PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • As SecurityWeek columnist Oliver Rochford points out, studies of the methods utilized in the wild reflect that attackers have a preference for the same tools that penetration testers and other security professionals use or sell to others, and Metasploit is no different.
http://www.w3.org/ns/prov#wasQuotedFrom
  • securityweek.com