metasploit-framework

https://github.com/rapid7/metasploit-framework

Ruby

Metasploit Framework

Msf::Exploit::Remote::HttpClient#setup

For HTTP Client exploits, we often want to verify that the server info matches some regex before
firing a giant binary exploit blob at it. We override setup() here to accomplish that.

Source | Google | Stack overflow

Edit

git clone [email protected]:rapid7/metasploit-framework.git

cd metasploit-framework

open lib/msf/core/exploit/http/client.rb

Contribute

# Make a new branch

git checkout -b -your-name--update-docs-Msf--Exploit--Remote--HttpClient-setup-for-pr


# Commit to git

git add lib/msf/core/exploit/http/client.rbgit commit -m "better docs for Msf::Exploit::Remote::HttpClient#setup"


# Open pull request

gem install hub # on a mac you can `brew install hub`

hub fork

git push <your name> -your-name--update-docs-Msf--Exploit--Remote--HttpClient-setup-for-pr

hub pull-request


# Celebrate!