metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Mechanism to disable iteration of all IP's reported for the FQDN in Scanner modules
- ProxyShell module uploads a webshell that doesn't seem to work as expected
- process migration (Linux)
- Directly support extend user details in the Meterpreter API
- Update the Block API to use the Length Field
- Metasploit v6.0.52-dev SMB connections fail against Samba 4.2.3 where it previously worked with v4.16.48-dev
- Enumerate Meterpreter Channels
- CmdStager doesn't support python payloads
- exploit/windows/smb/psexec does not work while impacket-psexec does
- sessions -C execute fails with a nil:NilClass
- Docs
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=
- Plugin::FuzzyUse#desc