metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
43 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework![CodeTriage badge for rapid7/metasploit-framework](/rapid7/metasploit-framework/badges/users.svg?count=43)
Help out
- Issues
- Exploiting Empire C2 Framework
- New module to replicate xspy tool (and x11 library)
- Wordpress Plugin Bricks unauth RCE (CVE-2024-25600)
- Several issue with Java command shell payloads (and a proposed fix)
- Gitlab login scanner ignoring user and pass files.
- Add module for CVE-2024-21762 FortiOS out-of-bounds write to RCE
- Update `admin/mssql/mssql_sql` to handle required password changes when attempting login
- Android exploit
- generate_true/generate_false for the sqli mixin
- Container Rooting + Escape (GameOver(lay)) (CVE-2023-2640, CVE-2023-32629)
- Docs
- Msf::Payload::Adapter::Fetch::Server::TFTP#cleanup_tftp_fetch_service
- Msf::Payload::Adapter::Fetch::Server::TFTP#initialize
- Msf::Payload::Adapter::Fetch::Server::TFTP#start_tftp_server
- Msf::Payload::Adapter::Fetch::Server::Https#start_https_server
- Msf::Payload::Adapter::Fetch::Server::Https#start_https_fetch_handler
- Msf::Payload::Adapter::Fetch::Server::Https#start_http_fetch_handler
- Msf::Payload::Adapter::Fetch::Server::Https#ssl_version
- Msf::Payload::Adapter::Fetch::Server::Https#ssl_cipher
- Msf::Payload::Adapter::Fetch::Server::Https#ssl_compression
- Msf::Payload::Adapter::Fetch::Server::Https#ssl_cert