Incursion
It is possible to perform an attack emulation in a simpler way and allows the display of attack details. It will also send a package that the user have selected through the network and security controls to the destination endpoint.
Last updated