Metasploit Framework
 
 
 
 
 
 
Go to file
Pedro Ribeiro 41bdae4b84 update links and CVE on webnms_file_upload 2016-09-13 18:50:25 +01:00
.github
app
config
data Land 7281, add vagrant default password to wordlist 2016-09-07 13:01:01 +01:00
db
documentation Land #7287, mdaemon cred dumper 2016-09-10 08:43:07 -05:00
external add exploit for cve-2016-0189 2016-08-01 13:26:35 -05:00
features Apparently the tests expected the typo in DATABASE. 2016-07-28 17:40:37 -05:00
lib Land #7299, Set defaults in WordpressMulticall login scanner 2016-09-12 12:26:08 -05:00
modules update links and CVE on webnms_file_upload 2016-09-13 18:50:25 +01:00
plugins Merge branch 'nessus-bridge-gem' of git://github.com/kost/metasploit-framework into kost-nessus-bridge-gem 2016-08-30 17:25:46 -05:00
script
scripts typo 2016-08-13 08:22:41 -05:00
spec Land #7254, Rex::SSLScan Gemification 2016-09-08 13:20:56 -05:00
test replace old rex::ui::text::table refs 2016-08-10 13:30:09 -05:00
tools replace old rex::ui::text::table refs 2016-08-10 13:30:09 -05:00
.gitignore
.gitmodules
.mailmap And Thao, too! 2016-07-01 16:10:21 -04:00
.rspec
.rubocop.yml
.ruby-gemset
.ruby-version
.simplecov
.travis.yml
.yardopts
CODE_OF_CONDUCT.md
CONTRIBUTING.md Add note about release notes to CONTRIBUTING.md 2016-08-22 15:15:22 -05:00
COPYING
Gemfile
Gemfile.local.example
Gemfile.lock Land #7254, Rex::SSLScan Gemification 2016-09-08 13:20:56 -05:00
HACKING
LICENSE
README.md
Rakefile
Vagrantfile
metasploit-framework.gemspec Land #7254, Rex::SSLScan Gemification 2016-09-08 13:20:56 -05:00
msfconsole
msfd
msfrop move Rex::Ui::Text::Color out to rex::text gem 2016-08-11 10:28:09 -05:00
msfrpc
msfrpcd
msfupdate
msfvenom Sort msfvenom --help-platforms 2016-08-25 14:02:58 -05:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: http://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.