Scan target networks for open ports.
Detect and report vulnerabilities in systems.
Access a repository of hacking exploits.