All Categories

History

Database metasploitPro-MetasploitPro
Database metasploitPro-Anchor Technologies Co., Ltd.

About This Product

This is a high-performance commercial version of metasploit framework, an OSS that has been used by many organizations as a pen testing tool for many years. Pen testing is possible for NW devices, servers, virtual machines, OS, web applications, etc. It can be operated by GUI and is easy to use. It also supports Android, embedded Linux, and IoT verification. metasploitPro Overview

■metasploit Pro is a penetration testing tool with the following features.

・World's largest exploit database ・Automate penetration testing procedures ・Targeted attack training implementation function ・Advanced features for successful attacks ・Cooperation with insightVM

■World's largest exploit database

We work with an open source community of over 250,000 members to add new exploit modules at a rate of 1.2 per day. Over 3,000 exploit modules are currently registered, providing unique insight into the latest attacker techniques and know-how.

■Automate penetration testing procedures

Performing a thorough penetration test takes time, even for experienced personnel. metasploitPro makes it easy to automate all stages of penetration testing, from selecting the right exploit to streamlining evidence collection and reporting.

■Targeted attack training implementation function

You can clone websites and conduct targeted attack training for internal employees.

■Advanced functions for successful attacks

It has advanced features such as VPN pivoting and antivirus evasion for successful attacks.

■Cooperation function with nexpose/insightVM

-Make your organization more robust by using metasploit in the following order in combination with insightVM, a solution for vulnerability management within your organization. - Import the vulnerability diagnosis results with high risk of intrusion identified by insightVM into metasploit. ・Easily conduct penetration tests using metasploit's wizard function and verify that intrusion is possible. ・Return verification results to insightVM and reflect them in prioritizing vulnerabilities.

  • Product

    Database metasploitPro

Share this product


80+ people viewing

Last viewed: 1 hour ago


Free
Get started with our free quotation service - no cost, no obligation.

No Phone Required
We respect your privacy. You can receive quotes without sharing your phone number.

1 Models of Database metasploitPro

Image Part Number Price (excluding tax)
Database metasploitPro-Part Number-MetasploitPro

MetasploitPro

Available upon quote

Customers who viewed this product also viewed

Reviews shown here are reviews of companies.

See More Security Systems Products

Other products of Anchor Technologies Co., Ltd.

Reviews shown here are reviews of companies.


View more products of Anchor Technologies Co., Ltd.

About Company Handling This Product

This is the version of our website addressed to speakers of English in the United States. If you are a resident of another country, please select the appropriate version of Metoree for your country in the drop-down menu.

Copyright © 2025 Metoree