About 25,700 results
Open links in new tab
  1. Metasploitable 2 | Metasploit Documentation - Rapid7

    For your test environment, you need a Metasploit instance that can access a vulnerable target. The following sections describe the requirements and instructions for setting up a vulnerable …

  2. Download Metasploit: World's Most Used Penetration Testing …

    Metasploitable is essentially a penetration testing lab in a box created by the Rapid7 Metasploit team. These are Metasploit's payload repositories, where the well-known Meterpreter payload …

  3. Metasploitable download | SourceForge.net

    Aug 19, 2019 · Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing …

  4. GitHub - rapid7/metasploitable3: Metasploitable3 is a VM that is …

    Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with metasploit. …

  5. Install Metasploitable 2 - GeeksforGeeks

    Sep 2, 2025 · Visit Rapid7’s official repository or SourceForge to download the Metasploitable 2 image. The file is typically around 800 MB in a compressed format (e.g. .zip).

  6. Download Metasploitable - Intentionally Vulnerable Machine

    Metasploitable is virtual machine based on Linux that contains several intentional vulnerabilities for you to exploit. Metasploitable is essentially a penetration testing lab in a box, available as a …

  7. Ethical Hacking 101 – How to Set Up Metasploitable on Your …

    Mar 12, 2024 · Metasploitable is an ‘intentionally vulnerable virtual machine’ by Rapid7, owners of the popular security project, Metasploit. Note that Metasploitable and Metasploit are two …

  8. What Is Metasploitable: Hacker’s Playground Based On Ubuntu …

    Jun 14, 2025 · In simple terms, Metasploitable is a Linux-based operating system designed specifically for practicing penetration testing, network security, and Metasploit-Framework …

  9. Metasploitable Challenges - PenTesting.Org

    Feb 5, 2025 · Metasploitable is an intentionally vulnerable Linux virtual machine designed for security testing and assessment. It’s specifically created to help security professionals practice …

  10. Metasploitable: 2 - VulnHub

    Some folks may already be aware of Metasploitable, an intentionally vulnerable virtual machine designed for training, exploit testing, and general target practice.