Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit
It's Finally Here! Metasploit5 Basics for Hackers
Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL
Metasploit Basics, Part 27: Compromising an Exim Email Server
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Metasploit Basics for Hackers, Part 24: The New Evasion Modules in Metasploit 5
Metasploit5 Basics, Part 4: Connecting and Using the postgresql Database with Metasploit
Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX
Metasploit Basics, Part 16: Metasploit SCADA Hacking
Metasploit Basics, Part 9: Using msfvenom to Create Custom Payloads
Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials
Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
Metasploit Basics: Installing Metasploit 5 into Kali 2018 and New Features
Metasploit Basics, Part 22: Exploiting and Controlling a System When You Have Physical Access
Metasploit Basics, Part 21: Capturing Credentials with mimikatz
Metasploit Basics, Part 19: Web Delivery for Windows
AutoSploit: The Powerful Marriage of Shodan and Metasploit!
Metasploit Basics, Part 17: Automobile Hacking with Metasploit
Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)
Metasploit Kung-Fu Videos Now For Sale!