ThreatMapper hunts for threats in your production platforms, and ranks these threats based on their risk-of-exploit. It uncovers vulnerable software components, exposed secrets and deviations from good security practice. ThreatMapper uses a combination of agent-based inspection and agent-less monitoring to provide the widest possible coverage to detect threats. With ThreatMapper's ThreatGraph visualization, you can then identify the issues that present the greatest risk to the security of your applications, and prioritize these for planned protection or remediation.
FEATURES
SIMILAR TOOLS
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.
FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.
All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.
A LinkedIn reconnaissance tool for gathering information about companies and individuals on the platform.
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.