Penetration Testing

Why your exploit completed, but no session was created? Try these fixes..

Why your exploit completed, but no sessions was created? Try these fixes logo

When using Metasploit Framework, it can be quite puzzling trying to figure out why your exploit failed. All you see is an error message on the console saying “Exploit completed, but no session was created”. There can be many reasons behind this problem and in this blog post we will look on possible causes why

Why your exploit completed, but no session was created? Try these fixes.. Read More »

Accessing Windows Systems Remotely From Linux

Accessing Windows Systems Remotely From Linux logo

This page contains a collection of methods for connecting to a remote Windows system from Linux and examples of how to execute commands on Windows machines remotely from Linux using number of different tools. It covers over 30 different methods for obtaining remote shell, remote command execution or connecting to a remote desktop using variety

Accessing Windows Systems Remotely From Linux Read More »

Metasploit Auxiliary Modules (Detailed Spreadsheet)

Metasploit Auxiliary Modules (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit auxiliary modules that are currently available in the latest Metasploit Framework, the most popular penetration testing platform. I’m hoping that this list will help you navigate through the quantity of Metasploit auxiliary modules more easily and save you time during your penetration testing

Metasploit Auxiliary Modules (Detailed Spreadsheet) Read More »

List of Metasploit Windows Exploits (Detailed Spreadsheet)

List of Metasploit Windows Exploits (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit Windows exploits that are currently available in the open source version of the Metasploit Framework, the number one penetration testing platform. It is my hope that this list will help you navigate through the vast lists of Metasploit exploits more easily and help

List of Metasploit Windows Exploits (Detailed Spreadsheet) Read More »