About 70,000 results
Open links in new tab
  1. Metasploit Wrap-Up - Rapid7

    5 days ago · When successful, the Metasploit operator will have an interactive session to the MSSQL server that can be used to run interactive queries, or MSSQL auxiliary modules. Building on this …

  2. Deep Dive into Metasploit & Python Scripting for Penetration Testing ...

    Master the art of penetration testing with cutting-edge techniques in Metasploit and Python scripting tailored for cybersecurity professionals who want to elevate their offensive security skills. Dive deep …

  3. Metasploit Unleashed | Getting a Shell - OffSec

    Following out POP POP RET Instructions | Metasploit Unleashed and finally execute the two jumps on the stack which will land us inside our NOP sled: Executing our NOPSLED | Metasploit Unleashed …

  4. Metasploit: The Penetration Tester's Guide – Aspen Book Company

    Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you've built your foundation …

  5. NETREAPER Offensive Security Toolkit That Wraps 70+ Penetration …

    Dec 8, 2025 · NETREAPER is an easy command-line toolkit that combines 70+ penetration testing tools in one place for faster security assessments.

  6. Weaponizing PowerShell with Metasploit and how to defend against ...

    Nov 4, 2018 · In today's post, we will combine the flexibility of Metasploit and PowerShell. This combination is a great opportunity to perform more customized attacks and security tests.

  7. Metasploit: Introduction to Payloads — MCSI Library

    Metasploit: Introduction to Payloads # A payload is a piece of code that is used to execute a specific task, such as opening a reverse shell or creating a persistent backdoor. In this blog post, we’ll give …

  8. And metasploit Training Courses | Datastat Training Institute

    Explore 2 professional And metasploit training courses delivered by Datastat Training Institute. Gain practical expertise through hands-on workshops and live sessions.

  9. Exploit Database - Exploits for Penetration Testers, Researchers, and ...

    The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

  10. Vulners - Vulnerability DataBase

    Vulners - Vulnerability DataBase