LEARN THE METASPLOIT FRAMEWORK INSIDE OUT NOTES

These are my open source notes in latex about basic metasploit. I am sharing with everyone so can read it, edit, upgrade them, use as an idea for your notes. If you have any advice just ping me. I am sure there is still a lot of to write about, so I ll let the community enrich it and make it better.

If someone is a bit expert: I would like to have more ideas about how to clean the system after the intrusion on both Windows 10 and Linux. If you have tricks, idea, know-how just hit me with a msg.