metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- SIP options module broken
- Potential new module? (Mojave security feature; origin spoofing)
- Umlauts in Windows username seem to foil "is_system" checks.
- smb_fingerprint_windows_os() returns wrong XP service pack
- Reconnected TCP sessions aren't marked as encrypted
- ms17_010_eternalblue fails against some DCs
- Feature request: PTY support in Mettle a la POSIX Meterpreter
- Exploits spawning telnetd don't stop the service on session close
- current_user_psexec fails to resolve hostnames
- Add Disable Event log like event::drop in mimikatz
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=