Metasploit

Explore 14 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Metasploit Logo

A penetration testing framework for identifying and exploiting vulnerabilities.

1
barq Logo

A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.

0
Industrial Exploitation Framework (ISF) Logo

ISF (Industrial Exploitation Framework) - An exploitation framework for industrial systems with various ICS protocol clients and exploit modules.

0
Metasploit Cheat Sheet Logo

A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.

0
Viper Logo

A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

0
AutoTTP Logo

AutoTTP automates complex attack sequences and testing scenarios for regression tests and research using frameworks like Empire, Metasploit, and Cobalt Strike.

0
Payloads All The Things Logo

A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.

0
Windows Exploit Suggester Logo

Compares target's patch levels against Microsoft vulnerability database and detects missing patches.

0
Metasploit Framework Logo

A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.

0
Metasploitable3 Logo

A virtual machine with numerous security vulnerabilities for testing exploits with Metasploit.

0
CrackMapExec (CME) Logo

CrackMapExec (CME) - A tool for querying internal database for host and credential information in cybersecurity.

0
WPSploit Logo

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

0
Preparing for Red Team at PRCCDC 2015 Logo

Preparation process for participating in the Pacific Rim CCDC 2015.

0
Metasploit Payloads Logo

A unified repository for different Metasploit Framework payloads.

0