Windows Oneliners for Remote Code Execution
A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
Offensive security testing uncovers vulnerabilities through simulated attacks.
A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
An open-source intelligence collection, research, and artifact management tool inspired by SpiderFoot, Harpoon, and DataSploit.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A cheat sheet providing examples of creating reverse shells for penetration testing.
A customized Kali Linux distribution for ICS/SCADA pentesting professionals
BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
Adversary emulation framework for testing security measures in network environments.
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
A front-end JavaScript toolkit for creating DNS rebinding attacks
A cheat sheet providing examples of creating reverse shells for penetration testing.
A professional platform that simplifies penetration testing by providing a unified dashboard for managing targets, automating scans, integrating diverse tools, and delivering AI-powered insights.
Metasploit is the industry-leading open-source penetration testing platform, empowering security professionals to discover, exploit, and validate vulnerabilities with precision and efficiency. Its comprehensive framework provides a robust environment for developing and executing exploit code, managing security assessments, and enhancing defensive strategies through IDS signature development and anti-forensic techniques. Trusted globally, Metasploit accelerates your security testing lifecycle and strengthens your organization's defenses against emerging threats.