Pentest environment deployer (kali linux + targets) using vagrant and chef.
-
Updated
Jun 21, 2019 - Ruby
Pentest environment deployer (kali linux + targets) using vagrant and chef.
Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet
A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and control.
Python - Metasploit-Framework Database Management
Metasploit v 5
this script is what seems to be a discord token gen that checks the tokens as it gens but you would be wrong because it is really a token logger with a python meterpreter payload inside so you can use this with metasploit to infect somones device and steal there token
Ethical Hacking Workshop
En este repositorio haré una breve explicación de como montar un entorno de trabajo con Kali y Metasploiable2 , en dos máquinas virtualizadas mediante VirtualBox. También explico a modo de practica como realizar un ataque DDoS y como introducir un backdoor en el servicio sftp, por el puerto 21.
Este Proyecto es para realizar pruebas de laboratorio en la mayoría de los entornos linux sin la necesidad de tener las herramientas instaladas de forma native el unico requerimiento es que se tenga docker y docker-compose instalado el el hosts
Install and fix metasploit problems on termux
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
Pentesting project to attack a Metasploitable VM using Metasploit and find 5 different vulnerabilities, 3 of them detected by the IDS Snort and 2 of them not. Attack exploits on services like ProFTPD, CUPS, Drupal, and Apache are explored, alongside discussions on IDS effectiveness.
This is the instruction on how to download the metasploitable3 successfully
A series of detailed vulnerability assessments and PoCs on Metasploitable2, aimed at demonstrating a systematic approach to identifying and mitigating security vulnerabilities for educational purposes.
A CTF for beginners
I designed and implemented a multi-platform cybersecurity homelab to simulate real-world Enterprise environments for practicing penetration testing, Network defense, and Active Directory management. I am building this homelab to stimulate both Offensive and Defensive Security
Various task performed in ISS.
Proof of practising security tools
Hacking and solution of vulnerable ports in a metasploitable vulnerable machine. Metasploitable zafiyetli makinesindeki zafiyetli portların hacklenmesi, çözümü
Security tools practice
Add a description, image, and links to the metasploitable topic page so that developers can more easily learn about it.
To associate your repository with the metasploitable topic, visit your repo's landing page and select "manage topics."