Loading...
Vulnerability management tools for security scanning, penetration testing, bug bounty programs, and vulnerability assessment. Task: Exploit
Browse 8 security tools
AI-powered continuous pentesting that finds and fixes vulnerabilities
AI-powered PTaaS platform with continuous attack surface discovery and exploit validation
AI-powered PTaaS platform with continuous attack surface discovery and exploit validation
AI-powered automated penetration testing platform for web apps and networks
AI-powered automated penetration testing platform for web apps and networks
Penetration testing software for simulating attacks and validating vulnerabilities
Penetration testing software for simulating attacks and validating vulnerabilities
A tool to help exploit XXE vulnerabilities by sending a crafted XML file to the server and parsing it to extract the data.
A tool to help exploit XXE vulnerabilities by sending a crafted XML file to the server and parsing it to extract the data.
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
A comprehensive database of exploits and vulnerabilities for researchers and professionals
A comprehensive database of exploits and vulnerabilities for researchers and professionals
Automate the search for Exploits and Vulnerabilities in important databases.
Automate the search for Exploits and Vulnerabilities in important databases.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs