US6760746B1
(en)
|
1999-09-01 |
2004-07-06 |
Eric Schneider |
Method, product, and apparatus for processing a data request
|
EP1149339A1
(de)
|
1998-12-09 |
2001-10-31 |
Network Ice Corporation |
Verfahren und vorrichtung zur netzwerk- und computersystem- sicherung
|
US9141717B2
(en)
|
1999-03-22 |
2015-09-22 |
Esdr Network Solutions Llc |
Methods, systems, products, and devices for processing DNS friendly identifiers
|
US8037168B2
(en)
|
1999-07-15 |
2011-10-11 |
Esdr Network Solutions Llc |
Method, product, and apparatus for enhancing resolution services, registration services, and search services
|
US7188138B1
(en)
|
1999-03-22 |
2007-03-06 |
Eric Schneider |
Method, product, and apparatus for resource identifier registration and aftermarket services
|
USRE43690E1
(en)
|
1999-03-22 |
2012-09-25 |
Esdr Network Solutions Llc |
Search engine request method, product, and apparatus
|
US6338082B1
(en)
|
1999-03-22 |
2002-01-08 |
Eric Schneider |
Method, product, and apparatus for requesting a network resource
|
US6839757B1
(en)
*
|
1999-04-28 |
2005-01-04 |
2Wire, Inc. |
System and method for automatically discovering accessible services on a computer network and providing automatic access thereto
|
US7346929B1
(en)
*
|
1999-07-29 |
2008-03-18 |
International Business Machines Corporation |
Method and apparatus for auditing network security
|
US7073198B1
(en)
|
1999-08-26 |
2006-07-04 |
Ncircle Network Security, Inc. |
Method and system for detecting a vulnerability in a network
|
USRE44207E1
(en)
|
1999-09-01 |
2013-05-07 |
Esdr Network Solutions Llc |
Network resource access method, product, and apparatus
|
JP4084914B2
(ja)
*
|
1999-09-29 |
2008-04-30 |
株式会社日立製作所 |
セキュリティ評価方法および装置、セキュリティ施策の作成支援方法および装置
|
US8006243B2
(en)
|
1999-12-07 |
2011-08-23 |
International Business Machines Corporation |
Method and apparatus for remote installation of network drivers and software
|
JP4507319B2
(ja)
*
|
1999-12-17 |
2010-07-21 |
ソニー株式会社 |
情報処理装置、情報処理方法、プログラム、および記録媒体、端末装置、並びに、システムおよびシステムの方法
|
US6775657B1
(en)
*
|
1999-12-22 |
2004-08-10 |
Cisco Technology, Inc. |
Multilayered intrusion detection system and method
|
US6957348B1
(en)
|
2000-01-10 |
2005-10-18 |
Ncircle Network Security, Inc. |
Interoperability of vulnerability and intrusion detection systems
|
US7315801B1
(en)
|
2000-01-14 |
2008-01-01 |
Secure Computing Corporation |
Network security modeling system and method
|
US7698396B2
(en)
*
|
2000-01-31 |
2010-04-13 |
Hitachi Software Engineering Co., Ltd. |
Method of automatically recognizing network configuration including intelligent packet relay equipment, method of displaying network configuration chart, and system thereof
|
CA2375206A1
(en)
*
|
2000-03-27 |
2001-10-04 |
Network Security Systems, Inc. |
Internet/network security method and system for checking security of a client from a remote facility
|
US6880005B1
(en)
*
|
2000-03-31 |
2005-04-12 |
Intel Corporation |
Managing policy rules in a network
|
IL152502A0
(en)
*
|
2000-04-28 |
2003-05-29 |
Internet Security Systems Inc |
Method and system for managing computer security information
|
US7921459B2
(en)
*
|
2000-04-28 |
2011-04-05 |
International Business Machines Corporation |
System and method for managing security events on a network
|
US7574740B1
(en)
*
|
2000-04-28 |
2009-08-11 |
International Business Machines Corporation |
Method and system for intrusion detection in a computer network
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US6993448B2
(en)
*
|
2000-08-09 |
2006-01-31 |
Telos Corporation |
System, method and medium for certifying and accrediting requirements compliance
|
US9280667B1
(en)
|
2000-08-25 |
2016-03-08 |
Tripwire, Inc. |
Persistent host determination
|
US7181769B1
(en)
*
|
2000-08-25 |
2007-02-20 |
Ncircle Network Security, Inc. |
Network security system having a device profiler communicatively coupled to a traffic monitor
|
US6807569B1
(en)
*
|
2000-09-12 |
2004-10-19 |
Science Applications International Corporation |
Trusted and anonymous system and method for sharing threat data to industry assets
|
US9027121B2
(en)
|
2000-10-10 |
2015-05-05 |
International Business Machines Corporation |
Method and system for creating a record for one or more computer security incidents
|
US6704030B1
(en)
*
|
2000-10-13 |
2004-03-09 |
Lucent Technologies Inc. |
Method and apparatus for provisioning telecommunications equipment
|
US7130466B2
(en)
*
|
2000-12-21 |
2006-10-31 |
Cobion Ag |
System and method for compiling images from a database and comparing the compiled images with known images
|
US7072981B1
(en)
*
|
2000-12-21 |
2006-07-04 |
Cisco Technology, Inc. |
Preallocation of client network address translation addresses for client-server networks
|
US7089328B1
(en)
|
2000-12-29 |
2006-08-08 |
Cisco Technology, Inc. |
Method allocation scheme for maintaining server load balancers services in a high throughput environment
|
WO2002062049A2
(en)
*
|
2001-01-31 |
2002-08-08 |
Timothy David Dodd |
Method and system for calculating risk in association with a security audit of a computer network
|
US7185232B1
(en)
|
2001-02-28 |
2007-02-27 |
Cenzic, Inc. |
Fault injection methods and apparatus
|
US7590745B2
(en)
*
|
2001-03-02 |
2009-09-15 |
International Business Machines Corporation |
System and method for analyzing a router in a shared network system
|
US8135815B2
(en)
*
|
2001-03-27 |
2012-03-13 |
Redseal Systems, Inc. |
Method and apparatus for network wide policy-based analysis of configurations of devices
|
US20030028803A1
(en)
*
|
2001-05-18 |
2003-02-06 |
Bunker Nelson Waldo |
Network vulnerability assessment system and method
|
US7325252B2
(en)
*
|
2001-05-18 |
2008-01-29 |
Achilles Guard Inc. |
Network security testing
|
US7043757B2
(en)
*
|
2001-05-22 |
2006-05-09 |
Mci, Llc |
System and method for malicious code detection
|
DE60135449D1
(de)
*
|
2001-06-14 |
2008-10-02 |
Ibm |
Eindringsdetektion in Datenverarbeitungssystemen
|
US7657419B2
(en)
*
|
2001-06-19 |
2010-02-02 |
International Business Machines Corporation |
Analytical virtual machine
|
US7003561B1
(en)
*
|
2001-06-29 |
2006-02-21 |
Mcafee, Inc. |
System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure
|
US7124181B1
(en)
*
|
2001-06-29 |
2006-10-17 |
Mcafee, Inc. |
System, method and computer program product for improved efficiency in network assessment utilizing variable timeout values
|
US7228566B2
(en)
*
|
2001-07-10 |
2007-06-05 |
Core Sdi, Incorporated |
Automated computer system security compromise
|
US8104017B2
(en)
*
|
2001-10-25 |
2012-01-24 |
The Mathworks, Inc. |
Traceability in a modeling environment
|
US8266703B1
(en)
|
2001-11-30 |
2012-09-11 |
Mcafee, Inc. |
System, method and computer program product for improving computer network intrusion detection by risk prioritization
|
US6546493B1
(en)
|
2001-11-30 |
2003-04-08 |
Networks Associates Technology, Inc. |
System, method and computer program product for risk assessment scanning based on detected anomalous events
|
WO2003058451A1
(en)
|
2002-01-04 |
2003-07-17 |
Internet Security Systems, Inc. |
System and method for the managed security control of processes on a computer system
|
US7505498B2
(en)
|
2002-01-08 |
2009-03-17 |
Jorge Sanchez |
Apparatus and method for measurement for dynamic laser signals
|
US7543056B2
(en)
*
|
2002-01-15 |
2009-06-02 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7257630B2
(en)
*
|
2002-01-15 |
2007-08-14 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7664845B2
(en)
*
|
2002-01-15 |
2010-02-16 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US20030154269A1
(en)
*
|
2002-02-14 |
2003-08-14 |
Nyanchama Matunda G. |
Method and system for quantitatively assessing computer network vulnerability
|
US20030163729A1
(en)
*
|
2002-02-27 |
2003-08-28 |
International Business Machines Corporation |
Security management in data processing networks
|
US7694128B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US7124438B2
(en)
|
2002-03-08 |
2006-10-17 |
Ciphertrust, Inc. |
Systems and methods for anomaly detection in patterns of monitored communications
|
US6941467B2
(en)
*
|
2002-03-08 |
2005-09-06 |
Ciphertrust, Inc. |
Systems and methods for adaptive message interrogation through multiple queues
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
US7693947B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for graphically displaying messaging traffic
|
US7903549B2
(en)
|
2002-03-08 |
2011-03-08 |
Secure Computing Corporation |
Content-based policy compliance systems and methods
|
US7870203B2
(en)
|
2002-03-08 |
2011-01-11 |
Mcafee, Inc. |
Methods and systems for exposing messaging reputation to an end user
|
US7096498B2
(en)
|
2002-03-08 |
2006-08-22 |
Cipher Trust, Inc. |
Systems and methods for message threat management
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US20030188194A1
(en)
*
|
2002-03-29 |
2003-10-02 |
David Currie |
Method and apparatus for real-time security verification of on-line services
|
US7519990B1
(en)
*
|
2002-07-19 |
2009-04-14 |
Fortinet, Inc. |
Managing network traffic flow
|
EP1563393A4
(de)
*
|
2002-10-22 |
2010-12-22 |
Unho Choi |
Integriertes notfallsystem für informationsinfrastruktur und betriebsverfahren dafür
|
US7607169B1
(en)
|
2002-12-02 |
2009-10-20 |
Arcsight, Inc. |
User interface for network security console
|
US7913303B1
(en)
|
2003-01-21 |
2011-03-22 |
International Business Machines Corporation |
Method and system for dynamically protecting a computer system from attack
|
US8091117B2
(en)
*
|
2003-02-14 |
2012-01-03 |
Preventsys, Inc. |
System and method for interfacing with heterogeneous network data gathering tools
|
US20050005152A1
(en)
*
|
2003-07-01 |
2005-01-06 |
Navjot Singh |
Security vulnerability monitor
|
US7657938B2
(en)
|
2003-10-28 |
2010-02-02 |
International Business Machines Corporation |
Method and system for protecting computer networks by altering unwanted network data traffic
|
EP1716471B1
(de)
|
2004-02-11 |
2018-11-21 |
Entit Software LLC |
System und verfahren zum testen von web-anwendungen mit rekursiver entdeckung und analyse
|
US20060282494A1
(en)
*
|
2004-02-11 |
2006-12-14 |
Caleb Sima |
Interactive web crawling
|
US7765597B2
(en)
*
|
2004-02-11 |
2010-07-27 |
Hewlett-Packard Development Company, L.P. |
Integrated crawling and auditing of web applications and web content
|
KR100631784B1
(ko)
*
|
2004-02-16 |
2006-10-11 |
삼성전자주식회사 |
컴퓨터 바이러스로부터의 감염을 방지하기 위한 시스템 및방법
|
US8201257B1
(en)
|
2004-03-31 |
2012-06-12 |
Mcafee, Inc. |
System and method of managing network security risks
|
US20050259634A1
(en)
*
|
2004-05-19 |
2005-11-24 |
Ross Perry R |
Method and apparatus for low-overhead service availability and performance monitoring
|
US7752671B2
(en)
*
|
2004-10-04 |
2010-07-06 |
Promisec Ltd. |
Method and device for questioning a plurality of computerized devices
|
US8635690B2
(en)
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US20060117388A1
(en)
*
|
2004-11-18 |
2006-06-01 |
Nelson Catherine B |
System and method for modeling information security risk
|
KR20060057916A
(ko)
*
|
2004-11-24 |
2006-05-29 |
한국전자통신연구원 |
정보보호 제품의 기능 시험을 위한 공격 패킷 생성 기능을포함하는 네트워크 패킷 생성 장치 및 방법
|
US8095983B2
(en)
|
2005-03-15 |
2012-01-10 |
Mu Dynamics, Inc. |
Platform for analyzing the security of communication protocols and channels
|
US7958560B1
(en)
|
2005-03-15 |
2011-06-07 |
Mu Dynamics, Inc. |
Portable program for generating attacks on communication protocols and channels
|
WO2006102515A1
(en)
*
|
2005-03-23 |
2006-09-28 |
Belarc, Inc. |
Security control verification and monitoring subsystem for use in a computer information database system
|
US7937480B2
(en)
|
2005-06-02 |
2011-05-03 |
Mcafee, Inc. |
Aggregation of reputation data
|
US20160248813A1
(en)
|
2006-08-23 |
2016-08-25 |
Threatstop, Inc. |
Method and system for propagating network policy
|
US8316447B2
(en)
*
|
2006-09-01 |
2012-11-20 |
Mu Dynamics, Inc. |
Reconfigurable message-delivery preconditions for delivering attacks to analyze the security of networked systems
|
US9172611B2
(en)
|
2006-09-01 |
2015-10-27 |
Spirent Communications, Inc. |
System and method for discovering assets and functional relationships in a network
|
US7958230B2
(en)
|
2008-09-19 |
2011-06-07 |
Mu Dynamics, Inc. |
Test driven deployment and monitoring of heterogeneous network systems
|
US7949716B2
(en)
|
2007-01-24 |
2011-05-24 |
Mcafee, Inc. |
Correlation and analysis of entity attributes
|
US7779156B2
(en)
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US8179798B2
(en)
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US8214497B2
(en)
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US8122729B2
(en)
*
|
2007-03-13 |
2012-02-28 |
Dri-Eaz Products, Inc. |
Dehumidification systems and methods for extracting moisture from water damaged structures
|
US20090038014A1
(en)
*
|
2007-07-31 |
2009-02-05 |
Paul Force |
System and method for tracking remediation of security vulnerabilities
|
US7774637B1
(en)
|
2007-09-05 |
2010-08-10 |
Mu Dynamics, Inc. |
Meta-instrumentation for security analysis
|
US8871096B2
(en)
*
|
2007-09-10 |
2014-10-28 |
Res Usa, Llc |
Magnetic separation combined with dynamic settling for fischer-tropsch processes
|
US8250658B2
(en)
*
|
2007-09-20 |
2012-08-21 |
Mu Dynamics, Inc. |
Syntax-based security analysis using dynamically generated test cases
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US8045458B2
(en)
|
2007-11-08 |
2011-10-25 |
Mcafee, Inc. |
Prioritizing network traffic
|
TWI355824B
(en)
*
|
2007-12-11 |
2012-01-01 |
Inst Information Industry |
Method, network apparatus and computer readable me
|
US8160975B2
(en)
|
2008-01-25 |
2012-04-17 |
Mcafee, Inc. |
Granular support vector machine with random granularity
|
US8589503B2
(en)
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
KR20090121579A
(ko)
*
|
2008-05-22 |
2009-11-26 |
주식회사 이베이지마켓 |
서버의 취약점을 점검하기 위한 시스템 및 그 방법
|
US8069471B2
(en)
*
|
2008-10-21 |
2011-11-29 |
Lockheed Martin Corporation |
Internet security dynamics assessment system, program product, and related methods
|
WO2011017566A1
(en)
*
|
2009-08-05 |
2011-02-10 |
Core Sdi, Incorporated |
System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy
|
US8490193B2
(en)
*
|
2009-09-08 |
2013-07-16 |
Core Security Technologies |
System and method for probabilistic attack planning
|
US8547974B1
(en)
|
2010-05-05 |
2013-10-01 |
Mu Dynamics |
Generating communication protocol test cases based on network traffic
|
US8463860B1
(en)
|
2010-05-05 |
2013-06-11 |
Spirent Communications, Inc. |
Scenario based scale testing
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
US8826231B1
(en)
*
|
2010-06-28 |
2014-09-02 |
The Boeing Company |
Methods and systems for deploying software applications
|
US9106514B1
(en)
|
2010-12-30 |
2015-08-11 |
Spirent Communications, Inc. |
Hybrid network software provision
|
US8464219B1
(en)
|
2011-04-27 |
2013-06-11 |
Spirent Communications, Inc. |
Scalable control system for test execution and monitoring utilizing multiple processors
|
US8800046B2
(en)
|
2012-04-10 |
2014-08-05 |
Mcafee, Inc. |
Unified scan engine
|
US9407653B2
(en)
*
|
2012-04-10 |
2016-08-02 |
Mcafee, Inc. |
Unified scan management
|
US9516451B2
(en)
*
|
2012-04-10 |
2016-12-06 |
Mcafee, Inc. |
Opportunistic system scanning
|
US9049207B2
(en)
|
2012-04-11 |
2015-06-02 |
Mcafee, Inc. |
Asset detection system
|
US8972543B1
(en)
|
2012-04-11 |
2015-03-03 |
Spirent Communications, Inc. |
Managing clients utilizing reverse transactions
|
US8955036B2
(en)
|
2012-04-11 |
2015-02-10 |
Mcafee, Inc. |
System asset repository management
|
US8954573B2
(en)
|
2012-04-11 |
2015-02-10 |
Mcafee Inc. |
Network address repository management
|
US9027141B2
(en)
|
2012-04-12 |
2015-05-05 |
Netflix, Inc. |
Method and system for improving security and reliability in a networked application environment
|
CN103457957B
(zh)
*
|
2013-09-17 |
2016-05-18 |
北京信息科技大学 |
一种具有自适应功能的网络渗透测试系统及方法
|
US9781046B1
(en)
*
|
2013-11-19 |
2017-10-03 |
Tripwire, Inc. |
Bandwidth throttling in vulnerability scanning applications
|
US11102273B2
(en)
*
|
2015-05-13 |
2021-08-24 |
Cisco Technology, Inc. |
Uplink performance management
|
WO2018138608A2
(en)
|
2017-01-30 |
2018-08-02 |
XM Ltd. |
Penetration testing of a networked system
|
US10686822B2
(en)
|
2017-01-30 |
2020-06-16 |
Xm Cyber Ltd. |
Systems and methods for selecting a lateral movement strategy for a penetration testing campaign
|
US10068095B1
(en)
|
2017-05-15 |
2018-09-04 |
XM Cyber Ltd |
Systems and methods for selecting a termination rule for a penetration testing campaign
|
US10367846B2
(en)
|
2017-11-15 |
2019-07-30 |
Xm Cyber Ltd. |
Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
|
US10257220B2
(en)
|
2017-01-30 |
2019-04-09 |
Xm Cyber Ltd. |
Verifying success of compromising a network node during penetration testing of a networked system
|
US10999308B2
(en)
|
2017-01-30 |
2021-05-04 |
Xm Cyber Ltd. |
Setting-up penetration testing campaigns
|
US10581802B2
(en)
|
2017-03-16 |
2020-03-03 |
Keysight Technologies Singapore (Sales) Pte. Ltd. |
Methods, systems, and computer readable media for advertising network security capabilities
|
US10534917B2
(en)
|
2017-06-20 |
2020-01-14 |
Xm Cyber Ltd. |
Testing for risk of macro vulnerability
|
US10574684B2
(en)
|
2017-07-09 |
2020-02-25 |
Xm Cyber Ltd. |
Locally detecting phishing weakness
|
US10904282B2
(en)
*
|
2017-08-08 |
2021-01-26 |
American International Group, Inc. |
System and method for assessing cybersecurity risk of computer network
|
US10412112B2
(en)
|
2017-08-31 |
2019-09-10 |
Xm Cyber Ltd. |
Time-tagged pre-defined scenarios for penetration testing
|
US10447721B2
(en)
|
2017-09-13 |
2019-10-15 |
Xm Cyber Ltd. |
Systems and methods for using multiple lateral movement strategies in penetration testing
|
US11093617B2
(en)
*
|
2017-10-04 |
2021-08-17 |
Servicenow, Inc. |
Automated vulnerability grouping
|
US10440044B1
(en)
|
2018-04-08 |
2019-10-08 |
Xm Cyber Ltd. |
Identifying communicating network nodes in the same local network
|
US10382473B1
(en)
|
2018-09-12 |
2019-08-13 |
Xm Cyber Ltd. |
Systems and methods for determining optimal remediation recommendations in penetration testing
|
US11418528B2
(en)
*
|
2018-11-02 |
2022-08-16 |
Rapid7, Inc. |
Dynamic best path determination for penetration testing
|
WO2020089698A1
(en)
|
2018-11-04 |
2020-05-07 |
Xm Cyber Ltd. |
Using information about exportable data in penetration testing
|
US10771490B2
(en)
|
2018-11-28 |
2020-09-08 |
Rapid7, Inc. |
Detecting anomalous network device activity
|
US10574687B1
(en)
|
2018-12-13 |
2020-02-25 |
Xm Cyber Ltd. |
Systems and methods for dynamic removal of agents from nodes of penetration testing systems
|
US10462177B1
(en)
|
2019-02-06 |
2019-10-29 |
Xm Cyber Ltd. |
Taking privilege escalation into account in penetration testing campaigns
|
US11283827B2
(en)
|
2019-02-28 |
2022-03-22 |
Xm Cyber Ltd. |
Lateral movement strategy during penetration testing of a networked system
|
US11206281B2
(en)
|
2019-05-08 |
2021-12-21 |
Xm Cyber Ltd. |
Validating the use of user credentials in a penetration testing campaign
|
US10637883B1
(en)
|
2019-07-04 |
2020-04-28 |
Xm Cyber Ltd. |
Systems and methods for determining optimal remediation recommendations in penetration testing
|
US11416623B2
(en)
|
2019-07-31 |
2022-08-16 |
International Business Machines Corporation |
Automatic penetration testing enablement of regression buckets
|
US10880326B1
(en)
|
2019-08-01 |
2020-12-29 |
Xm Cyber Ltd. |
Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
|
US11533329B2
(en)
|
2019-09-27 |
2022-12-20 |
Keysight Technologies, Inc. |
Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
|
US11005878B1
(en)
|
2019-11-07 |
2021-05-11 |
Xm Cyber Ltd. |
Cooperation between reconnaissance agents in penetration testing campaigns
|
CN111026660B
(zh)
*
|
2019-12-05 |
2023-07-07 |
国网浙江省电力有限公司电力科学研究院 |
一种基于专家系统知识库的渗透测试方法
|
US11575700B2
(en)
|
2020-01-27 |
2023-02-07 |
Xm Cyber Ltd. |
Systems and methods for displaying an attack vector available to an attacker of a networked system
|
US11507860B1
(en)
*
|
2020-02-24 |
2022-11-22 |
Rapid7, Inc. |
Machine learned inference of protocols from banner data
|
US11582256B2
(en)
|
2020-04-06 |
2023-02-14 |
Xm Cyber Ltd. |
Determining multiple ways for compromising a network node in a penetration testing campaign
|
US20210336971A1
(en)
*
|
2020-04-23 |
2021-10-28 |
Specter Ops, Inc. |
System and method for continuous collection, analysis and reporting of attack paths in a directory services environment
|
US11539725B2
(en)
|
2020-04-23 |
2022-12-27 |
Specter Ops, Inc. |
System and method for continuous collection, analysis and reporting of attack paths choke points in a directory services environment
|
CN111683047B
(zh)
*
|
2020-04-30 |
2023-05-30 |
中国平安财产保险股份有限公司 |
越权漏洞检测方法、装置、计算机设备及介质
|
USD956778S1
(en)
|
2020-08-11 |
2022-07-05 |
Specter Ops, Inc. |
Display screen or portion thereof with an animated graphical user interface
|
USD956779S1
(en)
|
2020-08-11 |
2022-07-05 |
Specter Ops, Inc. |
Display screen or portion thereof with an animated graphical user interface
|
USD956777S1
(en)
|
2020-08-11 |
2022-07-05 |
Specter Ops, Inc. |
Display screen or portion thereof with graphical user interface
|
CN112165498B
(zh)
*
|
2020-11-12 |
2022-10-25 |
北京华云安信息技术有限公司 |
一种渗透测试的智能决策方法及装置
|
CN113704763B
(zh)
*
|
2021-09-02 |
2022-03-25 |
北京珞安科技有限责任公司 |
流水线式设备扫描探测方法
|