Skip to content
#

metasploitable2

Here are 8 public repositories matching this topic...

Cracked 6 out of 7 user password hashes from an intentionally vulnerable open-source Linux system (Metasploitable 2) using real-world password cracking techniques with tools like John the Ripper and Hashcat. This project was executed during my cybersecurity internship to simulate real-world password auditing on a compromised system.

  • Updated May 15, 2025

A comprehensive penetration testing report detailing 46 security vulnerabilities discovered during a full-scope assessment of a Metasploitable2 lab environment. Findings include Network Services, Web Applications, Privilege Escalation, and Enumeration vulnerabilities.

  • Updated Dec 22, 2025

Improve this page

Add a description, image, and links to the metasploitable2 topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the metasploitable2 topic, visit your repo's landing page and select "manage topics."

Learn more