metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Powershell sessions become unresponsive after starting cmd.exe
- [Draft] Scanner module check method implementation is wrong
- Oracle Opera Preauth RCE CVE-2023-21932.
- Add in Exploit for CVE-2023-1671 - Pre-Auth RCE in Sophos Web Appliance < 4.3.10.4
- Add in Exploit for CVE-2021-36955 - Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability Exploit
- Msf::DBManager::Import::Acunetix: Vulnerabilities are not imported
- shell_to_meterpreter: PAYLOAD_OVERRIDE does not override payload configuration on Windows
- Exploit modules which start a handler automatically do not support bind payloads
- Exploit failed: SyntaxError (eval):2: syntax error, unexpected constant, expecting local variable or method
- backup_file.rb adds dictionary
- Docs
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=
- Plugin::FuzzyUse#desc