metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Meterpreters Should No Longer Return TLV_TYPE_ADDR_TYPE When Resolving Hostnames
- Native WMI Exec
- How to solve the problem that too many Meterpreter Sessions will cause MSF RPC API calls to get stuck
- Remote Code Execution in JXPath Library (CVE-2022-41852)
- Microsoft Teams Authenticated Cookie post module
- Consistency in Post modules and Post module libraries
- [Idea / Suggestion] "Hardening" done via metasploit on different computers / operating systems
- Snap package of Metasploit is now available
- Windows Seagate Media Sync privesc (CVE-2022-40286)
- Add pagination to JSON RPC APIs
- Docs
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=
- Plugin::FuzzyUse#desc