App Screenshots

Get instant access to our trial versions

Ready to give them a spin?

Step 1: Download the tools.
Step 2: Get the latest Java JDK
Step 3: Learn about Exploit Pack - Control Pack

Ready to order? Get your license here
Need more help? Ask on the support chat

Exploit Pack is a commercial exploitation framework. Control Pack is a commercial C2 for attack simulation. They support all operating systems as host or target and can be installed on Windows, Linux or Mac. Exploit Pack can also be found pre-installed in several Linux distributions.

Download Control Pack Download Exploit Pack


Minimum Requirements:
The latest OpenJDK / OracleJDK: Download Java JDK
Windows, Linux and Mac are supported

Known issues:
⦁ Using Exploit Pack (EP) and Control Pack (CP) could produce addiction.
⦁ Prolonged periods of time using EP and CP could produce network mayhem or even dead.
⦁ In case of intoxication ( running EP or CP under Windows ) please call your doctor immediately.

Do you need help? How to install our tools:
Step by step installation guide - Exploit Pack
Step by step installation guide - Control Pack

Our Pricing Options

Exploit Pack full license: The real deal. Exploit Pack contains all the exploits you could possibly find out there: A set of 39.500+ exploits + Zero-days, implants and post-exploitation modules. You can be sure that your next pentest will become unstoppable with Exploit Pack in your arsenal of tools. All platforms are supported: Windows, Linux, Unix, Minix, SCO, Solaris, OSX and you can even target mobile and web.

A full license of Exploit Pack Framework also includes access to monthly updates, monthly zero-days from our lab, training and technical support for one year.


Control Pack full license: Control Pack contains all the functionalities you need to mimic the tactics, techniques, and procedures of cyber adversaries. All platforms are supported: Windows, Linux, Unix, Minix, SCO, Solaris, OSX and you can even target mobile and web.

A full license of Control Pack also includes access to monthly updates and technical support.


Delivery: Personal keys are delivered via email within 24 hours of purchase and linked to the email address used during the purchase.

Do you need a quotation? Email us

⦁ We do not issue refunds for our products once the order is confirmed and the product is digitally sent.
⦁ Please be aware that all issued licenses cannot be modified or sent to a different email address at any later stage.
⦁ We recommend contacting us for assistance if you experience any issues receiving or downloading our products.

Technical support for lifetime licenses is valid for a period of two years from the date of purchase. During this time frame, customers will receive assistance and guidance pertaining to the product's functionality, troubleshooting, and maintenance. After that period you can continue using the last version you received, as well as updates for this version. Optionally, not required, you can opt to extend your technical support and access to exploits from our lab.

Full license
Exploit Pack

950

1 year - (1 user license)
Regular full license

  • ✔ Exploit Pack full license
  • ✔ Exploit writing training
  • ✔ Over 39.500 exploits
  • ✔ Zero-day exploits
  • ✔ Monthly Zero-day exploits from our lab along with video tutorials
  • ✔ Exploit editor ( reconfigure, modify and add new exploits )
  • ✔ Exploit Finder (by OS, type, service, etc.)
  • ✔ Local Fuzzer
  • ✔ Remote Fuzzer
  • ✔ Web attacks
  • ✔ Post-Exploitation
  • ✔ Remote control
  • ✔ Automated attacks
  • ✔ Network scanner
  • ✔ Targets management
  • ✔ Hexa editor
  • ✔ Reverse shells ( include a custom shellcode or convert into an executable file )
  • ✔ Live online training
  • ✔ Technical support

Buy Exploit Pack

Full license
Control Pack

950

1 year - (1 user license)
Regular full license

  • ✔ Control Pack full license
  • ✔ Ransomware ( DLL-Based ) for Red Team operations
  • ✔ DLL agent
  • ✔ .Net-Core and profiler agent
  • ✔ Python agent
  • ✔ In-memory agent
  • ✔ VBS-based agent (macros)
  • ✔ Browser-based agent for XSS/Web attacks
  • ✔ Phishing campaigns
  • ✔ WebKit-based ( Chrome ) plugin agent
  • ✔ Auto exec commands
  • ✔ Simple reverse shells, scalable to full agents
  • ✔ KnownDLL unhook for evasion and AV bypasses
  • ✔ Protected Process Light ( PPL ) ready agent for AV bypass
  • ✔ Persistence methods
  • ✔ IDA Pro and GDB Connector for debugging
  • ✔ Antireversing techniques for agent protection
  • ✔ Training and Tech support
Buy Control Pack

What the comunity says about Exploit Pack:

"Penetration testing has a lot of repeating tasks, especially when doing similar assignments for clients. For this reason, tools like Exploit Pack help with automating repeating activities. This framework contains over 38.000 exploits, probably much more than one might ever need." - linuxsecurity.expert