Welcome
Project description
Welcome to the CMetasploit Module .
- CMetasploit contains Powerful Attacks for Performing Hacking for Legal Purposes .
## ( Tools For Ethical Hackers ) ##
Some Features of CMetasploit are :
>> Bruteforce Attacks >> WordList for Dictionary Attacks Generator >> Dictionary Attacks >> Servers Testers >> Ping Testers >> Connectivity Testers
How To Use CMetasploit :
pip install CMetasploit
Change Log
0.0.1 (03/03/2024)
First Release
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
CMetasploit-0.0.2.tar.gz
(4.4 kB
view details)
File details
Details for the file CMetasploit-0.0.2.tar.gz
.
File metadata
- Download URL: CMetasploit-0.0.2.tar.gz
- Upload date:
- Size: 4.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.11.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 52945ede9328fd118169d871ec4e88350b07b3ce4103d45dd2664cc9c5c44147 |
|
MD5 | b9dc82cb95ccdc85128e4d3d8d2d26de |
|
BLAKE2b-256 | 30f4df6eee85a107bd161855315d7716384da64b63049db37a927ad67fd9514a |