
Introducing Protocol Discovery to stop guessing what’s behind your open ports
Most tools will just tell you that a port is open. We’ve decided that’s not enough. TLDR: We’ve launched Protocol Discovery, a custom-built engine designed …
Detectify

Security is often a game of “you don’t know what you don’t know.” At Detectify, we focus on removing that uncertainty. Whether it’s reaching 922 quintillion payload permutations or refining a UI workflow, our goal is to make the experience of securing your stack as seamless as the tech you’re building.
We believe that a security tool shouldn’t just be powerful, it should be intuitive, fast, and, dare we say, a joy to use. We take our UI and the experience of using Detectify quite seriously. This past month, we’ve rolled out a series of updates ranging from massive new discovery capabilities to smaller but impactful UI improvements. Why? Because we know that a smoother workflow translates into a more secure environment.
You can’t secure what you don’t know exists. We’ve launched several features designed to give you total visibility over your attack surface and full transparency into how we’re poking at it.
Our new Protocol Discovery helps you find exposed protocols across your entire attack surface by identifying the specific services communicating behind your open ports.
Security teams often focus solely on web traffic (HTTP/HTTPS), but attackers look for any open door. By identifying protocols like SSH, FTP, or SMB across your infrastructure, we provide a more complete view of your risk. Scanning your web apps isn’t enough; we want to give you a map of your entire attack surface so nothing is left to chance.
Transparency is essential for trust, so we believe you should know exactly how you’re being protected. The new Test Catalogue is a searchable, comprehensive database of most of the vulnerability tests Detectify performs.
We know that users need this transparency to ensure compliance and coverage. This catalogue allows them to dig into our security research and become more informed defenders.

The threat landscape moves fast. But so do our researchers. In the end, a product is only as good as its engine. We are constantly implementing the latest vulnerabilities so you’re protected against new CVEs and other attack vectors. We’ve added significant new tests in two major batches (Batch 1 and Batch 2).
Here’s a list of a few interesting new security tests, along with a description by our security researchers:
A large part of our focus this month was shipping improvements to our API Scanning product. We take customers’ feedback quite seriously, so here’s a list of a few enhancements that we shipped:
Whether it’s moving a button two pixels to the left or building a complex protocol discovery engine, our goal remains the same: to build a product that works as hard as you do. Security is a journey of continuous improvement, and we’re committed to making every step of that journey as intuitive as possible.
Want to see these updates in action? Check out our latest changes here or dive straight into your API Scanning dashboard.

Most tools will just tell you that a port is open. We’ve decided that’s not enough. TLDR: We’ve launched Protocol Discovery, a custom-built engine designed …

TL;DR We’re launching Internal Scanning, bringing our proprietary security engines, research-led crawling and fuzzing engine for internal vulnerability scanning behind your firewall. Built by Detectify’s …