Group of softwares that allows users to circumvent or bypass a security measure or system function, essentially enabling access to something that would normally be restricted; this can be used for legitimate purposes like testing or troubleshooting, but is often associated with malicious activity to gain unauthorized access to systems.