Product Name
metasploit
Description
Automate all phases of a penetration test, including choosing the right exploits and streamlining evidence collection and reporting. Creates sophisticated attacks to test user weaknesses, including cloning websites with the click of a button for phishing campaigns and masking malicious files for USB drop campaigns. Keep track of who falls for what to assess your user awareness—or to gain a foothold for a deeper attack.
Company Associations
Glossary Associations
Taxonomy Associations
|
|