Show thread history
npub1tcekj
Dec 15, 2024
I am fully aware of that, and most definitively not a novice.
But the last time I dealt with this in a proper, non-theoretical way, was when Metasploit Framework was "the thing to use" - which it really isn't anymore, as far as I can tell.
So, I want to seek the proper alternatives. I have untill thursday to learn them, which is enough time to cover the basics, and probably more than enough for what I need.
This class assignment is rather basic, but I do want to deliver something - so, this is a great opportunity to learn those tools! ^^
But the last time I dealt with this in a proper, non-theoretical way, was when Metasploit Framework was "the thing to use" - which it really isn't anymore, as far as I can tell.
So, I want to seek the proper alternatives. I have untill thursday to learn them, which is enough time to cover the basics, and probably more than enough for what I need.
This class assignment is rather basic, but I do want to deliver something - so, this is a great opportunity to learn those tools! ^^
See translation
0
0
0
0
0