First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target.
This module will check a file for malware on VirusTotal based on the checksum. Exploit Targets Windows 7 Windows XP Requirement Attacker: Kali Linux Victim
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while
This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton
This module will broadcast a Youtube video on all compromised systems. It will play the video in the target machine’s native browser in full screen
This module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file
This module exploits vulnerability in OpenOffice 2.3.1 and 2.3.0 on Microsoft Windows XP SP3. By supplying an OLE file with a malformed Document Summary Information
This module exploits a buffer overflow in Digital Music Pad Version 8.2.3.3.4 when opening a malicious pls file with the Digital Music Pad, a remote