Features
* Latest exploits and payloads – Leverages the world’s largest, fully quality assured and integrated public database of exploits and payloads to conduct your tests
* Extensive attack targets – Compromises standard and custom Web applications, network devices, database servers, endpoint systems, and email users.
* Full graphical user interface – Simplifies usability and greatly enhances efficiency of penetration testers and security experts in a step-by-step model.
* VPN pivoting – Tunnels any traffic through the target, for example to route vulnerability scans through a compromised machine.
* Social engineering – Uses phishing and endpoint security testing to create exploit campaigns, track click-through, and capture passwords.
* Web applications – Identify web services across the entire enterprise, audit these services for vulnerabilities, and quickly exploit them to validate the results.
* Team support – Enables teams to coordinate concerted attacks.
* Robust reports – Includes online and offline reports with detailed vulnerabilities descriptions and remediation information and customized design templates.
|
Features
DDoS Protection, Content Delivery Network, Website Security and Load Balancer
|
Languages
English
|
Languages
English, Arabic, Chinese Simplified, Chinese Traditional, Czech, Danish, Dutch, Finnish, French, German, Hebrew, Hungarian, Indonesian, Irish, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, Russian, Spanish, Swedish, Taiwanese, Turkish, Ukrainian
|