Loading...
Browse 320 security audit tools
Global cybersecurity compliance advisory & assessment for 100+ frameworks
Cybersecurity risk assessment service for breach prevention & insurance reqs
Mobile app penetration testing service for iOS and Android applications
Professional API penetration testing service for identifying vulnerabilities
Web application penetration testing service for vulnerability discovery
Cyber security audit service assessing digital infrastructure and compliance
Cybersecurity services provider offering TPRM, VAPT, and security audits
Free AD, Entra ID, and Okta security assessment tool for vulnerability scanning
PostgreSQL management tool detection scanner for asset discovery
API security audit tool for OpenAPI contracts with 300+ security checks
Smart contract security audit service for DeFi blockchain platforms
Cybersecurity services provider offering pentesting, appsec, and consulting
Cloud penetration testing service for Azure, Google Cloud, AWS environments
A Python script that scans file systems to identify hardcoded credentials, API keys, and other sensitive secrets using configurable regex patterns.
Oracle Access Governance is an identity and access management solution that helps organizations control, monitor, and audit user access privileges across their IT environment.
Automated web scanner detecting vulnerabilities and HTTP security headers
ScubaGear is a PowerShell-based assessment tool that evaluates Microsoft 365 tenant configurations against CISA security baselines using Open Policy Agent and generates compliance reports.
A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.
A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.
A security tool that performs whitebox evaluation of S3 object permissions to identify publicly accessible files and generate reports on potential exposure risks.
Get strategic cybersecurity insights in your inbox