metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
42 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- New Persistence Technique: Windows Time Provider
- New Persistence Technique: Windows Port Monitor
- New Persistence Technique: Windows PrintProcessor
- Some payloads generated with AppendExit may use `exit` syscall twice
- Prepends mixin is used inconsistently
- Application vs. Transport Protocol naming scheme in Metasploit
- Burn Payload Cache Size Specs
- GestioIP 3.5.7 Remote Command Execution (CVE 2024-48760)
- Metasploit Kerberoast Module - Database Error on String Size
- Please simplify msfvenom internal workflow, current implementation just trick bad hackers into thinking they're good sorry
- Docs
- Msf::Payload::Linux::Riscv32le::Prepends#appends_map
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv32le::Prepends#appends_order
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_order
- Msf::Payload::Linux::Riscv64le::Prepends#appends_map
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv64le::Prepends#appends_order
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_order
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_shared_headers
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_basic_auth_credentials