TruffleHog is a popular open source tool used by security researchers all over the world to find leaky API keys and responsibly disclose them to affected companies. This provides income through bug bounty platforms like HackerOne to individuals that may otherwise have a hard time finding employment.
Explore similar companies to Truffle Security

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Outtake
Cyber agents for any digital threat.
Cybersecurity · Series B · Onsite · Based in New York

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Upwind
Cloud security happens at runtime.
Cybersecurity · Series B · Remote · Based in San Francisco

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Backline
AI agents to automate security backlogs.
Cybersecurity · Seed · Onsite · Based in Tel Aviv

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Cape
A new ultra-private and secure mobile carrier.
Cybersecurity · Series B · Onsite · Based in Washington, DC

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Torq
Autonomous security operations.
Cybersecurity · Series D · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Echo
Delivering CVE-free container base images.
Cybersecurity · Series A · Remote · Based in New York

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Delve
AI-native compliance.
Cybersecurity · Series A · Remote · Based in San Francisco

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Cloaked
Protect your data by generating unlimited identities.
Cybersecurity · Series A · Onsite · Based in New York

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv

Clover Security
AI-driven product security.
Cybersecurity · Seed · Remote · Based in Tel Aviv




