Security Scanners
A comprehensive suite of 45 autonomous cybersecurity tools. Containerized agents powered by AI to protect your digital assets.
Web Security
Scan websites for vulnerabilities, misconfigurations, and security issues
Deep Security Scan
🔥 RecommendedComprehensive vulnerability scan with 25,847 templates. Detects CVEs, XSS, SQLi, and more.
Quick Web Scanner
Fast security audit with 3,412 templates for OWASP Top 10 and common vulnerabilities.
Directory Bruteforce
Discover hidden directories and files with 8,756 wordlist entries.
API Endpoint Scanner
Discover and test API endpoints with 4,231 attack patterns.
Technology Detection
Identify technologies with 2,847 fingerprints for frameworks and CMS.
Wayback Machine
Discover historical URLs and sensitive files from web archives.
JavaScript Secrets Scanner
Crawl websites to find exposed secrets, API keys and endpoints in JS files.
Mobile Security
Analyze Android and iOS applications for security vulnerabilities
Network & Infrastructure
Scan networks, ports, SSL certificates, and cloud infrastructure
Network & Port Scanner
Find open ports and running services on target systems.
SSL/TLS Scanner
Analyze certificates, detect weak ciphers and misconfigurations.
IP Intelligence
Get intelligence data for any IP including open ports and CVEs.
IP Threat Intelligence
Check IPs against multiple threat intelligence databases for abuse reports, noise classification, and reputation data.
Cloud Security Scanner
Scan cloud infrastructure for exposed buckets and misconfigs.
Reconnaissance
Discover subdomains, attack surface, and potential takeover vulnerabilities
Code & Secrets
Scan repositories and databases for exposed secrets and sensitive data
Code Scanner V2
Advanced code analysis with 1,847 security rules for vulnerabilities and secrets.
Container Scanner
Scan Docker images with 12,456 vulnerability signatures.
IaC Security Scanner
Scan Terraform, CloudFormation, Kubernetes with 3,214 policy checks.
Source Code Scanner
Analyze GitHub repos with 2,156 security patterns.
Codebase Security
Scan GitHub repos for exposed secrets with 847 detection patterns.
Git Advanced Scanner
Advanced secret detection with entropy analysis and 1,523 patterns.
Git Secrets Global Scanner
Detect leaked API keys and secrets across GitHub, GitLab & Bitbucket with advanced config patterns.
API Key Validator
Validate API keys against 25+ services (OpenAI, GitHub, Stripe, Slack, etc.) to check if they're active.
GitSentinel Monitor
Monitor GitHub for sensitive data leaks about your company in real-time.
GitHub Enterprise Scanner
Scan enterprise organizations for exposed secrets and sensitive repos.
Supabase RLS Scanner
Audit for exposed service keys and RLS vulnerabilities.
Supabase Quick Scanner
Detect exposed Supabase API keys and data leaks by scanning website JavaScript.
MongoDB Leak Scanner
Check for exposed MongoDB instances and unsecured databases.
Firebase Security Scanner
Detect exposed Firebase databases and takeover vulnerabilities.
AWS S3 Bucket Scanner
Find misconfigured S3 buckets with public read/write access.
Email & Identity
Check email security records and credential breaches
Email Security Scanner
Check DMARC, SPF, DKIM records and data breaches.
Identity Leak Checker
Check if your email has been exposed in data breaches.
Password Breach Check
Check if credentials have been exposed in breaches.
Password Leaked Premium
View leaked passwords in plaintext from COMB database. Search by username or email.
Threat Intelligence
Scan for malware, malicious files, and threat indicators
Website Malware Scanner
Check URLs against 70+ antivirus engines and threat databases.
File Scanner
Scan files for malware, sensitive data, and security issues.
Dark Web Scanner
Search the dark web for data leaks, breaches, and mentions of your identity or company.
Data Breach Scanner
Search email, domain, phone, credit card, IBAN exposures across breach databases.
OSINT Tools
Open Source Intelligence tools for advanced threat detection
Threat Email Search
Search for compromised data by email address in infostealer databases.
Threat Domain Search
Find compromised employees and credentials associated with your domain.
Threat URL Search
Find URLs with compromised credentials on your domain.
Threat Username Search
Search for compromised accounts by username across the web.