Attack Paths

Real, exploitable breach chains derived from findings · pick a host to view its attack graph

Pick an asset

No scans yet — run a scan first.

How attack paths work

Each chain shows: attacker entry → lateral movement → privilege escalation → data access.
Sorted by Real Breach Risk (likelihood × automation × impact ÷ skill ÷ detection), not CVSS. Open a site detail page to see the chained vulnerabilities and the interactive graph view.