This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
The GUI interface and being able to drag attacks to run against hosts and groups. I also like the ability to search modules by CVE and name. Review collected by and hosted on G2.com.
For a pentesting suite to be useful, it must have the ability to create a command-and-control session that can be customized to get through/past modern controls. The Core agent and it's command-and-control sessions are easily detected and blocked. With enough customization, we have success with Cobalt Strike HTTPS and DNS beacons. If Core Impact could automate the creation and customization of malleable and signed agents that bypass controls, it would get a 10/10.
Licensing has become difficult do to the many acquisitions of Core Security and Core Impact. I have not been able to access my software in several months! Review collected by and hosted on G2.com.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
Validated through a business email account
This reviewer was offered a nominal incentive as thanks for completing this review.
Invitation from G2 on behalf of a seller or affiliate. This reviewer was offered a nominal incentive as thanks for completing this review.







