Vulnerability ExploitationRSS

Exploitation Engines

A network vulnerability exploitation tool will not only identify if a remote host is vulnerable to a particular attack, but take the process a level further and actually exploit the host, offering a shell or various other functions on the remote host.  These tools are awesome!

Core Security Technologies
Commercial
Pricing Model

CORE IMPACT Pro is the most comprehensive software solution for assessing the security of network systems, endpoint systems, email users and web applications. IMPACT Pro takes security testing to the next level by using penetration testing techniques to s ...

Modified
Metasploit LLC
Open Source
Pricing Model

The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perf ...

Modified
Commercial
Pricing Model

Immunity CANVAS allows your penetration testing team to take advantage of over fifty exploits, written and tested by Immunity's team. CANVAS's completely open design allows a teams to adapt CANVAS to their environment and needs. CANVAS's advanced infrastr ...

Modified
RedSeal Systems Inc.
Commercial
Pricing Model

RedSeal Vulnerability Advisor transforms scanning into actionable vulnerability management. It gathers the configurations of all your network devices — firewalls, routers, load balancers, wireless access points, and more—and combines this info ...

Modified
Open Source
Pricing Model

Mantra is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers, security professionals etc. It is portable, ready-to-run, compact and follows the tru ...

Modified
Limited Free Trial
Pricing Model

Titania Nipper is an industry-leading configuration auditing software product that audits network devices such as firewalls, routers and switches with supported devices including Cisco, Check Point Software Technologies, Fortinet, Palo Alto Networks, 3Com ...

Modified
Titania Nipper
Pwnie Express
Commercial
Pricing Model

Pwn Pro is a powerful hardware platform designed for commercial penetration testing and vulnerability scanning. Pwn Pro features onboard high-gain wireless, on board high-gain Bluetooth, 4G/GSM cellular, pre-loaded penetration testing software, and centra ...

Modified
Pwn Pro
Pwnie Express
Commercial
Pricing Model

The Pwn Plug R3 is a next-generation penetration testing device in a portable, shippable, “Plug-and-Pwn” form factor. With onboard high-gain 802.11a/b/g/n wireless, onboard Bluetooth, external 4G/GSM cellular, ruggedized case design, and greatly improved ...

Modified
Pwn Plug R3
Open Source
Pricing Model

Pompem is an open source tool, which is designed to automate the search for exploits in major databases. Developed in Python, has a system of advanced search, thus facilitating the work of pentesters and ethical hackers. In its current version, performs s ...

Modified

© Computer Network Defence Limited 2021