This website uses cookies
We use cookies to continuously improve your experience on our site. More info.
A product or service for an authorized attempt to bypass the means of protecting the information system. The result of the test is a report that can / must contain a list of detected vulnerabilities, used attack vectors, achieved results, recommendations for correction.
Open-source | Yes |