Exploit Pack contains a full set of 38000+ exploits, you can be sure that your next pentest will become unstoppable.
All operating systems are supported as targets, including: Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc. and even mobile and web platforms.
Exploit Pack is an integrated environment for performing and conducting professional penetration tests. As any tool of this type, it requires some basic knowledge and expertise in the matter. Exploit Pack has been designed to be used by hands-on security professionals to support their testing process. With a little bit of effort, anyone can start using the core features of Exploit Pack to test in-deep the security of their applications. Some Exploit Pack’s more advanced features will take further learning and experience to master. All of this time-investment is hugely worth it.
The Next level of Professional Penetration Testing
Exploit Pack has been designed by an experienced team of software developers and exploit writers to automate processes so that penetration testers can focus on what’s really important. The threat. This blend of software engineers and subject matter experts provides an unique advantage by combining technical know-how with true insight into the problem set.
React Faster, Detect, Analyze and mitigate
Objectively measure threats, vulnerabilities, impact and risks associated with specific cyber-security incidents by rapidly reacting on the integration of both, offensive and defensive security, this is vital to achieve a security strength and ensure all facets of your environment are synchronized in time and space are core strengths, we provide our users with operational exploits and security tools to prevent disasters and measure security and active risks.
The offensive side of the fence
Exploit Pack use an advanced software-defined interface that supports rapid reconfiguration to adapt exploit codes to the constantly evolving threat environment. The objective of Exploit Pack is to process and exploit security issues, gain remote access and report incidents in a technical fashion to help you achieve a better security posture against hostile systems. We have successfully demonstrated our capabilities to detect, track, identify and negate security flaws.
Download and install Java 8 from Oracle:
Windows Java SE Java 8 for 32 bits or Java 8 for 64 bits
After you have installed Java 8 in your machine, double click ExplotPack.jar or from a console run this command: “java -jar ExploitPack.jar”
Under any Linux distribution that supports DEB packages like Ubuntu, Debian, Kali, etc. you can run the following commands to install Java 8 from an official repository
Copy and paste the following in a terminal window:
echo “deb http://ppa.launchpad.net/webupd8team/java/ubuntu trusty main” >> /etc/apt/sources.list
echo “deb-src http://ppa.launchpad.net/webupd8team/java/ubuntu precise main” >> /etc/apt/sources.list
sudo apt-key adv –keyserver keyserver.ubuntu.com –recv-keys EEA14886
sudo apt-get update
sudo apt-get install oracle-java8-installer
Download and install Java 8 for OSX 32/64 bits from Oracle: OSX Java 8 32/64 bits
After you have Java 8 installed in your Mac, double click ExploitPack.jar to run it or from a console: “java -jar ExploitPack.jar”
- Using Exploit Pack could produce addiction.
- Prolonged periods of time using this tool could produce network mayhem or even dead.
- In case of intoxication ( using Exploit Pack under Windows ) please call your doctor immediately.