Purchase Core Impact Basic
Core Impact Basic Pricing Information
The Core Impact Basic plan has everything you need to get your penetration testing program moving, whether you’re just starting out or looking to streamline your current processes.
A one year license of Core Impact Basic is $9,450. Core Impact can also be bundled with our advanced adversary simulation tool, Cobalt Strike, for $12,600.
Start the Purchase Process in Three Simple Steps
Fill out the form to the right.
Complete a brief vetting process, required by the government since Core Impact is a powerful penetration testing tool that uses the same techniques as threat actors.
Receive your Core Impact license(s) and begin pen testing.
If you're interested in comparing the Basic plan to our Pro and Enterprise plans, refer to the pricing comparison chart below.
Core Impact Basic | Core Impact Pro | Core Impact Enterprise |
$9,450 / User Per Year | $12,600 / User Per Year | Varied Pricing |
Core Impact Basic has everything you need to get your penetration testing program moving, with limited features that enable your security professionals to assess their network security. It includes:
| Core Impact Pro includes limited features of the solution and enables your security professionals to broaden their penetration testing program past purely network engagements, extending your reach without having to add complexity. It includes:
| Core Impact Enterprise includes all features and enables organizations of any size to conduct advanced penetration tests with ease, effectively exploiting security weaknesses before a threat actor does. It includes:
|
Purchase Now | Purchase Now | Get a Quote |
Not sure which package is right for you?
Why Choose Core Impact?
Why Choose Core Impact? Core impact is simple enough for your first test, but powerful enough for the rest. Whether you are looking to automate routine testing or simply validate remediation effectiveness, Core Impact can help you meet your penetration testing goals.
Use intuitive automations to swiftly uncover and exploit security weaknesses.
Pen test safely with access to our robust library of expert certified exploits.
Gather information, test systems, and generate reports, all in one place.