From 5e39417a64a17873f927ffa9d6ee5e9d612e3be7 Mon Sep 17 00:00:00 2001 From: roadmap bot <135830415+roadmap-bot@users.noreply.github.com> Date: Tue, 20 Jun 2023 15:15:57 +0100 Subject: [PATCH] chore: add resource under cyber-security:security-skills-and-knowledge:common-exploit-frameworks --- .../127-common-exploit-frameworks.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/127-common-exploit-frameworks.md b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/127-common-exploit-frameworks.md index 76d134d58..d49bbdfe5 100644 --- a/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/127-common-exploit-frameworks.md +++ b/src/data/roadmaps/cyber-security/content/103-security-skills-and-knowledge/127-common-exploit-frameworks.md @@ -43,3 +43,5 @@ Exploit frameworks are essential tools in the cybersecurity landscape, as they p - Offers USB-based exploitation for human-interface devices When using these exploit frameworks, it is important to remember that they are powerful tools that can cause significant damage if misused. Always ensure that you have explicit permission from the target organization before conducting any penetration testing activities. + +- [Metasploit Primer (TryHackMe)](https://tryhackme.com/room/rpmetasploit) \ No newline at end of file