ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,718 results

Metasploit

15K subscribers

Declan Middleton
Why Metasploit is still relevant in 2025

Want to dive deep into cybersecurity and master the art of ethical hacking? Become a member today and unlock hacking tutorials ...

1:01
Why Metasploit is still relevant in 2025

1,878 views

10 months ago

Declan Middleton
Metasploit framework commands that you probably didn’t know, for penetration testers.

Want to dive deep into cybersecurity and master the art of ethical hacking? Become a member today and unlock hacking tutorials ...

1:10
Metasploit framework commands that you probably didn’t know, for penetration testers.

1,492 views

10 months ago

K
Metasploitable3 - ProFTPD mod_copy exploit with Metasploit.

ProFTPD 'mod_copy' is a remote arbitrary file copy vulnerability. It is affected by a vulnerability in the mod_copy module which ...

2:44
Metasploitable3 - ProFTPD mod_copy exploit with Metasploit.

2,909 views

2 years ago

TrendAI Zero Day Initiative
Demonstrating the vmware_host_open Metasploit Local Exploit Module

Demonstrating the vmware_host_open exploit Metasploit module first discussed during the DerbyCon 2017 presentation ...

1:24
Demonstrating the vmware_host_open Metasploit Local Exploit Module

2,343 views

8 years ago

K
Metasploitable3 - HTTP Parameter Key/Value SQL Injection (Drupageddon) with Metasploit.

This module exploits the Drupal HTTP Parameter Key/Value SQL Injection (aka Drupageddon) in order to achieve a remote shell ...

1:30
Metasploitable3 - HTTP Parameter Key/Value SQL Injection (Drupageddon) with Metasploit.

476 views

2 years ago

K
Metasploitable3 - UnrealIRCD 3.2.8.1 Backdoor Command Execution with Metasploit.

This Metasploit module exploits a malicious backdoor that was added to the Unreal IRCD 3.2.8.1 download archive.

1:21
Metasploitable3 - UnrealIRCD 3.2.8.1 Backdoor Command Execution with Metasploit.

1,599 views

2 years ago

TrendAI Zero Day Initiative
Demonstrating the vmware_copy_pirate Metasploit Post-Exploitation Module

Demonstrating the VMware Copy Pirate Metasploit post-exploitation module first discussed during the DerbyCon 2017 ...

1:45
Demonstrating the vmware_copy_pirate Metasploit Post-Exploitation Module

1,062 views

8 years ago

Daniel Farrell
Brute-force SSH with ssh_login using Metasploit via msfconsole against Metasploitable

NOTE: WATCH IN HD. I will use Metasploit on BackTrack5r2 to brute-force weak SSH credentials on a Metasploitable (Ubuntu ...

1:48
Brute-force SSH with ssh_login using Metasploit via msfconsole against Metasploitable

8,120 views

13 years ago

TrendAI Zero Day Initiative
Demonstrating an HPE IMC Metasploit Module

A demonstration of a Metasploit module getting a shell on a system via CVE-2017-8982 - a now-patched bug in HPE IMC that ...

0:53
Demonstrating an HPE IMC Metasploit Module

873 views

8 years ago

Declan Middleton
Export Results from Database in Metasploit (Information Gathering and Scanning Ep. 9)

Welcome to Episode 9 of the Metasploit Fundamentals Course, a structured learning series created to help students and ...

1:31
Export Results from Database in Metasploit (Information Gathering and Scanning Ep. 9)

61 views

2 months ago

aafortinet
Metasploit session connected to a remote Android meterpreter

This video shows what happens on the attacker's server when a malware infected with a Java-based meterpreter connects back to ...

0:49
Metasploit session connected to a remote Android meterpreter

747 views

5 years ago

Repacked Tools
Hacking Made Easy: Metasploit MCP Explained

My Metasploit MCP Server is a Model Context Protocol (MCP) server that bridges large language models (e.g., GPT-5; Ollama; ...

2:27
Hacking Made Easy: Metasploit MCP Explained

522 views

5 months ago

Boni Yeamin
port scanning nmap using metasploit  #cybersecuritytraining #kalilinux  #nmap  #cybersecurity

Learn how to perform a port scan using Nmap in Metasploit on Kali Linux in this quick and easy tutorial. Enhance your ...

0:23
port scanning nmap using metasploit #cybersecuritytraining #kalilinux #nmap #cybersecurity

6,381 views

1 year ago

Daniel Farrell
Exploit Samba on Metasploitable from BackTrack5r2 using Metasploit via msfconsole

NOTE: WATCH IN HD. I will use CVE-2007-2447, a remote command injection vulnerability, in Samba version 3.0.20-Debian ...

1:41
Exploit Samba on Metasploitable from BackTrack5r2 using Metasploit via msfconsole

2,223 views

13 years ago

Declan Middleton
Unlocking Pen Testing  Secrets Beyond Metasploit  #cybersecurity

Want to dive deep into cybersecurity and master the art of ethical hacking? Become a member today and unlock hacking tutorials ...

0:24
Unlocking Pen Testing Secrets Beyond Metasploit #cybersecurity

10 views

1 year ago

Declan Middleton
Explaining what Metasploit is to my Parents

Social instagram.com/declan.middleton tiktok.com/@declanmiddles linkedin.com/in/declanmiddleton ...

0:10
Explaining what Metasploit is to my Parents

2,380 views

9 months ago

SecurityHackingVideo
iExploitTube  Episode 59 SMB Version Scanning with Metasploit

Check out the following: http://solidshellsecurity.com/ (quality dedicated/vps servers and IT services) ...

3:43
iExploitTube Episode 59 SMB Version Scanning with Metasploit

7 views

12 years ago

Declan Middleton
Setting Up Your Lab Environment (Metasploit Fundamentals ep2)

Welcome to Episode 2 of the Metasploit Fundamentals Course. Before you can start exploiting vulnerabilities or diving into ...

2:24
Setting Up Your Lab Environment (Metasploit Fundamentals ep2)

122 views

2 months ago

Daniel Farrell
Exploit distcc on Metasploitable from BackTrack5r2 using Metasploit via msfconsole

NOTE: WATCH IN HD. Following a Samba exploit (http://bit.ly/K5QnV1), I will now demo exploiting distcc, a distributed C compiler, ...

1:43
Exploit distcc on Metasploitable from BackTrack5r2 using Metasploit via msfconsole

558 views

13 years ago