Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,535 papers from all fields of science
Search
Sign In
Create Free Account
Metasploit
Known as:
Meterpreter
, Metasploit project
, Opcode Database
Expand
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Anti-computer forensics
Armitage
BackBox Linux
BackTrack
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Pengembangan Laboratorium Virtual untuk Simulasi Uji Penetrasi Sistem Keamanan Jaringan
Fahru Roszy Mahtuf
,
Puspanda Hatta
,
Endar Suprih Wihidiyat
JOINTECS (Journal of Information Technology and…
2019
Corpus ID: 199013827
Penelitian ini bertujuan untuk mengembangkan sebuah laboratorium berbasis virtualisasi untuk simulasi uji penetrasi dan…
Expand
Highly Cited
2014
Highly Cited
2014
Effective penetration testing with Metasploit framework and methodologies
Filip Holík
,
J. Horalek
,
Ondrej Marik
,
Sona Neradova
,
Stanislav Zitta
International Symposium on Computational…
2014
Corpus ID: 18909293
Nowadays, information security is very important, because more and more confidential information, like medical reports, is being…
Expand
2014
2014
Antecedents of Entrepreneurial Intention ( With Reference to Undergraduates of UWU , Sri Lanka )
Weerakoon Wmpgc
,
Gunatissa Hhaj
2014
Corpus ID: 115146652
Entrepreneurial intentions are considered as more accurate predictors of entrepreneurial behavior. Understanding entrepreneurial…
Expand
Highly Cited
2012
Highly Cited
2012
The Role of Self-Perceptions in the Prediction of Household Recycling Behavior in Australia
K. White
,
M. K. Hyde
2012
Corpus ID: 59129563
This study examined the role of self-perceptions, within a theory of planned behavior (TPB) framework, in the prediction of…
Expand
Highly Cited
2011
Highly Cited
2011
Metasploit: The Penetration Tester's Guide
David Kennedy
,
Jim O'Gorman
,
Devon Kearns
,
Mati Aharoni
2011
Corpus ID: 21866584
"The best guide to the Metasploit Framework." HD Moore, Founder of the Metasploit Project The Metasploit Framework makes…
Expand
Review
2008
Review
2008
Windows memory forensics
Nicolas Ruff
Journal in Computer Virology
2008
Corpus ID: 17104462
This paper gives an overview of all known “live” memory collection techniques on a Windows system, and freely available memory…
Expand
Highly Cited
2004
Highly Cited
2004
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
John C. Koziol
,
D. Litchfield
,
+4 authors
Riley Hassell
2004
Corpus ID: 60596104
About the Authors. Acknowledgments. Introduction to the Second Edition. Part I: Introduction to Exploitation: Linux on x86…
Expand
1981
1981
Temporal patterns of play bouts in captive common marmosets (Callithrix jacchus)
N. Chalmers
,
J. Locke-Haydon
Animal Behaviour
1981
Corpus ID: 53172184
Highly Cited
1980
Highly Cited
1980
Mate preferences of female mottled sculpins, Cottus bairdi
J. Downhower
,
L. Brown
Animal Behaviour
1980
Corpus ID: 53174384
Highly Cited
1980
Highly Cited
1980
Female choice and polygyny in redwinged blackbirds
S. Lenington
Animal Behaviour
1980
Corpus ID: 53179591
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE