Skip to content

πŸ‘½ Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.

License

Notifications You must be signed in to change notification settings

ShubhamJagtap2000/Metasploit-Tutorial

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

      metasploit-1024x480

  • Metasploit is the most widely used exploitation framework. You can learn how to use it and unlock its full potential.

  • The Metasploit framework is a set of open-source tools for network enumeration, identifying vulnerabilities, developing payloads, and executing exploit code against remote target machines.

  • Get hands-on with the various tools and features Metasploit provides, from exploit development to post-exploitation techniques, this repo covers it all.

  • This repo is open for contributors! Please ⭐ this repo if you find it worth learning and insightful, thank you!

  • A humble request to all the stargazers, visitors, and topic seekers to start a discussion, raise an issue, and suggest improvements by submitting a pull request.

  • Please read our Contribution Guidelines before submitting an issue/PR.

Table Of Content

Modules
  Auxiliary
  Encoders
  Evasion
  Exploits
  NOPs
  Payloads
  Post

Using Modules
Sessions

Port Scanning
UDP Service Identification
SMB Scans

Example Workflow

Working With Exploit
Working With Sessions

Intro and o/p Formats
Encoders
Handlers
Other Payloads

Core Commands
File System Commands
Networking Commands
System Commands
Other Commands

Help
Meterpreter Commands
Migrate
Hashdump
Search
Shell

Metasploit Introduction
Metasploit Exploitation
Metasploit Meterpreter