metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Ubuntu needrestart LPE (CVE-2024-48990)
- Ubuntu needrestart LPE (CVE-2024-48990)
- Linux stageless Metereter is not shellcode
- Inconsistencies among mettle arches/stage values and prepend/output types.
- ARM32 LE Shared Object template alignment issue
- Exploit module for PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474)
- system make ' failed Metasploit & Oracle (ruby-oci8)
- Various bugs when using the PASSWORD_SPRAY option
- Fixing multiple bugs in credential generation + refactoring
- ProFTPD Backdoor Unauthorised Access Vulnerability Help
- Docs
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=
- Plugin::FuzzyUse#desc