You Might Also Like
Gen AI apps are built with MongoDB Atlas Icon
Gen AI apps are built with MongoDB Atlas

The database for AI-powered applications.

MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Start Free
SOCRadar Extended Threat Intelligence Platform Icon
SOCRadar Extended Threat Intelligence Platform

Get real-time visibility into vulnerabilities, leaked data, and threat actor activity targeting your organization.

SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence.
Start Free Trial
Build innovative business apps powered by process automation Icon
Build innovative business apps powered by process automation

Connect workflows, teams and systems within one digital business transformation platform

Manage your business as a unified system of interacting processes. Use BPMN 2.0 for low-code process modeling by business people. Follow your strategic goals with process architecture that always corresponds to the structure of an actual business.
Learn More
Attack Surface Management | Criminal IP ASM Icon
Attack Surface Management | Criminal IP ASM

For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
DriveStrike: Remote Wipe | Data Breach Protection Icon
DriveStrike: Remote Wipe | Data Breach Protection

. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Learn More

Additional Details for CogentTools

Operating Systems

BSD, Linux

Languages

English

Intended Audience

Science/Research

Registered

2007-12-07

Last Updated

Categories

Distributed Computing

Maintainers

djgoldsmith, jbrusey, khirbee

Keep Me Updated!