Loading...
Browse 77 attack paths tools
Runtime app security observability platform with attack path detection
Runtime app security observability platform with attack path detection
AI-powered platform for vulnerability detection, response, and MDR services
AI-powered platform for vulnerability detection, response, and MDR services
Threat exposure management platform implementing CTEM framework end-to-end
Threat exposure management platform implementing CTEM framework end-to-end
AI-powered automated pen testing & continuous red teaming platform
AI-powered automated pen testing & continuous red teaming platform
AI-powered identity security platform for AD and Entra ID protection
AI-powered identity security platform for AD and Entra ID protection
Exposure validation platform combining BAS and attack path validation (CART)
Exposure validation platform combining BAS and attack path validation (CART)
AI-powered continuous offensive security platform for vulnerability detection
AI-powered continuous offensive security platform for vulnerability detection
Automated security validation platform for testing attack surfaces continuously
Automated security validation platform for testing attack surfaces continuously
Automated internal network penetration testing and security validation platform
Automated internal network penetration testing and security validation platform
AI Security Posture Management solution for AI models, data, and services
AI Security Posture Management solution for AI models, data, and services
External attack surface mgmt with automated pentesting and validation
External attack surface mgmt with automated pentesting and validation
Cyber risk quantification platform for exposure assessment and mitigation
CNAPP platform for multi-cloud security with risk mgmt and threat detection
CNAPP platform for multi-cloud security with risk mgmt and threat detection
AI-powered CTEM platform for discovering & prioritizing cyber risks & exposures
AI-powered CTEM platform for discovering & prioritizing cyber risks & exposures
CNAPP for multi-cloud and hybrid cloud security with risk prioritization
CNAPP for multi-cloud and hybrid cloud security with risk prioritization
Cloud-native security platform with runtime insights and AI-driven analysis
Cloud-native security platform with runtime insights and AI-driven analysis
A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.
A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.
Cloud security platform for visibility, posture mgmt & threat detection
Cloud security platform for visibility, posture mgmt & threat detection
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
A cloud security analysis tool that creates digital twins of AWS environments using graph databases to identify attack paths and security misconfigurations through automated and manual rule-based assessments.
A cloud security analysis tool that creates digital twins of AWS environments using graph databases to identify attack paths and security misconfigurations through automated and manual rule-based assessments.
ZeusCloud is an open source cloud security platform that discovers AWS assets, identifies attack paths, and provides remediation guidance with customizable compliance controls.
ZeusCloud is an open source cloud security platform that discovers AWS assets, identifies attack paths, and provides remediation guidance with customizable compliance controls.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
A comprehensive resource for securing Active Directory, including attack methods and effective defenses.
A comprehensive resource for securing Active Directory, including attack methods and effective defenses.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance