Skip navigation

Tools that an attacker uses to crack a password or exploit a vulnerability in order to gain administrator-level access to a computer or network, designed to avoid detection and conceal the attacker’s activities.


Want More Content Like This?

Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.