metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Kibana Authenticated RCE in Machine Learning (CVE-2024-37287)
- How to integrate or deploy the browser exploit server
- [shellcode, stager] ARM stager restore r0 in loop
- Add CVE-2024-21338 post module: Windows Applocker Diver LPE
- Linux persistence techniques
- Can't uninstall old version of metasploit after deleting `metasploitframework-latest.msi`
- Add support for Windows 10 Enterprise LTSB 14393 x64 in 'windows/smb/ms17_010_eternalblue' and for x86 based processors
- Guide on enumeration of homelab kubernetes
- CVE-2024-29510 – Exploiting Ghostscript using format strings
- CVE-2024-6387 - Signal handler race condition in OpenSSH on glibc-based Linux systems.
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=