AlternativeTo Logo

Core Impact Pro Alternatives

Core Impact Pro is described as 'is the most comprehensive software solution assessing and testing security vulnerabilities throughout your organization. Core Impact Pro tests across a broad spectrum of risk areas including:' and is a vulnerability scanner in the security & privacy category. There are more than 10 alternatives to Core Impact Pro for a variety of platforms, including Windows, Linux, Mac, Online / Web-based and Self-Hosted solutions. The best alternative is Metasploit. It's not free, so if you're looking for a free alternative, you could try Censys or ZoomEye. Other great apps like Core Impact Pro are Nessus, Social-Engineer Toolkit, mimikatz and Cobalt Strike.

This page was last updated
  • Windows
  • Linux

Core Impact Pro is the most comprehensive software solution assessing and testing security vulnerabilities throughout your...

Learn more about Core Impact Pro

  1. Metasploit icon

    Metasploit

    • Free PersonalOpen Source
    • Windows
    • Linux
    • BSD

    Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free.

    Suggest and vote on features
    Screenshot
  2. Censys icon

    Censys

    • FreemiumOpen Source
    • Online

    Censys is a search engine that enables researchers to ask questions about the hosts and networks that compose the Internet.

    Suggest and vote on features
    Screenshot


  3. Nessus icon

    Nessus

    • Mac
    • Windows
    • Linux
    • Android
    • iPhone

    The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.

    Suggest and vote on features
    Screenshot
    Nessus vs Core Impact Pro opinions
    pros, cons and recent comments

    Nessus!Easy to use!BEst of the best!

    Positive comment ago
    Copy a direct link to this comment to your clipboard   
    If this Comment contains spam or other abuse, notify admins about it.

    1
  4. ZoomEye icon

    ZoomEye

    • FreemiumProprietary
    • Online

    Network mapping service.

    Suggest and vote on features
    Screenshot
  5. Social-Engineer Toolkit

    • FreeOpen Source
    • Mac
    • Linux
    • Python

    The Social-Engineer Toolkit is an open source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.

    Suggest and vote on features
    Screenshot


  6. mimikatz icon

    mimikatz

    • FreeOpen Source
    • Windows
    • C (programming language)

    It's well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket, build Golden tickets, play with certificates or private keys, vault... maybe make coffee?.

    Suggest and vote on features
    Screenshot
  7. Cobalt Strike icon

    Cobalt Strike

    • Mac
    • Windows
    • Linux

    Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs.

    Suggest and vote on features
    Screenshot
  8. Exploit Pack icon

    Exploit Pack

    • FreeOpen Source
    • Mac
    • Windows
    • Linux

    Exploit Pack is an open source project security that will help you adapt exploit codes on-the-fly.

    Suggest and vote on features
    Screenshot
  9. Nexpose icon

    Nexpose

    • Windows
    • Linux

    Learn about our vulnerability management software, Nexpose. See how our vulnerability scanner prioritizes vulnerabilities and speeds up remediation.

    Suggest and vote on features
    No screenshots yet
  10. Immunity CANVAS icon

    Immunity CANVAS

    • Mac
    • Windows
    • Linux

    Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.

    Suggest and vote on features
    No screenshots yet
Showing 10 of 16 alternatives