Vulnerability Analysis tools

Select two Vulnerability Analysis tools of your choosing which are used in research and/or commercially available and describe their main features and functionality. Compare and contrast their relative strengths, weaknesses and costs when used in the three (3) scenarios described below:
This question is based on one or more problems found in various publications and textbooks. For example, Exercise 3 in Chapter 21 of Matt Bishops’ textbook (2003, pp. 609 – 610). Exercise 3 states:
Briefly discuss what you see as issues when working with private data and information on untrusted Web sites or web sites in general.