Skip to main content
Attack Surface Management

Discover & Secure Your
External Attack Surface.

Map your entire external footprint automatically - subdomains, DNS records, live hosts, and vulnerabilities discovered and tracked continuously.

24/7 Continuous Discovery
Passive CT Log Monitoring
Real-Time Vulnerability Alerts
Full Stack DNS Enumeration
Attack Surface Management

Discover Your External Attack Surface

Subdomain Discovery

Passive discovery through Certificate Transparency logs. Finds every subdomain tied to your domains - including ones you forgot about.

DNS Enumeration

Full DNS record analysis: MX, TXT, CNAME, and NS records. Reveals your connected vendors and SaaS providers automatically.

Alive Host Tracking

Monitor which hosts are live and which services are exposed. Track changes over time.

Vulnerability Scanning

Severity classification with remediation guidance. CVE correlation with CVSS scoring and exploit availability.

Vulnerability Management

CVE Correlation & Prioritized Scanning

Not just vulnerability lists - PurpleOps prioritizes by actual risk. CVE correlation with CVSS scoring, exploit availability, and threat actor interest.

CRITICAL
CVE-2024-21762 FortiOS Out-of-Bound Write - RCE
CVSS 9.8 Exploit Available
CRITICAL
CVE-2024-3400 PAN-OS Command Injection
CVSS 10.0 Exploit Available
HIGH
CVE-2024-27198 TeamCity Auth Bypass
CVSS 9.1 Exploit Available
MEDIUM
CVE-2024-1709 ConnectWise ScreenConnect Path Traversal
CVSS 6.8 PoC Only
FAQ
FAQ

Frequently Asked Questions

How does PurpleOps discover subdomains?

Passive Certificate Transparency log monitoring discovers subdomains without generating traffic to your infrastructure. This finds every subdomain tied to your domains, including ones you may not know about.

What DNS records does PurpleOps enumerate?

Full DNS record analysis including MX, TXT, CNAME, and NS records. This reveals your email providers, cloud services, SaaS vendors, and third-party integrations.

Does PurpleOps scan for vulnerabilities?

Yes. PurpleOps performs external vulnerability scanning with CVE correlation, CVSS scoring, and exploit availability tracking. Vulnerabilities are prioritized by actual risk rather than just severity score.

How does attack surface monitoring integrate with my existing tools?

Alerts arrive via Slack, Teams, Discord, email, or webhooks. The REST API plugs into your SIEM, SOAR, or vulnerability management system for automated remediation workflows.

Map Your Attack Surface

Add your domains and discover your complete external footprint. Subdomain discovery, DNS enumeration, and vulnerability scanning start immediately.