Metasploit Framework
 
 
 
 
 
 
Go to file
Luke Imhoff 8a2dc0a09f Give ruby Modules that wrap Metasploit modules a name
[#36737359]

active_support/dependencies cannot resolve missing constants in Metasploit
modules because the wrapper module is anonymous.  In order to make the
wrapper module non-anonymous, the module must be assigned to a constant.
Since we don't want modules colliding, the wrapper module needs a unique
name, so use the module lookup name to derive the proper nested module names
to namespace the wrapper module.  All derived modules are nested under
Msf::Modules.  The name derivation handles invalid characters for constant
names such as digits as the first character or non-alphanumeric character.
The invalid constant name characters are converted to their hex value and
prefixed with X, so '-' in a name become 'X2d'.
2012-09-27 12:52:09 -05:00
data Add bin for mephos' netstat fixes 2012-09-12 16:57:17 -05:00
documentation updated release number to 4.3 2012-07-06 10:21:00 -05:00
external I was pretty sure to have removed those fclose before 2012-09-12 13:11:24 -05:00
lib Give ruby Modules that wrap Metasploit modules a name 2012-09-27 12:52:09 -05:00
modules Merge branch 'auxilium' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-auxilium 2012-09-24 10:22:18 -05:00
plugins Dont store files in /tmp with predictable names 2012-07-16 09:53:19 -05:00
scripts Added XP Support and Changed Output Method for User Password Hints 2012-08-20 21:30:12 -05:00
spec Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
test Add a File.open method for meterpreter 2012-08-29 16:19:03 -05:00
tools fix TypeError 2012-09-24 11:21:47 +09:00
.gitignore Give ruby Modules that wrap Metasploit modules a name 2012-09-27 12:52:09 -05:00
COPYING Committing Egypt's README updates 2012-05-30 10:42:52 -05:00
Gemfile Rollback rails to 3.2.2 to fix asset pipeline issues. 2012-06-06 11:08:39 -05:00
HACKING Get fascist about 50/72 git commit messages 2012-08-20 10:30:01 -05:00
README.md Committing Egypt's README updates 2012-05-30 10:42:52 -05:00
THIRD-PARTY.md Adding carrierwave to metasploit's gemcache. 2012-06-12 14:47:50 -05:00
armitage pass commandline arguments through to armitage.jar, fixes #3519 2011-01-13 16:04:42 +00:00
msfbinscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfcli Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfconsole Touchups to msfconsole command parsing 2012-09-20 13:40:01 -05:00
msfd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfelfscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfencode Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfgui Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfmachscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfpayload Merge the commandline options with the payload's datastore 2012-07-16 16:07:54 -05:00
msfpescan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrop Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrpc Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrpcd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfupdate Add the --non-interactive flag to msfupdate (thx pyllyukko) 2012-09-04 14:06:04 -05:00
msfvenom Merge the commandline options with the payload's datastore 2012-07-16 16:07:54 -05:00

README.md

Metasploit

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at: https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at: https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to: msfdev(at)metasploit.com

The framework mailing list is the place to discuss features and ask for help. To subscribe, visit the following web page: https://mail.metasploit.com/mailman/listinfo/framework

The mailing list archives are available from: https://mail.metasploit.com/pipermail/framework/

Installing

Generally, you should use the installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading some of the great tutorials online:

Contributing

See the Dev Environment Setup guide on github which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request.