BloodHound - Maps Active Directory relationships, shows who can escalate to domain admin., Nessus - Scans systems for vulnerabilities, CVEs, and misconfigurations., PowerSploit - Post-exploitation, privilege escalation, payloads., Grype - Finds vulnerabilities in Docker images or filesystem packages., Trivy - Scans containers, IaC files, repos, dependencies., Kube-hunter - Active Probe Kubernetes clusters for weaknesses., Nikto - Active Web server vulnerability/misconfig scanner., OpenVAS/Greenbone - Active Open-source vulnerability scanning., TruffleHog - Passive Find secrets and keys in repos/code., Burp Suite - Web testing proxy, Intercept requests, scan parameters, brute-force forms, fuzz, automate., Qualys - Enterprise vulnerability scanning from the cloud, OWASP Dependency-Check - Scans project dependencies for known CVEs.,
0%
Vulnerability Discovery & Analysis
Share
Share
Share
by
Pookiedookie
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Match up
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?