Skip navigation

Tools that an attacker uses to crack a password or exploit a vulnerability in order to gain administrator-level access to a computer or network, designed to avoid detection and conceal the attacker’s activities.