Chrome extension that finds DOM based XSS vulnerabilities Finds DOM-based XSS vulnerabilities in web applications.
Finds publicly known security vulnerabilities in a website's frontend JavaScript libraries.
A free and open-source tool for identifying vulnerabilities in Joomla-based websites.
A Java based HTTP/HTTPS proxy for assessing web application vulnerability with various useful features.
Automate Google Hacking Database scraping and searching with Pagodo, a tool for finding vulnerabilities and sensitive information.
TANNER is a remote data analysis and classification service for evaluating HTTP requests and composing responses for SNARE.
OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.