CompanyStrikers
Sign inTry Strike for free
CompanyStrikers
Try Strike for free

What's New

Last updated 15 Feb 2023

Q1 2023

ASM recurrency

The ASM recurrency feature automates this process to ensure that the attack surface is continuously monitored and managed. By running the ASM recurrency every week, the system can detect and respond to any new vulnerabilities or changes to the attack surface.

New export types in Vulnerability Manager

We added JSON, XLS and XLSX as new export types to the Vulnerability Manager.

Q4 2022

Upload images in WYSWYG fields

Strikers, while reporting a Vulnerability, can add images inside the text fields so you can easily understand the descriptions without the need to open the image gallery saving you time and enhancing your experience.

False-Positive Vulnerability Status

A new Vulnerability status has been added, so you can indicate that a Vulnerability that was reported was incorrectly identified and it does not actually exist.

Add file attachments to Vulnerability

This is a feature that allows users to attach files like videos, images, PDFs, to a Vulnerability, so the Striker can give all the information they got.

Public API remake

We created a new version of our Public API with more features and better documentation so it’s easier to understand it and integrate it.

Export vulnerabilities to CSV from Vulnerability Manager

We know that you wanted to export your vulnerabilities from our platform, we heard you, so now you can export your vulnerabilities to a CSV file.

Surface Monitoring

"Attack surface monitoring" is a security practice that involves continuously monitoring and analyzing an organization's systems and networks for vulnerabilities that could be exploited by attackers. This includes monitoring external-facing assets such as websites and public APIs, as well as internal assets such as servers and network infrastructure.

Now you can add all your domains to our platform and we can monitor all your attack surfaces.

Q3 2022

New Pentest Creation - Whitebox and Greybox

Is a feature that enables you to initiate and customize Whitebox and Greybox pentesting engagements with the best user experience.

Whitebox pentesting involves testing an organization's systems and networks with full knowledge and access to the systems and networks being tested. This can include access to source code, network diagrams, and other internal information. Whitebox pentesting can be a valuable tool for organizations that want to thoroughly assess the security of their systems and networks and identify any vulnerabilities or weaknesses that could be exploited by attackers.

Greybox pentesting involves testing an organization's systems and networks with partial knowledge and access to the systems and networks being tested. This can include access to some internal information, such as network diagrams or system configurations, but not all of the information that would be available during a whitebox pentest. Greybox pentesting can provide a more realistic simulation of an attack, as it more closely reflects the level of knowledge and access that an attacker might have in a real-world scenario.

New Pentest Report

With this feature you can export all your pentesting data to a report in a PDF file, where you have all the most important information about your pentest and you can add all found vulnerabilities, reported assessment updates and a compliance checklist.

Aug 2022

Sandbox mode

This is a feature that allows you to experiment and test our features with already defined dummy data, so you can be sure that you understand everything without the worry of changing something in your real data.

New user profile view

We heard you and care about simplifying things, so we redesigned your profile view in the platform to have only the necessary fields needed to use our platform and to improve the experience.

New Pentest Creation - Blackbox

Is a feature that enables you to initiate and customize Blackbox pentesting engagements with the best user experience.

Blackbox pentesting simulates an attack on an organization's systems and networks from the perspective of an attacker who has no prior knowledge or access to these systems and networks.

Automated scans

This is a feature that allows your organization to use automated tools to scan their systems and networks for vulnerabilities that could be exploited by attackers. All vulnerabilities are integrated to our Vulnerability Manager.

Q2 2022

Vulnerability manager

This is a feature that helps your organizations identify, track, and mitigate vulnerabilities within your systems. You can sort; filter by status, criticality, source and view it in kanban or list mode.

Assessment Updates

Strikers now can update you in a continuing form all the things they’ve been testing in your platform. So, besides knowing all your vulnerabilities, now you can know where your platform is correctly secured.

Second Factor Authentication

Security, yours and ours, is the most important thing in the world for us. So, now you can enable 2FA with OTP so in every new login our platform requires you to provide a second form of authentication in addition to their password when logging in to a system or service.

Q1 2022

Continue with Google

This is a feature that allows you to quickly and easily log in or sign up to our platform using your work Google account. It simplifies this process by using our platform without a password and adding the Google security to ours.