11 Intelligence Modules.
One Platform.

Cydome integrates best-in-class security tools into a unified scanning pipeline. Each module feeds into the next, building a comprehensive picture of your external attack surface.

🌐

DNS & Subdomain Discovery

Map your complete domain footprint by enumerating DNS records, subdomains, and zone configurations. Finds forgotten assets, dev environments, and shadow IT that attackers will target first.

  • Recursive subdomain enumeration
  • DNS record analysis (A, AAAA, MX, TXT, CNAME, NS)
  • WHOIS registration data
  • Zone transfer detection
  • Wildcard DNS identification
Reconnaissance
$ cydome scan --module dns example.com
Found 47 subdomains
├── www.example.com → 203.0.113.1
├── mail.example.com → 203.0.113.2
├── dev.example.com → 203.0.113.8
├── api.example.com → 203.0.113.3
└── staging.example.com → 203.0.113.9
⚠ 2 potentially sensitive subdomains exposed
🕵

Shodan Intelligence

Query the world's largest internet-connected device search engine to discover exposed services, open ports, and vulnerable software across your IP ranges — without sending a single packet to your infrastructure.

  • Passive service discovery
  • Banner grabbing and version detection
  • Known vulnerability matching
  • Historical data analysis
  • IoT and ICS device detection
Reconnaissance
$ cydome scan --module shodan 203.0.113.0/24
12 hosts discovered
├── :22 OpenSSH 7.4 — CVE-2018-15473
├── :80 nginx/1.14.0
├── :443 Apache/2.4.29
├── :3389 RDP — publicly exposed
└── :8080 Tomcat/9.0.12
🔒

Censys Asset Inventory

Deep analysis of TLS certificates, host configurations, and exposed services. Detects expired certificates, outdated TLS versions, and risky service exposure across your entire infrastructure.

  • TLS certificate inventory and expiry tracking
  • Certificate chain validation
  • Host and service enumeration
  • Protocol version analysis
  • Cross-reference with Shodan findings
Reconnaissance
$ cydome scan --module censys example.com
8 certificates analyzed
├── *.example.com — valid, expires 2027-01
├── mail.example.com — expired 2025-11
├── api.example.com — valid, Let's Encrypt
└── TLS 1.0 enabled on 2 hosts
🛡

VirusTotal Threat Intel

Cross-reference your domains and IPs against 70+ antivirus engines and threat databases. Surface malware associations, phishing flags, and reputation issues before attackers exploit them.

  • Domain and IP reputation scoring
  • Malware association detection
  • Phishing and social engineering flags
  • Historical threat data
  • Community-sourced intelligence
Scanning
$ cydome scan --module virustotal example.com
Reputation: Clean (68/70 engines)
├── Kaspersky: Clean
├── Norton: Clean
├── Sophos: Suspicious activity flagged
├── ESET: Potentially unwanted content
└── Community score: 12/100
🔌

Port Scanning & Service Detection

Comprehensive TCP/UDP port scanning identifies every open port and running service on your internet-facing hosts. Combined with banner grabbing and version detection for accurate vulnerability mapping.

  • TCP SYN and connect scanning
  • Top 1000+ port coverage
  • Service version fingerprinting
  • Operating system detection
  • Custom port range scanning
Scanning
$ cydome scan --module ports 203.0.113.42
Scanning 65535 ports...
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2
80/tcp open http nginx 1.18
443/tcp open https nginx 1.18
3306/tcp open mysql MySQL 5.7
6379/tcp open redis Redis 6.0
🔐

SSL/TLS & Certificate Analysis

Deep inspection of your SSL/TLS configuration to identify weak ciphers, protocol vulnerabilities, certificate issues, and misconfigurations that could expose your traffic to interception.

  • Protocol version testing (SSLv3 through TLS 1.3)
  • Cipher suite strength analysis
  • Certificate chain validation
  • HSTS header verification
  • OCSP stapling and CT log checks
Analysis
$ cydome scan --module ssl example.com
SSL/TLS Analysis Complete
├── TLS 1.3: ✓ Supported
├── TLS 1.2: ✓ Supported
├── TLS 1.0: ✗ Still enabled
├── HSTS: ✓ Enabled (max-age: 31536000)
├── Certificate: Valid until 2027-03-15
└── Grade: A-
📧

Email Security Analysis

Evaluate your email infrastructure security by checking SPF, DKIM, and DMARC records. Identify misconfigurations that could allow email spoofing, phishing delivery, or domain abuse.

  • SPF record validation and policy analysis
  • DKIM key discovery and verification
  • DMARC policy evaluation
  • MX record security assessment
  • Email relay and open relay detection
Analysis
$ cydome scan --module email example.com
Email Security Report
├── SPF: ✓ Valid (v=spf1 include:...)
├── DKIM: ✓ 2048-bit key found
├── DMARC: ✗ Policy set to 'none'
├── MX: mail.example.com (priority 10)
└── No DANE/TLSA records found
🔀

CORS & Security Headers

Audit HTTP security headers and CORS policies across all your web assets. Missing or misconfigured headers are one of the most common — and easily fixable — attack vectors.

  • Content-Security-Policy analysis
  • X-Frame-Options verification
  • CORS policy audit
  • Referrer-Policy and Permissions-Policy
  • Cookie security flags (Secure, HttpOnly, SameSite)
Analysis
$ cydome scan --module headers example.com
Security Headers Report
├── X-Content-Type-Options: ✓ nosniff
├── X-Frame-Options: ✗ Missing
├── CSP: ✗ Not configured
├── Strict-Transport-Security: ✓
├── CORS: Access-Control-Allow-Origin: *
└── Grade: C
💣

Nuclei Vulnerability Scanner

Powered by ProjectDiscovery's Nuclei engine with 8,000+ community-maintained templates. Detects known CVEs, misconfigurations, exposed panels, default credentials, and more at high speed.

  • 8,000+ vulnerability templates
  • CVE detection with exploit references
  • Default credential testing
  • Exposed admin panel detection
  • Technology-specific checks (WordPress, Jira, etc.)
Scanning
$ cydome scan --module nuclei example.com
Running 8,247 templates...
[critical] CVE-2024-21762 — FortiOS
[high] Exposed .env file detected
[high] WordPress xmlrpc.php enabled
[medium] jQuery 3.2.1 — outdated
[info] Apache/2.4.29 detected
Completed in 4m 23s

CVE Enrichment (NVD)

Automatically match detected software versions against the National Vulnerability Database. Enrich findings with CVSS scores, CWE classifications, PoC exploit references, and remediation guidance.

  • CVSS v3.1 severity scoring
  • CWE weakness classification
  • Exploit availability indicators
  • Vendor advisory links
  • Patch and remediation references
Enrichment
$ cydome enrich --cve CVE-2024-21762
CVE-2024-21762 — FortiOS Out-of-Bound Write
├── CVSS: 9.8 (Critical)
├── CWE: CWE-787 (Out-of-bounds Write)
├── Exploited in wild: Yes
├── Patch: FortiOS 7.4.3+
└── References: NVD, CISA KEV

Continuous Monitoring & Alerting

Because point-in-time assessments decay over time, Cydome's auto testing feature continuously monitors your external environment. Set it up to scan automatically and get instant alerts if new issues or ports are discovered.

  • Flexible scheduling: daily, weekly, monthly, or quarterly
  • Automated tracking of vulnerability remediation
  • Alerts for newly opened ports or exposed services
  • Continuous tracking of SSL/TLS certificate expiry
  • Regression testing to ensure closed vulnerabilities stay closed
Monitoring
$ cydome monitor --schedule=weekly example.com
Monitoring scheduled...
[2026-04-12] Diff Report Generated:
├── Fixed: OpenSSH updated to 8.4 (CVE-2018-15473 resolved)
├── New Alert: Port 3389/TCP opened on 203.0.113.10
└── New Alert: Certificate expiring in 14 days
Alert notifications sent via Email to security team.
📈

Reporting & Export Engine

Every scan produces professional, branded reports ready to share with management, compliance auditors, or clients. Available in PDF, DOCX, and JSON formats with executive summaries and detailed findings.

  • Executive summary with risk score
  • Severity breakdown with visual charts
  • Step-by-step remediation guidance
  • Compliance mapping indicators
  • PDF, DOCX, and machine-readable JSON
Reporting
$ cydome report --format pdf example.com
Generating report...
├── Executive Summary ✓
├── Findings (47 total) ✓
├── Risk Score: 62/100 (Moderate)
├── Charts & Visualizations ✓
├── Remediation Roadmap ✓
└── Saved: report_example_com.pdf

Ready to See What
Attackers See?

Request a free assessment and we'll scan your domain with all 11 modules. No commitment, no agents to install.

Request Your Free Assessment →