ScourNomad benefits
Rapid development
Rapidly develop and maintain automation procedures for networking, software security, and cyber-security tasks
Collections
Pick and choose from the database of available tools and predefined templates for faster deployments
Tailored solutions
Utilize our programmable nodes to create solutions completely tailor-made for your environments
With our point-and-click drag-and-drop approach to automation development, our customers will spend as little time as possible on automation development and maintenance. The speed at which the software and hardware change today is faster than ever, and the cyber attack surface changes with it. It is of vital importance to be able to quickly adapt automation to this changing world.
Being able to select predefined solutions additionally increases the speed at which our customers are able to deploy the automation procedures. The customers can choose between using out-of-the-box workflows or perform additional tweaking as well as building upon their base functionalities.
Our customers are free to leverage ScourNomad's programmable nodes alongside its powerful information management aproach to implement customized functionalities with already prepared inputs and generic outputs available for the following nodes. Any missing functionality can be easily added to complete the customers' requirements.
Who is ScourNomad for?
Penetration testers and bug bounty hunters
- Implement testing methodologies
- Create recon automation
- Perform post-processing on gathered results, for instance scope validation
Software development companies
- Create security integration tests for your software products
- Integrate the tests with CI / CD pipelines
- Monitor repositories for unwanted critical leaks
Companies in general
- Automate security testing on your online infrastructure
- Monitor hardware and software resources on the Internet and in the Cloud for changes
- Automate general networking tasks such as server backups, file backups, data cleanup, etc.
Latest videos
How do we accomplish this?
- Easily access project notes and information
- Set up the initial environments for testing
- Manage initial environment resources
- Review changes from automated scans
- Use publicly available tools as well as the proprietary nodes
- Run the workflows manually or schedule them
- Set them up to be triggered from outside environments
- Observe the changes between the scan runs
- Get alerted on changes or interesting finds
- Pick the tools from our database, which includes our custom-made nodes as well as the integrations of publicly available security software
- Import existing workflow templates from the marketplace and adjust them to your needs
- Use nodes out-of-the-box or customize their functionalities using their settings
- Save and load often used setting presets
- Implement custom functionalities using our programmable nodes
- Pick from one of the supported programming languages
- Select custom libraries to preinstall and use in your implementations
- Select the node's capabilities, including accepted inputs, outputs, and user-customizable properties
- Upload files like wordlists, setting files, and custom node implementations
- Edit the files with the live editor
- Use the files in the workflows
Roadmap
We currently have the PoC running and are actively working on finalizing the pre-alpha stage. After this stage, we will perform the initial pentest and start with the closed alpha testing.
-
-
2021
Proof of Concept development
-
Q3 2022
FRC investment received
-
Sep 2022
Pre-alpha development
-
Jan 2022
Closed alpha testing starts
-
Q1-Q2 2023
Beta testing starts
-
Q3-Q4 2023
First commercial version
-
Q1 2024
Marketplace