RCE

Metasploit Auxiliary Modules (Detailed Spreadsheet)

Metasploit Auxiliary Modules (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit auxiliary modules that are currently available in the latest Metasploit Framework, the most popular penetration testing platform. I’m hoping that this list will help you navigate through the quantity of Metasploit auxiliary modules more easily and save you time during your penetration testing

Metasploit Auxiliary Modules (Detailed Spreadsheet) Read More »

List of Metasploit Windows Exploits (Detailed Spreadsheet)

List of Metasploit Windows Exploits (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit Windows exploits that are currently available in the open source version of the Metasploit Framework, the number one penetration testing platform. It is my hope that this list will help you navigate through the vast lists of Metasploit exploits more easily and help

List of Metasploit Windows Exploits (Detailed Spreadsheet) Read More »

List of Metasploit Linux Exploits (Detailed Spreadsheet)

List of Metasploit Linux Exploits (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit Linux exploits that are currently available in the open source version of the Metasploit Framework, the number one penetration testing platform. It is my hope that this list will help you navigate through the vast lists of Metasploit exploits more easily and help

List of Metasploit Linux Exploits (Detailed Spreadsheet) Read More »

RCE on Windows from Linux Part 5: Metasploit Framework

RCE on Windows from Linux using Metasploit logo

In this post we will be detailing RCE capabilities of the Metasploit Framework (MSF) – the world’s most popular penetration testing framework. This is the 5th part of the blog post series focused on tools capable of authenticated remote command execution (RCE) on Windows machines from Linux (Kali). Introduction As mentioned in the previous parts

RCE on Windows from Linux Part 5: Metasploit Framework Read More »