Get Custom Pricing for the Offensive Security - Essentials Bundle

Request a quote for our security bundle of Frontline VM and Core Impact

Build and enhance your offensive security program with this foundational security testing bundle that features both a powerful vulnerability management solution, Frontline VM, and an advanced penetration testing tool, Core Impact. Though these tools provide distinct ways to identify and prioritize security weaknesses, they are even more powerful when deployed together.

Pairing Frontline VM and Core Impact enables your security professionals to:

  • Automate Your Security: Use built-in scans and intuitive pen test wizards to swiftly uncover and exploit vulnerabilities.
  • Integrate Solutions: Import scanning data from Frontline VM into Core Impact for one-step vulnerability validation.
  • Simplify Compliance: Create authoritative reports to prove compliance adherence to security auditors.

Start the Purchase Process

Core Impact’s simple tiered pricing model provides the versatility needed to allow organizations to build their security testing program at a reasonable pace and price. The Offensive Security - Essentials Bundle is available with all three versions of Core Impact: Basic, Pro, and Enterprise. If you're interested in comparing plans, refer to the pricing page.

When bundled, each tier of Core Impact will come with a license for the complete version of Frontline VM.

Since Core Impact is a powerful security testing tool that uses the same techniques as threat actors, we limit the purchase of this bundle only to responsible buyers. This is determined through a complete vetting of prospective users, which is also required by the U.S. government to maintain security. To get this process started, simply complete the form.

What's Included in the Offensive Security - Essentials Bundle?

Every Version of Core Impact Includes:

Network Testing

Exploit vulnerabilities on internal information systems to evaluate the potential risk of a breach.

Rapid Penetration Tests

Get step-by-step guidance for routine tests including information gathering, attack and penetration, privilege escalation, clean up, and more.

Test Modules

Tailor penetration tests to your environment by manually building different tasks, which can then be saved and reused.


Prove compliance for regulations like PCI DSS, GDPR, and HIPAA with automated report generation, which can also be used for planning and prioritizing remediation efforts.

Unlimited IP Testing Scope

Get a thorough overview of your environment by testing as many IPs as you need.

Frontline VM Features Include:

Vulnerability Scanning

Schedule automated scans tailored to your environment to efficiently uncover internal and external vulnerabilities.

Compliance Auditing

Use benchmark scans to verify adherence to regulations, with precise pinpointing of where a network fails to meet compliance.

Smart Labels

Easily filter and group your assets using automatic labeling for dynamic scanning.

Status Tracking

Get a real-time picture of your environment's security health with a view of known assets, discovered vulnerabilities, and whether they've been addressed.


Tailor asset-specific vulnerability and patch management reports using detailed filtering options.

Why Pair Frontline VM and Core Impact?

With these tools, you'll be able to detect security weaknesses, exploit vulnerabilities, and prioritize risk in order to properly plan for remediation.

Left Column

Swiftly identify security vulnerabilities, prioritize risk, and guide remediation.

Middle Column
Intelligence gathering

Automate routine security scans and pen tests to benefit both beginner and expert security personnel.

Right Column

Develop a proactive security strategy to detect and determine risk before an attacker strikes.