metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
43 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- GNU InetUtils Telnet Root Login Authentication Bypass (CVE-2026-24061)
- Add exploit module for SolarWinds Web Help Desk (CVE-2025-40536 + CVE-2025-40551)
- Msf::Post::File: format argument of stat command not behaving as expected
- post/windows/manage/rpcapd_start: run_rpcapd(cmdline) method does not run rpcapd with cmdline
- Pasting into msfconsole cmdline is slow
- CVE‑2025‑1094 (PostgreSQL libpq SQL injection → RCE)
- Add AD CS Web Enrollment Module
- Add support for deprecated module options
- Add GHSA and OSV reference type support
- Feature Request: Optional Lightweight TCP Redirector for Multi/Handler
- Docs
- Msf::Payload::Linux::Riscv32le::Prepends#appends_map
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv32le::Prepends#appends_order
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_order
- Msf::Payload::Linux::Riscv64le::Prepends#appends_map
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv64le::Prepends#appends_order
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_order
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_shared_headers
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_basic_auth_credentials