Develop-Soft Inc. recently experienced many cyberattacks. The management of the organization instructed Alex, a security engineer, to strengthen the security of the organization. In this process, Alex employed a tool for detecting session hijacking attempts and performed asset discovery, intrusion detection, threat intelligence, and vulnerability assessment using that tool. Which of the following tools did Alex employ in the above scenario?