ThreatMapper Logo

ThreatMapper

0
Free
Updated 11 March 2025
Visit Website

ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk-of-exploit. It uncovers vulnerable software components, exposed secrets and deviations from good security practice. ThreatMapper uses a combination of agent-based inspection and agent-less monitoring to provide the widest possible coverage to detect threats. With ThreatMapper's ThreatGraph visualization, you can then identify the issues that present the greatest risk to the security of your applications, and prioritize these for planned protection or remediation.

FEATURES

SIMILAR TOOLS

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

An extensible, heuristic-based vulnerability scanning tool for installed npm packages.

Powerful PowerShell script for identifying missing software patches for local privilege escalation vulnerabilities.

Patch-level verification tool for bundler to check for vulnerable gems and insecure sources.

A tool for detecting and exploiting Android application vulnerabilities

Platform for users to test cybersecurity skills by exploiting vulnerabilities.

A guide to brute forcing DVWA on the high security level with anti-CSRF tokens

A categorized collection of bug bounty write-ups for various vulnerabilities.

A curated list of known malicious NPM packages

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved