Collect NetFlow v9 flow records from firewalls/routers to identify suspicious communication patterns and risky egress behavior—then correlate traffic with discovered assets and vulnerabilities for faster triage.
Advanced Service Fingerprinting:
Accurate service and version detection is critical for CVE matching. Our fingerprinting engine goes beyond basic port scanning.
- Deep Service Detection: Identifies not just the service (HTTP, SSH) but the specific implementation (Apache, nginx, OpenSSH) and exact version
- Framework & Technology Stack: Detects underlying frameworks (PHP, Node.js, Java), CMS platforms (WordPress, Drupal), and dependencies
- TLS/SSL Analysis: Extracts certificate details, cipher suites, and protocol versions to identify weak configurations
- Custom Signature Support: Add proprietary or custom service signatures for your specific environment
- Continuous Database Updates: Fingerprint database updated weekly with new service signatures and version patterns
- Confidence Scoring: Each detection includes confidence level (High/Medium/Low) to help prioritize investigation
Real-time CVE feeds from NVD, CISA KEV, GitHub, OSV, and ExploitDB. Over 320,000 vulnerabilities tracked.
Comprehensive Vulnerability Intelligence:
Our threat intelligence engine aggregates and normalizes data from the industry's leading vulnerability databases to provide the most complete picture of your security posture.
- NVD Integration: Direct feed from NIST's National Vulnerability Database with CVSS scores, CWE classifications, and detailed descriptions
- CISA KEV Catalog: Real-time tracking of vulnerabilities actively exploited in the wild, as confirmed by the Cybersecurity and Infrastructure Security Agency
- GitHub Security Advisories: Monitors 100,000+ GitHub repositories for disclosed vulnerabilities in open-source libraries and dependencies
- OSV Database: Open Source Vulnerabilities database covering npm, PyPI, Maven, Go modules, and more
- ExploitDB Integration: Correlates CVEs with publicly available exploits to identify weaponized vulnerabilities
- Daily Updates: Threat intelligence feeds refreshed every 6 hours to ensure latest vulnerability data
- Smart Deduplication: Automatically merges duplicate CVE entries from multiple sources into unified records
Exploit Prediction Scoring System integration to prioritize vulnerabilities based on real-world exploitation probability.
Exploit Prediction Scoring System (EPSS):
EPSS provides data-driven probability estimates of exploitation, helping you prioritize remediation efforts based on actual threat likelihood rather than just severity scores.
- Probability-Based Prioritization: Each CVE receives a 0-100% exploitation probability score based on real-world attack data
- Percentile Ranking: See how a vulnerability compares to all others—a 95th percentile score means it's more likely to be exploited than 95% of known CVEs
- Temporal Analysis: Tracks how exploitation probability changes over time as exploits emerge and patches are released
- Combined Scoring: Automatically combines EPSS probability with CVSS severity to identify high-impact, high-likelihood vulnerabilities
- Threat Actor Correlation: Links EPSS trends with observed threat actor activity captured by honeypots
- Weekly Recalculation: EPSS scores updated weekly based on latest exploitation telemetry from FIRST.org
Deploy bootable honeypot sensors with 8 services (SSH, HTTP, MySQL, etc.) to capture attack intelligence.
Production-Ready Deception Technology:
Deploy realistic decoy systems that attract and record attacker behavior, providing early warning of reconnaissance and lateral movement attempts.
- 8 Service Emulations: SSH (port 22), HTTP/HTTPS (80/443), MySQL (3306), PostgreSQL (5432), RDP (3389), SMB (445), FTP (21), Telnet (23)
- Bootable ISO Deployment: Generate custom Alpine Linux-based ISOs that boot directly into honeypot mode—no OS installation required
- Virtual Machine Ready: Deploy in VMware, Hyper-V, or VirtualBox with pre-configured network settings
- Low Resource Footprint: Runs on 512MB RAM and 2GB disk space, perfect for older hardware or VMs
- Realistic Banner Responses: Returns authentic-looking service banners to avoid detection as a honeypot
- Attack Telemetry: Captures source IPs, attempted credentials, exploit payloads, and command sequences
- Automatic Geolocation: Maps attacker IPs to countries and ASNs for threat intelligence
- Zero False Positives: Any interaction with a honeypot is malicious—no legitimate traffic should reach these systems
Capture and track compromised credentials from attacker login attempts. SHA256 hashed for security.
Attacker Credential Intelligence:
When attackers attempt to authenticate to your honeypots, we capture the credentials they're using—revealing password spray campaigns, credential stuffing, and compromised account usage.
- Real-Time Capture: Records usernames and passwords from SSH, RDP, HTTP Basic Auth, FTP, and MySQL login attempts
- SHA256 Hashing: All captured credentials immediately hashed with SHA256 for secure storage and compliance
- Breach Correlation: Compare captured credentials against known data breaches to identify which leaks attackers are exploiting
- Pattern Analysis: Identifies common password patterns, dictionary attacks, and credential stuffing campaigns
- Internal Validation: Check if captured usernames match your organization's naming conventions—indicating targeted attacks
- Timing Analysis: Tracks when specific credentials are first seen and how frequently they're reused across attacks
- Export & Integration: Export captured credential hashes to check against your password policies or SIEM
Automatic subdomain enumeration using DNS, Certificate Transparency, and brute-force techniques.
Comprehensive Attack Surface Enumeration:
Automatically discovers all subdomains associated with your domains, uncovering forgotten staging servers, shadow IT, and third-party integrations that expand your attack surface.
- Certificate Transparency Logs: Monitors CT logs from Google, Cloudflare, and other CAs to discover subdomains as certificates are issued
- DNS Zone Transfers: Attempts AXFR zone transfers where permitted to enumerate all DNS records
- DNS Brute-Force: Tests 50,000+ common subdomain names (www, mail, vpn, dev, staging, api, admin, etc.)
- Recursive Discovery: Discovers subdomains of subdomains (e.g., api.staging.example.com)
- Wildcard Detection: Identifies wildcard DNS records to avoid false positives
- Historical DNS Data: Integrates with passive DNS databases to find subdomains that existed in the past
- Continuous Monitoring: Automatically re-scans weekly to detect newly added subdomains
- Third-Party Discovery: Finds subdomains pointing to cloud services (AWS, Azure, GCP) that may be misconfigured
Generate custom bootable ISOs for onsite sensor deployment with preconfigured agent and honeypots.
Zero-Touch Sensor Deployment:
Generate custom bootable ISOs for deploying remote scanning agents and honeypots without needing to install an operating system or configure network settings manually.
- Pre-Configured Connectivity: ISOs include your unique API key and server URL—boots directly into agent mode
- Network Auto-Detection: Automatically detects available networks and configures DHCP or uses provided static IP settings
- Alpine Linux Base: Lightweight (150MB) Alpine Linux image with all dependencies pre-installed
- Hybrid Boot Support: Generated ISOs work with BIOS and UEFI firmware
- Persistent Mode: Option to install to disk for permanent deployment, or run entirely from RAM
- Custom Branding: Add your company name and logo to the boot splash screen
- Multi-Function Mode: Single ISO can act as scanner, honeypot, or both based on runtime configuration
- Secure Boot Compatible: Signed bootloader for deployment on secure boot-enabled hardware
Monitor assets, scans, findings, and threat intelligence in a unified dashboard with dark mode support.
Unified Security Command Center:
A single dashboard providing real-time visibility into your entire security posture—from external attack surface to internal vulnerabilities and active threats.
- Asset Inventory: Live view of all domains, subdomains, IP addresses, and endpoints under management
- Vulnerability Metrics: Count of critical/high/medium/low findings with trend graphs showing improvement over time
- Scan Status: Real-time progress bars for active scans with ETA and completion percentage
- Threat Feed Activity: Stream of new CVEs and exploits relevant to your environment as they're published
- Honeypot Alerts: Live feed of attack attempts with source IPs, targeted services, and captured payloads
- Agent Health: Status indicators for all deployed agents showing last check-in time and any errors
- Dark Mode: Eye-friendly dark theme with high-contrast colors for 24/7 monitoring
- Customizable Widgets: Drag-and-drop interface to arrange widgets based on your priorities
Deployed agents check for updates every 4 hours and self-update with automatic rollback on failure.
Self-Maintaining Agent Infrastructure:
Deployed agents automatically update themselves with the latest scanning engines, vulnerability signatures, and bug fixes—without manual intervention or downtime.
- 4-Hour Check Interval: Agents check for updates every 4 hours, ensuring rapid deployment of critical patches
- Differential Updates: Only downloads changed components, minimizing bandwidth usage (typically 1-5MB)
- Automatic Rollback: If an update fails to start or crashes within 5 minutes, automatically reverts to previous version
- Staged Rollout: New updates deployed to 10% of agents first, then gradually expanded after stability validation
- Offline Operation: Agents continue functioning with existing signatures if unable to reach update server
- Version Pinning: Option to pin specific agents to particular versions for testing or compliance
- Update History: Full audit log of all updates applied to each agent with timestamps and version numbers
- Zero Downtime: Updates applied during normal operation without interrupting active scans
Track active scans and discoveries with live progress indicators and background task monitoring.
Live Scan Visibility & Monitoring:
Track the progress of all scanning and discovery operations in real-time, with detailed breakdowns of what's being scanned, how far along it is, and when it will complete.
- Per-Asset Progress: See individual progress bars for each domain, subnet, or endpoint being scanned
- Task Breakdown: View sub-tasks like "Port Scanning", "Service Detection", "CVE Matching", and their individual progress
- Time Estimates: Dynamic ETA calculations based on scan velocity and remaining targets
- Scan Queue: View upcoming scans in the queue with scheduled start times and priority levels
- Background Task Monitoring: Track long-running operations like subdomain enumeration and network discovery
- Resource Usage: Monitor CPU, memory, and network bandwidth usage during scans to avoid overloading systems
- Pause/Resume Controls: Temporarily pause resource-intensive scans during business hours and resume overnight
- Historical Performance: See how long previous scans took to estimate future scan durations
Instant toast notifications for scan starts, completions, and errors with auto-dismiss and manual control.
Intelligent Alert Management:
Receive instant notifications for critical events without being overwhelmed by noise—smart filtering ensures you only see alerts that matter.
- Toast Notifications: Non-intrusive popup notifications in the corner of the dashboard with auto-dismiss
- Scan Lifecycle Alerts: Notifications when scans start, complete, or encounter errors
- New Vulnerability Alerts: Instant notification when a newly discovered asset matches a critical CVE
- Honeypot Attack Alerts: Real-time alerts when honeypots detect scanning or authentication attempts
- Agent Health Alerts: Notifications when agents go offline, fail to update, or encounter errors
- Severity Filtering: Configure notification thresholds (e.g., only alert for Critical/High findings)
- Auto-Dismiss Timer: Notifications automatically disappear after 10 seconds unless pinned by user
- Notification History: Review past 7 days of notifications with timestamps and event details
Automated network device discovery per agent with MAC address tracking and device fingerprinting.
Automated Internal Asset Inventory:
Each deployed agent automatically discovers all devices on its local network segment, building a comprehensive inventory of workstations, servers, IoT devices, and network infrastructure.
- ARP Cache Monitoring: Passively monitors ARP cache to discover active hosts without generating network traffic
- Active Ping Sweep: Scans local subnet with ICMP and TCP pings to find responsive hosts
- MAC Address Tracking: Records MAC addresses to track devices even when IP addresses change via DHCP
- Vendor Identification: Resolves MAC OUI (Organizationally Unique Identifier) to identify device manufacturers
- Device Fingerprinting: Analyzes OS fingerprints, open ports, and service banners to classify devices (Windows, Linux, router, printer, etc.)
- Unauthorized Device Detection: Alerts when new, unknown MAC addresses appear on the network
- Network Topology Mapping: Builds visual network map showing relationships between discovered devices
- VLAN Awareness: Discovers devices across multiple VLANs when agent has trunk access
Agent error logging with alerting for failed scans, connectivity issues, and operational problems.
Comprehensive Agent Telemetry:
Detailed error logging and alerting ensures you're immediately aware of scan failures, connectivity problems, or agent malfunctions—with enough context to troubleshoot quickly.
- Structured Error Logs: All errors logged with timestamp, severity, error code, and stack trace
- Scan Failure Alerts: Immediate notification when scans fail due to network issues, timeouts, or permission errors
- Connectivity Monitoring: Tracks agent check-ins and alerts if an agent hasn't reported in 15 minutes
- Resource Exhaustion Detection: Warns when agents run low on disk space, memory, or CPU resources
- Certificate Validation Errors: Alerts on TLS/SSL certificate problems between agents and server
- Authentication Failures: Logs and alerts when agents are unable to authenticate with API keys
- Error Aggregation: Groups similar errors together to avoid alert fatigue from repeated issues
- Remote Debugging: Enable verbose logging on specific agents for troubleshooting without redeploying