Metasploit Creator Renames His Startup and IT Discovery Tool Rumble to 'runZero'Metasploit Creator Renames His Startup and IT Discovery Tool Rumble to 'runZero'
HD Moore's company has rebranded its IT, IoT, and OT asset discovery tool as the platform rapidly evolves.
![Photo of HD Moore, a cleanshaven man with short brown hair. He is wearing a dark suit and tie. Photo of HD Moore, a cleanshaven man with short brown hair. He is wearing a dark suit and tie.](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt161ab2eeef9c0f27/64f15fec717d609a23b8720e/HDMooreNew.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
Renowned security industry pioneer HD Moore — creator of the wildly popular Metasploit hacking toolkit — has renamed his startup Rumble to runZero in a nod to how its platform has evolved since its inception in 2019.
Moore initially built the IT asset discovery tool Rumble Network Discovery after years of witnessing firsthand as a penetration tester that organizations can't properly find, track, and manage IT devices on their networks, nor the security posture of those devices. He pioneered major research scanning for and discovering all types of exposed devices on the public Internet, ultimately developing the Rumble IT asset discovery tool that finds and fingerprints devices and their status on the network.
According to a blog post on the rebranding, the new name better reflects how the platform has evolved. Moore, the chairman and founding CTO of the startup, originally named the platform (and company) "Rumble" to mean "discover," but now that the platform can do more than find assets, he decided to rename it.
"Rumble was the perfect name for us at the time, but we've outgrown it. Each new integration we've added has extended Rumble's capabilities beyond discovery, by enriching asset data and uncovering coverage gaps in other IT and security tools," the company said in a blog post.
Moore's company received $5 million in venture capital in 2021.
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025