metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Modules should not use Net::HTTP or Rex::Proto::Http::Client.new
- add option for CMD & ARCH_CMD to CmdStager exploits by default
- add option to use all available cmdstagers one after another
- PHP download_exec payload depend on allow_url_fopen (offer curl/sockets fallbacks)
- Meterpreter continuity
- Feature Request - Screenshot based workspace
- Add module that abuses R via SQL server
- Add "label" support to sessions
- Non-ASCII characters in auxiliary/scanner/smb/smb_login
- use minimal permission in buffer allocations in stager shellcode
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=