Security & Vulnerability Tools Compared

Scanning for vulnerabilities, exposed certificates, or known exploits? Compare actors that search CVE databases, certificate transparency logs, and DNS records.

ActorPriceSuccess RateUsers (30d)Runs (30d)Key Features
NVD CVE Vulnerability Search$0.003/cve-fetched80.6%136
  • NVD CVE database
  • CVSS scoring
  • Keyword/product search
SSL Certificate Transparency Search$0.003/certificate-fetched93.5%031
  • CT log search
  • Subdomain discovery
  • Certificate details
DNS Record Lookup - MX, A, TXT, DMARC & SPF Check$0.003/dns-looked-up100.0%232
  • A/AAAA/MX/TXT records
  • DMARC/SPF analysis
  • Batch domain lookup
CISA Known Exploited Vulnerabilities Search$0.003/vulnerability-fetched100.0%036
  • Actively exploited CVEs
  • Remediation deadlines
  • Vendor/product filtering

Feature comparison

FeatureNVD CVE Vulnerability SearchSSL Certificate Transparency SearchDNS Record Lookup - MX, A, TXT, DMARC & SPF CheckCISA Known Exploited Vulnerabilities Search
CVE search
Certificate transparency
DNS enumeration
Exploit prioritization
Subdomain discovery
Batch queries

Which one should you use?

CVE vulnerability database search. Best for security teams tracking known vulnerabilities and patch prioritization.

Certificate transparency log search. Best for discovering subdomains and monitoring certificate issuance.

DNS record enumeration. Best for infrastructure mapping and email configuration analysis.

CISA Known Exploited Vulnerabilities catalog. Best for prioritizing patching of actively exploited vulnerabilities.