Phoenix Security is an Application Security Posture Management (ASPM) and Unified Vulnerability Management (UVM) platform that processes security data from multiple sources. The platform integrates with application security scanners to aggregate, deduplicate, and contextualize vulnerabilities across cloud infrastructure and applications. It provides vulnerability prioritization capabilities by analyzing threat intelligence and correlating security findings to help identify critical issues. The system offers functionality for: - Vulnerability aggregation and deduplication - Risk contextualization and prioritization - Integration with security scanners and tools - Vulnerability tracking and management - Cloud security posture monitoring - Application security program management
FEATURES
ALTERNATIVES
Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.
An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
XGuardian XARA Security Scanner for OSX with URL scheme, Bundle ID, and keychain hijack checks.
A script that checks for common best-practices around deploying Docker containers in production.
A tool for scanning and identifying potential security risks in GitHub organizations, users, and repositories.
A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.