1
0
Fork 0
mirror of https://github.com/rapid7/metasploit-framework.git synced 2024-07-17 20:57:14 +02:00
Metasploit Framework
Go to file
2024-07-16 08:28:57 -05:00
.github Land #19270, Update Github runners 2024-06-20 11:22:09 +01:00
app
config
data Add exploit module for CVE-2024-5084: WordPress Hash Form Plugin RCE 2024-05-28 18:27:02 +02:00
db automatic module_metadata_base.json update 2024-07-16 08:28:57 -05:00
docker
docs remove duplicate word 2024-07-09 18:02:31 -04:00
documentation Land #19311, Add GeoServer unauth RCE module 2024-07-12 11:07:36 -07:00
external Add source code for Python deserialization gadgets 2024-03-29 09:33:47 -04:00
kubernetes
lib Land #19324, Add improvements to rcp_session lib 2024-07-15 14:25:57 -07:00
modules Update geoserver_unauth_rce_cve_2024_36401.rb 2024-07-16 11:20:35 +02:00
plugins remove db_create mention 2024-04-08 16:53:17 +02:00
script
scripts Actually add script contents 2024-04-29 15:28:34 -05:00
spec Update rpc compatible modules to handle unknown sessions 2024-07-15 10:38:56 +01:00
test Update ldap modules to support an ldap session 2024-05-15 15:12:51 +01:00
tools Add the viewstate generator as an option 2024-02-29 16:56:06 -05:00
.dockerignore
.git-blame-ignore-revs
.gitignore
.gitmodules
.mailmap Add adeherdt-r7 to the mail map 2024-06-21 15:14:34 +02:00
.rspec
.rubocop.yml
.ruby-gemset
.ruby-version Update ruby version 2024-05-20 17:55:10 +01:00
.simplecov
.solargraph.yml
.yardopts
CODE_OF_CONDUCT.md
CONTRIBUTING.md
COPYING
cortex.yaml
CURRENT.md
docker-compose.override.yml
docker-compose.yml
Dockerfile Update ruby version 2024-05-20 17:55:10 +01:00
Gemfile Bump ruby_smb to 3.3.6 2024-04-25 09:41:48 -04:00
Gemfile.local.example
Gemfile.lock Bump metasploit_payloads-mettle to 1.0.30 2024-07-12 05:17:19 -04:00
LICENSE
LICENSE_GEMS Bump metasploit_payloads-mettle to 1.0.30 2024-07-12 05:17:19 -04:00
metasploit-framework.gemspec Bump metasploit_payloads-mettle to 1.0.30 2024-07-12 05:17:19 -04:00
msf-json-rpc.ru
msf-ws.ru
msfconsole
msfd
msfdb
msfrpc
msfrpcd
msfupdate
msfvenom
Rakefile
README.md Remove stale documentation link 2024-03-19 13:46:35 +00:00
Vagrantfile

Metasploit Maintainability Test Coverage Docker Pulls

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html

You can find documentation on Metasploit and how to use it at: https://docs.metasploit.com/

Information about setting up a development environment can be found at: https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html

Our bug and feature request tracker can be found at: https://github.com/rapid7/metasploit-framework/issues

New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://docs.metasploit.com/api/

Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading the basics of using Metasploit or Metasploit Unleashed.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.