Metasploit
BeEF
Our great sponsors
Metasploit | BeEF | |
---|---|---|
117 | 42 | |
32,532 | 9,314 | |
1.2% | 1.7% | |
10.0 | 9.0 | |
7 days ago | 1 day ago | |
Ruby | JavaScript | |
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Metasploit
-
Best Hacking Tools for Beginners 2024
Metasploit
-
Metasploit explained for pentesters
msf6 > use auxiliary/scanner/smb/smb_ms17_010 msf6 auxiliary(scanner/smb/smb_ms17_010) > options Module options (auxiliary/scanner/smb/smb_ms17_010): Name Current Setting Required Description ---- --------------- -------- ----------- CHECK_ARCH true no Check for architecture on vulnerable hosts CHECK_DOPU true no Check for DOUBLEPULSAR on vulnerable hosts CHECK_PIPE false no Check for named pipe on vulnerable hosts NAMED_PIPES /usr/share/metasploit-framework/data/wordl yes List of named pipes to check ists/named_pipes.txt RHOSTS yes The target host(s), see https://github.com/rapid7/metasploit-framework/wiki/U sing-Metasploit RPORT 445 yes The SMB service port (TCP) SMBDomain . no The Windows domain to use for authentication SMBPass no The password for the specified username SMBUser no The username to authenticate as THREADS 1 yes The number of concurrent threads (max one per host)
-
Effective Adversary Emulation
Metasploit: https://github.com/rapid7/metasploit-framework
-
Hacking from anywhere
1-) Learn Hacking on a debian based distro like Kali Linux - I personally started with tools like nikto, camhacker... and then moved to more complex frameworks like metasploit.
-
Hackers Tools: Must-Have Tools for Every Ethical Hacker
Metasploit Framework (mentioned earlier)
-
I watched a video of Mr. Robot programming a script. As I watch the script, the syntax is reminiscent of the Ruby language, and it really is.
It's using the metasploit framework https://github.com/rapid7/metasploit-framework
-
The 36 tools that SaaS can use to keep their product and data safe from criminal hackers (manual research)
Metasploit
-
Why are there so many Rails related posts here?
This is something that kind of annoys me; there's even a /r/rails sub-reddit specifically for Ruby on Rails stuff. Understandably Rails helped put Ruby on the map. Before Rails, Ruby was just another fringe language. Rails became massively popular, helped many startups quickly build their Web 2.0 sites, and become successful companies (ex: GitHub, LinkedIn, AirBnB, etc). Like others have said, "Rails is where the money is at". However, this posses a problem for the Ruby community: whenever Rails becomes less popular, so does Ruby. I wish the Ruby ecosystem wasn't so heavily centralized around Rails, and that we diversified our uses of Ruby a bit. There's of course Sinatra, dry-rb, Hanami, Dragon Ruby, SciRuby, and a dozen security tools written in Ruby such as Metasploit, BeFF, Arachni, and Ronin.
-
Pentesting Tools I Use Everyday
Learn more about Metasploit here: https://www.metasploit.com/
BeEF
-
Why are there so many Rails related posts here?
This is something that kind of annoys me; there's even a /r/rails sub-reddit specifically for Ruby on Rails stuff. Understandably Rails helped put Ruby on the map. Before Rails, Ruby was just another fringe language. Rails became massively popular, helped many startups quickly build their Web 2.0 sites, and become successful companies (ex: GitHub, LinkedIn, AirBnB, etc). Like others have said, "Rails is where the money is at". However, this posses a problem for the Ruby community: whenever Rails becomes less popular, so does Ruby. I wish the Ruby ecosystem wasn't so heavily centralized around Rails, and that we diversified our uses of Ruby a bit. There's of course Sinatra, dry-rb, Hanami, Dragon Ruby, SciRuby, and a dozen security tools written in Ruby such as Metasploit, BeFF, Arachni, and Ronin.
- Es seguro entrar en cualquier url?
-
How attackers use exposed Prometheus server to exploit Kubernetes clusters
Third-party registry: In this case, one of the methods could be social engineering, using tools like BeeF to create a specific phishing or fake page to get the login credentials and change the image to a new one with a known and exploitable vulnerability and wait for the deployment. One more thing is this is not magic or 100% successful. If the company scans the images in the deployment, it could be detected!
- Don’t know how to create phishing link
-
Trying to install beEF on Ubuntu but this message pops up after I tried to manually install ruby gems
Here are the instructions: git clone https://github.com/beefproject/beef
Here’s what I typed: sudo apt-get update -y; sudo apt-get upgrade -y sudo apt install ruby ruby-dev sudo apt install git git clone https://github.com/beefproject/beef.git //changed directories here to beef sudo ./install //then here is where it didn’t work. It said I had to install ruby gems manually and to the latest version. After, I typed in bundle install And it can up with the error in the picture
-
FUD Keylogger
I don't know much about it other than what I picked up in a Levelonetechs video, but look into the beef project since you do a little website development and the vector will be in the browser anyway.
-
Anyone know how to fix this Beef-xss problem im having?
Sep 21 20:33:54 kali beef[1241]: [20:33:54] | Site: https://beefproject.com
-
Selfhosted keychain/password manager
If you want to have some more understanding of what might be possible, have a look at https://github.com/beefproject/beef
What are some alternatives?
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
SQLMap - Automatic SQL injection and database takeover tool
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications
thc-hydra - hydra
Rack::Attack - Rack middleware for blocking & throttling
pwntools - CTF framework and exploit development library
CVE-2021-1675 - C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
php-reverse-shell
CrackMapExec - A swiss army knife for pentesting networks