metasploit-framework/tools/module_disclodate.rb

72 lines
1.3 KiB
Ruby
Raw Normal View History

#!/usr/bin/env ruby
#
# $Id$
# $Revision$
#
# This script lists each module by its disclosure date
#
msfbase = File.symlink?(__FILE__) ? File.readlink(__FILE__) : __FILE__
$:.unshift(File.join(File.dirname(msfbase), '..', 'lib'))
require 'rex'
require 'msf/ui'
require 'msf/base'
Indent = ' '
# Initialize the simplified framework instance.
$framework = Msf::Simple::Framework.create
tbl = Rex::Ui::Text::Table.new(
'Header' => 'Module References',
'Indent' => Indent.length,
'Columns' => [ 'Module', 'Disclosure Date' ]
)
# fancy monkey patch
class Msf::Module
def disclo_date
if (module_info and module_info['DisclosureDate'])
begin
dt = Date.parse(module_info['DisclosureDate'])
rescue ArgumentError
return 'Error'
end
return dt.strftime('%b %d %Y')
end
''
end
end
$framework.payloads.each_module { |name, mod|
x = mod.new
tbl << [ 'payload/' + name, x.disclo_date ]
}
$framework.exploits.each_module { |name, mod|
x = mod.new
tbl << [ 'exploit/' + name, x.disclo_date ]
}
$framework.nops.each_module { |name, mod|
x = mod.new
tbl << [ 'nop/' + name, x.disclo_date ]
}
$framework.encoders.each_module { |name, mod|
x = mod.new
tbl << [ 'encoder/' + name, x.disclo_date ]
}
$framework.auxiliary.each_module { |name, mod|
x = mod.new
tbl << [ 'auxiliary/' + name, x.disclo_date ]
}
puts tbl.to_s