Vulnerability ExploitationRSS

Exploitation Engines

A network vulnerability exploitation tool will not only identify if a remote host is vulnerable to a particular attack, but take the process a level further and actually exploit the host, offering a shell or various other functions on the remote host.  These tools are awesome!

CORE IMPACT Pro is the most comprehensive software solution for assessing the security of network systems, endpoint systems, email users and web applications. IMPACT Pro takes security testing to the next level by using penetration testing techniques to s ...

VendorCore Security Technologies
Pricing ModelCommercial
Modified

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...

VendorMetasploit LLC
Pricing ModelOpen Source
Modified

Immunity CANVAS allows your penetration testing team to take advantage of over fifty exploits, written and tested by Immunity's team. CANVAS's completely open design allows a teams to adapt CANVAS to their environment and needs. CANVAS's advanced infrastr ...

VendorImmunity
Pricing ModelCommercial
Modified

RedSeal Vulnerability Advisor transforms scanning into actionable vulnerability management. It gathers the configurations of all your network devices — firewalls, routers, load balancers, wireless access points, and more—and combines this info ...

VendorRedSeal Systems Inc.
Pricing ModelCommercial
Modified

Mantra is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers, security professionals etc. It is portable, ready-to-run, compact and follows the tru ...

VendorOWASP
Pricing ModelOpen Source
Modified
Nipper Studio

During a network audit Nipper Studio processes the devices’ native configurations and enables you to create a variety of different audit reports. By using traditional methodology for your network audit, such as manual Penetration Testing, Agent-base ...

VendorTitania
Pricing ModelCommercial
Modified
Pwn Pro

Pwn Pro is a powerful hardware platform designed for commercial penetration testing and vulnerability scanning. Pwn Pro features onboard high-gain wireless, on board high-gain Bluetooth, 4G/GSM cellular, pre-loaded penetration testing software, and centra ...

VendorPwnie Express
Pricing ModelCommercial
Modified
Pwn Plug R3

The Pwn Plug R3 is a next-generation penetration testing device in a portable, shippable, “Plug-and-Pwn” form factor. With onboard high-gain 802.11a/b/g/n wireless, onboard Bluetooth, external 4G/GSM cellular, ruggedized case design, and greatly improved ...

VendorPwnie Express
Pricing ModelCommercial
Modified

Pompem is an open source tool, which is designed to automate the search for exploits in major databases. Developed in Python, has a system of advanced search, thus facilitating the work of pentesters and ethical hackers. In its current version, performs s ...

Vendorrfunix
Pricing ModelOpen Source
Modified

© Computer Network Defence Limited 2019