Running Metasploit with Docker and Kubernetes This article is intended to make it easy to build a penetration test environment without complicated settings if Docker and Kubernetes are introduced.
[If you implement the contents of this article to a server or network that you do not manage yourself, please be aware that it may violate the unauthorized access prohibition law]Environment used in this article[Read more…] about Metasploit with Docker and Kubernetes