Metasploit Project

Results: 164



#Item
1Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
2Software / Computer security / Computing / Computer network security / Software testing / Metasploit Project / Open core / H. D. Moore

Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed by

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:27
3Software / Computer security / Computing / Computer network security / Software testing / Metasploit Project / Open core / H. D. Moore

Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed by

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
4Programming language implementation / Executable / Disassembler / Linker / Relocation / Compiler / Machine code / Metasploit Project

Metasm a ruby (dis)assembler Yoann Guillot 20 october 2007

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
5Computer security / Security / Cyberwarfare / Cybercrime / Computer network security / National security / Hacking / Military technology / Shellcode / Metasploit Project / Security hacker

William Owen Redwood Contact Information Department of Computer Science The Florida State University

Add to Reading List

Source URL: ww2.cs.fsu.edu

Language: English - Date: 2013-02-18 11:48:25
6Computer security / Cyberwarfare / Computer network security / Computing / Software testing / Metasploit Project / Penetration test / Exploit / Transaction authentication number / Cloud computing

POTASSIUM: Penetration Testing as a Service Richard Li, Dallin Abendroth, Xing Lin, Yuankai Guo, Hyun-wook Baek, Eric Eide, Robert Ricci, and Jacobus Van der Merwe Current Pentesting

Add to Reading List

Source URL: acmsocc.github.io

Language: English - Date: 2016-02-21 03:10:51
7Software / Computer security / Computing / Software testing / Computer security software / Computer network security / Hacking / Nmap / Nessus / Port scanner / Metasploit Project / Penetration test

Penetration TestingPenetration Testing

Add to Reading List

Source URL: cs.brown.edu

Language: English - Date: 2010-12-07 19:50:06
8Software / Computing / Computer security / Computer network security / Software testing / Penetration test / Application security / Vulnerability assessment / W3af / Security testing / Metasploit Project / Vulnerability

International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, NovemberAN OVERVIEW OF PENETRATION TESTING 1 Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones

Add to Reading List

Source URL: airccse.org

Language: English - Date: 2011-11-30 01:55:07
9Software / Computer security / System software / Computer network security / Software testing / Metasploit Project / Hacking / Exploit / Script kiddie

Metasploit 3.0 Metasploit 3.0: The Middle of the End of the End of the Middle? by Aaron Grothe, CISSP, NSA IAM/IEM, Security+

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2008-05-16 20:02:08
10Computer network security / W3af / Metasploit Project / Rapid7 / Penetration test / Web application security / Exploit / Application security / OWASP / Computer security / Cyberwarfare / Software

Web Application Security Payloads Andrés Riancho Director of Web Security OWASP AppSec USAMinneapolis Topics

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:10:56
UPDATE