Alternatives to Kontra
Compare Kontra alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Kontra in 2026. Compare features, ratings, user reviews, pricing, and more from Kontra competitors and alternatives in order to make an informed decision for your business.
-
1
SaltStack
SaltStack
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems. -
2
SecureFlag
SecureFlag
SecureFlag’s hands-on training in real development environments offers a tailored approach to enterprise training needs. 45+ technologies supported and over 150 vulnerability types covered. Each comprises a fully configured development environment. With more than 70% of vulnerabilities introduced during development, writing secure software is more critical than ever. SecureFlag has revolutionized the approach to secure coding training. With SecureFlag’s hands-on labs, participants learn in virtualized environments using the tools they know and love. SecureFlag’s Labs teaches participants how to identify and remediate the most prevalent security issues by doing instead of simply just seeing. Labs run in real, virtualized development environments, and participants learn using the same tools they use at work. Engage with your organization’s developer community and promote learning through enjoyable competition. -
3
HackEDU's hands-on secure coding training uses real applications, real tools and where developers actually have to code. At HackEDU, our primary goal is to increase the security of your applications and reduce vulnerabilities in code. We provide best in class hands-on secure coding training for companies looking to train developers to code more securely to reduce vulnerabilities in software.
-
4
Code Review Lab
Code Review Lab
Code Review Lab is a hands-on secure coding and code review training platform designed to help developers, security engineers, and DevSecOps teams identify, understand, and fix real-world vulnerabilities before they reach production. Rather than relying on passive learning such as videos or slides, Code Review Lab immerses users in realistic code review scenarios where they analyze vulnerable code, spot security flaws, and apply secure fixes. The platform focuses on practical, job-relevant skills and mirrors the challenges engineers face in real development environments. Code Review Lab supports multiple programming languages and covers a wide range of application security topics, including common vulnerability classes, secure coding best practices, and real-world attack patterns. Interactive exercises provide immediate feedback, reinforcing a security-first mindset and helping teams continuously improve their secure coding capabilities.Starting Price: $7/month/user -
5
AppSec Labs
AppSec Labs
AppSec Labs is a dedicated application security organization, positioned in the top 10 application security companies worldwide. Our mission is to share our hands-on experience, by providing cutting-edge penetration tests, training/academy & consulting. Full cycle application security consulting services, from design to production. Penetration testing and security assessment services for web, desktop, and mobile applications. High-end, hands-on, training in secure coding and penetration testing on a variety of platforms. We work with a multitude of clients from different industry vectors. In addition to our high-profile customers, we work with small companies and young start-ups. Working with a diverse range of companies from the fields of technology, finance, commerce, HLS, and many more, enables us to allocate the best-suited, experienced, and most naturally-inclined team member to each client, guaranteeing the highest level of service. -
6
Security Journey
Security Journey
Our platform takes a unique level approach, transitioning learners from security basics to language-specific knowledge to the experiential learning required to become security champions. With lessons offered in multiple formats, including text, video, and hands-on sandbox environments, there is a modality that resonates with every learning style. Organizations with teams of security champions develop a security-first mindset that allows them to deliver safer, more secure applications. Security Journey offers robust application security education tools to help developers and the entire SDLC team recognize and understand vulnerabilities and threats and proactively mitigate these risks. The knowledge learners acquire in our programs goes beyond helping learners code more securely, it turns everyone in the SDLC into security champions. Our flexible platform makes it quick and easy to achieve short-term compliance goals, and target current problems.Starting Price: $1,650 per year -
7
CMD+CTRL Training
CMD+CTRL
CMD+CTRL Training is a leading provider of software security training, offering an industry-leading learning platform designed to help organizations create secure software. Their comprehensive training solutions include over 350 courses and labs covering more than 60 languages and frameworks, structured into progressive learning journeys with certifications. The platform features ultra-realistic, gamified, hands-on training environments that present real-world scenarios, provide real-time feedback, and engage participants through competitive challenges. Detailed insights are offered through customizable skills assessments, robust reporting, and benchmarking tools. CMD+CTRL Training caters to all roles across the software development lifecycle—builders, operators, and defenders, aiming to elevate software security postures. With over 20 years of expertise in industry best practices, the company emphasizes exceptional customer service and support. -
8
we45
we45
Application development today is fraught with challenges like speed, scalability and quality which have relegated security to a post development consideration. Today, Application Security Testing (AST) is performed only in the final stages of the SDLC(Software Development Life Cycle) which is expensive, disruptive and inefficient. Today’s DevOps environments demand a low distraction security model which is integrated with product development. we45 helps product teams build an application security tooling framework that enables the identification and remediation of vulnerabilities within the development phase and ensure fewer security vulnerabilities in production. Security Automation from the get-go. Integrate AST(Application Security Testing) with Continuous Integration/Deployment platforms like Jenkins and perform security checks right from when the code is checked in. -
9
Symbiotic Security
Symbiotic Security
Symbiotic Security puts code security in your flow, not in your way, with AI-powered, developer-centric solutions. By embedding real-time vulnerability detection, contextual remediation, and just-in-time training directly into the IDE teams accelerate development cycles and increase code security - no matter where the code comes from. Its continuous learning loop, where developers train the AI and the AI coaches developers, drives smarter, faster, and more secure development at scale. With Symbiotic, enterprises don’t just reduce security risk, they eliminate security debt and empower their teams to grow into security-savvy engineers. -
10
Secure Code Warrior
Secure Code Warrior
Secure Code Warrior is a proven suite of secure coding tools. They are contained within one powerful platform which moves the focus from reaction to prevention. The platform trains and equips Developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development - allowing them to ship secure code with confidence. Secure Code Warrior 'starts left' within the Software Development Life Cycle (SDLC); focusing on making the Developer the first line of defense by preventing coding vulnerabilities from happening in the first place. Most current application security tools focus on 'shifting left' in the SDLC – an approach that supports detection and reaction – detect the vulnerabilities in the written code and react to fix them. According to the National Institute of Standards and Technology, it is 30 times more expensive to detect and fix vulnerabilities in committed code than it is to prevent them. -
11
RangeForce
RangeForce
Build cyber resilience through RangeForce hands-on training and team exercises. Train in emulated, realistic environments featuring real IT infrastructure, real security tools, and real threats. Cut cost over traditional cyber training programs and complex on-premise cyber ranges. Our solutions offer team-based training for a variety of experience levels. Choose from hundreds of interactive modules to understand critical security concepts and see the most important security tools in action. Prepare your team to defend against complicated threats with realistic threat exercises. Train in customizable, virtual environments that emulate your own security stack. -
12
Security Innovation
Security Innovation
Security Innovation solves software security from every angle: whether fix-driven assessments or novel training to learn & never forget, we make risk reduction a reality. Build powerful skills with the industry’s only software-focused cyber range. Cloud-based with nothing to install, just bring the attitude. Go beyond the code to reduce real risk! Industry’s largest coverage for those that build, operate, and defend software, from beginner to elite. Simply put, we find vulnerabilities others can’t. More importantly, we provide tech-specific remediation to ensure you can fix them. Secure cloud operations, IT Infrastructure hardening, Secure DevOps, software assurance, application risk rating, and more. Security Innovation is an authority on software security and helps organizations build and deploy more secure software. Security Innovation specializes in software security, an area where traditional “information security” and “business” consultants tend to struggle. -
13
GuardRails
GuardRails
Empowering modern development teams to find, fix and prevent vulnerabilities related to source code, open source libraries, secret management and cloud configuration. Empowering modern development teams to find, fix, and prevent security vulnerabilities in their applications. Continuous security scanning reduces cycle times and speeds up the shipping of features. Our expert system reduces the amount of false alerts and only informs about relevant security issues. Consistent security scanning across the entire product portfolio results in more secure software. GuardRails provides a completely frictionless integration with modern Version Control Systems like Github and GitLab. GuardRails seamlessly selects the right security engines to run based on the languages in a repository. Every single rule is curated to decide whether it has a high security impact issue resulting in less noise. Has built an expert system that detects false positives that is continuously tuned to be more accurate.Starting Price: $35 per user per month -
14
Avatao
Avatao
Avatao’s security training goes beyond simple tutorials and videos offering an interactive job-relevant learning experience to developer teams, security champions, pentesters, security analysts and DevOps teams. With 750+ challenges and tutorials in 10+ languages, the platform covers a wide range of security topics across the entire security stack from OWASP Top 10 to DevSecOps and Cryptography. The platform immerses developers in high-profile cases and provides them with real, in-depth experience with challenging security breaches. Engineers will actually learn to hack and patch the bugs themselves. This way Avatao equips software engineering teams with a security mindset that increases their capability to reduce risks and react to known vulnerabilities faster. This in turn increases the security capability of a company to ship high-quality products. -
15
Rezilion
Rezilion
Automatically detect, prioritize and remediate software vulnerabilities with Rezilion’s Dynamic SBOM. Focus on what matters, eliminate risk quickly, and free up time to build. In a world where time is of the essence, why sacrifice security for speed when you can have both? Rezilion is a software attack surface management platform that automatically secures the software you deliver to customers, giving teams time back to build. Rezilion is different from other security tools that create more remediation work. Rezilion reduces your vulnerability backlogs. It works across your stack, helping you to know what software is in your environment, what is vulnerable, and what is actually exploitable, so you can focus on what matters and remediate automatically. Create an instant inventory of all of the software components in your environment. Know which of your software vulnerabilities are exploitable, and which are not, through runtime analysis. -
16
Codebashing
Checkmarx
Codebashing is Checkmarx’s in-context eLearning platform that sharpens the skills developers need to fix vulnerabilities and write secure code. Expanding on the learn-by-doing concept, Codebashing teaches developers the principles of secure coding and helps them sharpen application security skills in the most efficient way. Give your developers the skills they need to increase security and reduce risk right from the start. Transform developer security training into an ongoing experience that integrates seamlessly into daily workflows, making learning continuous, personalized, and directly aligned with developers’ evolving needs. Personalized secure code training journeys are carefully crafted to equip developers with role-specific knowledge, making security training both relevant and effective. This custom learning path includes 85 lessons, covering all SDLC aspects, designed to help security-minded developers become security champions for your enterprise. -
17
PatrOwl
PatrOwl.io
PatrowlHears supports your vulnerability watch process for your internal IT assets (OS, middleware, application, Web CMS, Java/.Net/Node library, network devices, IoT). Vulnerabilities and related exploitation notes at put at your disposal. Scan continuously websites, public IP, domains and subdomains for vulnerabilities, misconfigurations. Perform the reconnaissance steps, including the asset discovery and the full-stack vulnerability assessment and the remediation checks. Automation of static code analysis, external resources assessment and web application vulnerability scans. Access a comprehensive and continuously updated vulnerability database scored and enriched with exploit and threat news information. Metadata are collected and qualified by security experts from public OSINT and private feeds.Starting Price: €49 per month -
18
Qwiet AI
Qwiet AI
The Fastest Code Analysis, Hands Down. 40X faster scan times so developers never have to wait for results after submitting pull requests. The Most Accurate Results. Qwiet AI has the highest OWASP Benchmark score, which is nearly triple the commercial average and more than double the 2nd highest score. Developer-Centric Security Workflows. 96% of developers report that disconnected security and development workflows inhibit their productivity. Implementing developer-centric AppSec workflows decreases mean-time-to-remediation (MTTR), typically by 5X - enhancing both security and developer productivity. Automatically Find Business Logic Flaws in Dev. Identify vulnerabilities that are unique to your code base before they reach production. Achieve Compliance. Demonstrate and maintain compliance with security and privacy regulations such as SOC 2, PCI-DSS, GDPR, and CCPA.Starting Price: Free -
19
Coana
Socket
Traditional SCA tools do not distinguish between exploitable and unexploitable vulnerabilities. As a consequence, up to 95% of the vulnerabilities that developers are remediating 'are irrelevant and can be safely ignored. Coana employs reachability analysis to eliminate up to 95% false positives. As a consequence, developers only need to remediate the remaining few vulnerabilities that are relevant. With up to 95% of vulnerabilities being unreachable, you save time and resources by focusing only on the remaining few that pose a real threat. Pinpoint the exact locations in your code affected by reachable vulnerabilities. See exactly which dependency updates are necessary to remediate reachable vulnerabilities. Identify reachable vulnerabilities in both direct and indirect dependencies.Starting Price: $20 per user per month -
20
Data Theorem
Data Theorem
Inventory your apps, APIs, and shadow assets across your global, multi-cloud environment. Establish custom policies for different types of asset groups, automate attack tools, and assess vulnerabilities. Fix security issues before going into production, making sure application and cloud data is compliant. Auto-remediation of vulnerabilities with rollback options to stop leaky data. Good security finds problems fast, but great security makes problems disappear. Data Theorem strives to make great products that automate the most challenging areas of modern application security. The core of Data Theorem is its Analyzer Engine. Utilize the Data Theorem analyzer engine & proprietary attack tools to hack and exploit application weaknesses continuously. Data Theorem has built the top open source SDK called TrustKit, used by thousands of developers. Our technology ecosystem continues to grow so that customers can continue to secure their entire Appsec stack with ease. -
21
StackFuel
StackFuel
StackFuel is a state-certified training partner that offers online courses for data analytics, data science and coding. StackFuel uses its expertise and experience from working with Germany's most successful companies to develop uniquely practice-oriented training courses. Participants learn hands-on and are supervised by expert mentors and career coaches to successfully transition into a career in data or continue their professional development with new skills. Fully online and full- or part-time.Starting Price: €284.41 -
22
Mobb
Mobb
Mobb automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation. Mobb lets organizations take control of securing applications with trusted, automated fixes that are informed and verified by the developers who own the source code. Organizations are able to act fast to significantly reduce the chances of being impacted by a security vulnerability exploit. CISOs can finally start reporting reductions in vulnerability backlogs, security teams can streamline processes and policies, and developers can quickly execute fixes with more trust and less friction. -
23
SANS Security Awareness
SANS Institute
Role-based and progressive training paths are geared towards all involved in the development process. Create a secure culture and ecosystem to mitigate vulnerabilities in critical web applications. With SANS developer training, we clarify the challenges in continuous deployment around the Secure Software Development Lifecycle (SDLC). Teach learners what to watch for in every stage of agile development and ensure your entire team, from developers to architects, managers, and testers creates web applications in a secure environment, and where to place the best security protection for your apps. By educating everyone involved in the software development process including developers, architects, managers, testers, business owners, and partners, you reduce the chances that your organization will become a victim of today’s data security threats and attacks, and ensure that your team can properly build defensible applications from the start. -
24
Black Duck
Black Duck
Black Duck, part of the Synopsys Software Integrity Group, is a leading provider of application security testing (AST) solutions. Their comprehensive portfolio includes tools for static analysis, software composition analysis (SCA), dynamic analysis, and interactive analysis, enabling organizations to identify and mitigate security vulnerabilities throughout the software development life cycle. By automating the discovery and management of open-source software, Black Duck ensures compliance with security and licensing standards. Their solutions are designed to help organizations build trust in their software by managing application security, quality, and compliance risks at the speed their business demands. Black Duck empowers businesses to innovate securely and deliver software with confidence. -
25
Xygeni
Xygeni Security
Xygeni All-In-One AppSec Platform protects software from code to cloud with a unified solution built for Application Security Posture Management (ASPM). It gives CISOs, CIOs, and DevSecOps teams full visibility and control across the software supply chain, without slowing delivery. Xygeni secures every SDLC stage, code, dependencies, secrets, builds, IaC, containers, and CI/CD systems, detecting vulnerabilities, misconfigurations, and malware in real time. Powered by advanced AI, Xygeni prioritizes exploitable risks, cuts 90% of alert noise, and drives automated remediation through AI SAST, Auto-Fix, and Xygeni Bot. Developers scan and fix issues directly in their IDE, keeping code secure from the start. Early Malware Warning blocks zero-day supply-chain threats at publication, while smart dependency analysis prevents breaking updates. Seamless integration with GitHub, GitLab, Bitbucket, Jenkins, and Azure DevOps ensures a frictionless experience. -
26
Halborn
Halborn
Using deep security inspection and the latest offensive security tactics, we work to find critical vulnerabilities in applications before they are exploited. We use hands-on assessment by our team of dedicated ethical hackers to simulate the latest activities and techniques used by threat actors. We pentest everything from web apps to wallets and layer1 blockchains. Halborn provides an exceedingly thorough analysis of a blockchain application’s smart contracts in order to correct design issues, errors in the code, or identify security vulnerabilities. We perform both manual analysis and automated testing to make sure your smart contract application or DeFi platform is ready for mainnet. Get your security and development processes automated to save you time and money. Our expertise is in automated scanning, CI/CD Pipeline development, Infrastructure as Code, Cloud Deployment, SAST/DAST integration, and experience to help build an effective DevSecOps culture. -
27
Cyber Chief
Cyber Chief
The best way to keep hackers out is to first understand the security vulnerabilities they see in your software and network infrastructure. Thankfully, not only can Cyber Chief show you the vulnerabilities that hackers will exploit, it will show your developers how those vulnerabilities should be fixed. You can help your development team build the in-house capability you need to ensure your SaaS application has near zero security holes at every release. With Cyber Chief's on-demand vulnerability testing and best-practice, but easy-to-implement vulnerability fixes, your team will take control of securing your application. SaaS teams often put off application security activities because of a perception that it slows them down. Cyber Chief now helps you shift left with AppSec and turn it into smaller, more manageable chunks of work. This helps you ship new products & features as fast as ever, but with the extra advantage of added security.Starting Price: $96 per month -
28
PDQ Detect
PDQ
Avoid wasting time on vulnerabilities that will never meaningfully impact your organization. PDQ Detect helps you secure your Windows, Apple, and Linux devices by prioritizing the highest risk vulnerabilities. Cut through the noise and get your continuous remediation plan rolling with: 1. Full attack surface visibility — Scan all on-prem, remote, and internet-facing assets to gain full visibility of your attack surface in real time. 2. Consumable, contextual risk prioritization — PDQ Detect leverages machine learning to identify vulnerabilities that are currently exploitable in your specific environment. 3. Effective remediation & reporting — Get clear remediation steps, prioritized by impact and exploitability. Utilize automated or custom reports.Starting Price: $18/device -
29
Heeler
Heeler
Heeler is an application security platform that helps development and security teams automate the detection, prioritization, and remediation of open source and application risks by unifying contextual data from code, runtime, deployment, dependencies, and business logic into a single actionable model. It combines static and runtime analysis, software composition analysis, threat modeling, and secrets scanning with a context engine that maps how code runs in production, enabling real-time threat prioritization based on exploitability and business impact rather than raw vulnerability counts. Heeler automatically generates validated remediation guidance and can even produce merge-ready pull requests to upgrade libraries or fix issues, reducing manual research and accelerating fixes. It provides end-to-end visibility across the software development lifecycle, tracking vulnerabilities from identification through resolution and monitoring fixes across deployments.Starting Price: $250 per developer -
30
Bright Security
Bright Security
Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively. Its approach enables quick and iterative scans to identify critical security vulnerabilities early in the SDLC without compromising on quality or delivery speed. Bright empowers AppSec teams to provide governance for securing APIs and web apps while allowing developers to take ownership of security testing and remediation work. Unlike legacy DAST solutions built for AppSec professionals, which are complex to deploy and find vulnerabilities late in the development process, Bright's DAST solution is optimized for the DevOps world. It can be deployed as early as the Unit Testing phase and run throughout the SDLC, learning and optimizing from every scan. By enabling organizations to detect and remediate vulnerabilities early in the SDLC, Bright reduces risk at a lower cost and effort. -
31
Claude Mythos
Anthropic
Claude Mythos Preview is a highly advanced AI model developed with strong capabilities in cybersecurity, particularly in identifying and exploiting software vulnerabilities. It demonstrates the ability to autonomously discover zero-day vulnerabilities across major operating systems, browsers, and critical software systems. The model can also generate complex exploit chains, including privilege escalation and remote code execution attacks. Its capabilities extend beyond vulnerability detection to reverse engineering and exploit development in both open-source and closed-source environments. Mythos Preview operates through agentic workflows, enabling it to analyze codebases, test hypotheses, and validate exploits independently. These abilities represent a significant leap compared to previous models, which struggled with exploit generation. Overall, Claude Mythos Preview highlights a new era where AI can both strengthen and challenge global cybersecurity practices. -
32
ManageEngine Vulnerability Manager Plus
ManageEngine
Enterprise vulnerability management software. Vulnerability Manager Plus is an integrated threat and vulnerability management software that delivers comprehensive vulnerability scanning, assessment, and remediation across all endpoints in your network from a centralized console. Scan and discover exposed areas of all your local and remote office endpoints as well as roaming devices. Leverage attacker-based analytics, and prioritize areas that are more likely to be exploited by an attacker. Mitigate the exploitation of security loopholes that exist in your network and prevent further loopholes from developing. Assess and prioritize vulnerabilities based on exploitability, severity, age, affected system count, as well as the availability of the fix. Download, test, and deploy patches automatically to Windows, Mac, Linux, and over 250 third-party applications with an integral patching module—at no additional cost.Starting Price: $695 per user per year -
33
Mondoo
Mondoo
Mondoo is a unified security and compliance platform designed to drastically reduce business-critical vulnerabilities by combining full-stack asset visibility, risk prioritization, and agentic remediation. It builds a complete inventory of every asset, cloud, on-premises, SaaS, endpoints, network devices, and developer pipelines, and continuously assesses configurations, exposures, and interdependencies. It then applies business context (such as asset criticality, exploitability, and policy deviation) to score and highlight the most urgent risks. Users can choose guided remediation (pre-tested code snippets and playbooks) or autonomous remediation via orchestration pipelines, with tracking, ticket creation, and verification built in. Mondoo supports ingestion of third-party findings, integrates with DevSecOps toolchains (CI/CD, IaC, container registries), and includes 300 + compliance frameworks and benchmark templates. -
34
Deepfactor
Deepfactor
Help developers automatically discover, prioritize, and remediate application risks early in development and testing. Deepfactor detects runtime security risks in filesystem, network, process, and memory behavior including exposing sensitive information, insecure programming practices, and prohibited network communications. Deepfactor generates software bills of materials in CycloneDX format to comply with executive orders and enterprise supply chain security requirements. Deepfactor maps vulnerabilities to compliance standards (SOC 2 Type 2, PCI DSS, NIST 800-53) to reduce compliance risks. Deepfactor generates prioritized insights that enable developers to pinpoint insecure code, streamline remediation, analyze drift between releases, and understand potential impact to compliance objectives. -
35
CTI Academy
CTI Academy
CTI Academy’s learning platform delivers an immersive cyber threat intelligence education through an intuitive e‑learning environment featuring expert‑led courses, interactive course materials, virtual lab environments, and practical exercises that simulate real‑world scenarios in threat intelligence, malware analysis, and attack surface management. It offers self‑paced, hands‑on labs that eliminate the need for external infrastructure or portals, ensuring seamless access to performance‑driven modules designed to build expertise in analyzing threats, reverse‑engineering malware, and monitoring vulnerabilities. Complementing this, the Cyber Underground Forum provides members‑only access to an exclusive community of cybersecurity professionals and analysts, up‑to‑the‑minute threat intelligence feeds, global coverage of emerging attack patterns, instant alerts on critical vulnerabilities, and a comprehensive archive of intelligence data for collaborative research. -
36
Contrast Security
Contrast Security
Modern software development must match the speed of the business. But the modern AppSec tool soup lacks integration and creates complexity that slows software development life cycles. Contrast simplifies the complexity that impedes today’s development teams. Legacy AppSec employs a one-size-fits-all vulnerability detection and remediation approach that is inefficient and costly. Contrast automatically applies the best analysis and remediation technique, dramatically improving efficiencies and efficacy. Separate AppSec tools create silos that obfuscate the gathering of actionable intelligence across the application attack surface. Contrast delivers centralized observability that is critical to managing risks and capitalizing on operational efficiencies, both for security and development teams. Contrast Scan is pipeline native and delivers the speed, accuracy, and integration demanded by modern software development.Starting Price: $0 -
37
ScanAnchor
ScanAnchor
Enterprise vulnerability scanning with flat-rate pricing. No per-IP fees. Scan unlimited assets for one monthly fee. Built-in CISA KEV and EPSS threat intelligence shows which vulnerabilities are actively exploited. Compliance reporting for PCI-DSS, Cyber Essentials, ISO 27001, SOC 2, and HIPAA. Integrates with Jira, ServiceNow, Splunk. Plans from £179/mo. 14-day free trial, no credit card required.Starting Price: £179/month -
38
Awesome Fuzzing
secfigo
Awesome Fuzzing is a list of fuzzing resources including books, courses, both free and paid, videos, tools, tutorials, and vulnerable applications to practice in order to learn fuzzing and initial phases of exploit development like root cause analysis. Courses/training videos on fuzzing, videos talking about fuzzing techniques, tools, and best practices. Conference talks and tutorials, blogs, tools that help in fuzzing applications, and fuzzers that help in fuzzing applications that use network-based protocols like HTTP, SSH, SMTP, etc. Search and pick the exploits, that have respective apps available for download, and reproduce the exploit by using the fuzzer of your choice. Set of tests for fuzzing engines. Includes different well-known bugs. A corpus, including various file formats for fuzzing multiple targets in the fuzzing literature.Starting Price: Free -
39
A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management. We created Risk-Based Vulnerability Management software and now we’re defining the modern model. Show your security and IT teams which infrastructure vulnerabilities they should remediate, when. Our latest version reveals exploitability can be measured, and accurately measuring exploitability can help you minimize it. Cisco Vulnerability Management (formerly Kenna.VM) combines real-world threat and exploit intelligence and advanced data science to determine which vulnerabilities pose the highest risk and which you can deprioritize. Spoiler alert: Your mega-list of “critical vulnerabilities” will shrink faster than a woolen sweater-vest in a hot cycle.
-
40
neoCoder
iamneo.ai
Trusted technology skill development solution that allows organizations to build in-demand skills and brings your new hires up to speed. The most in-demand technology programs, built by the experts who know them best. Our integrated development environment offer advanced features like syntax highlighting, extensive keyboard shortcuts, code complete & lot more. Practice as you learn with interactive courses, your team members can test-drive new skills with hands-on coding challenges and guided feedback. Identify your knowledge gaps and strengths with our skill assessments like quizzes, project-based assessment, hackathon, etc. Practice as you learn with interactive courses, your team members can test-drive new skills with hands-on coding challenges and guided feedback. Our adaptive learning engine ensures that your employees get a customized learning path tailored to their roles. -
41
Wizer
Wizer
Wizer offers no-nonsense security awareness training and phishing simulation to level up your security culture. It's short, and to the point, and you can start for free! The platform includes training courses, phishing simulation, learner experience, and secure code training. The video library has hundreds of videos, with new ones added monthly, providing micro-learning that is quick, simple, effective, and fun. Video topics range from security awareness basics and advanced, assorted compliance training, advanced phishing, new employee onboarding, safety at home, and much more. Language packs are available, offering videos with both text and voice-overs in multiple languages. Wizer's pricing plan is clear and easy to understand, with a free plan providing basic annual training with tracking and reporting to help your team meet basic security awareness requirements.Starting Price: $25 per month -
42
ArmorCode
ArmorCode
Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps. -
43
AppSecEngineer
AppSecEngineer
What’s a true AppSec Engineer if not an expert on all things security? Or a super-specialist in a single domain, you choose. Either way, our training has you covered. Learn new skills with our constantly updated library of courses, become a certified AppSec expert, and make your resume impossible to say no to. All that with a single subscription. Does it feel like security is getting sidelined at your organization? As an AppSec Engineer, you can do something about that. Our courses can help you and your team skill up fast and take your AppSec capabilities to the next level. If your team needs customized training, we do that, too! Our cutting-edge labs are up and running before you can say ‘hands-on learning’. Access our entire library of courses, labs, and learning material with a single purchase. Our courses are tailored to the needs of companies looking to hire security experts.Starting Price: $49 per user per month -
44
Astelia
Astelia
Astelia is an attack-driven exposure management platform designed to help security and IT teams identify which vulnerabilities in their environment are truly reachable and exploitable. It maps network topology through read-only integrations and applies agentic AI to analyze the technical requirements of each vulnerability, correlating reachability and exploitability data to surface the small fraction of risks that actually matter. Instead of relying on probability-based scoring alone, Astelia provides evidence-based prioritization that helps organizations cut through massive vulnerability backlogs and focus remediation efforts where they will have the greatest impact. It also visualizes potential attack paths using graph-based models, showing exactly how an attacker could move through the network to compromise assets. In addition, it exposes coverage gaps by mapping infrastructure down to the port level, revealing unscanned assets and third-party connections. -
45
Amplify Security
Amplify Security
Amplify Security is an AI-driven security platform that integrates seamlessly with development workflows to automatically detect, analyze, and remediate security vulnerabilities in code with minimal manual effort. It connects to repositories on services like GitHub and GitLab, continuously scans code, and surfaces security issues directly in pull or merge requests while offering deployment-ready fixes that developers can apply with a single click. It uses a dual-agent AI architecture, one focused on security risk prioritization and another on developer-friendly resilience, that generates clear, actionable remediation suggestions that align with existing coding practices and reduce the need for back-and-forth between security and development teams. Amplify Security is designed to automate traditionally slow, manual vulnerability management tasks, reduce false positives, and help teams resolve security problems in minutes rather than months. -
46
Consensys Diligence
Consensys
Security is critical in the blockchain space. Our comprehensive smart contract audit service helps everyone from startups to enterprises launch and maintain their Ethereum blockchain applications. Our industry-leading suite of blockchain security analysis tools, combined with hands-on review from our veteran smart contract auditors, ensures that your Ethereum application is ready for launch and built to protect users. Auditing your code early in the development lifecycle prevents potentially catastrophic vulnerabilities after launch. Our APIs provide affordable smart contract security options and the peace of mind that your code is fortified. Veteran security auditors manually double-check your code to eliminate spurious results. Our tools integrate into your development environment so you can perform continuous security analysis. Receive a vulnerability report with an executive summary, vulnerability details, and mitigation guidance. -
47
SafeStack Academy
SafeStack Academy
Security education and support for small companies with big missions. You shouldn’t need to have a big budget to secure what matters most to your organization. SafeStack Small Business Security products and services are world class, yet affordable. SafeStack is a small company. We live and breathe the same challenges as our SMB clients. We know there are compromises. We build products and services with empathy, made with respect for the world you work in. Small businesses use technology to get the job done. That doesn’t mean that technical jargon is needed when it comes to security. We bring our expertise to your organization without jargon and buzzwords. SafeStack Academy provides an ongoing program of security awareness training to organizations of all shapes and sizes. For a low annual fee per learner, we deliver new training content each month to help improve security skills and behaviours and meet compliance requirements.Starting Price: $30 per user, per year -
48
depthfirst
depthfirst
depthfirst is an AI-native application security platform designed to help organizations detect, prioritize, and fix software vulnerabilities by deeply understanding their code, infrastructure, and business logic as a unified system. depthfirst, built around its core “General Security Intelligence,” analyzes entire repositories and environments to map how systems actually function, enabling it to uncover complex, real-world vulnerabilities that traditional scanners often miss. It evaluates full attack paths, permissions, and data flows to determine whether an issue is truly exploitable, significantly reducing false positives and allowing teams to focus only on meaningful risks. depthfirst operates across multiple layers of the stack, including source code, dependencies, secrets, containers, and running applications, providing continuous security coverage from development through production. -
49
Cybrary
Cybrary
Hands-on experiences to gain real-world skills. Guided career paths and role-based learning. Industry certification courses with practice tests. Dedicated mentors and professional networking. Cybrary is the fastest growing, fastest-moving catalog in the industry. By working with an elite community of instructors, experts, and thought leaders, as well as cutting edge hands-on learning providers, we deliver relevant and high-quality content that is accessible anytime, anywhere. Hands-on learning experiences provide the most engaging and effective way to learn real-world concepts and skills that you need to be successful. We build and aggregate over 1,000 secure, browser-based virtual labs, practice tests, and assessments in fields such as cybersecurity, IT, cloud technologies, data science, and more. Prepare for in-demand industry certifications with courses, virtual labs, and practice tests tied directly to the exam’s learning objectives.Starting Price: $19 per month -
50
Veriti
Veriti
Veriti AI-driven platform proactively monitors and safely remediates exposures across the entire security stack, without disrupting the business, from the OS-Level and up. With complete visibility, you can swiftly neutralize threats before they happen. Veriti consolidates all configurations to establish your security baseline, then correlates telemetries, CAASM, BAS and vulnerability management tools, security logs, and intelligence feeds to pinpoint the misconfigurations that are leading to exposures. Automated non-intrusive assessment of all security configurations. Get direct visibility into your risk posture and all remediation paths available including compensating controls, IoCs, and patches. Now your team can make confident security decisions. Remediation is best applied before exposures are exploited. Leveraging proprietary machine learning, Veriti predicts the ripple effects of any given remediation action, assessing potential impacts.