Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  1. ronnykoby

    VENOM 1.0.17 - metasploit Shellcode generator/compiller

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  2. rth789

    Shodan 2 Metasploit

    This project is a simple Python script that automatically sends IPs found on Shodan according to specified parameters to Metasploit Framework and runs the desired exploits against these targets. Edit the python code for necessary adjustments. Link: *** Hidden text: You do not have sufficient...
  3. luffySanbei

    Brute  Metasploit module - Remote Code Execution

    This here Metasploit module uses the Remote-Control Server's protocol to send a payload and run it from the server. The Remote-Control Collection by Steppschuh version 3.1.1.12 has been tested and has been affected. If you're a fan of Metasploit, then you'll enjoy this. Download: *** Hidden...
  4. el matadoor

    Kage GUI for Metasploit Meterpreter and Session Handler

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. кнαη

    Hacking Ético Con Metasploit Framework Desde Cero [Spanish]

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. m4guy

    PACKT Learn Metasploit 4th edition (1K access)

    Link: https://send.exploit.in/download/10f3d7c42b31f2dd/#krvaQk4MTKyvb7tv9aBADA *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. SPKRFRQR

    METASPLOIT BOOTCAMP: DEVELOP METASPLOIT SKILLS IN 7 DAYS

    METASPLOIT BOOTCAMP :: A FAST-PACED GUIDE TO ENHANCE YOUR PENTENSTING SKILLS by Nipun Jaswall :ban: LEAVE A LIKE. DON'T BE A LEECH. :ban: ::: l i n k ::: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** :ban: LEAVE A LIKE. DON'T BE A...
  8. 074c1ef2ab9dc40fbeef

    Generate an Android APK payload via metasploit

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  9. 074c1ef2ab9dc40fbeef

    Watch Windows Screen Remotely via Metasploit

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. manocat

    Be Professional With MetaSploit Framework Course MSF A To Z-Udemy Coupon

    Be Professional With MetaSploit Framework Course MSF A To Z Unleash Your Inner Hacker: Master Metasploit and Transform Your Cybersecurity Skills! What you'll learn Penetration testing skills make you a more marketable IT tech. How To Install Virtwalbox & Kali linux & Windows 7 & Metasploitable...
  11. Rafapante

    Metasploit Pro Cracked v4.21.1 (Windows / Linux)

    Metasploit – Um projeto dedicado à segurança da informação. Criado para fornecer informações sobre vulnerabilidades, auxiliar na criação de assinaturas para IDS, criação e teste de exploits. O projeto mais famoso é o Metasploit Framework - uma plataforma conveniente para criar e depurar...
  12. carxproveteran

    Ethical Hacking: Metasploit (Learn how to run Exploits!)

    Ethical Hacking: Metasploit Learn how to run Exploits! What you'll learn How to use Metasploit How to Search Exploits How to use Exploits How to exploit Win 2k and Ubuntu 16 *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. omarosama

    Udemy - Hacking with Metasploit & Penetration Testing

    What you'll learn Hacking with Metasploit How to Setup a Lab Environment Penetration Testing Penetration Testing Methodology OSINT, Reconnaissance, Banner Grabbing, & Scanning Penetration Testing Toolsets Hacking with Metasploit Exploiting Metasploitable 2 Capture the Flag Requirements...
  14. luiyam

    Checking shodan's requests with a metasploit

    Greetings, forumchane! This information is provided not only in the following cases: for beginners in using the shodan, but also for experienced 'lamers' in general. Enjoy reading it. (All actions take place in Kali Linux) First, launch the console and write msfconsole , we wait for our shell...
  15. tronny

    EC-Council - Metasploit Like a Pro, by Scott Drew

    EC-Council - Metasploit Like a Pro, by Scott Drew *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. tronny

    SANS - SEC580 - Metasploit Kung Fu for Enterprise Pen Testing

    SANS - SEC580 - Metasploit Kung Fu for Enterprise Pen Testing *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. M

    Hacking Ético: Pentesting Basico en Android Con Metasploit

    https://www.udemy.com/course-dashboard-redirect/?course_id=4577996
  18. tronny

    INE - The Metasploit Framework Bootcamp, by Alexis Ahmed

    INE - The Metasploit Framework Bootcamp, by Alexis Ahmed *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. Azarkaran

    How to hack android with metasploit with presistant backdoor

    Step 1: Download the latest version of apktool and Zipalign in your kali linux machine Step 2:download an application that has an always active background service like internet speed meter pro which will help our payload to maintian presistance after reboot Step 3: go to folder where you have...
  20. hell112

    Pentest with metasploit - overview

    Pentest with metasploit - overview download
  21. hell112

    PenTest Web do Black Box ao White Box

    hello, PenTest Web do Black Box ao White Box download
  22. Razor69

    Metasploit Framework / Tools

    Metasploit Framework / Tools -LINK: https://openwebinars.net/blog/fundamentos-de-metasploit-framework/
  23. User3Name

    METASPLOIT - The Penetration Tester’s Guide

    Link: http://docs.alexomar.com/biblioteca/metasploit_apenetrationtestersguide.pdf The Metasploit Framework has long been one of the tools most widely used by information security professionals, but for a long time little documentation existed aside from the source code itself or comments on...
  24. Kök Tengri

    Metasploit Cheat Sheet

    Metasploit Cheat Sheet By Yori Kvitchko, Tom Hessman, Daniel Pendolino, & Ed Skoudis POCKET REFERENCE GUIDE http://pen-testing.sans.org/ resources/ Useful Auxiliary Modules msfvenom Port Scanner: msf > use auxiliary/scanner/portscan/ tcp msf > set RHOSTS 10.10.10.0/24 msf > run DNS Enumeration...
  25. henryhensworth

    Bypass Two Factor Authentication Using Metasploit Beef-Xss On Kali Linux

    bypass 2fa step by step
  26. carxproveteran

    Udemy - Metasploit Ethical Hacker Guide

    Metasploit Ethical Hacker Guide Learn to hack using Metasploit practically. All basics and practical hacking videos added! What you'll learn Learn the basics of Metasploit Gain the core knowledge of Ethical Hacking using Metasploit Boost your Ethical Hacking career Boost your hacking skills...
  27. kaidynsully

    #3) Metasploit Hacking Tools

    #3) Metasploit Price: Metasploit Framework is an open-source tool and it can be downloaded for free. Metasploit Pro is a commercial product. The free trial is available for 14 days. Contact the company to learn more about its pricing details. It is the software for penetration testing. Using...
  28. carxproveteran

    Udemy - The Cyber Security Metasploit Framework Guide For Beginners

    The Cyber Security Metasploit Framework Guide For Beginners Comprehensive Shellcode Metasploit Ethical Hacking Course. Learn to hack with metasploit with this course. What you'll learn What You Need to Know About Hacking The Metasploit Framework Programming for Hackers How to Work with...
  29. jackluka

    How to Hack Android Devices Using Metasploit

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** In this tutorial, I'll be teaching you how to hack Android devices such as phones and tablets using Metasploit. I'm going to be using Sana (Kali 2.0) for this tutorial, but you're...
  30. DeepTow

    Hacking with Nmap and Metasploit udemy

    https://www.udemy.com/course/ethical-hacking-with-nmap-and-metasploit-framework-part-2/
  31. username2133

    How to Use Metasploit in Kali Linux: A Step-By-Step Tutorial

    https://www.stationx.net/how-to-use-metasploit-in-kali-linux/
  32. cuthniki

    Method/Tut  ☣ Hack any computer with an ip using MetaSploit ☣

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. HenryGX

    METASPLOIT - PENTEST TOOL

    The Metasploit Project is a computer security project that provides information about security vulnerabilities and helps with penetration testing and development of IDS signatures. It is owned by Rapid7, a security company based in Boston, Massachusetts. Link: *** Hidden text: You do not have...
  34. cerrahp

    The Use of Metasploit in Penetration Tests

    LİNK. ( TURKİSH)
  35. userBuddy

    The Ultimate Ethical Hacking Linux and Metasploit Training

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. AxzDark

    Method/Tut  How to Install Metasploit On Termux

    🌀 GH05T-HUNTER5 OFFICIAL INSTALLATION 🌀 {SAFE AND SECURE} ADVANCED METASPLOIT INSTALLATION Install Metasploit Framework 6 in Termux apt install metasploit (not working) {but this}100% working Official Exo Tool { Safe and Secure } $ pkg install git -y $ git clone...
  37. D

    Metasploit Penetration Testing Recipes

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. TDSf0x_X

    🔰 Metasploit Framework US+RU versions !

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  39. Bl4ckc0d3

    Metasploit Penetration Testing

    Topics : Preparing The Environment Conducting Metaspolit Penetration Testing White Box Metaspolit Penetration Testing Black Box Metaspolit Penetration Testing Client Side Attack Post Exploitation Building Custom Exploits Source ...
Top Bottom