Denial-of-service

Metasploit Auxiliary Modules (Detailed Spreadsheet)

Metasploit Auxiliary Modules (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit auxiliary modules that are currently available in the latest Metasploit Framework, the most popular penetration testing platform. I’m hoping that this list will help you navigate through the quantity of Metasploit auxiliary modules more easily and save you time during your penetration testing

Metasploit Auxiliary Modules (Detailed Spreadsheet) Read More »

List of Metasploit Windows Exploits (Detailed Spreadsheet)

List of Metasploit Windows Exploits (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit Windows exploits that are currently available in the open source version of the Metasploit Framework, the number one penetration testing platform. It is my hope that this list will help you navigate through the vast lists of Metasploit exploits more easily and help

List of Metasploit Windows Exploits (Detailed Spreadsheet) Read More »

List of Metasploit Linux Exploits (Detailed Spreadsheet)

List of Metasploit Linux Exploits (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit Linux exploits that are currently available in the open source version of the Metasploit Framework, the number one penetration testing platform. It is my hope that this list will help you navigate through the vast lists of Metasploit exploits more easily and help

List of Metasploit Linux Exploits (Detailed Spreadsheet) Read More »

Top 20 Microsoft Azure Vulnerabilities and Misconfigurations

Microsoft Azure cloud top 20 vulnerabilities and misconfigurations logo

In this article, we will look on the top 20 vulnerabilities and misconfigurations of the Microsoft Azure cloud that are commonly found during credentialed security audits and architecture reviews. Information in this post can hopefully aid security architects, auditors and other professionals in assessment of the security posture of a given Azure cloud environment. Introduction

Top 20 Microsoft Azure Vulnerabilities and Misconfigurations Read More »