Exploit Prevention Suites & Software

Robert
Robert List by Robert , last updated 2019-06-14
  1. Metasploit icon

    Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true...

    • ...
    Metasploit screenshot 1
  2. Immunity CANVAS icon

    Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.

    • ...
  3. The Social-Engineer Toolkit is an open source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.

    • ...
    Social-Engineer Toolkit screenshot 1
  4. Exploit Pack icon

    Exploit Pack is an open source project security that will help you adapt exploit codes on-the-fly.

    • ...
    Exploit Pack screenshot 1
  5. Andspoilt icon

    Android hacking toolkit for creating payloads and launching exploits.

    • FreeOpen Source
    • Linux
    • Wine
    • ...
    Andspoilt screenshot 1
  6. Nexpose icon

    Learn about our vulnerability management software, Nexpose. See how our vulnerability scanner prioritizes vulnerabilities and speeds up remediation.

    • ...
  7. OpenVAS icon

    The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.

    • ...
    OpenVAS screenshot 1
  8. skipfish icon

    A fully automated, active web application security reconnaissance tool. Key features: High speed: pure C code, highly optimized HTTP handling, minimal CPU footprint - easily achieving 2000 requests per second with responsive targets.

    • ...
    at work, during scanning
  9. This vulnerability scanner for the Windows WorkStations et Servers gives you all the actions to enforce security of your Windows operating Systems.

    • ...
  10. OpenSCAP icon

    SCAP is a line of standards managed by NIST. It was created to provide a standardized approach to maintaining the security of enterprise systems, such as automatically verifying the presence of patches, checking system security configuration settings, and examining systems for...

    • ...
    OpenSCAP screenshot 1
  11. Core Impact Pro icon

    Core Impact Pro is the most comprehensive software solution assessing and testing security vulnerabilities throughout your organization. Core Impact Pro tests across a broad spectrum of risk areas including:

    • ...
  12. Intruder icon

    Intruder is a security monitoring platform for internet-facing systems.

    Intruder provides an easy to use security solution which continually scans your digital assets, highlighting vulnerabilities and outlining remediation advice in simple terms.

    • ...
  13. Nessus icon

    The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.

    • ...
    Nessus screenshot 1
  14. Shodan icon

    Shodan is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it as a public port scan directory or a search engine of banners.

    • FreemiumProprietary
    • Online
    • Google Chrome
    • Firefox
    • ...
    Shodan screenshot 1
  15. PatrolServer icon

    Check realtime and continuously for outdated web software on your server. Delivered by mail and an easy to use dashboard and get notified if PHP, Apache, cPanel, Wordpress, Drupal and many more become outdated.

    • ...
    PatrolServer screenshot 1
  16. The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. Indeed, this is not a bullet-proof method and you will most likely have many false positives (vulnerability is...

    • ...
  17. snort icon

    Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol, and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide.

    • ...
    snort screenshot 1

This list was created by Robert Jun 14, 2019 and was last updated Jun 14, 2019. The list has 17 apps.

You can create your own lists from our large database of apps either for your own sake or if you want to share some great apps with other people.


No comments so far, maybe you want to be first?
Gu