search
Join or Log In

Attack Paths

Browse 14 cybersecurity tools tagged with "Attack Paths"

SafeBreach Exposure Validation Platform

SafeBreach Exposure Validation

language

Exposure Management

SafeBreach Exposure Validation Platform on SecurityListing: Exposure validation platform combining BAS and attack path validation (CART)

4.7(2)
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains

Intelligence-Driven Computer Network

language

Threat Intelligence Platforms

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains on SecurityListing: A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

4.5(1)
Reveald Epiphany Intelligence Platform

Reveald Epiphany Intelligence

language

Exposure Management

Reveald Epiphany Intelligence Platform on SecurityListing: AI-powered platform for vulnerability detection, response, and MDR services

4.5(1)
Hive Pro Uni5 Xposure

Hive Pro Uni5

language

Exposure Management

Hive Pro Uni5 Xposure on SecurityListing: Threat exposure management platform implementing CTEM framework end-to-end

4.5(1)
CYE Hyver Risk Mitigation Planning

CYE Hyver Risk

language

Exposure Management

CYE Hyver Risk Mitigation Planning on SecurityListing: Risk mitigation planning platform for prioritizing vulnerability remediation

4.5(1)
Miggo Prove Next-Gen Runtime Vulnerability Prioritization

Miggo Prove Next-Gen

language

Application Security Posture Management

Miggo Prove Next-Gen Runtime Vulnerability Prioritization on SecurityListing: Runtime vulnerability prioritization using code execution and attack path analysis

4.5(1)
CYE AttackRoute Visualization

CYE AttackRoute Visualization

language

Exposure Management

CYE AttackRoute Visualization on SecurityListing: Visualizes attack paths from threat sources to critical business assets

4.3(2)
Praetorian Chariot

Praetorian Chariot

language

Exposure Management

Praetorian Chariot on SecurityListing: AI-powered continuous offensive security platform for vulnerability detection

4.3(2)
Operant AI API Threat Protection

Operant AI API

language

API Security

Operant AI API Threat Protection on SecurityListing: Runtime API threat protection for Kubernetes environments with discovery

4.3(2)
MITRE ATT&CK®

MITRE ATT&CK®

language

Threat Intelligence Platforms

MITRE ATT&CK® on SecurityListing: Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

4.2(3)
FireCompass AI-powered Pen Testing

FireCompass AI-powered Pen

language

Penetration Testing

FireCompass AI-powered Pen Testing on SecurityListing: AI-powered automated pen testing & continuous red teaming platform

3.8(1)
Paving The Way to DA - Complete Post (Pt 1,2 & 3)

Paving The Way

language

Offensive Security

Paving The Way to DA - Complete Post (Pt 1,2 & 3) on SecurityListing: A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.

Reveald Managed Vulnerability Detection and Response

Reveald Managed Vulnerability

language

Exposure Management

Reveald Managed Vulnerability Detection and Response on SecurityListing: Managed service for continuous vulnerability detection and response with AI

CYE Hyver

CYE Hyver

language

Exposure Management

CYE Hyver on SecurityListing: Cyber risk quantification platform for exposure assessment and mitigation