Loading...
Browse 57 privilege escalation tools
Red teaming service simulating real cyberattacks to test defenses
Red teaming service simulating real cyberattacks to test defenses
Assumed breach testing service simulating post-compromise attack scenarios
Assumed breach testing service simulating post-compromise attack scenarios
OS and service hardening review services for servers and workstations
OS and service hardening review services for servers and workstations
Network penetration testing services for internal and external networks
Network penetration testing services for internal and external networks
3-day Metasploit training course focused on Ruby scripting & custom modules
3-day Metasploit training course focused on Ruby scripting & custom modules
Deception-based ITDR platform for identity threat detection and response
Deception-based ITDR platform for identity threat detection and response
Internal network penetration testing service for insider threat assessment
Internal network penetration testing service for insider threat assessment
Cloud penetration testing service for AWS, Azure, and GCP environments
Cloud penetration testing service for AWS, Azure, and GCP environments
Red team penetration testing services simulating real-world attacks
Red team penetration testing services simulating real-world attacks
ITDR solution that monitors authentication events and identity behavior
ITDR solution that monitors authentication events and identity behavior
PAM solution for controlling, auditing, and protecting privileged accounts
PAM solution for controlling, auditing, and protecting privileged accounts
Tier 0 attack path discovery tool for Active Directory and Entra ID
Tier 0 attack path discovery tool for Active Directory and Entra ID
GenAI-powered identity security platform for least privilege access management
GenAI-powered identity security platform for least privilege access management
Cloud identity entitlement mgmt. for right-sizing perms & detecting compromise
Cloud identity entitlement mgmt. for right-sizing perms & detecting compromise
Provides visibility into all identities and access across hybrid environments.
Provides visibility into all identities and access across hybrid environments.
AI agent security platform for discovery, risk assessment, and access control
AI agent security platform for discovery, risk assessment, and access control
Access intelligence platform for mapping access paths and enforcing least privilege
Access intelligence platform for mapping access paths and enforcing least privilege
Privileged access security platform for discovery, classification & protection
Privileged access security platform for discovery, classification & protection
Discovers, monitors, and enforces access policies for non-human identities.
Discovers, monitors, and enforces access policies for non-human identities.
Exposure validation platform combining BAS and attack path validation (CART)
Exposure validation platform combining BAS and attack path validation (CART)
Identity threat detection and response platform for hybrid environments
Identity threat detection and response platform for hybrid environments
Detects & blocks identity-based threats in real-time across hybrid environments
Detects & blocks identity-based threats in real-time across hybrid environments
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance