metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- WIP CraftCMS FTP Template exploit
- Netis Router Exploit Chain Reactor [CVE-2024-48455, CVE-2024-48456 and CVE-2024-48457]
- Add Selenium Firefox RCE module (CVE-2022-28108)
- Add Selenium Chrome RCE module (CVE-2022-28108)
- Support Ruby 3.4
- CVE-2024-30085: Windows Elevation of Privilege
- No user-agent embedded in the shellcode via msfvenom with payload 'windows/x64/meterpreter/reverse_https'
- My tcp doesnt work
- Update docs dependency rexml
- Request for CVE-2024-56145: Craft CMS RCE
- Docs
- Plugin::Capture::ConsoleCommandDispatcher#poison_included
- Plugin::Capture::ConsoleCommandDispatcher#parse_start_args
- Msf::Exploit::Remote::SMB::Relay::NTLM::Server#close
- Msf::Exploit::Remote::SMB::Relay::NTLM::Server#closed?
- Msf::Exploit::Remote::SMB::Relay::NTLM::Server#run
- Msf::Exploit::Remote::SMB::Relay::NTLM::Server#initialize
- Net::LDAP::Connection#initialize
- Msf::Exploit::Remote::HTTP::JWT.decode
- Msf::Exploit::Remote::HTTP::JWT.encode
- Msf::Exploit::Remote::HTTP::JWT#initialize