Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to attempt security breaches in order to detect vulnerabilities, defects, and penetration points in production. - Run simulated cyberattacks, gather insights, and produce reports of results - Target known or potential weaknesses in computer systems and applications - Test communication channels and make assessments of organizational impact
135 results
Veracode Manual Penetration Testing combines the skills of world-class penetration testers with automated security testing scan results to dramatically reduce application risk, meet compliance requirements, and help teams understand and report on security posture.
The world's leading toolkit for web application security testing. Burp Suite Professional allows users to test, find, and exploit vulnerabilities faster, accelerate penetration testing workflows, and perform powerful manual testing. It's the web security tester's toolkit of choice. Use it to automate repetitive testing tasks - then dig deeper with its expert-designed manual and semi-automated security testing tools. Burp Suite Professional can help you to test for OWASP Top 10 vulnerabilities - as well as the very latest hacking techniques.
A Bug Bounty program gives you access to a diverse, unlimited pool of skilled security researchers. Our community of hunters provides a continuous audit of your growing attack surface to uncover high impact vulnerabilities – even on heavily-pentested scopes. - Private Bug Bounty Programs: Private Bug Bounty programs are restricted to a specific number of handpicked security researchers and the program rules are not publicly disclosed. YesWeHack chooses hunters whose skillset and experience are best suited to your assets, budget and testing requirements. Only thoroughly vetted and high-ranking hunters are eligible for private programs. - Public Bug Bounty Programs: Public Bug Bounty programs are open to our entire community of ethical hackers and their basic details are publicly disclosed. By crowdsourcing security testing at such scale, you can potentially maximise test coverage and showcase your commitment to security to your customers, partners, and shareholders.
Astra Security is a cyber security SaaS company that makes otherwise chaotic penetration tests a breeze with its one of a kind Pentest Platform. Astra's continuous vulnerability scanner emulates hacker behavior to scan applications for 9300+ security tests. CTOs & CISOs love Astra because it helps them fix vulnerabilities in record time and move from DevOps to DevSecOps with Astra's CI/CD integrations. Astra is loved by 650+ companies across the globe. Last year, Astra uncovered 2,000,000+ vulnerabilities for its customers, saving customers $69M+ in potential losses due to security vulnerabilities. We've been awarded by the President of France Mr. François Hollande at the La French Tech program with Prime Minister of India Mr. Narendra Modi at the Global Conference on Cyber Security.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who uncover vulnerabilities in websites, mobile apps, connected devices and digital infrastructure. The YesWeHack platform offers a range of integrated, API-based solutions: Bug Bounty (crowdsourcing vulnerability discovery); Vulnerability Disclosure Policy (creating and managing a secure channel for external vulnerability reporting); Pentest Management (managing pentest reports from all sources); Attack Surface Management (continuously mapping online exposure and detecting attack vectors); and ‘Dojo’ and YesWeHackEDU (ethical hacking training). YesWeHack's services have ISO 27001 and ISO 27017 certifications, and its IT infrastructure is hosted by EU-based IaaS providers, compliant with the most stringent standards: ISO 27001 (+ 27017, 27018 & 27701), CSA STAR, SOC I/II Type 2 and PCI DSS.
XM Cyber is a leading hybrid cloud security company that’s changing the way organizations approach cyber risk. XM Cyber transforms exposure management by demonstrating how attackers leverage and combine misconfigurations, vulnerabilities, identity exposures, and more, across AWS, Azure, GCP and on-prem environments to compromise critical assets. With XM Cyber, you can see all the ways attackers might go, and all the best ways to stop them, pinpointing where to remediate exposures with a fraction of the effort. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
Pentest-Tools.com is your ready-to-go pentesting arsenal! Start a full pentest in minutes with powerful cloud-based tools, plus flexible reporting, automation & collaboration options. “Our goal is to help security specialists be exponentially more effective in doing what they do best." Adrian Furtuna, Founder & CEO We built Pentest-Tools.com for: SECURITY TEAMS that collaborate to deliver better pentests, faster ✔ 25+ tools for recon, vulnerability discovery & offensive security ✔ Cloud-based platform with access sharing ✔ Library of pentests your team can use ✔ Automation options to minimize repetitive work & technical debt ◎ PENTESTERS & BUG BOUNTY HUNTERS who use automation to scale ✔ Bulk scanning, scan templates & scheduled scans for faster engagements ✔ Pentest robots to chain multiple tools & run automated testing sequences ✔ Ready-to-use, customizable report templates to automate 90% of reporting ✔ Up to date pentesting arensal to save time on config & maintenance