Security & Vulnerability Tools Compared
Scanning for vulnerabilities, exposed certificates, or known exploits? Compare actors that search CVE databases, certificate transparency logs, and DNS records.
| Actor | Price | Success Rate | Users (30d) | Runs (30d) | Key Features |
|---|---|---|---|---|---|
| NVD CVE Vulnerability Search | $0.003/cve-fetched | 80.6% | 1 | 36 |
|
| SSL Certificate Transparency Search | $0.003/certificate-fetched | 93.5% | 0 | 31 |
|
| DNS Record Lookup - MX, A, TXT, DMARC & SPF Check | $0.003/dns-looked-up | 100.0% | 2 | 32 |
|
| CISA Known Exploited Vulnerabilities Search | $0.003/vulnerability-fetched | 100.0% | 0 | 36 |
|
Feature comparison
| Feature | NVD CVE Vulnerability Search | SSL Certificate Transparency Search | DNS Record Lookup - MX, A, TXT, DMARC & SPF Check | CISA Known Exploited Vulnerabilities Search |
|---|---|---|---|---|
| CVE search | ✓ | — | — | ✓ |
| Certificate transparency | — | ✓ | — | — |
| DNS enumeration | — | — | ✓ | — |
| Exploit prioritization | ✓ | — | — | ✓ |
| Subdomain discovery | — | ✓ | ✓ | — |
| Batch queries | ✓ | ✓ | ✓ | ✓ |
Which one should you use?
CVE vulnerability database search. Best for security teams tracking known vulnerabilities and patch prioritization.
Certificate transparency log search. Best for discovering subdomains and monitoring certificate issuance.
DNS record enumeration. Best for infrastructure mapping and email configuration analysis.
CISA Known Exploited Vulnerabilities catalog. Best for prioritizing patching of actively exploited vulnerabilities.