WYRMCYBER
Sixteen cyber tools — threat intel, OSINT, CVE, dark web, recon, attack surface, sanctions, data toolkit — under one subscription. Built for lean security teams who need the whole toolkit without buying six different SaaS contracts.
What you can do
Sixteen tools, one console
Every tool below is included on Cyber Pro. No upsells, no add-ons, no per-seat surprises until you graduate to Enterprise.
Identity & OSINT
Find people, profiles, and the trail they leave
Username, phone, email, image — pivot from one fragment to the full picture.
Username Search
Map a handle to every social, forum, and dev account it lives on. 3,000+ sites in a single sweep.
Phone OSINT
Validate a number, identify carrier and region, and surface the public footprint tied to it.
Email Breach
Check an address against known breaches — passwords, sessions, PII exposure dates, breach source.
Image OSINT
Reverse-image search, EXIF metadata extraction, and provenance hints. See where a photo lived and when it was shot.
Threat Intelligence
Know what's targeting your sector before it lands
Curated IOC feeds, real-world CVE triage, and entity sanctions in one screen.
Threat Intel
Aggregated feeds from CISA KEV, abuse.ch, AlienVault and 20+ sources — scored, deduped, correlated.
CVE Monitor
Live NVD + EPSS exploit-probability + CISA KEV. Triage actual risk, not raw CVSS. Watchlists by vendor or CPE.
Threat Feeds
Curated IOC streams — malware hashes, C2 infrastructure, phishing kits, ransomware claims. Webhook-ready.
Sanctions
OFAC, UK HMT, EU consolidated, OpenSanctions. Screen entities against every major regime in one query.
Recon & Attack Surface
Map what's exposed before someone else does
Subdomain discovery, port scans, light stress probing, dorking, and historical snapshots.
Recon
Subdomain enumeration, certificate transparency, tech fingerprinting. Full external footprint in seconds.
Network Scanner
Port scans, service detection, banner grabs, and light stress probing. See what's open and how it holds up under load.
Attack Surface
Continuous monitoring of exposed assets, scored by criticality. Catches new shadow IT before attackers do.
Google Dorking
Pre-built advanced operators for finding exposed docs, configs, panels, and forgotten subdomains.
Wayback
Historical site snapshots. See what was live, when it changed, and what got quietly removed.
Dark Web & Forensics
Search the corners search engines won't reach
Onion crawlers, paste-site mentions, IP attribution, and a full data-transformation toolkit.
Dark Web
Onion sites, paste sites, ransomware leak forums. Search for your domain, staff, or clients in the underground.
IP Lookup
ASN, geolocation, hosting reputation, abuse history. Residential proxy? VPN exit? Datacenter? Known C2?
Data Toolkit
Decode, transform, extract, hash, encode, decrypt. The CyberChef-style swiss-army knife for evidence work.
Who it's for
Built for the people doing the work
If you've been paying for five overlapping tools and stitching results together by hand, this is for you.
Pen testers
Recon, attack surface, network probing, and dorking in one console — without firing up six VMs.
Blue teams & SOC
Triage threat intel, screen IOCs against your stack, and pivot from a single alert into the full picture.
OSINT analysts & journalists
Username, image, dark-web, and breach data — track a story from a fragment to the source.
DFIR & bug-bounty
Wayback snapshots, EXIF chains, IP attribution, and a data toolkit for evidence-grade analysis.
Pricing
Two tiers. No surprises.
Same toolkit on both. Enterprise adds team seats, SSO, API access, custom feeds, and an SLA.
Cyber Pro
Full cyber toolkit — individual analyst
Every WYRM cyber tool under one subscription. For security analysts who need the full toolkit without juggling six contracts.
- All 16 cyber tools (threat intel, OSINT, CVE, recon…)
- Dark web monitoring + breach alerts
- Attack-surface snapshots
- Single-analyst usage
- Standard rate limits
- Email support
Cyber Enterprise
Team seats · SSO · API · SLA
Cyber Pro features plus team seats, SSO, full API access, custom threat feeds, and an SLA. For CISO offices and SOC teams.
- Everything in Cyber Pro
- Team seats (5+) with role-based access
- SSO (Google / Microsoft / Okta)
- REST API + webhooks
- Custom threat-feed ingestion
- 99.9% SLA
- Priority support
WYRM Cyber is a separate product line from WYRM Sentinel. Existing Sentinel customers can add Cyber to their plan; Cyber-only customers don't pay for procurement features they won't use.