metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- CVE-2024-6387 - Signal handler race condition in OpenSSH on glibc-based Linux systems.
- Add aarch64 windows exec payload
- CVE-2024-30078: Windows WiFi Driver RCE
- Integrate ChromeKatz as Post Module or Meterp Extension
- CVE-2023-21554 Microsoft Message Queuing RCE Exploit Module
- Post/aux modules for Recall collection
- Fortinet FortiSIEM Unauthenticated Command Injection [CVE-2023-34992]
- NoMethodError undefined method `unescape' for URI:Module
- Infinite loop when waiting on a socket with no remote part
- Linux LPE (CVE-2024-1086)
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=