metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Make BRUTEFORCE_SPEED more dynamic
- Reverse Port Forwarding to get meterpreter through pivoting meterpreter sessions
- ARM targets
- Duplication in Exploit::Remote::Ftp and Rex::Proto::Ftp Libraries
- Consolidate ssh_login_pubkey and ssh_login modules
- redis_replication_cmd_exec: write to data/exploits/redis/module.c fails due insufficient permissions
- Incorrect call to get_notepad_pathname in modules/post/windows/manage/migrate.rb
- Using java/jsp_shell_reverse_tcp with exploit/multi/handler results in a Windows shell with the wrong "shell type"
- Automatic payload selection ignores that Meterpreter no longer supports Windows systems prior to XP SP2
- mfs > exploit(ms08_067_netapi) > pull-request ?
- Docs
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=
- Plugin::FuzzyUse#desc