-
## Steps to reproduce
How'd you do it?
1. Use windows/smb/ms17_010_eternalblue
2. Set RHOSTS to the target IP address.
3. Set LHOST to my local IP address.
4. Set LPORT to my desired port…
-
Collect exploits from PACKETSTORM at https://packetstormsecurity.com/
See discussion document at https://docs.google.com/document/d/1XtMmxthmANhr-IqXsyMgFnrOq5fTGfsE/edit?usp=sharing&ouid=11724122242…
-
# Exploit Hopper
This issue contains exploits which we could demo in Warnet.
- [ ] User/pass were encoded in bas64 and sent over the wire: https://bitcoindev.network/exploiting-cve-2018-20587/
-…
-
# Problem
At the moment the logic for exploits is that most of interactive functionality with attacker components is defined in the `c2` package. As of late with the exploration of the external C2 …
-
We want to collect data about exploits.
- [ ] https://github.com/nexB/vulnerablecode/issues/1452
- [x] https://github.com/nexB/vulnerablecode/issues/1453
- [x] https://github.com/nexB/vulnerable…
-
### Bug Description
[Metasploit Framework](https://launchpad.net/~jitpatro/+snap/metasploit-framework) builds are failing due to the following error:-
```
snapcraft internal error: RecursionError…
-
https://app.hackthebox.com/machines/Blue
```
$ nmap -sC -sV -Pn 10.10.10.40
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-02-23 00:51 JST
Nmap scan report for 10.10.10.40
Host is up (0.41s…
-
I got a error when running psnuffle sniffer in the metasploit framework.
```
msf auxiliary(sniffer/psnuffle) > run
[*] Auxiliary module running as background job 0.
msf auxiliary(sniffer/psnuffl…
-
I would like more information included in the github documentation about how to use/leverage/deploy or integrate the Browser Exploit Server into existing instances of Metasploit.
Useful Links:
…
-
@red0xff and I had previously discussed someway of giving feedback for SQLi where the output isn't near instant. So a blind SQLi for instance. I LOVE how sqlmap will give you `_________` then fill it …