metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Update LDAP-related module documentation to use DOMAIN/USERNAME/PASSWORD instead of BIND_DN/BIND_PW options
- msf6 auxiliary(gather/cloud_lookup) > run [*] Passive gathering information... [*] * ViewDNS.info: 97 IP address(es) found. [*] Querying DNS MX records for vulnhub.com [+] vulnhub.com MX: alt1.aspmx.l.google.com [+] vulnhub.com MX: aspmx.l.google.com [+] vulnhub.com MX: aspmx3.googlemail.com [+] vulnhub.com MX: alt2.aspmx.l.google.com [+] vulnhub.com MX: aspmx2.googlemail.com [*] * Received MX records: 5 IP address(es) found. [+] download.vulnhub.com A: 188.114.96.3 [+] download.vulnhub.com A: 188.114.97.3 [+] staging.vulnhub.com A: 188.114.96.3 [+] staging.vulnhub.com A: 188.114.97.3 [+] www.vulnhub.com A: 188.114.97.3 [+] www.vulnhub.com A: 188.114.96.3 [*] * DNS Enumeration: 2 IP address(es) found. [*] [*] Clean CloudFlare server(s)... [*] * Total: 10 IP address(es) found after cleaning. [*] [*] Bypass CloudFlare is in progress... [-] No direct-connect IP address found :-( [*] Auxiliary module execution completed msf6 auxiliary(gather/cloud_lookup) >
- Improve flimsy architecture detection
- Acronis Cyber Infrastructure Default Password RCE [CVE-2023-45249]
- DNS Resolver crash when starting Metasploit console
- Add an `Auto` option to live_compile
- CVE-2023-2640, CVE-2023-32629 Game Overlay Ubuntu Privillege Escalation
- Write module for WP Plugin LiteSpeed Cache Account Take Over (CVE-2024-44000)
- Add VICIdial Authenticated RCE module (CVE-2024-8504)
- Improve modules/nops/php/generic.rb
- Docs
- Msf::Payload::Adapter::Fetch::Server::HTTP#start_http_server
- Msf::Payload::Adapter::Fetch::Server::HTTP#payload_response
- Msf::Payload::Adapter::Fetch::Server::HTTP#on_request_uri
- Msf::Payload::Adapter::Fetch::Server::HTTP#start_http_fetch_handler
- Msf::Payload::Adapter::Fetch::Server::HTTP#cleanup_http_fetch_service
- Msf::Payload::Adapter::Fetch::Server::HTTP#add_resource
- Msf::Payload::Adapter::Fetch::Server::HTTP#srvname
- Msf::Payload::Adapter::Fetch::Server::SMB#on_client_connect
- Msf::Payload::Adapter::Fetch::Server::SMB#start_smb_fetch_handler
- Msf::Payload::Adapter::Fetch::Server::SMB#fetch_protocol