Home page logo
/

Core Impact

Core Impact isn't cheap (be prepared to spend at least $30,000), but it is widely considered to be the most powerful exploitation tool available. It sports a large, regularly updated database of professional exploits, and can do neat tricks like exploiting one machine and then establishing an encrypted tunnel through that machine to reach and exploit other boxes. Other good options include Metasploit and Canvas. For downloads and more information, visit the Core Impact homepage.

Popularity #29, 15
Rating ★★★★½ (3)
Latest release 12
Aug. 8, 2011
(2 years, 8 months ago)
Homepage/Download
Outdated/incomplete?
★★★★★ 
 67%
★★★★ 
 0%
★★★ 
 33%
★★ 
 0%
★ 
 0%

Comments

★★★ Andrea Bodei

Core Impact is amazing. Absolutely the best software in the field of security but it's too expensive.

★★★★★ Neil McCann

I do like that it has that unified approach and pivoting capabilities. However, blended attacks from WebbApp using SQLi to Network, or WebApp DB attack to Phishing is truely amazing. As for the cost, that's no longer an issue when you have the perpetual licensing option. If you're supporting a large enterprise networks, Insight is the way to go!

no rating stsdroog

The tool does what it says but for 20k for a single user license it is greatly over priced. Also the web penetration testing was less that accurate. This is a good tool for a knowledgeable pen tester in a large enterprise environment with time constraints but doesnt really fit in the small to medium markets.

★★★★★ Alex Horan

Excellent multivector capabilities that allows you to very easily and quickly pivot between Email, Network, WiFi and WebApplication attacks.

Your comment

Along with your rating, you can use the comment form to post a review, tutorial, tips and tricks, or anything else others will find useful. If you develop this software (or work for the company), please don't rate it. You may leave a clarifying comment as long as you state your affiliation and don't specify a star rating (just leave it as “No rating”).

 
 
  (will not be shown, will not be spammed)
  (web site, Twitter, Facebook, etc.)
(At least 50 characters. No markup is allowed. URLs will be made into links.)
 What is the standard TCP port number for the SSH service? (antispam)

Feed for updates.

Home

[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]