Metasploit Framework
 
 
 
 
 
 
Go to file
wchen-r7 0d7b587b5d Avoid printing rhost:rport from AuthBrute
When AuthBurte is mixed with other modules using the TCP mixin,
rhost:rport is printed twice. This info should come from the
protocol level mixin.
2016-06-08 14:32:58 -05:00
.github
app Move shared example from pro into framework 2016-04-07 13:09:52 -05:00
config only set log_level in the Metasploit Framework context 2016-05-18 08:42:32 -05:00
data Add popen() vuln to ImageMagick exploit 2016-06-02 11:35:37 -05:00
db still trying to fix these migrations 2016-05-11 14:54:40 -05:00
documentation Add module doc for symantec_brightmail_ldapcreds 2016-06-07 19:39:55 -05:00
external
features use raw file write for cuke 2016-05-12 11:17:53 -05:00
lib Avoid printing rhost:rport from AuthBrute 2016-06-08 14:32:58 -05:00
modules Should be print_error 2016-06-08 14:22:36 -05:00
plugins Remove idle from usage, will implement in the future if needed 2016-05-15 12:32:05 -05:00
script
scripts File.exists? must die 2016-04-21 00:47:07 -04:00
spec Land #6919, Move LURI into a full URI for a new 'Payload opts" column in jobs output 2016-06-03 13:57:47 -05:00
test Modify stdapi so it also uses exist? over exists? for ruby parity 2016-04-23 17:31:22 -04:00
tools Update md5_lookup.rb 2016-06-02 18:49:22 +03:00
.gitignore
.gitmodules
.mailmap
.rspec
.rubocop.yml
.ruby-gemset
.ruby-version bump ruby version to 2.3.1 2016-05-03 06:23:15 +02:00
.simplecov
.travis.yml bump ruby version to 2.3.1 2016-05-03 06:23:15 +02:00
.yardopts
CODE_OF_CONDUCT.md
CONTRIBUTING.md
COPYING
Gemfile fix deps 2016-05-13 13:34:18 -05:00
Gemfile.local.example
Gemfile.lock Bump version of framework to 4.12.7 2016-06-07 13:14:34 -07:00
HACKING
LICENSE
README.md
Rakefile
metasploit-framework.gemspec adding tzinfo-data to the gemspec 2016-05-17 11:40:25 -05:00
msfbinscan
msfconsole
msfd
msfelfscan
msfmachscan
msfpescan
msfrop
msfrpc
msfrpcd
msfupdate File.exists? must die 2016-04-21 00:47:07 -04:00
msfvenom reenable jar format 2016-05-09 21:25:23 +02:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: http://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.