Metasploit Framework
 
 
 
 
 
 
Go to file
William Vu 1162a06d2d
Fix #6677, typo fix for atutor_sqli
2016-04-06 14:20:50 -05:00
.github Fix link 2016-02-22 15:14:38 -06:00
app Import workspace IP validation from Mdm 2016-03-29 17:56:22 -05:00
config Merge branch 'jbarnett-r7-feature/MS-833/ms08-067-automation' into upstream-master 2016-03-04 12:34:00 -06:00
data Land #6721, Add additional SOLMAN default creds 2016-03-30 10:48:53 -05:00
db
documentation Move module_doc_template 2016-03-24 17:07:19 -05:00
external Kill defanged mode 2016-03-28 09:02:07 -05:00
features Put the code in the wrong block. 2016-02-25 13:39:04 -06:00
lib Merge branch 'landing-6748' into upstream-master 2016-04-06 13:44:15 -05:00
modules Fix typo 2016-04-06 14:20:41 -05:00
plugins whitespace fixes 2016-03-15 22:08:25 -05:00
script
scripts Remove rb from module name 2015-09-03 09:49:54 +05:00
spec Merge branch 'master' into staging/rails-upgrade 2016-04-04 09:30:01 -05:00
test update test modules to use MetasploitModule 2016-03-13 13:44:44 -05:00
tools Use patch_finder for msu_finder 2016-03-29 23:21:01 -05:00
.gitignore Add .php and .py meterpreter excludes to gitignore 2015-12-08 16:59:57 +10:00
.gitmodules
.mailmap Update mailmap for Steven Seeley 2016-03-22 12:45:28 -05:00
.rspec
.rubocop.yml
.ruby-gemset
.ruby-version bump ruby version 2016-03-31 23:40:15 +02:00
.simplecov
.travis.yml revert travis.yml for now 2016-04-01 16:07:07 +02:00
.yardopts
CODE_OF_CONDUCT.md Add individual contacts 2016-01-13 10:35:39 -06:00
CONTRIBUTING.md Clarify that contributed code should be BSD/MIT 2016-02-22 16:29:13 -06:00
COPYING Update COPYING, too. 2016-01-04 16:31:01 -06:00
Gemfile unlock gemfile deps first 2016-04-04 13:55:53 -05:00
Gemfile.local.example
Gemfile.lock unlock gemspec deps 2016-04-04 15:31:09 -05:00
HACKING
LICENSE Update copyright notice to 2016 [ci skip] 2016-01-03 20:25:47 +05:30
README.md Use SVG badges to please the eyes 👀 2015-12-13 00:28:14 +01:00
Rakefile
metasploit-framework.gemspec unlock gemspec deps 2016-04-04 15:31:09 -05:00
msfbinscan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfconsole
msfd Initialize the DisableBanner option 2015-10-08 14:08:45 -05:00
msfelfscan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfmachscan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfpescan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfrop Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfrpc
msfrpcd
msfupdate Install Bundler in msfupdate if we don't have it 2016-03-02 10:12:45 -06:00
msfvenom No real reason for this check 2016-02-12 10:49:18 -06:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: http://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.