metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
42 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- Add Windmill path traversal RCE, SQLi RCE, and auxiliary modules (CVE-2026-29059, CVE-2026-23696)
- Add Nextcloud AppApi interactive shell module
- Add `comments` field top the `db.hosts` RPC endpoint
- Add a `notes` field to the `module.info` RPC endoint
- Update the `db.notes` RPC endpoint to return the note's data as a JSON
- Add staged RISC-V (riscv64le/riscv32le) Linux payloads
- Add Linux LoongArch64 chmod payload
- Add Linux LoongArch64 execute command payload
- Add RISC-V fileless fetch payload support
- Add Ghost CMS RCE Exploit (CVE-2026-29053)
- Docs
- Msf::Payload::Linux::Riscv32le::Prepends#appends_map
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv32le::Prepends#appends_order
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_order
- Msf::Payload::Linux::Riscv64le::Prepends#appends_map
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv64le::Prepends#appends_order
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_order
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_shared_headers
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_basic_auth_credentials