metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
42 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- add compat check to msftidy
- Add OptArray datastore option type
- Unauthenticated remote code execution in CentOS Web Panel - CVE-2025-48703
- Add auxiliary module for Pterodactyl Panel CVE-2025-49132
- Objective See KIller: OSX Antivirus Enumeration & Detection.
- Add Apport Symlink Hijacking: CVE-2020-8831
- docs/metasploit-framework.wiki/Metasploit-Guide-MySQL.md
- Add dedicated java meterpreter payload to pentest Forge (minecraft server launcher)
- CVE-2024-9053 vLLM allows Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC server entrypoints
- CVE-2025-0927
- Docs
- Msf::Payload::Linux::Riscv32le::Prepends#appends_map
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv32le::Prepends#appends_order
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_order
- Msf::Payload::Linux::Riscv64le::Prepends#appends_map
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv64le::Prepends#appends_order
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_order
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_shared_headers
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_basic_auth_credentials