Information Security Projects
The Metasploit Unleashed free online training course was created to fill a gap in quality documentation on the practical usage of the popular and versatile Metasploit Framework. In keeping with the open-source nature of Metasploit, this resource is provided at no charge.
The Exploit Database
The Exploit Database is the ultimate archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most comprehensive collection of exploits gathered from various sources.
Google Hacking Database
The Google Hacking Database (GHDB) is the authoritative source for querying the ever-widening reach of the Google search engine. In the GHDB, you will find search terms for files containing usernames, vulnerable servers, and even files containing passwords.
BackTrack Linux is the highest-rated and most popular Linux security distribution available. Kali Linux is a robust, enterprise ready penetration testing Linux distribution and is the successor of the popular and highly-rated BackTrack Linux. Kali Linux is used by penetration testers and IT professionals around the world to test the security of their networks.
BackTrack Linux is the highest-rated and most popular Linux security distribution available. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in their ability to perform assessments in a purely native dedicated environment.