Loading...
Attack surface management tools for discovering, monitoring, and reducing external attack vectors to minimize cybersecurity risks.
Browse 375 attack surface tools
CloudScraper is an enumeration tool that discovers cloud storage resources including S3 buckets, Azure blobs, and DigitalOcean Spaces across target environments.
A Chrome browser extension that uses machine learning to detect and alert users about sensitive data exposure and potential data breaches across web environments.
Secret Bridge monitors GitHub repositories to detect and alert on leaked secrets and sensitive data exposure.
A tool for identifying sensitive secrets in public GitHub repositories
A tool that finds more information about a given URL or domain by querying multiple data sources.
A Go-based web crawler that supports multiple protocols and authentication methods for systematic web resource discovery and collection.
A Python API client for BuiltWith that enables programmatic access to website technology profiling and reconnaissance data.
A Python-based tool for external attack surface discovery and reconnaissance across large-scale networks, focusing on IP address and subdomain enumeration.
An information gathering tool for DNS, subdomains, ports, and directories enumeration.
A command-line tool for discovering domains and subdomains related to a target domain during reconnaissance activities.
A subdomain scan tool that helps you find subdomains of a given domain.
An automation framework that runs multiple open-source subdomain bruteforcing tools in parallel using Docker Compose and custom wordlists.
A tool for generating permutations, alterations and mutations of subdomains and resolving them
A simple web-based interface for subdomain enumeration using the subfinder tool.
A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys.
A Python-based tool for subdomain enumeration and analysis
A tool for performing subdomain enumeration using Censys API
A powerful enumeration tool for discovering assets and subdomains.
375 tools across 5 specializations · 81 free, 294 commercial
Brand Protection
Brand protection services and tools that monitor for trademark infringement, domain abuse, and brand impersonation across digital channels.
Cyber Asset Attack Surface Management
Cyber Asset Attack Surface Management platforms for comprehensive cyber asset inventory, attack surface visibility, and security posture management across IT environments.
Digital Risk Protection
Digital Risk Protection (DRP) solutions that track external threats, data breaches, and security exposures across the internet and dark web.
Common questions about Attack Surface tools, selection guides, pricing, and comparisons.
Attack surface management (ASM) is the continuous discovery, inventory, classification, and monitoring of all internet-facing assets that could be exploited by attackers. This includes domains, subdomains, IP addresses, cloud resources, APIs, web applications, and third-party services. ASM tools automatically find assets you may not know about, including shadow IT and forgotten infrastructure.
External Attack Surface Management (EASM) focuses on discovering and monitoring internet-facing assets from an outside-in perspective, simulating what an attacker would see. Cyber Asset Attack Surface Management (CAASM) provides an inside-out view by aggregating data from internal security tools (EDR, vulnerability scanners, CMDB) to create a comprehensive asset inventory. Most organizations benefit from both approaches.
Vulnerability scanning tests known assets for specific CVEs and misconfigurations. Attack surface management first discovers all assets (including unknown ones), then continuously monitors for exposure changes like new subdomains, exposed services, expired certificates, and cloud misconfigurations. ASM answers "what do I have?" while vulnerability scanning answers "what is wrong with what I know about?"