runZero is a comprehensive cyber asset attack surface management solution with the fastest and easiest way to full asset inventory. Uncover all managed and unmanaged devices, IT, IoT, and OT, from all environments, on-premise, cloud, and remote. Once discovered, it is easy to see which devices are missing an EDR agent, are not included in vulnerability scans, or violate policy.
Based on our record, Bugcrowd should be more popular than runZero. It has been mentiond 8 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
I like bugcrowd.com but there are others. Source: about 1 year ago
Depending on what type of cybersecurity you want to do, there's other ways to set yourself apart as well. Another way I'd get confidence in someone's abilities is if they've made bug bounties on bugcrowd.com or hackerone.com, for example. Even then, at big companies those people still have to go through HR just like everybody else. Source: almost 2 years ago
CTFs are the suitable choice in your early phases of learning , just keep an eye on ctftime.org and play some CTFs , if you are confident enough of your skills and disagree with the idea of having a pre-vulnreable software/app then you can do bug bounties on platforms like : Https://Hackerone.com Https://bugcrowd.com. Source: over 2 years ago
Something else that looks great on a resume is bug bounties. There are a number of responsible disclosure websites like HackerOne and BugCrowd where you can find companies willing to either pay or provide thanks for responsibly disclosing security flaws in their products. Look up some tips on bug bounty hunting and if you get lucky you might be able to find something! Source: over 2 years ago
Hackerone.com and bugcrowd.com but you need hacking skills. Source: almost 3 years ago
For network scanning / lite asset management I would recommend rumble.run. Source: about 2 years ago
Have you looked at https://rumble.run. Source: about 2 years ago
I would start by using https://rumble.run and do recon of all the devices and services. That will give you a better understanding of what is there and what it does. You can do it by hand but this will scan whatever network subnets you give it. Source: over 2 years ago
Rumble sounds like it might be a great fit. Source: over 2 years ago
I want to add rumble to the list (https://rumble.run). Source: over 2 years ago
HackerOne - HackerOne provides a platform designed to streamline vulnerability coordination and bug bounty program by enlisting hackers.
Axonius - Cyber security asset management to see and secure all
YesWeHack - Global Bug Bounty & Vulnerability Management Platform
Sevco - Bring order to the chaos of your increasingly complex environment. Sevco’s real-time, multi-source cyber asset management platform helps you close security gaps, improve incident response and maintain continuous compliance.
HackenProof - The world trusted Bug Bounty Platform for crypto projects
Armis - The leading enterprise-class agentless device security platform to address the new threat landscape of unmanaged and IoT devices.