ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk-of-exploit. It uncovers vulnerable software components, exposed secrets and deviations from good security practice. ThreatMapper uses a combination of agent-based inspection and agent-less monitoring to provide the widest possible coverage to detect threats. With ThreatMapper's ThreatGraph visualization, you can then identify the issues that present the greatest risk to the security of your applications, and prioritize these for planned protection or remediation.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
testssl.sh is a free command line tool for checking server's TLS/SSL configurations with clear and machine-readable output.
Automate software supply chain security by blocking malicious open source components
HTTP parameter discovery suite
A vulnerable web site in NodeJS for testing security source code analyzers.
Platform for users to test cybersecurity skills by exploiting vulnerabilities.