Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,368,981 papers from all fields of science
Search
Sign In
Create Free Account
Metasploit
Known as:
Meterpreter
, Metasploit project
, Opcode Database
Expand
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
Anti-computer forensics
Armitage
BackBox Linux
BackTrack
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Scarce Attack Datasets and Experimental Dataset Generation
M. S. G. Devi
,
M. Nene
Second International Conference on Electronics…
2018
Corpus ID: 52917056
Efficient employability of machine learning and artificial intelligence techniques to automate the process of network forensics…
Expand
2015
2015
SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks
T. Okamoto
International Conference on Knowledge-Based…
2015
Corpus ID: 31558611
2015
2015
The missing complexity in seismically imaged normal faults: what are the implications for geometry and production response?
A. Wood
,
D. Paton
,
R. Collier
Special Publications
2015
Corpus ID: 53710417
Abstract The impact of geometric uncertainty on across-fault flow behaviour at the scale of individual intra-reservoir faults is…
Expand
2014
2014
Antecedents of Entrepreneurial Intention ( With Reference to Undergraduates of UWU , Sri Lanka )
Weerakoon Wmpgc
,
Gunatissa Hhaj
2014
Corpus ID: 115146652
Entrepreneurial intentions are considered as more accurate predictors of entrepreneurial behavior. Understanding entrepreneurial…
Expand
Review
2014
Review
2014
Web Penetration Testing using Nessus and Metasploit Tool
I. Mukhopadhyay
,
S. Goswami
,
Eshita Mandal
2014
Corpus ID: 13793481
Web Penetration Testing is a tool that is being used widely to see how the website reacts when an vulnerability attack is done…
Expand
2012
2012
Intra-procedural Path-insensitve Grams (I-GRAMS) and Disassembly Based Features for Packer Tool Classification and Detection
Scott E Gerics
2012
Corpus ID: 54906188
Abstract : The DoD relies on over seven million computing devices worldwide to accomplish a wide range of goals and missions…
Expand
2011
2011
A Testbed for the Evaluation of Web Intrusion Prevention Systems
Jeff Stuckman
,
James M. Purtilo
Third International Workshop on Security…
2011
Corpus ID: 14775583
Web intrusion prevention systems are popular for defending web applications against common attacks, such as SQL injection and…
Expand
2007
2007
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
P. Gladyshev
,
Andreas Enbacka
International Journal of Digital Evidence
2007
Corpus ID: 17243746
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used…
Expand
2006
2006
A Needs Assessment: A Study of Perceived Need for Student Services by Distance Learners
Amy Raphael
2006
Corpus ID: 140774754
Education, in its traditional format, has rapidly changed as a result of technological advances. The present study examined what…
Expand
Highly Cited
1980
Highly Cited
1980
Female choice and polygyny in redwinged blackbirds
S. Lenington
Animal Behaviour
1980
Corpus ID: 53179591
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE