- Stars
- 11,843
- License
- GPL-3.0
- Last commit
- 3 days ago
Best Vulnerability Scanners Tools
Explore leading tools in the Vulnerability Scanners category, including open-source options and SaaS products. Compare features, use cases, and find the best fit for your workflow.
5 open-source projects · 3 SaaS products
Top open-source Vulnerability Scanners
These projects are active, self-hostable choices for knowledge management teams evaluating alternatives to SaaS tools.

Faraday
Collaborative platform to centralize, automate, and visualize vulnerability data
- Stars
- 6,047
- License
- GPL-3.0
- Last commit
- 2 months ago
- Stars
- 5,915
- License
- BSD-3-Clause
- Last commit
- 1 year ago
- Stars
- 4,637
- License
- Apache-2.0
- Last commit
- 4 days ago

OpenVAS Scanner
Powerful, continuously updated vulnerability scanner for comprehensive security testing.
- Stars
- 4,251
- License
- GPL-2.0
- Last commit
- 4 days ago
Agent-less vulnerability scanner for Linux, FreeBSD, containers, and more
Vuls automatically detects vulnerabilities across Linux, FreeBSD, Windows, macOS, containers, and WordPress sites without agents, delivering regular reports and Slack/email alerts for proactive security management.
Popular SaaS Platforms to Replace
Understand the commercial incumbents teams migrate from and how many open-source alternatives exist for each product.
Qualys VMDR
Risk-based vulnerability management with automated prioritization and patching.
Rapid7 InsightVM
Vulnerability management with live dashboards, unified agent, and risk-based prioritization
Tenable Vulnerability Management
Risk-based vulnerability management for continuous discovery, prioritization, and remediation
Qualys VMDR (Vulnerability Management, Detection & Response) discovers assets, continuously assesses for vulnerabilities, quantifies risk with TruRisk, and orchestrates remediation/patching via no-code workflows across hybrid environments.
Frequently replaced when teams want private deployments and lower TCO.
Explore related categories
Browse neighbouring categories in Security to widen your evaluation.
- Application Security Testing (SAST/DAST/SCA)Static/dynamic analysis and dependency (SCA) scanning for application vulnerabilities.
- Compliance Automation & GRCAutomated controls, evidence collection and audits for SOC 2, ISO 27001, HIPAA and more.
- Container SecurityContainer image scanning and Kubernetes security tools for supply chain protection.
- Data Discovery & ClassificationSensitive data discovery, classification and privacy compliance across data stores.
- Identity & SSOIdentity and single sign-on (SSO) servers for authentication and user management.
- Secrets ManagementVaults and key management systems for secure storage of credentials and secrets.


