Search Results for "metasploitable2-linux.ova"

Showing 4 open source projects for "metasploitable2-linux.ova"

View related business solutions
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1
    Downloads: 870 This Week
    Last Update:
    See Project
  • 2
    Metasploitable2-gohack

    Metasploitable2-gohack

    Customized Metasploitable2 VM for Beginners

    ...Like the original Metasploitable2 virtual server, this VM is designed to be vulnerable for ethical hacking practice and should be used only on a closed network. Never make a Metasploitable2 VM publicly accessible over the internet - use inside a safe, virtual network on a host with an active firewall, antivirus/anti-malware, and other standard security software/hardware protection.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 3

    Metasploitable

    Metasploitable is an intentionally vulnerable Linux virtual machine

    This is Metasploitable2 (Linux) Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. The default login and password is msfadmin:msfadmin. Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means).
    Leader badge
    Downloads: 15,114 This Week
    Last Update:
    See Project
  • 4
    nfslap

    nfslap

    Automated NFS misconfiguration root obtainer

    This is a quick script I wrote to automate a rather inconveniently long sequence of terminal commands to compromise a misconfigured nfs server, and obtain root. In other words i'm lazy, so I wrote a bash script. Password is: FELIX Programmed on kali linux, to use on metasploitable2.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB