The metasploit
0. Metasploit - Home
1. Metasploit - Introduction
2. Metasploit - Environment Setup
3. Metasploit - Basic Commands
4. Metasploit - Armitage GUI
5. Metasploit - Pro Console
6. Metasploit - Vulnerable Target
7. Metasploit - Discovery Scans
8. Metasploit - Task Chains
9. Metasploit - Import Data
10. Metasploit - Vulnerability Scan
11. Metasploit - Vulnerability Validation
12. Metasploit - Exploit
13. Metasploit - Payload
14. Metasploit - Credential
15. Metasploit - Brute-Force Attacks
16. Metasploit - Pivoting
17. Metasploit - Maintaining Access
18. Metasploit - MetaModules
19. Metasploit - Social Engineering
20. Metasploit - Export Data
21. Metasploit - Reports
22. Metasploit - Quick Guide
23. Metasploit - Useful Resources
24. Metasploit - Discussion
Thanks for reading the tutorial.