BeEF
Metasploit
Our great sponsors
BeEF | Metasploit | |
---|---|---|
42 | 117 | |
9,377 | 32,790 | |
1.4% | 1.3% | |
9.2 | 10.0 | |
3 days ago | about 23 hours ago | |
JavaScript | Ruby | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
BeEF
-
Upside-Down-Ternet
Ha, fun to see this again! Back before everything was HTTPS, it was fun to use the Browser Exploitation Framework (https://beefproject.com) which had a script included that did this. Though in those cases I wasn't in control of the gateway, so ARP spoofing was required to get other devices to route through me.
-
How stupid do they think people are?
For example IOS WebKit has a bunch of vulnerabilities announced recently. and one of those could be used via the Browser Exploitation Framework to install malware on your phone with you just clicking the link.
-
Is there a risk of being hacked even in a home network without port forwarding?
Motivation is a key part, so those attacks are more theoretical than practically dangerous, however there is a class of attacks that's based on the fact that your browser can make arbitrary network connections, so unprivileged javascript can be used for some scans of your local network - for example, your router's internally accessible admin page or some vulnerability in a printer accessible in local network, as the attacker might guess commonly used models, the internal IP addresses they use by default, etc. For example, you might take a look at https://beefproject.com/
-
Why are there so many Rails related posts here?
This is something that kind of annoys me; there's even a /r/rails sub-reddit specifically for Ruby on Rails stuff. Understandably Rails helped put Ruby on the map. Before Rails, Ruby was just another fringe language. Rails became massively popular, helped many startups quickly build their Web 2.0 sites, and become successful companies (ex: GitHub, LinkedIn, AirBnB, etc). Like others have said, "Rails is where the money is at". However, this posses a problem for the Ruby community: whenever Rails becomes less popular, so does Ruby. I wish the Ruby ecosystem wasn't so heavily centralized around Rails, and that we diversified our uses of Ruby a bit. There's of course Sinatra, dry-rb, Hanami, Dragon Ruby, SciRuby, and a dozen security tools written in Ruby such as Metasploit, BeFF, Arachni, and Ronin.
-
Breaking into archaic embedded Linux system - any advice?
If you can open any webpage there then I would recommend using BeEF https://beefproject.com/
- Es seguro entrar en cualquier url?
-
Looking to explore a spam link from a text message. How to stay secure?
Perhaps https://beefproject.com/
-
Is it dangerous to click unsolicited links?
If you want an example of what exploiting a browser can do, see the capabilities of the Browser Exploitation Framework (BEef): https://github.com/beefproject/beef/wiki/BeEF-modules
- trying to install beef
-
realistically, how much hacking can you do using a link only ( no executables )
Take a look at BeEF framework - https://beefproject.com/ that's pretty much all the things you can do from a browser.
Metasploit
-
Best Hacking Tools for Beginners 2024
Metasploit
- Metasploit: Add Systemd BSOD QR Payload?
- Metasploit explained for pentesters
-
Effective Adversary Emulation
Metasploit: https://github.com/rapid7/metasploit-framework
- CVE-2023-22515 - Atlassian Confluence unauthenticated RCE exploit module
-
Hacking from anywhere
1-) Learn Hacking on a debian based distro like Kali Linux - I personally started with tools like nikto, camhacker... and then moved to more complex frameworks like metasploit.
-
CMV: The Second Amendment "right to bear arms" and the discussions surrounding gun control also apply to hacking tools.
I once had to give a presentation about Metasploit, and whether it was ethically correct for the creator to make it free and open-source, available to everyone. And in researching this I realized that there were a lot of parallels between the arguments for or against hacking tools being readily available and the arguments for or against gun control. I'll just list a few quickly:
-
Hackers Tools: Must-Have Tools for Every Ethical Hacker
Metasploit Framework (mentioned earlier)
-
Penetration Testing
This phase is where the pen testers practically prove that there exist potential vulnerabilities in the target system. The pen testers do the hacking using an array of technical approaches and social engineering methods to exploit the vulnerabilities. The ethical hackers commonly use Metasploit framework to automatically execute exploitation against the target systems. Moreover, they may install malwares such as rootkit to persistently maintain their foothold and further compromise the target system.
- Metasploit Framework
What are some alternatives?
Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
SecureHeaders - Manages application of security headers with many safe defaults
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
Rack::Attack - Rack middleware for blocking & throttling
SQLMap - Automatic SQL injection and database takeover tool
Hashids - A small Ruby gem to generate YouTube-like hashes from one or many numbers. Use hashids when you do not want to expose your database ids to the user.
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
TSS - Threshold Secret Sharing - A Ruby implementation of Threshold Secret Sharing (Shamir) as defined in IETF Internet-Draft draft-mcgrew-tss-03.txt
Clamby - ClamAV interface to your Ruby on Rails project.