Scanner Catalog
14 categories of specialized security scanners, from enterprise CVE detection to ICS/SCADA assessment.
Enterprise CVE
ProfessionalProduct-specific CVE scanners for enterprise software — Exchange, Confluence, Citrix, Jenkins, and 30+ more.
Web Security
StarterOWASP web vulnerabilities — XSS, SQLi, CSRF, SSRF, secrets exposure, API misconfigurations, supply-chain JS attacks.
Threat Intelligence
ProfessionalML-powered threat analysis — APT attribution, ransomware group tracking, dark web monitoring, supply chain risk, MITRE ATT&CK mapping.
Cloud Security
ProfessionalAWS, Azure, GCP, and generic cloud misconfigurations — IAM, storage, networking, encryption, logging.
Infrastructure
ProfessionalNetwork services and ICS/OT — Kubernetes, LDAP, SMB, SMTP, SCADA, RDP, SSH, FTP.
Compliance
Business18 compliance frameworks — GDPR, PCI-DSS, HIPAA, SOC2, ISO 27001, WCAG/ADA, ePrivacy, D3FEND.
Network & OSINT
FreeDNS, SSL, subdomain enumeration, email security, brand protection, CT logs, Shodan, Mozilla Observatory.
SEO & Performance
StarterSearch engine optimization checks — meta tags, structured data, crawlability, content analysis.
Performance
StarterSpeed metrics, Core Web Vitals, HTTP/2-3 support, PageSpeed analysis, resource optimization.
Windows & AD
BusinessActive Directory, ADCS, credentials, Exchange, SCCM/WSUS/WMI, print spooler, RDP, SharePoint/IIS, SQL Server.
Mobile Security
BusinessMobile API security, static analysis, SSO, PWA, payment integration, native bridge vulnerabilities.
API Security
ProfessionalAPI authentication attacks, C2 detection, injection, LLM prompt attacks, protocol-level vulnerabilities.
Spyware & Malware
ProfessionalIOC detection, C2 beacon identification, signature matching, cryptominer detection.
Privacy & ML Compliance
BusinessML-powered privacy violation detection — data collection practices, consent flows, third-party tracking.
21 Scan Bundles
Pre-configured scan packages for every use case and tier.
Quick Health Check
SSL, DNS, and DNS security basics
SEO & Performance
All SEO and performance scanners
Security Essentials
Network and web security fundamentals
TI Deep Scan
All 67 threat intelligence scanners
API Deep Scan
API-focused security testing
Supply Chain Audit
Third-party and dependency risk analysis
Secrets & Credentials
Exposed secrets, leaked credentials, git history
Cloud Posture Assessment
AWS + Azure + GCP misconfiguration scanning
Full Web Audit
Comprehensive 12-group web security scan
Full Web Audit + AI
Full web audit with AI-powered synthesis
Passive DAST
Rule-based HTTP probing without authentication
GDPR Compliance
GDPR, cookies, privacy policy, data subject rights
PCI-DSS Compliance
Payment card industry security standards
HIPAA Compliance
Healthcare data protection compliance
AI/LLM Security
AI model and LLM attack surface testing
APT & Ransomware
APT attribution, ransomware, and Tor analysis
Mobile Audit
Mobile API, SSO, PWA, and payment security
Windows & AD
Active Directory, credentials, Exchange, SharePoint
Enterprise Posture
Everything — all scanners, all categories
ICS/SCADA Assessment
Industrial control systems and OT security
Authenticated DAST
Full authenticated scanning with 13 fuzz models