metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Change ManageEngine CVE-2022-47966 to be more stealthy
- Framework Native/Universal build for Apple Silicon (x86_64 & arm64)
- Improve NagiosXI authenticated exploit modules to increase resilience and for use with Autocheck disabled
- Add CVE-2021–21974 (ESXi unauth RCE)
- Lexmark 0day
- Add missing Notes for modules (Lint/ModuleEnforceNotes)
- Create a module out of tools/smb_file_server.rb
- Integrate Creds to Modules (autofill)
- Meterpreter Portforward Breaks When Route is Added
- sysinfo['Computer'] returns IP address not hostname on Linux sessions
- Docs
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=
- Plugin::FuzzyUse#desc