More than 7 billion assets have been identified through active detection of global Internet assets. Additionally, 350,000 fingerprint rules have been accumulated. This allows for the identification of most software and hardware network assets. Asset data can be used to support external presentation and application in many ways and can perform hierarchical portraits based on IP.
w3af - w3af is a Web Application Attack and Audit Framework
Shodan - Shodan is the world's first search engine for Internet-connected devices.
Nikto - Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web...
ZoomEye - Network mapping service
Censys - Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.
Zed Attack Proxy - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding...