frame, but can access all content of page without any restriction.
  • 17
    DeepWebMonitor

    DeepWebMonitor

    DeepWebMonitor

    Monitor website pages for changes behind login, web forms and inside web apps. Forms, multi-step sequences, SPA and full JavaScript rendering are supported. We open websites with real browser, click on links, submit forms and perform other required actions to get to the page you need and monitor it for changes. When selected page content changes we notify you.
  • 18
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 19
    Arachni

    Arachni

    Arachni

    Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of modern web applications. It is free, with its source code public and available for review. It is multi-platform, supporting all major operating systems (MS Windows, Mac OS X and Linux) and distributed via portable packages which allow for instant deployment. It is versatile enough to cover a great deal of use cases, ranging from a simple command line scanner utility, to a global high performance grid of scanners, to a Ruby library allowing for scripted audits, to a multi-user multi-scan web collaboration platform. In addition, its simple REST API makes integration a cinch. Finally, due to its integrated browser environment, it can support highly complicated web applications which make heavy use of technologies such as JavaScript, HTML5, DOM manipulation and AJAX.
  • 20
    Jaunt

    Jaunt

    Jaunt

    Jaunt is a Java library designed for web scraping, web automation, and JSON querying. It provides a fast, ultra-light headless browser that enables Java programs to perform tasks such as web scraping, form handling, and interfacing with REST APIs. Jaunt supports parsing of HTML, XHTML, XML, and JSON, and offers features like HTTP header and cookie manipulation, proxy support, and customizable caching. The library does not support JavaScript execution; however, for automating JavaScript-enabled browsers, Jauntium is recommended. Jaunt is available under the Apache License, with a monthly edition that expires periodically, requiring users to download the latest version upon expiration. The library is suitable for tasks such as parsing and extracting data from web pages, filling out and submitting forms, and handling HTTP requests and responses. Comprehensive tutorials and documentation are available to assist users in getting started with Jaunt.
  • 21
    Baycloud

    Baycloud

    Baycloud Systems

    Effective consent and privacy protection. Automatic website scanning and privacy preserving analytics. The consent panel is displayed when a user visits for the first time, or whenever they click on the CookieQ privacy button. At any time they can interact with it to agree or disagree with cookies or other storage, or personal data processing by any of the third-parties recorded there. Parties that are not recognised or the user has not given consent for will be blocked from appearing in the user's browser. We maintain a database of known cookies names and third-party domains so we can deliver accurate first-party cookie & third-party information to users. Baycloud supports a rich API which client JavaScript can use to interact with the Consent Platform. As well as the standard TCF 1.1 and 2.0 functions there is also the ability to request user consent or assign it in response to your own UI elements.
  • 22
    Trusted Knight Protector Air

    Trusted Knight Protector Air

    Trusted Knight Corporation

    Injected seamlessly into each web page request, Protector Air disables malware, encrypts data prior to extraction and prevents content manipulation; all with no impact on customer experience. A customer’s web page request routes through Protector Air, is inspected for threats and the site response has a layer of protected Javascript added. The Javascript communicates with Protector Air’s cloud-based service to neutralize malware using integrity verification, behavioral analysis, data encryption and by disabling malicious scripts. Threat data is returned to the website owner for reporting, session management and policy development. Stops customer data theft that costs companies millions of dollars in hard losses, and even more in brand reputation damage and share price falls. Inbound calls from compromised customers, or those persuaded to download agent-based endpoint protection, never materialize.
  • 23
    JSDefender

    JSDefender

    PreEmptive

    Cutting-edge JavaScript obfuscation techniques with control-flow flattening, tamper detection and other in-app protection transforms. We would not send our own unprotected code to a remote service controlled by third parties and we would not expect you to either. JSDefender supports major JavaScript frameworks, runtimes, and bundlers including Angular, Node, React, React Native, Webpack and others. Unlike languages like .NET and Java that are compiled to intermediate, stack-based assembly instructions before being distributed in binary form, JavaScript apps are typically distributed in source form. This means that your code is directly visible to anyone with access to the execution environment (like a browser). So, potential attackers can very easily step through the running code using a debugger built into their browser, or use other tools to statically analyze the code for vulnerabilities.
  • 24
    Screenshot Scout

    Screenshot Scout

    Screenshot Scout

    Screenshot Scout is a managed screenshot automation service for developers who need reliable, production-ready captures of web pages. With one HTTP request, it renders screenshots from any URL and automatically clears common clutter such as cookie banners, chat widgets, and ads. You can emulate devices or set precise viewports, capture full pages with scrolling to load lazy content, or target a specific element via CSS selector. Customize before capture by hiding selectors, clicking elements, choosing request location, injecting CSS or JavaScript, and enabling dark mode. Export PNG, JPEG, WebP, or PDF, use caching, and optionally upload results to S3-compatible storage. Plans range from a free tier (200 shots/month, no card) to production and enterprise volumes. No SDK is required, and examples are provided.
    Starting Price: $19/month
  • 25
    Cuckoo Sandbox
    You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment. Malware is the swiss-army knife of cybercriminals and any other adversary to your corporation or organization. In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments.
  • 26
    Olitt

    Olitt

    Olitt

    Olitt is a free drag-and-drop website builder that hands you the tools you need to succeed online. Choose from our collection of 200+ premium designs for any business use cases. Our suite of configurations keeps you focused on the only thing that matters, your core product. Collect payments on your landing pages and websites using ready made Stripe and Paypal Payment Integrations. Track and monitor traffic using Google Web Tools by adding Google Analytics & Tag Manager in the integration section. Integrate with any platform by adding Custom JavaScript to your page footer section. Popular integrations include Livechat, Help Desk and Facebook Pixel. All-inclusive, with no hidden charges. Olitt supports domain names, DNS management, SEO tools & free SSL certificates. Manage your domain names records from a secure DNS management platform for free.
    Starting Price: $1.99 per month
  • 27
    WebScraping.ai

    WebScraping.ai

    WebScraping.ai

    WebScraping.AI is an AI-powered web scraping API that simplifies data extraction by handling browsers, proxies, CAPTCHAs, and HTML parsing on behalf of the user. By providing a URL, users can receive the HTML, text, or data from the target webpage. The platform features JavaScript rendering in a real browser, ensuring that page content appears exactly as it would on a user's computer. It also offers automatically rotated proxies, allowing users to scrape any site without limitations, with geotargeting options available. HTML parsing is performed on WebScraping.AI's servers, alleviating concerns about heavy CPU load and potential vulnerabilities in HTML parsers. Additionally, the platform includes tools powered by large language models to extract unstructured page content, provide answers to questions, generate summaries, and perform rewrites. Users can extract visible page text after JavaScript rendering and use it as a prompt for their own LLM models.
    Starting Price: $29 per month
  • 28
    ScrapFly

    ScrapFly

    ScrapFly

    Scrapfly offers a suite of APIs designed to streamline web data collection for developers. Their web scraping API enables efficient extraction of web pages, handling challenges like anti-scraping measures and JavaScript rendering. The Extraction API utilizes AI and large language models to parse documents and extract structured data, while the screenshot API allows for capturing high-quality visuals of web pages. These tools are built to scale, ensuring reliability and performance as data needs grow. Scrapfly also provides comprehensive documentation, SDKs in Python and TypeScript, and integrations with platforms like Zapier and Make to facilitate seamless integration into various workflows.
    Starting Price: $30 per month
  • 29
    Gaffa

    Gaffa

    Gaffa

    Gaffa is a REST API for browser automation that enables developers to control real, full browsers at scale with a single API call, eliminating the need to manage headless-browser frameworks, proxies, scaling, or infrastructure. It handles JavaScript rendering by default, ensuring that pages load exactly as they would for a real user, and supports a variety of automation tasks: scraping websites, taking screenshots, exporting pages to PDF, converting pages into clean, LLM-ready Markdown, infinite-scroll scraping of dynamic sites, form filling, capturing full-page screenshots, and archiving pages in offline form. Gaffa includes a rotating residential proxy network to ensure reliable access from different geographies, automatic CAPTCHA handling (where needed), and a credit-based usage model where you pay for actual browser execution time and bandwidth, simplifying scaling and cost control.
    Starting Price: $29 per month
  • 30
    PatrOwl

    PatrOwl

    PatrOwl.io

    PatrowlHears supports your vulnerability watch process for your internal IT assets (OS, middleware, application, Web CMS, Java/.Net/Node library, network devices, IoT). Vulnerabilities and related exploitation notes at put at your disposal. Scan continuously websites, public IP, domains and subdomains for vulnerabilities, misconfigurations. Perform the reconnaissance steps, including the asset discovery and the full-stack vulnerability assessment and the remediation checks. Automation of static code analysis, external resources assessment and web application vulnerability scans. Access a comprehensive and continuously updated vulnerability database scored and enriched with exploit and threat news information. Metadata are collected and qualified by security experts from public OSINT and private feeds.
    Starting Price: €49 per month
  • 31
    Project Shield

    Project Shield

    Project Shield

    Project Shield, created by Google Cloud and Jigsaw and powered by Google Cloud Armor, provides free unlimited protection against DDoS attacks, a type of digital attack used to censor information by taking websites offline. Project Shield filters out malicious traffic using Google's infrastructure and DDoS tools. If your website is targeted by a DDoS attack, our servers will block attacking traffic to keep your website up and running. Project Shield can be configured to fetch content from your website's servers once and serve a cached copy on subsequent requests. This reduces traffic to your servers and absorbs potential DDoS attacks. Project Shield caches content to strengthen DDoS defenses, improve site performance, and save bandwidth to sites. Users have the ability to invalidate caches for their site's needs. Project Shield provides controls such as JavaScript cookies and IP denylists for increased site protection.
  • 32
    Browshot

    Browshot

    Browshot

    Browshot is a real-time web page screenshot service and API that lets developers programmatically capture high-quality screenshots of any live website in multiple resolutions and device types, including desktop and mobile browsers supporting HTML5, CSS3, and JavaScript rendering for accurate visual output. It provides a comprehensive REST API with simple and full feature sets, enabling automatic requests for screenshots, thumbnails of any size and ratio, and even full-page captures with configurable options like delay before capture, custom headers, and CSS selector targeting; results can be retrieved, hosted, and downloaded directly or automatically uploaded to AWS S3/CDN. Browshot supports over 30 different browser configurations and offers open source libraries and command-line tools for easy integration with languages like Python, PHP, Perl, Ruby, C#, and Node.js.
  • 33
    Wijmo

    Wijmo

    GrapeCity

    High-performance JavaScript UI controls for enterprise apps. Build lightweight, high-speed HTML5/JavaScript apps with zero dependencies, fast! New in Wijmo 2022 v1: - Inventory management reference app built in Angular - Website traffic monitoring reference app built in Angular - FlexMap added to GeoDashboard reference app - Rotated Spline Chart - Re-order FlexGrid rows with drag and drop General Features of Wijmo: - CellTemplates for Angular, React and Vue FlexGrids - Use Wijmo’s single set of true JavaScript controls in any framework, including Angular, React, and Vue.js - Use controls as native HTML elements with Wijmo Web Components - Filter, group, sort, and more with FlexGrid, JavaScript’s fastest data grid - Visualize data with 80+ charts and controls - Instantly analyze and aggregate data with OLAP Pivot Grid
    Starting Price: $695 per user per year
  • 34
    PDF-LIB

    PDF-LIB

    PDF-LIB

    Create and modify PDF documents in any JavaScript environment. Create PDF documents from scratch, or modify existing PDF documents. Draw text, images, and vector graphics. Embed your own fonts. Even embed and draw pages from other PDFs. Written in TypeScript and compiled to pure JavaScript with no native dependencies. Works in any JavaScript runtime, including browsers, Node, Deno, and even React Native. Add, insert, and remove pages. Split a single PDF into separate ones. Or merge multiple PDFs into a single document. Create new forms or fill and read existing fields. Checkboxes, buttons, radio groups, dropdowns, option lists, and text fields are all supported. If you aren't using a package manager, UMD modules are available on the unpkg and jsDelivr CDNs. Note that only some PDF readers can view attachments. This includes Adobe Reader, Foxit Reader, and Firefox. If you are using the CDN scripts in production, you should include a specific version number in the URL.
  • 35
    Gridsome

    Gridsome

    Gridsome

    Gridsome makes it easy for developers to build static generated websites & apps that are fast by default. Vue.js, GraphQL & all the power of Node.js & the JavaScript ecosystem. Develop locally and get instant hot-reloading for any code change. Gridsome builds ultra performance into every page by using the PRPL pattern. You get code splitting, asset optimization, progressive images, and link prefetching out of the box. Gridsome sites get almost perfect page speed scores by default. Gridsome generates static PWAs. Only critical HTML, CSS, and JavaScript get loaded first. The next pages are then prefetched so users can click around incredibly fast without page reloads, even when offline. Gridsome sites load as static HTML before they hydrate into fully Vue.js-powered SPAs. This makes it possible for search engines to be able to crawl content and give better SEO ranking, and still have all the power of Vue.js.
  • 36
    Prerender

    Prerender

    Prerender

    Get higher rankings by serving crawlers a static HTML version of your Javascript website, without compromising your customers’ experience. Prerender® is a SaaS platform that makes your JavaScript website SEO-friendly. Before your customer can find your website on search engines like Google, it first has to be crawled and indexed by one of their web crawlers, such as Googlebot. They do this by reading and cataloging a stripped-down, HTML version of your website with the visual and interactive elements taken away. This normally isn’t an issue if your website is built in static HTML, and typically takes just a few days. If your website is made in a JavaScript framework, it’s a different story. While Google can crawl websites built in JavaScript, it’s much harder for them to do. It can easily take weeks before your JavaScript website can be indexed and found in the search results. Google will see all of your content and links, and get your website in front of your customers in no-time.
    Starting Price: $90 per month
  • 37
    Urlbox

    Urlbox

    Urlbox

    Urlbox is the trusted website screenshot service that delivers flawless, full-page captures at scale via a single, developer-friendly API. Designed from the ground up for high-volume, automated screenshots, it renders pages “as meticulously as a designer on macOS,” supports over 100 browser rendering options (including viewport, element and full-page modes), and produces PNG, PDF, video or fully hydrated HTML, Markdown and metadata outputs with custom JavaScript. Whether you need one screenshot or one million before breakfast, Urlbox’s globally distributed, headless-browser infrastructure handles massive workloads without breaking a sweat. It's a single API call that lets you control dimensions, formats, device emulation, authentication, CSS injection, dark mode, banner hiding, and more, ensuring accuracy, consistency, and security for research, compliance, design, marketing, and monitoring.
    Starting Price: $49 per month
  • 38
    Indusface WAS

    Indusface WAS

    Indusface

    Get the most comprehensive application security audit done today. Indusface WAS with its automated scans & manual pen-testing ensures none of the OWASP Top10, business logic vulnerabilities and malware go unnoticed. With zero false positive guarantee and comprehensive report with remediation guidance, Indusface web app scanning ensures developers quickly fixes vulnerabilities. The proprietary scanner built ground up, keeping js framework driven, single page applications in mind to provide complete & intelligent crawling. With latest threat intelligence, get extensive web app scanning for vulnerabilities, and malware. Support on a functional understanding of logical flaws for an in-depth security audit.
    Starting Price: $49 per month
  • 39
    SmarterStats

    SmarterStats

    SmarterTools Inc.

    SmarterStats offers true web log analytics to provide a complete understanding of the popularity and performance of your online presence. Google Analytics and script-based website analysis products only track those pages that have a script added to them, and then only track those visitors that allow JavaScript. A web server logs every visit to every web page of a site, making log analytics many times more reliable than script-based products. SmarterStats has several reports that analyze website traffic and help business owners improve a site’s overall performance. Along with pre-built reports, webmasters, marketers and business owners can build their own custom reports so the information they need is the information they get. Site Tuning helps improve a website's overall performance and search engine compatibility. By looking for common, and sometimes hidden, issues that could cause visitors to leave your site, and search engines to avoid it,
    Starting Price: $299 one-time payment
  • 40
    IxEdit

    IxEdit

    IxEdit

    IxEdit is a JavaScript-based interaction design tool for the web. With IxEdit, designers can practice DOM-scripting without coding to change, add, move, or transform elements dynamically on your web pages. Especially, IxEdit must be useful to try various interactions rapidly in the prototyping phase of your web application. Interactions are visual changes of the screen which occur when users act on user interface elements. In other words, interactions are the behaviors of the user interface. For instance, when a user click a button, an image switches to another, or when a user drags an edge, the viewport expands. Those are interactions. Users are doing their jobs with a computer through various interactions generally. To implement interactions on a web page, programming with JavaScript is needed. However, it is hard to manage JavaScript for many designers. Therefore, making well-designed web interactions is difficult in general. IxEdit solves this problem.
  • 41
    Oorian

    Oorian

    Corvus Engineering

    Oorian is a server-side Java web framework for building interactive web applications without writing JavaScript. HTML elements are Java objects with type-safe styling, events are handled with standard Java listeners, and real-time updates flow automatically via AJAX, SSE, or WebSocket—your choice per page. Rather than reinventing UI components, Oorian wraps best-of-breed JavaScript libraries (AG Grid, Syncfusion, Chart.js, and 150+ more), so you get enterprise-grade components maintained by specialists. Battle-tested in production for over 10 years, Oorian is free for non-commercial use with commercial licensing available.
  • 42
    JavaScript

    JavaScript

    JavaScript

    JavaScript is a scripting language and programming language for the web that enables developers to build dynamic elements on the web. Over 97% of the websites in the world use client-side JavaScript. JavaScript is one of the most important scripting languages on the web. Strings in JavaScript are contained within a pair of either single quotation marks '' or double quotation marks "". Both quotes represent Strings but be sure to choose one and STICK WITH IT. If you start with a single quote, you need to end with a single quote. There are pros and cons to using both IE single quotes tend to make it easier to write HTML within Javascript as you don’t have to escape the line with a double quote. Let’s say you’re trying to use quotation marks inside a string. You’ll need to use opposite quotation marks inside and outside of JavaScript single or double quotes.
  • 43
    Staclo.host

    Staclo.host

    Cowboy Labs s.r.o

    Staclo.host is a user-friendly platform designed to simplify the deployment of static websites. It allows users to effortlessly share HTML, CSS, and JavaScript files, making it ideal for app frontends, static pages, PDFs, and more. With a focus on speed and simplicity, Staclo.host enables quick and efficient hosting of static content.
    Starting Price: $4/month
  • 44
    Auslogics Anti-Malware
    Detects malware, spyware and viruses, then safely removes them from your PC to help keep it as secure as possible. The program is made to complement your main antivirus. Detects malicious items you'd never suspect existed. Flexible scheduling of automatic scans. Catches items your antivirus may miss, making your PC more secure. Keeps your computer safe and secure, giving you the peace of mind you need. Designed not to conflict with your main antivirus, no matter what brand. Checks system memory for malicious programs that could be running. Detects cookies that track your activity and collect your personal data. Checks system and temporary folders for security issues. Analyzes auto-start items and suspicious entries in the registry. Checks the safety of programs set to auto-start in the task schedule. Scans browser extensions to prevent data leaks. Quick scan, which analyzes the most important areas where threats can be found.
    Starting Price: $39.95 per year
  • 45
    Hacker AI

    Hacker AI

    Hacker AI

    Hacker AI is an artificial intelligence system that scans source code to identify potential security weaknesses that may be exploited by hackers or malicious actors. By identifying these vulnerabilities, organizations can take steps to fix the issues and prevent security breaches. Hacker AI is created by a French company based in Toulouse that uses a GPT-3 model. Please compress your project source code into a single Zip archive and upload it. Check your email, as you will receive the vulnerability detection report within 10 minutes. The Hacker AI is in the beta phase and the results it provides are not useful without the guidance of a cybersecurity expert with a background in code analysis. We do not sell or use your code source for malicious purposes. It is strictly used for the detection of vulnerabilities. If necessary, you can request a dedicated non-disclosure agreement (NDA) from us. You can also request a private instance.
  • 46
    Zenmap

    Zenmap

    Zenmap

    Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database. You can download Zenmap (often packaged with Nmap itself) from the Nmap download page. Zenmap is quite intuitive, but you can learn more about using it from the Zenmap User's Guide or check out the Zenmap man page for some quick reference information.
  • 47
    VisitorLAB

    VisitorLAB

    VisitorLAB

    No more guesswork! Let your visitors tell you what they want. Make your website perfect based on visitors' actions, needs and wants. Heatmaps. Observe user movements better with the help of heat maps. Measure where your visitors focusing most on your website with the analysis of mouse movements, click rates and page transitions. Session Replay. Keep track of your users' behavior closely through visitor records. See the usage patterns of your visitors on their website. Witness all the experience through videos in a live way. Error Detection. VisitorLAB creates a detailed list of client-side JavaScript errors that occur in browsers for you and warns you about these errors. This will help you to quickly find errors from all different kinds of browsers, devices and fix them immediately. It makes your visitors' and development team lives easier. AI LAB. In addition to that VisitorLAB will show you some UI and UX suggestion to increase interaction based on the data which we analyzed
    Starting Price: $9 per user, per month
  • 48
    Browsera

    Browsera

    Browsera

    Browsera tests and reports cross-browser layout differences and scripting errors on your site. Browsera locates cross-browser layout problems automatically by comparing each browser's output. JavaScript errors from each browser are collected and reported after your test is complete. With the site crawling feature, it's easy to test all of the different pages on your site. Most of your sites require authentication. No sweat, Browsera can handle logging in prior to running each test. Tired of building and maintaining a physical or virtual test lab? Our service runs entirely in the cloud, so there's nothing to install. Have a bunch of AJAX and DHTML on your site? Not to worry, we wait for the page to be ready before testing it. Browsera will notify you of possible cross-browser layout problems it finds while testing your site. Instead of having to check out each screenshot on your own, you'll get a report detailing which pages have potential problems.
  • 49
    LayerX

    LayerX

    LayerX

    LayerX Enterprise Browser Extension analyzes web sessions at the utmost granular elements to prevent attacker-controlled webpages from performing malicious activities and users from putting enterprise resources at risk, without disrupting their legitimate interactions with websites, data and applications Prevent risk to your data, apps, and devices with access and activity policies. Enhance identity protection by using the browser extension as an additional authentication factor. Dynamically scan every web page to disclose malicious code, content and files. Monitor user activities to detect potential compromise or data loss. Create adaptive or rule-based policies that respond to detected risk with a wide range of protective actions, from restricting ֵactivities and web page behavior to full blocking.
  • 50
    VirusTotal

    VirusTotal

    VirusTotal

    VirusTotal inspects items with over 70 antivirus scanners and URL/domain blocklisting services, in addition to a myriad of tools to extract signals from the studied content. Any user can select a file from their computer using their browser and send it to VirusTotal. VirusTotal offers a number of file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. The web interface has the highest scanning priority among the publicly available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API.