See how adversary watches your network, in real-time.
Monitor your public assets, the way hackers do.
Be notified whenever a change happens to your public infrastructure.
Our engine handles thousands of nodes seamlessly.
We release top-class features on regular basis.
FullHunt can be used as an assets database to automatically discover and track your assets.
FullHunt is fully integrated with all popular network and vulnerability scanners in the market.
Utilize FullHunt APIs into your custom tools easily.
Fully configure and schedule scans using our dashboard and APIs.
FullHunt performs intelligence gathering and active testing to networks and public assets. It uses complex data analysis algorithms to build a profile on targets. From there, active (yet stealthy) scans are done in order to find changes, weaknesses, and mistakes. Once FullHunt identifies anything that can be valuable to an attacker, an alert is issued to users. This is all done without having a single appliance installed internally, simulating a real-world sophisticated adversary attack on public assets and networks.
FullHunt is the first public start-up of its kind to perform all complex monitoring on external assets without having a single appliance installed in the middle. This flexibility allows FullHunt to extend testing and monitoring of hundreds and even thousands of targets in real-time, without worrying about installation processes, and while doing everything as a real attacker
During the development of FullHunt, we have been testing the build against real targets that permits and encourages responsible disclosure. For a duration of 1 month, the early build of FullHunt were set to attack and monitor Swisscom networks. The data from FullHunt was used to attack assets on Swisscom, as a real-world actual adversary. The results of testing allowed the FullHunt team to gain access to two different Swisscom databases. Everything was reported and fixed.
During the first month of building FullHunt, a test was conducted against a Tesla owned service. The generated data were put into testing. From there, manual testing revealed a critical vulnerability that could have compromised one of Tesla’s email servers. The issue was reported and fixed.
Discover and monitor all your organization's assets within seconds.