Skip to main content

Vulnerability Exploitation

Exploitation Engines

A network vulnerability exploitation tool will not only identify if a remote host is vulnerable to a particular attack, but take the process a level further and actually exploit the host, offering a shell or various other functions on the remote host.  These tools are awesome!