AlternativeTo Logo

Exploit Pack Alternatives

Exploit Pack is described as 'open source project security that will help you adapt exploit codes on-the-fly' and is an app in the network & admin category. There are more than 10 alternatives to Exploit Pack for a variety of platforms, including Linux, Windows, Mac, Online / Web-based and Self-Hosted solutions. The best alternative is Censys, which is both free and Open Source. Other great apps like Exploit Pack are Metasploit, ZoomEye, Social-Engineer Toolkit and mimikatz.

This page was last updated
  • FreeOpen Source
  • Mac
  • Windows
  • Linux

Exploit Pack is an open source project security that will help you adapt exploit codes on-the-fly.

Learn more about Exploit Pack

  1. Censys icon

    Censys

    • FreemiumOpen Source
    • Online

    Censys is a search engine that enables researchers to ask questions about the hosts and networks that compose the Internet.

    Suggest and vote on features
    Screenshot
  2. Metasploit icon

    Metasploit

    • Free PersonalOpen Source
    • Windows
    • Linux
    • BSD

    Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free.

    Suggest and vote on features
    Screenshot


  3. ZoomEye icon

    ZoomEye

    • FreemiumProprietary
    • Online

    Network mapping service.

    Suggest and vote on features
    Screenshot
  4. Social-Engineer Toolkit

    • FreeOpen Source
    • Mac
    • Linux
    • Python

    The Social-Engineer Toolkit is an open source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.

    Suggest and vote on features
    Screenshot
  5. mimikatz icon

    mimikatz

    • FreeOpen Source
    • Windows
    • C (programming language)

    It's well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket, build Golden tickets, play with certificates or private keys, vault... maybe make coffee?.

    Suggest and vote on features
    Screenshot


  6. Cobalt Strike icon

    Cobalt Strike

    • Mac
    • Windows
    • Linux

    Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs.

    Suggest and vote on features
    Screenshot
  7. Nexpose icon

    Nexpose

    • Windows
    • Linux

    Learn about our vulnerability management software, Nexpose. See how our vulnerability scanner prioritizes vulnerabilities and speeds up remediation.

    Suggest and vote on features
    No screenshots yet
  8. Immunity CANVAS icon

    Immunity CANVAS

    • Mac
    • Windows
    • Linux

    Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.

    Suggest and vote on features
    No screenshots yet
  9. Core Impact Pro icon

    Core Impact Pro

    • Windows
    • Linux

    Core Impact Pro is the most comprehensive software solution assessing and testing security vulnerabilities throughout your organization. Core Impact Pro tests across a broad spectrum of risk areas including:

    Suggest and vote on features
    No screenshots yet
  10. Discover the attack surface and prioritize risk with our continuous Attack Surface Management (ASM) platform. Sn1per Professional provides an up-to-date view of your attack surface and provides an asset risk scoring system to find, prioritize and reduce risk.

    Suggest and vote on features
    Screenshot
Showing 10 of 12 alternatives