metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Support checks in relay modules
- Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)
- SOCKS Proxy is not used for rhost's set to hostnames
- Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
- Exploit module for IPP attributes remote code execution - OpenPrinting CUPS
- Chamilo v1.11.24 Unrestricted File Upload PHP Webshell
- Pyload RCE with js2py sandbox escape [CVE-2024-39205, CVE-2024-28397]
- Exploit failed [unreachable]: Rex::HostUnreachable
- MS-9682 Upgrade to Ruby on Rails 7.1
- Fix a crash with the `admin/dcerpc/icpr_cert` module and OpenSSL 3.4.0
- Docs
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=
- Plugin::FuzzyUse#desc
- Plugin::FuzzyUse#name
- Plugin::FuzzyUse#cleanup
- Plugin::FuzzyUse#initialize
- Plugin::FuzzyUse::ConsoleCommandDispatcher#cmd_fzuse
- Plugin::FuzzyUse::ConsoleCommandDispatcher#pipe_server