![purebasic window api fullscreen purebasic window api fullscreen](https://res.cloudinary.com/practicaldev/image/fetch/s--F3g9Ckfq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/2688/1*kz_rPGw_eKfIDcAxKA3b9g.png)
exploit -j Run the exploit under the context of the job.
![purebasic window api fullscreen purebasic window api fullscreen](https://i0.wp.com/filecr.com/wp-content/uploads/2019/06/scr2-Purebasic-free-download.jpg)
exploit Execute the module or exploit and attack the target.
![purebasic window api fullscreen purebasic window api fullscreen](https://forums.libretro.com/uploads/default/optimized/2X/c/c6b808b33b172ab751b80bef1410dd6cb2b7e44d_2_999x750.jpg)
check Determine whether a target is vulnerable to an attack. set autorunscript migrate -f Automatically migrate to a separate process upon exploit completion. set payload payload Specify the payload to use. set target num Specify a specific target index if you know the OS and service pack. show targets Show the platforms supported by the exploit. show options Show the options available for a module or exploit. setg function Set a specific value globally (for example, LHOST or RHOST). set function Set a specific value (for example, LHOST or RHOST). LHOST Your local host’s IP address reachable by the target, often the public IP address when not on a local network. use name Load an exploit or module (example: use windows/smb/psexec). Info Load information about a specific exploit or module. search name Search for exploits or modules within the Framework. show auxiliary Show all auxiliary modules within the Framework. show payloads Show all payloads within the Framework. See “Meterpreter Post Exploitation Com- mands” on page 282 for some all-in-one commands that will make your life easier.MSFconsole Commands show exploits Show all exploits within the Framework. CHEAT SHEET Here is a reference for the most frequently used com- mands and syntax within Metasploit’s various interfaces and utilities.