metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
42 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Selecting a /http/ module produces an error: The supplied module name is ambiguous: uninitialized constant HTTP.
- HTTP to LDAP Relay Module
- MCP Server, specs and documentation
- [WIP] Upgrade framework to rails 8.0
- RPC vulns and services reports resources and parents (service only)
- Block Api ROR13 IV randomization
- Improve vuln and vuln attempt tracking
- Notes returned as valid json instead of inspected string over RPC
- Rpc creds reports domain
- Add Langflow RCE module (CVE-2026-27966)
- Docs
- Msf::Payload::Windows::EncryptedReverseTcp#read_exe
- Msf::Payload::Windows::EncryptedReverseTcp#get_compiled_shellcode
- Msf::Payload::Windows::EncryptedReverseTcp#get_hash
- Msf::Payload::Windows::EncryptedReverseTcp#generate_c_src
- Msf::Payload::Windows::EncryptedReverseTcp#generate_stage
- Msf::Payload::Windows::EncryptedReverseTcp#include_send_uuid
- Msf::Payload::Windows::EncryptedReverseTcp#sends_hex_uuid?
- Msf::Payload::Windows::EncryptedReverseTcp#generate_stager
- Msf::Payload::Windows::EncryptedReverseTcp#initial_code
- Msf::Payload::Windows::EncryptedReverseTcp#generate