Phoenix Logo

Phoenix

0
Commercial
Visit Website

Phoenix Security is an Application Security Posture Management (ASPM) and Unified Vulnerability Management (UVM) platform that processes security data from multiple sources. The platform integrates with application security scanners to aggregate, deduplicate, and contextualize vulnerabilities across cloud infrastructure and applications. It provides vulnerability prioritization capabilities by analyzing threat intelligence and correlating security findings to help identify critical issues. The system offers functionality for: - Vulnerability aggregation and deduplication - Risk contextualization and prioritization - Integration with security scanners and tools - Vulnerability tracking and management - Cloud security posture monitoring - Application security program management

FEATURES

ALTERNATIVES

Automate software supply chain security by blocking malicious open source components

An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.

Automate the search for Exploits and Vulnerabilities in important databases.

Finds publicly known security vulnerabilities in a website's frontend JavaScript libraries.

A tool for scanning websites with open .git repositories and dumping their content for Bug Hunting/Pentesting Purposes.

An open-source tool for finding security vulnerabilities, compliance issues, and infrastructure misconfigurations in infrastructure-as-code

Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.

Patch-level verification tool for bundler to check for vulnerable gems and insecure sources.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved