Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,264,582 papers from all fields of science
Search
Sign In
Create Free Account
Metasploit
Known as:
Meterpreter
, Metasploit project
, Opcode Database
Expand
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Anti-computer forensics
Armitage
BackBox Linux
BackTrack
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Exploitation with Reverse_tcp Method on Android Device using Metasploit
Rizky Dwiananda Putra
,
Is Mardianto
Jurnal Edukasi dan Penelitian Informatika (JEPIN)
2019
Corpus ID: 155368393
Android is a popular operating system on smartphone which run on linux kernel. Android operating system allows developers to…
Expand
2015
2015
A Practical Approach for the Detection of DDoS attack and It’s Countermeasure selection in Open Stack using Xen Cloud Server
A. Narayanan
,
A. Lakshmi
,
Jishnu
2015
Corpus ID: 212507951
— - Cloud Security is an attractive issue for research and development efforts. A cloud server means virtual server, which runs…
Expand
2014
2014
Antecedents of Entrepreneurial Intention ( With Reference to Undergraduates of UWU , Sri Lanka )
Weerakoon Wmpgc
,
Gunatissa Hhaj
2014
Corpus ID: 115146652
Entrepreneurial intentions are considered as more accurate predictors of entrepreneurial behavior. Understanding entrepreneurial…
Expand
Review
2014
Review
2014
Web Penetration Testing using Nessus and Metasploit Tool
I. Mukhopadhyay
,
Shilpa Goswami
,
Eshita Mandal
2014
Corpus ID: 13793481
Web Penetration Testing is a tool that is being used widely to see how the website reacts when an vulnerability attack is done…
Expand
Review
2013
Review
2013
Learning Metasploit Exploitation and Development
Aditya Balapure
2013
Corpus ID: 196178704
Develop advanced exploits and modules with a fast-paced, practical learning guide to protect what's most important to your…
Expand
2012
2012
Intra-procedural Path-insensitve Grams (I-GRAMS) and Disassembly Based Features for Packer Tool Classification and Detection
Scott E Gerics
2012
Corpus ID: 54906188
Abstract : The DoD relies on over seven million computing devices worldwide to accomplish a wide range of goals and missions…
Expand
2012
2012
Compromising windows 8 with metasploit's exploit
Monika Pangaria
,
Vivek Shrivastava
,
Priyanka Soni
2012
Corpus ID: 62250264
Windows 8, the latest operating system by Microsoft will be launching soon in October 2012. It is designed and developed for use…
Expand
2011
2011
Live-fire security testing with Armitage and Metasploit
R. Mudge
2011
Corpus ID: 53810226
Defend your network by attacking it. Armitage and Metasploit give you the same techniques skilled attackers use, in an easy-to…
Expand
2010
2010
A Hacking View of Access Control
Pedro A. Diaz-Gomez
,
Gregory Steen
Security and Management
2010
Corpus ID: 14454936
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information…
Expand
2006
2006
Prospector : a protocol-specific detector of polymorphic buffer overflows
Asia Slowinska
,
G. Portokalidis
2006
Corpus ID: 14516401
While future attacks are likely to be increasingly polymorphic, current intrusion detection methods tend to be either powerless…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE