this post was submitted on 24 Nov 2023
5 points (100.0% liked)

Security Operations

570 readers
1 users here now

A place for all things Cyber Security, from questions, rants, and stories, to the latest attacks, vulnerabilities, and zero days.

founded 1 year ago
MODERATORS
L3s
 

Comprehensive guide on writing your first metasploit remote code execution module::Comprehensive guide on how to convert your RCE vulnerability into a fully functional metasploit module, that will spawn any payload. We use CVE-2023-32781 as our example.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here