metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- web_delivery module serves payload over LHOST, not SRVHOST
- NamedPipe connections failure in lateral movement
- Exiting the final session crashes intermediate session in named_pipe pivoted sessions
- exploit/solaris/ssh/pam_username_bof doesn't work in Metasploit recent versions
- `windows/*/reverse_ord_tcp` does not appear to work?
- Native Windows Credential Extraction
- Improve stagers to consistently prepend payload size
- Reverse HTTP stagers do not handle ReverseHTTPProxyType SOCKS correctly
- Create rubocop rule for preferring File.binread over IO.read
- android/local/su_exec: Does not work with su on modern Android
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=