core
Metasploit
core | Metasploit | |
---|---|---|
103 | 117 | |
377 | 32,848 | |
-0.3% | 0.8% | |
9.2 | 10.0 | |
2 days ago | about 22 hours ago | |
JavaScript | Ruby | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
core
-
Rare & Powerful Crypto Technologies Setting up to Outperform the Market
Website: terra.money
-
A Brief History Of Stablecoins
TerraUSD (UST) was launched in 2020. Like NuBits and other seigniorage algorithmic stablecoins, UST sought to peg one token by moving volatility to a separate token, in this case LUNA, which was also the native token of the Terra blockchain. Users could swap 1 UST for $1 of LUNA and vice versa. When the price of UST rose above $1, holders could profit by swapping $1 of LUNA for 1 UST (which would be worth more than $1), increasing supply and pushing down the price of UST. When UST was below $1, users could profit by swapping 1 UST for $1 of LUNA, reducing the supply of UST. This worked relatively well until a series of events led to confidence in the system collapsing, meaning there was no longer adequate demand for LUNA to stabilize UST. Its failure in May 2022 wiped out tens of billions of dollars of value from the Terra ecosystem, catalyzed the wider crypto bear market, and brought down several large organizations with exposure to it, including crypto hedge fund 3AC and lending company Celsius in the process.
- There is framework for everything.
-
Terraform Labs is creating infrastructure to build DAOs on Terra 2.0
Terra's Official Twitter account post, a newly created account, and a bio that reads "Building a new standard for DAO on Terra"
-
Deconstructing DeFi
A final example of a token is a "stablecoin". A stablecoin is a token which is kept by the issuer at a fixed price in terms of a government currency, generally the US dollar. Tether maintains a popular stablecoin known as USDT by keeping reserves matching the supply of the token. Other approaches include that used by MakerDao for its stablecoin Dai, where reserves are decentralized and take the form of tokens or Ethereum. These decentralized stablecoins are referred to as "algorithmic stablecoins". A more unfortunate example is Terra, who's algorithmic stablecoin collapsed to the tune of 60 billion dollars.
-
Overview of all IBC Chains - Curious Cosmonaut Research Group
Terra
-
Geesh they got me questioning everything!
https://www.terra.money/ (this looks exactly like the above)
- Terra: Core development history older than 6 days was deleted
- Terra Core development history was deleted 6 days ago. Why? (The code is still there but the history was deleted)
-
Welcome to clown world. This vote is just a big farse. Go to check Twitter
It’s also on their website https://www.terra.money/
Metasploit
-
Best Hacking Tools for Beginners 2024
Metasploit
- Metasploit: Add Systemd BSOD QR Payload?
- Metasploit explained for pentesters
-
Effective Adversary Emulation
Metasploit: https://github.com/rapid7/metasploit-framework
- CVE-2023-22515 - Atlassian Confluence unauthenticated RCE exploit module
-
Hacking from anywhere
1-) Learn Hacking on a debian based distro like Kali Linux - I personally started with tools like nikto, camhacker... and then moved to more complex frameworks like metasploit.
-
CMV: The Second Amendment "right to bear arms" and the discussions surrounding gun control also apply to hacking tools.
I once had to give a presentation about Metasploit, and whether it was ethically correct for the creator to make it free and open-source, available to everyone. And in researching this I realized that there were a lot of parallels between the arguments for or against hacking tools being readily available and the arguments for or against gun control. I'll just list a few quickly:
-
Hackers Tools: Must-Have Tools for Every Ethical Hacker
Metasploit Framework (mentioned earlier)
-
Penetration Testing
This phase is where the pen testers practically prove that there exist potential vulnerabilities in the target system. The pen testers do the hacking using an array of technical approaches and social engineering methods to exploit the vulnerabilities. The ethical hackers commonly use Metasploit framework to automatically execute exploitation against the target systems. Moreover, they may install malwares such as rootkit to persistently maintain their foothold and further compromise the target system.
- Metasploit Framework
What are some alternatives?
astrobwt - ASIC/FPGA/GPU resistant CPU mining algorithm.
BeEF - The Browser Exploitation Framework Project
gomod2nix - Convert applications using Go modules to Nix expressions [maintainer=@adisbladis]
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]
station - 🛰️ Station wallet
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
wasmvm - Go bindings to the running cosmwasm contracts with wasmer
SQLMap - Automatic SQL injection and database takeover tool
regen-ledger - :seedling: Blockchain for planetary regeneration
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
solana - Web-Scale Blockchain for fast, secure, scalable, decentralized apps and marketplaces.
Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications