Skip to main content

Welcome

Project description

Welcome to the CMetasploit Module .

CMetasploit contains Powerful Attacks for Performing Hacking for Legal Purposes .

## ( Tools For Ethical Hackers ) ##

Some Features of CMetasploit are :

>> Bruteforce Attacks >> WordList for Dictionary Attacks Generator >> Dictionary Attacks >> Servers Testers >> Ping Testers >> Connectivity Testers

How To Use CMetasploit :

pip install CMetasploit

Change Log

0.0.1 (03/03/2024)

  • First Release

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

CMetasploit-0.0.2.tar.gz (4.4 kB view details)

Uploaded Source

File details

Details for the file CMetasploit-0.0.2.tar.gz.

File metadata

  • Download URL: CMetasploit-0.0.2.tar.gz
  • Upload date:
  • Size: 4.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.11.4

File hashes

Hashes for CMetasploit-0.0.2.tar.gz
Algorithm Hash digest
SHA256 52945ede9328fd118169d871ec4e88350b07b3ce4103d45dd2664cc9c5c44147
MD5 b9dc82cb95ccdc85128e4d3d8d2d26de
BLAKE2b-256 30f4df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page