ThreatMapper Logo

ThreatMapper

0
Free
Visit Website

ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk-of-exploit. It uncovers vulnerable software components, exposed secrets and deviations from good security practice. ThreatMapper uses a combination of agent-based inspection and agent-less monitoring to provide the widest possible coverage to detect threats. With ThreatMapper's ThreatGraph visualization, you can then identify the issues that present the greatest risk to the security of your applications, and prioritize these for planned protection or remediation.

FEATURES

ALTERNATIVES

Nmap is an essential network scanning tool used for network security auditing and status monitoring.

A framework for building code injection vulnerability testbeds

Script to find exploits for vulnerable software packages on Linux systems using an exploit database.

A categorized collection of bug bounty write-ups for various vulnerabilities.

Python-based extension for integrating a Yara scanner into Burp Suite for on-demand website scans based on custom rules.

The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.

Amass by OWASP performs comprehensive attack surface mapping and asset discovery.

An OSINT tool that generates username lists for companies on LinkedIn for social engineering attacks or security testing purposes.