metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
44 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- windows/smb/ms17_010_psexec (EternalBlue) module fails on Vulnerable Windows XP embedded instance
- How to Fix metasploit Does Not Support cpp and dat extensions
- Update werkzeug rce module
- Add a python/exec payload to execute OS commands
- Allow settings the RPORT option for pipe_dcerpc_auditor
- Add bypass for GiveWP RCE (CVE-2024-8353)
- Unexpected PASSWORD_SPRAY and USER_AS_PASS Interaction
- Msfdb segmentation fault - msfdb run, reinit and init not working and runs into an error.
- NoMethodError in auxiliary/scanner/smb/smb_ms17_010
- Add support for RISC-V 32-bit / 64-bit Little Endian payloads
- Docs
- Plugin::FuzzyUse#desc
- Plugin::FuzzyUse#name
- Plugin::FuzzyUse#cleanup
- Plugin::FuzzyUse#initialize
- Plugin::FuzzyUse::ConsoleCommandDispatcher#cmd_fzuse
- Plugin::FuzzyUse::ConsoleCommandDispatcher#pipe_server
- Plugin::FuzzyUse::ConsoleCommandDispatcher#commands
- Plugin::FuzzyUse::ConsoleCommandDispatcher#name
- Plugin::FuzzyUse::ConsoleCommandDispatcher#initialize
- Msf::Payload::Adapter::Fetch::Server::HTTP#start_http_server