Platform Capabilities

🧠

Threat Intelligence

Real-time CVE feeds from NVD, CISA KEV, GitHub, OSV, and ExploitDB. Over 320,000 vulnerabilities tracked.

Comprehensive Vulnerability Intelligence:

Our threat intelligence engine aggregates and normalizes data from the industry's leading vulnerability databases to provide the most complete picture of your security posture.

  • NVD Integration: Direct feed from NIST's National Vulnerability Database with CVSS scores, CWE classifications, and detailed descriptions
  • CISA KEV Catalog: Real-time tracking of vulnerabilities actively exploited in the wild, as confirmed by the Cybersecurity and Infrastructure Security Agency
  • GitHub Security Advisories: Monitors 100,000+ GitHub repositories for disclosed vulnerabilities in open-source libraries and dependencies
  • OSV Database: Open Source Vulnerabilities database covering npm, PyPI, Maven, Go modules, and more
  • ExploitDB Integration: Correlates CVEs with publicly available exploits to identify weaponized vulnerabilities
  • Daily Updates: Threat intelligence feeds refreshed every 6 hours to ensure latest vulnerability data
  • Smart Deduplication: Automatically merges duplicate CVE entries from multiple sources into unified records
📊

EPSS Enrichment

Exploit Prediction Scoring System integration to prioritize vulnerabilities based on real-world exploitation probability.

Exploit Prediction Scoring System (EPSS):

EPSS provides data-driven probability estimates of exploitation, helping you prioritize remediation efforts based on actual threat likelihood rather than just severity scores.

  • Probability-Based Prioritization: Each CVE receives a 0-100% exploitation probability score based on real-world attack data
  • Percentile Ranking: See how a vulnerability compares to all others—a 95th percentile score means it's more likely to be exploited than 95% of known CVEs
  • Temporal Analysis: Tracks how exploitation probability changes over time as exploits emerge and patches are released
  • Combined Scoring: Automatically combines EPSS probability with CVSS severity to identify high-impact, high-likelihood vulnerabilities
  • Threat Actor Correlation: Links EPSS trends with observed threat actor activity captured by honeypots
  • Weekly Recalculation: EPSS scores updated weekly based on latest exploitation telemetry from FIRST.org
🍯

Honeypot Deployment

Deploy bootable honeypot sensors with 8 services (SSH, HTTP, MySQL, etc.) to capture attack intelligence.

Production-Ready Deception Technology:

Deploy realistic decoy systems that attract and record attacker behavior, providing early warning of reconnaissance and lateral movement attempts.

  • 8 Service Emulations: SSH (port 22), HTTP/HTTPS (80/443), MySQL (3306), PostgreSQL (5432), RDP (3389), SMB (445), FTP (21), Telnet (23)
  • Bootable ISO Deployment: Generate custom Alpine Linux-based ISOs that boot directly into honeypot mode—no OS installation required
  • Virtual Machine Ready: Deploy in VMware, Hyper-V, or VirtualBox with pre-configured network settings
  • Low Resource Footprint: Runs on 512MB RAM and 2GB disk space, perfect for older hardware or VMs
  • Realistic Banner Responses: Returns authentic-looking service banners to avoid detection as a honeypot
  • Attack Telemetry: Captures source IPs, attempted credentials, exploit payloads, and command sequences
  • Automatic Geolocation: Maps attacker IPs to countries and ASNs for threat intelligence
  • Zero False Positives: Any interaction with a honeypot is malicious—no legitimate traffic should reach these systems
🔐

Credential Capture

Capture and track compromised credentials from attacker login attempts. SHA256 hashed for security.

Attacker Credential Intelligence:

When attackers attempt to authenticate to your honeypots, we capture the credentials they're using—revealing password spray campaigns, credential stuffing, and compromised account usage.

  • Real-Time Capture: Records usernames and passwords from SSH, RDP, HTTP Basic Auth, FTP, and MySQL login attempts
  • SHA256 Hashing: All captured credentials immediately hashed with SHA256 for secure storage and compliance
  • Breach Correlation: Compare captured credentials against known data breaches to identify which leaks attackers are exploiting
  • Pattern Analysis: Identifies common password patterns, dictionary attacks, and credential stuffing campaigns
  • Internal Validation: Check if captured usernames match your organization's naming conventions—indicating targeted attacks
  • Timing Analysis: Tracks when specific credentials are first seen and how frequently they're reused across attacks
  • Export & Integration: Export captured credential hashes to check against your password policies or SIEM
🌐

Subdomain Discovery

Automatic subdomain enumeration using DNS, Certificate Transparency, and brute-force techniques.

Comprehensive Attack Surface Enumeration:

Automatically discovers all subdomains associated with your domains, uncovering forgotten staging servers, shadow IT, and third-party integrations that expand your attack surface.

  • Certificate Transparency Logs: Monitors CT logs from Google, Cloudflare, and other CAs to discover subdomains as certificates are issued
  • DNS Zone Transfers: Attempts AXFR zone transfers where permitted to enumerate all DNS records
  • DNS Brute-Force: Tests 50,000+ common subdomain names (www, mail, vpn, dev, staging, api, admin, etc.)
  • Recursive Discovery: Discovers subdomains of subdomains (e.g., api.staging.example.com)
  • Wildcard Detection: Identifies wildcard DNS records to avoid false positives
  • Historical DNS Data: Integrates with passive DNS databases to find subdomains that existed in the past
  • Continuous Monitoring: Automatically re-scans weekly to detect newly added subdomains
  • Third-Party Discovery: Finds subdomains pointing to cloud services (AWS, Azure, GCP) that may be misconfigured
💿

ISO Generator

Generate custom bootable ISOs for onsite sensor deployment with preconfigured agent and honeypots.

Zero-Touch Sensor Deployment:

Generate custom bootable ISOs for deploying remote scanning agents and honeypots without needing to install an operating system or configure network settings manually.

  • Pre-Configured Connectivity: ISOs include your unique API key and server URL—boots directly into agent mode
  • Network Auto-Detection: Automatically detects available networks and configures DHCP or uses provided static IP settings
  • Alpine Linux Base: Lightweight (150MB) Alpine Linux image with all dependencies pre-installed
  • Hybrid Boot Support: Generated ISOs work with BIOS and UEFI firmware
  • Persistent Mode: Option to install to disk for permanent deployment, or run entirely from RAM
  • Custom Branding: Add your company name and logo to the boot splash screen
  • Multi-Function Mode: Single ISO can act as scanner, honeypot, or both based on runtime configuration
  • Secure Boot Compatible: Signed bootloader for deployment on secure boot-enabled hardware
📊

Real-time Dashboard

Monitor assets, scans, findings, and threat intelligence in a unified dashboard with dark mode support.

Unified Security Command Center:

A single dashboard providing real-time visibility into your entire security posture—from external attack surface to internal vulnerabilities and active threats.

  • Asset Inventory: Live view of all domains, subdomains, IP addresses, and endpoints under management
  • Vulnerability Metrics: Count of critical/high/medium/low findings with trend graphs showing improvement over time
  • Scan Status: Real-time progress bars for active scans with ETA and completion percentage
  • Threat Feed Activity: Stream of new CVEs and exploits relevant to your environment as they're published
  • Honeypot Alerts: Live feed of attack attempts with source IPs, targeted services, and captured payloads
  • Agent Health: Status indicators for all deployed agents showing last check-in time and any errors
  • Dark Mode: Eye-friendly dark theme with high-contrast colors for 24/7 monitoring
  • Customizable Widgets: Drag-and-drop interface to arrange widgets based on your priorities
🔄

Auto-Updates

Deployed agents check for updates every 4 hours and self-update with automatic rollback on failure.

Self-Maintaining Agent Infrastructure:

Deployed agents automatically update themselves with the latest scanning engines, vulnerability signatures, and bug fixes—without manual intervention or downtime.

  • 4-Hour Check Interval: Agents check for updates every 4 hours, ensuring rapid deployment of critical patches
  • Differential Updates: Only downloads changed components, minimizing bandwidth usage (typically 1-5MB)
  • Automatic Rollback: If an update fails to start or crashes within 5 minutes, automatically reverts to previous version
  • Staged Rollout: New updates deployed to 10% of agents first, then gradually expanded after stability validation
  • Offline Operation: Agents continue functioning with existing signatures if unable to reach update server
  • Version Pinning: Option to pin specific agents to particular versions for testing or compliance
  • Update History: Full audit log of all updates applied to each agent with timestamps and version numbers
  • Zero Downtime: Updates applied during normal operation without interrupting active scans
📈

Real-time Progress

Track active scans and discoveries with live progress indicators and background task monitoring.

Live Scan Visibility & Monitoring:

Track the progress of all scanning and discovery operations in real-time, with detailed breakdowns of what's being scanned, how far along it is, and when it will complete.

  • Per-Asset Progress: See individual progress bars for each domain, subnet, or endpoint being scanned
  • Task Breakdown: View sub-tasks like "Port Scanning", "Service Detection", "CVE Matching", and their individual progress
  • Time Estimates: Dynamic ETA calculations based on scan velocity and remaining targets
  • Scan Queue: View upcoming scans in the queue with scheduled start times and priority levels
  • Background Task Monitoring: Track long-running operations like subdomain enumeration and network discovery
  • Resource Usage: Monitor CPU, memory, and network bandwidth usage during scans to avoid overloading systems
  • Pause/Resume Controls: Temporarily pause resource-intensive scans during business hours and resume overnight
  • Historical Performance: See how long previous scans took to estimate future scan durations
🔔

Smart Notifications

Instant toast notifications for scan starts, completions, and errors with auto-dismiss and manual control.

Intelligent Alert Management:

Receive instant notifications for critical events without being overwhelmed by noise—smart filtering ensures you only see alerts that matter.

  • Toast Notifications: Non-intrusive popup notifications in the corner of the dashboard with auto-dismiss
  • Scan Lifecycle Alerts: Notifications when scans start, complete, or encounter errors
  • New Vulnerability Alerts: Instant notification when a newly discovered asset matches a critical CVE
  • Honeypot Attack Alerts: Real-time alerts when honeypots detect scanning or authentication attempts
  • Agent Health Alerts: Notifications when agents go offline, fail to update, or encounter errors
  • Severity Filtering: Configure notification thresholds (e.g., only alert for Critical/High findings)
  • Auto-Dismiss Timer: Notifications automatically disappear after 10 seconds unless pinned by user
  • Notification History: Review past 7 days of notifications with timestamps and event details
🔍

Network Discovery

Automated network device discovery per agent with MAC address tracking and device fingerprinting.

Automated Internal Asset Inventory:

Each deployed agent automatically discovers all devices on its local network segment, building a comprehensive inventory of workstations, servers, IoT devices, and network infrastructure.

  • ARP Cache Monitoring: Passively monitors ARP cache to discover active hosts without generating network traffic
  • Active Ping Sweep: Scans local subnet with ICMP and TCP pings to find responsive hosts
  • MAC Address Tracking: Records MAC addresses to track devices even when IP addresses change via DHCP
  • Vendor Identification: Resolves MAC OUI (Organizationally Unique Identifier) to identify device manufacturers
  • Device Fingerprinting: Analyzes OS fingerprints, open ports, and service banners to classify devices (Windows, Linux, router, printer, etc.)
  • Unauthorized Device Detection: Alerts when new, unknown MAC addresses appear on the network
  • Network Topology Mapping: Builds visual network map showing relationships between discovered devices
  • VLAN Awareness: Discovers devices across multiple VLANs when agent has trunk access
⚠️

Error Tracking

Agent error logging with alerting for failed scans, connectivity issues, and operational problems.

Comprehensive Agent Telemetry:

Detailed error logging and alerting ensures you're immediately aware of scan failures, connectivity problems, or agent malfunctions—with enough context to troubleshoot quickly.

  • Structured Error Logs: All errors logged with timestamp, severity, error code, and stack trace
  • Scan Failure Alerts: Immediate notification when scans fail due to network issues, timeouts, or permission errors
  • Connectivity Monitoring: Tracks agent check-ins and alerts if an agent hasn't reported in 15 minutes
  • Resource Exhaustion Detection: Warns when agents run low on disk space, memory, or CPU resources
  • Certificate Validation Errors: Alerts on TLS/SSL certificate problems between agents and server
  • Authentication Failures: Logs and alerts when agents are unable to authenticate with API keys
  • Error Aggregation: Groups similar errors together to avoid alert fatigue from repeated issues
  • Remote Debugging: Enable verbose logging on specific agents for troubleshooting without redeploying