Core Impact 2017 R1 and Metasploit Pro are tools used to create multi-staged, real-world attacks to test enterprise security defenses. Both solutions have a large following, but there are several areas in which they are different that dramatically increase a pen-tester's ability to do their job.
Recent Security ArticlesView all
The connected camera category has seen much growth since 2014. In this tutorial, we reproduce the basic functionality of a camera like the Nest Cam but with the unique property of being cellular connected. We will use a Twilio Programmable Wireless starter pack and Raspberry Pi to do this.
Escrow.com has announced a beta version of its Platform API. Through the API, third party apps and services can integrate the escrow services Escrow.com has long been known for. Once integrated, apps and services can hold money in trust until a transaction has fully completed.
Most Popular Security APIs (10) View all
Box is a modern content management platform that transforms how organizations work and collaborate to achieve results faster.
Box Platform provides content APIs to build secure...
||The ThreatCrowd REST API allows developers to access and integrate the functionality of ThreatCrowd with other applications. Some example API methods include identifying related infrastructure and...||Security||10.12.2015|
Google Safe Browsing
||The Google Safe Browsing API allows developers to access and integrate the functionality of Google Safe Browsing with other applications. The Google Safe Browsing version 3 API allows applications to...||Security||06.29.2007|
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Mist.io displays real time analytics and visualizations of system metrics, and...||Web Site Management||10.10.2014|
||MEGA is a New Zealand based cloud storage service that helps users protect their privacy. With MEGA, users can control the encryption, users hold the keys, and users decide who to grant or deny...||Storage||01.24.2013|
All Security APIs (621)View all
||THE IIN API is a verification platform that integrates credit and debit card look up capabilities in order to detect fraudulent activities. Developers can white-list their API key to ensure specific...||Financial||11.05.2017|
IPQualityScore Proxy Detection
||IPQ's Proxy Detection can detect low quality IP connections that indicate fraudulent activity such as proxies, VPNs, & Tor connections. Reduce fraud and potential chargebacks by detecting...||Security||10.21.2017|
||This API is indirect access to the Mendix Model SDK. Please reference the SDK tab below. The SDK enables Mendix applications and works with the Platform SDK. Mendix provides a way to transform...||Application Development||10.05.2017|
||The Vantiv MercuryPay eCommerce RESTful API allows developers to post transaction requests directly from their shopping cart and combined with our tokenization it lightens the burden of PCI DSS...||Payments||10.04.2017|
Vantiv Fraud Filtering Services
||The Vantiv Fraud Filtering Services API provides the flexibility of restricting which transactions are submitted to the filtering service and which filters the system applies to which groups. This is...||Payments||10.03.2017|
Mashups (25)View all
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Users can view analytics visualizations from Mist.io's web interface...||Web Site Management||10.10.2014|
||IronBox is a service that protects data and secures privacy. Their IronBox Express is a web app that secures a user's DropBox account, ensuring file protection for all folder contents. IronBox...||Security||08.25.2014|
Captcha Bypass Service
||An efficient Captcha Bypass Service.||Tools||02.26.2014|
MappyHealth - Tracking disease trends, 140 characters at a time
||MappyHealth.com was developed in response to the NowTrending2012 application challenge. The team came together with a common mission to build an application that would positively impact public health...||Health||06.14.2012|
||IceCharge is a fraud detection and prevention service that is built on top of a digital profiling algorithm. The service tries to identify legitimate transactions based on trying to check the...||Messaging||08.29.2011|