Simulates cyber-attacks to identify and exploit vulnerabilities in systems and networks. Helps organizations strengthen their security defenses.