metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Bleeding Tooth: Linux Bluetooth Zero Click RCE Exploit
- gather/ldap_esc_vulnerable_cert_finder - Disclose when templates are configured to pend requests.
- Weekly Updater Action
- Linqpad deserialization
- Update Sharphound
- WIP CraftCMS FTP Template exploit
- CVE-2024-30085: Windows Elevation of Privilege
- No user-agent embedded in the shellcode via msfvenom with payload 'windows/x64/meterpreter/reverse_https'
- My tcp doesnt work
- Request for CVE-2024-56145: Craft CMS RCE
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=