metasploitable
-
New to Hacking? Post-Exploitation with Metasploitable Made Easy
Tags: backdoors, data gathering, metasploit, metasploitable, penetration testing, persistence, post-exploitation, privilege escalation, sensitive information, termuxCurious about what happens after gaining access? Learn real post-exploitation skills using Metasploitable —perfect for new ethical hackers on Termux.