metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- MacOS installation and quick start needs clarity
- Update openvas-omp gem
- Payload names inconsistency
- vmauthd_version & vmauthd_login does not seem to work
- session.shell_upgrade should return upgraded session ID as well along with the success status
- Add VLC H26X packetizer exploit (CVE-2020-13428)
- windows post exploitation to disable windows defender with exclusion path option
- grafana_auth_bypass - No Vhost Option
- multi/meterpreter/reverse_https fails when using x64 payloads stagers with EnableStageEncoding = True
- Is it still necessary to cleanup session info by removing non-ASCII characters? (minor issue)
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=