For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Secure your business by securing your people.
Over 100,000 businesses trust 1Password
Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.
Protoreto is a GPL-licensed tool to create prototypes of graphical user interfaces (GUIs).
NOTE: This project is not actively maintained at the moment. If you'd like to continue developing Protoreto, please send an e-mail to: wikipedian@users.sf.net
Whatzit provides a system for using error and status conditions much more rich than the canonical 'zero means success, anything else is situational' mechanism. You can tell the severity of a condition and where it originated by looking at its value.