Phenomenati
Phenomenati
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources
  • More
    • Home
    • The Future
      • Cyber Entropy™
      • The Decisive SOC
      • Augmented Intelligence
      • A SOC Taxonomy
    • Services
      • Cyber101 for the Board
      • Cyber Risk Assessments
      • Cyber ShadowBreaker™
      • Cybersecurity Strategy
      • Cybersecurity Design
      • Risk Level Agreements
      • SecOps Communications
      • Case Studies
    • Partners
      • Technology Vendors
      • Service Providers
    • About
      • Leadership
      • Contact Us
    • Resource Center
      • Essential Reading/Viewing
      • Frameworks, Standards
      • Threat Intel & Dashboards
      • Industry ISACs
      • Cyber Reconnaissance
      • Vulnerability Management
      • Scanning & Pen Testing
      • Monitoring, IDS, SIEM
      • IOC Scanning
      • Analytics
      • Rootkit Detection
      • Incident Response
      • DFIR Resources
  • Home
  • The Future
    • Cyber Entropy™
    • The Decisive SOC
    • Augmented Intelligence
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Essential Reading/Viewing
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Industry ISACs
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • IOC Scanning
    • Analytics
    • Rootkit Detection
    • Incident Response
    • DFIR Resources

Resource Center

A collection of useful Resources for Cyber Security Operations practitioners, or those building/evolving a SOC.

Cyber Vulnerability Intelligence Resources

CVE®

OVAL®

National Vulnerability Database (NVD)

PunkSPIDER Search Engine

Shodan Search Engine

Vulnerability Scanning

arachni Web App Scanner

Burp Suite Site Scanning

Firefox Hackbar

JoomScan Joomla Scanner

Nexpose Vulnerability Scanner

Nikto

OpenVAS

SQLmap SQL Injection Scanner

WPScan WordPress Scanner

Copyright © 2023 Phenomenati - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept