metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
43 Subscribers
View all SubscribersAdd a CodeTriage badge to metasploit-framework
Help out
- Issues
- FUXA SCADA/HMI Referer Authentication Bypass to RCE (CVE-2025-69985)
- Open WebUI Tools API exec() Code Injection RCE (CVE-2026-0766)
- GNU inetutils telnetd CREDENTIALS_DIRECTORY privilege escalation (CVE-2026-28372)
- Add Apache Zeppelin environment variable injection RCE module (CVE-2024-31866)
- Add Grafana Image Renderer arbitrary file write RCE module (CVE-2025-11539)
- Updates description for BeyondTrust command injection
- Update the SOCKS proxy to use the new RelayManager
- better wriable_dir for windows persistence
- Extend automatic encoder selection to payloads module
- mettle macos-15-intel Builds are failing
- Docs
- Msf::Payload::Linux::Riscv32le::Prepends#appends_map
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv32le::Prepends#appends_order
- Msf::Payload::Linux::Riscv32le::Prepends#prepends_order
- Msf::Payload::Linux::Riscv64le::Prepends#appends_map
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_map
- Msf::Payload::Linux::Riscv64le::Prepends#appends_order
- Msf::Payload::Linux::Riscv64le::Prepends#prepends_order
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_shared_headers
- Plugin::Nexpose::NexposeCommandDispatcher#nexpose_basic_auth_credentials