88073676
Aug 10, 2018
Apr 2, 2019
Active Trademark
Computer software for exploiting and conducting post-exploitation efforts of vulnerabilities discovered in a target computer network; computer software for the automation of repeatable penetration test exploit techniques enabling security analysts to report effectively on results that are generally easy to obtain but are time-consuming to process and incorporates numerous open-source vulnerability scanning and exploitation tools and gives these tools the ability to work together without extensive manual manipulation
Electrical and Scientific Apparatus