metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Msfvenom add win32 shellcode doesn't work for Jar file
- vncinject does not work with reverse_*http*
- windows/smb/psexec fails when setting LPORT for a bind payload that does not use ports
- python payload seems not compatible with msf modules
- web_delivery + PSH should support full stageless payloads without command line limits
- Converted Python meterpreter to .exe with pyinstaller throws errors
- Solaris x86 shell payloads segfault on Solaris 11
- Netsparker import doesn't appear in `vulns` command, only `wmap_vulns -l`
- HTTP/2 prospect
- Command history not storing all characters
- Docs
- Msf::Sessions::SMB#verify_connectivity
- Net::SSH::CommandStream#handle_error
- Net::SSH::CommandStream#logger=
- Net::SSH::CommandStream#logger
- Net::SSH::CommandStream#session=
- Net::SSH::CommandStream#session
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#nt_status=
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message
- Msf::Exploit::Remote::SMB::Relay::NTLM::Target::RelayResult#message=