Download mirrors for metasploit-latest-windows-installer.exe

Metasploit 4.1.4 Download Mirrors

Setup file metasploit-latest-windows-installer.exe - 145.94 MB - WinXP,WinVista,WinVista x64,Win7 x32,Win7 x64,WinServer - Support
All files are original. Download3K does not repack or modify downloads in any way. Check SHA1 and MD5 for confirmation.
Select a download mirror:

File information

  • Filename: metasploit-latest-windows-installer.exe
  • Size: 145.94 MB
  • License: Freeware
  • Date updated: 2/18/2016
  • Total Downloads: 12135
  • Last week: 19

  • Short file info:
    PE32 executable for MS Windows (GUI) Intel 80386 32-bit

  • MD5 checksum:
    ba68216f3a92045c5d95025392db61fc

  • SHA1 checksum:
    3114f5ccdd03e58252209863b882cbfb0dd21156

  • Download time
  • Dialup 356 m (56k)
  • ISDN 156 m (128k)
  • DSL 39 m (512k)
  • Cable 20 m (1024k)
  • T1 14 m (1484k)

  • File section
    File Type: Win32 EXE
    MIME Type: application/octet-stream
    EXE section
    Machine Type: Intel 386 or later, and compatibles
    Time Stamp: 2014:05:14 16:03:19-06:00
    PE Type: PE32
    Linker Version: 2.22
    Code Size: 905216
    Initialized Data Size: 77824
    Uninitialized Data Size: 1986560
    Entry Point: 0x2c13e0
    OS Version: 4.0
    Image Version: 1.0
    Subsystem Version: 4.0
    Subsystem: Windows GUI
    File Version Number: 4.11.6.0
    Product Version Number: 1.0.0.0
    File Flags Mask: 0x003f
    File Flags: (none)
    File OS: Win32
    Object File Type: Dynamic link library
    File Subtype: 0
    Language Code: English (U.S.)
    Character Set: Unicode
    Product Name: Metasploit
    Legal Trademarks:
    File Description:
    Internal Name:
    Company Name: Rapid7
    File Version: 1.0.0.0
    Legal Copyright: Copyright Rapid7
    Original Filename: setup.exe
    Comments:
    Product Version: 4.11.6

Short description

A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments.... more
User rating
3.5/5 (15 votes)
Good
Your rating
Your review