Various task performed in ISS.
-
Updated
Mar 23, 2021 - Python
Various task performed in ISS.
Proof of practising security tools
Hacking and solution of vulnerable ports in a metasploitable vulnerable machine. Metasploitable zafiyetli makinesindeki zafiyetli portların hacklenmesi, çözümü
Security tools practice
Este proyecto va enfocado a la seguridad informática y al Hacking Etico, pudiendo desplegar herramientas como Metasplotable, Dradis DVWAP.
Welcome to the Home Hacking Lab, an ongoing project where I transform my home setup into a hands-on CyberSec playground. Follow my journey as I explore various cybersecurity activities, set up virtual environments, and experiment with powerful tools and techniques. From VirtualBox adventures to diving into Kali Linux and Metasploitable shenanigans,
A project to integrate Metasploitable3 into an Active Directory environment and perform a vulnerability assessment using Nessus Essentials.
Seguridad de la informacion Metasploitable 2 linux y Windows server 2003
This is the instruction on how to download the metasploitable3 successfully
A series of detailed vulnerability assessments and PoCs on Metasploitable2, aimed at demonstrating a systematic approach to identifying and mitigating security vulnerabilities for educational purposes.
A CTF for beginners
I designed and implemented a multi-platform cybersecurity homelab to simulate real-world Enterprise environments for practicing penetration testing, Network defense, and Active Directory management. I am building this homelab to stimulate both Offensive and Defensive Security
Este Proyecto es para realizar pruebas de laboratorio en la mayoría de los entornos linux sin la necesidad de tener las herramientas instaladas de forma native el unico requerimiento es que se tenga docker y docker-compose instalado el el hosts
Install and fix metasploit problems on termux
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
Pentesting project to attack a Metasploitable VM using Metasploit and find 5 different vulnerabilities, 3 of them detected by the IDS Snort and 2 of them not. Attack exploits on services like ProFTPD, CUPS, Drupal, and Apache are explored, alongside discussions on IDS effectiveness.
Ethical Hacking Workshop
En este repositorio haré una breve explicación de como montar un entorno de trabajo con Kali y Metasploiable2 , en dos máquinas virtualizadas mediante VirtualBox. También explico a modo de practica como realizar un ataque DDoS y como introducir un backdoor en el servicio sftp, por el puerto 21.
this script is what seems to be a discord token gen that checks the tokens as it gens but you would be wrong because it is really a token logger with a python meterpreter payload inside so you can use this with metasploit to infect somones device and steal there token
Add a description, image, and links to the metasploitable topic page so that developers can more easily learn about it.
To associate your repository with the metasploitable topic, visit your repo's landing page and select "manage topics."