US2019081974A1
|
|
Systems and methods for using multiple lateral movement strategies in penetration testing
|
US2018270268A1
|
|
Verifying success of compromising a network node during penetration testing of a networked system
|
US2018219909A1
|
|
Systems and methods for detecting computer vulnerabilities that are triggered by events
|
US2019068631A1
|
|
Time-tagged pre-defined scenarios for penetration testing
|
US2019014141A1
|
|
Locally detecting phishing weakness
|
WO2018138640A1
|
|
Setting up penetration testing campaigns
|
WO2018138608A2
|
|
Penetration testing of a networked system
|
US2018219903A1
|
|
Systems and methods for selecting a lateral movement strategy for a penetration testing campaign
|
US2018365429A1
|
|
Testing for risk of macro vulnerability
|
US10068095B1
|
|
Systems and methods for selecting a termination rule for a penetration testing campaign
|
US2018219900A1
|
|
Setting-up penetration testing campaigns
|