ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

4,187 results

Metasploit

15K subscribers

Declan Middleton
Why Metasploit is still relevant in 2025

Want to dive deep into cybersecurity and master the art of ethical hacking? Become a member today and unlock hacking tutorials ...

1:01
Why Metasploit is still relevant in 2025

1,878 views

10 months ago

K
Metasploitable3 - ProFTPD mod_copy exploit with Metasploit.

ProFTPD 'mod_copy' is a remote arbitrary file copy vulnerability. It is affected by a vulnerability in the mod_copy module which ...

2:44
Metasploitable3 - ProFTPD mod_copy exploit with Metasploit.

2,909 views

2 years ago

Declan Middleton
Metasploit framework commands that you probably didn’t know, for penetration testers.

Want to dive deep into cybersecurity and master the art of ethical hacking? Become a member today and unlock hacking tutorials ...

1:10
Metasploit framework commands that you probably didn’t know, for penetration testers.

1,492 views

10 months ago

TrendAI Zero Day Initiative
Demonstrating the vmware_host_open Metasploit Local Exploit Module

Demonstrating the vmware_host_open exploit Metasploit module first discussed during the DerbyCon 2017 presentation ...

1:24
Demonstrating the vmware_host_open Metasploit Local Exploit Module

2,343 views

8 years ago

dist67
CVE-2017-0199 & Metasploit - Analysis

https://videos.didierstevens.com/2017/04/22/cve-2017-0199-metasploit-analysis/

6:15
CVE-2017-0199 & Metasploit - Analysis

7,570 views

8 years ago

DEFCONConference
DEF CON 17 - Egypt - Automatic Browser Fingerprinting and Exploitation with Metasploit

Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit Egypt Core Developer, ...

44:49
DEF CON 17 - Egypt - Automatic Browser Fingerprinting and Exploitation with Metasploit

1,276 views

12 years ago

Declan Middleton
Introduction to Metasploit Framework (Metasploit Fundamentals ep1)

In this lesson, we're breaking down the fundamentals of the Metasploit Framework inside Kali Linux. Before we touch any ...

8:16
Introduction to Metasploit Framework (Metasploit Fundamentals ep1)

321 views

2 months ago

Declan Middleton
Port Scanning with Metasploit (Information Gathering and Scanning Ep. 7)

Welcome to Episode 7 of the Metasploit Fundamentals Course, an educational cybersecurity series designed to help you ...

13:57
Port Scanning with Metasploit (Information Gathering and Scanning Ep. 7)

114 views

2 months ago

K
Metasploitable3 - UnrealIRCD 3.2.8.1 Backdoor Command Execution with Metasploit.

This Metasploit module exploits a malicious backdoor that was added to the Unreal IRCD 3.2.8.1 download archive.

1:21
Metasploitable3 - UnrealIRCD 3.2.8.1 Backdoor Command Execution with Metasploit.

1,599 views

2 years ago

Declan Middleton
Metasploit For Beginners - How To Pwn A Website | Learn from a pro ethical hacker

Mini Penetration Testing course for Beginners https://whop.com/dex-security-academy-course/ https://dexsecurityacademy.com/ ...

20:29
Metasploit For Beginners - How To Pwn A Website | Learn from a pro ethical hacker

1,077 views

10 months ago

Declan Middleton
Understanding Metasploit Architecture (Metasploit Fundamentals ep3)

Welcome to Episode 3 of the Metasploit Fundamentals Course. Now that your lab environment is ready, it's time to understand ...

9:00
Understanding Metasploit Architecture (Metasploit Fundamentals ep3)

106 views

2 months ago

John Hammond
TryHackMe! EternalBlue/MS17-010 in Metasploit

If you would like to support me, please like, comment & subscribe, and check me out on Patreon: ...

28:15
TryHackMe! EternalBlue/MS17-010 in Metasploit

285,723 views

5 years ago

Declan Middleton
Export Results from Database in Metasploit (Information Gathering and Scanning Ep. 9)

Welcome to Episode 9 of the Metasploit Fundamentals Course, a structured learning series created to help students and ...

1:31
Export Results from Database in Metasploit (Information Gathering and Scanning Ep. 9)

61 views

2 months ago

axju
Hacking with Metasploit | 4 Simple Examples

Its time to play with Metasploit. I don't go into too much detail, I just try it out and present the results. The post: ...

17:39
Hacking with Metasploit | 4 Simple Examples

1,014 views

4 years ago

media.ccc.de
Hardsploit: A Metasploit-like tool for hardware hacking

It is clear that something is needed to help the security community to evaluate, audit and control the security level of hardware ...

59:23
Hardsploit: A Metasploit-like tool for hardware hacking

1,705 views

10 years ago

Metasploit
Metasploit Demo Meeting 2020-01-28

The Rapid7 Metasploit development team discusses (and demonstrates!) ongoing Metasploit work and features during their ...

15:54
Metasploit Demo Meeting 2020-01-28

1,147 views

6 years ago

Repacked Tools
Hacking Made Easy: Metasploit MCP Explained

My Metasploit MCP Server is a Model Context Protocol (MCP) server that bridges large language models (e.g., GPT-5; Ollama; ...

2:27
Hacking Made Easy: Metasploit MCP Explained

522 views

5 months ago

NetSecNow
How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole

http://www.PentesterUniversity.org In this Video we show you how to exploit machines with Metasploit, Armitage, and msfconsole.

1:14:08
How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole

661,991 views

12 years ago

K
Metasploitable3 - HTTP Parameter Key/Value SQL Injection (Drupageddon) with Metasploit.

This module exploits the Drupal HTTP Parameter Key/Value SQL Injection (aka Drupageddon) in order to achieve a remote shell ...

1:30
Metasploitable3 - HTTP Parameter Key/Value SQL Injection (Drupageddon) with Metasploit.

476 views

2 years ago