metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Feature request: background CmdStager payload and don't block deletion
- Feature request: specify new session name as modules option
- Oracle 18c hash_dump, JTR format not supported
- Feature request: IgnoreComments advanced option for word list processing
- Session manipulation failed: Problem updating session: Couldn't find Mdm::Session
- Augment winrm_auth_methods module to decode and print NTLM info
- Review exploit/windows/winrm/winrm_script_exec
- Metasploit is not following the XDG directory standards
- wmap failed to add website.
- MSSQL login falls over when a server specified isn't an MSSQL server
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=