Metasploit modules for threat-informed purple teaming
Open-source researchers, pen testers, and threat hunters
We believe in rapid platform integration: driving a straight line from every Rapid7 Labs discovery to improving your security program now, today. Rapid7 Labs tracks adversaries, shares proprietary, curated intelligence and research, and builds trusted open-source communities. We all created the internet together. That’s how we’ll secure it.
Since 2020, Rapid7 has tracked huge increases in zero-day exploits, ransomware attacks, mass compromise incidents, and evolutions in attacker behavior. Rapid7 Labs has analyzed 14 months of attacker behavior and marquee vulnerabilities, publishing the findings alongside expert analysis and practical guidance for security professionals.
Rapid7 Labs holds a slew of AI patents that power risk and threat analysis, and detect threats faster and prioritize vulnerabilities better.
In the first half of 2023, we tracked 79 state-sponsored attacks. Labs uncovers emergent threats, zero-days, and our future.
Our open-source projects like Metasploit, Velociraptor, and AttackerKB have bi-directional feeds into our platform solutions.
Get easy insight into public internet exposure with Project Doppler, informed by Sonar scans and our honeypot network Project Lorelei.
Between Rapid7 Labs and our 24/7 follow-the-sun MDR, we observe 3.3 trillion security events every week. We perform in-depth technical analysis of emergent attack vectors, follow attacks as they evolve, and communicate indicators of compromise and next-step guidance in real time.
Get insight into widely exploited vulns, ransomware, and dark web marketplaces anytime with this on-demand webinar.
Take attackers out before they pop you. It’s proactive, comprehensive coverage for your entire environment from the endpoint to the cloud.
Japan is an economic juggernaut with subsidiaries and affiliates at unique and elevated risk of attack around the world. Of course Rapid7 Labs studied it.
Chief Scientist
Raj won the prestigious Peter Szor award (2015) for the best piece of technical security research conducted each year. He’s also been inducted into the Infosecurity Europe Hall of Fame.
Security Research
Caitlin directs our vulnerability researchers, exploit developers, emergent threat analysts, and the Metasploit team. She’s regularly quoted by ZDNet and Dark Reading.
Threat Analytics
A regular speaker at RSA and Black Hat, Christiaan leads intelligence teams, gathering threat data, inventing new research techniques, data correlation and publications.