Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet
-
Updated
Jul 4, 2024 - Ruby
Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet
A series of detailed vulnerability assessments and PoCs on Metasploitable2, aimed at demonstrating a systematic approach to identifying and mitigating security vulnerabilities for educational purposes.
Welcome to the Home Hacking Lab, an ongoing project where I transform my home setup into a hands-on CyberSec playground. Follow my journey as I explore various cybersecurity activities, set up virtual environments, and experiment with powerful tools and techniques. From VirtualBox adventures to diving into Kali Linux and Metasploitable shenanigans,
Pentesting project to attack a Metasploitable VM using Metasploit and find 5 different vulnerabilities, 3 of them detected by the IDS Snort and 2 of them not. Attack exploits on services like ProFTPD, CUPS, Drupal, and Apache are explored, alongside discussions on IDS effectiveness.
In this lab we cover the 5 phases of Ethical Hacking by conducting a penetration test on a target VM hosted on our VirtualBox Workstation.
A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and control.
Install and fix metasploit problems on termux
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
Ethical Hacking Workshop
A CTF for beginners
En este repositorio haré una breve explicación de como montar un entorno de trabajo con Kali y Metasploiable2 , en dos máquinas virtualizadas mediante VirtualBox. También explico a modo de practica como realizar un ataque DDoS y como introducir un backdoor en el servicio sftp, por el puerto 21.
Various task performed in ISS.
Este proyecto va enfocado a la seguridad informática y al Hacking Etico, pudiendo desplegar herramientas como Metasplotable, Dradis DVWAP.
Este Proyecto es para realizar pruebas de laboratorio en la mayoría de los entornos linux sin la necesidad de tener las herramientas instaladas de forma native el unico requerimiento es que se tenga docker y docker-compose instalado el el hosts
Hacking and solution of vulnerable ports in a metasploitable vulnerable machine. Metasploitable zafiyetli makinesindeki zafiyetli portların hacklenmesi, çözümü
this script is what seems to be a discord token gen that checks the tokens as it gens but you would be wrong because it is really a token logger with a python meterpreter payload inside so you can use this with metasploit to infect somones device and steal there token
Metasploit v 5
Python - Metasploit-Framework Database Management
Security tools practice
Proof of practising security tools
Add a description, image, and links to the metasploitable topic page so that developers can more easily learn about it.
To associate your repository with the metasploitable topic, visit your repo's landing page and select "manage topics."