Metasploit Framework
 
 
 
 
 
 
Go to file
Joe Vennix 8e27e87c81 Use the right disclosure date. 2013-12-19 12:58:52 -06:00
config Restored database.example 2013-11-12 09:23:10 +01:00
data Land #2760 2013-12-18 17:17:10 +10:00
db
documentation
external Add make script for nvidia nvsvc 2013-12-15 01:12:49 +00:00
lib Add support for Procs in browserexploit requirements. 2013-12-19 12:49:05 -06:00
modules Use the right disclosure date. 2013-12-19 12:58:52 -06:00
plugins Land #2504, @todb-r7's edit command for msfconsole 2013-10-30 15:38:07 -05:00
scripts Fix metsrv.dll name issue 2013-11-28 11:48:11 +10:00
spec Add support for Procs in browserexploit requirements. 2013-12-19 12:49:05 -06:00
test Minor description changes 2013-12-16 14:57:33 -06:00
tools Remove capturing parens and debug hexes. 2013-11-20 17:53:25 -06:00
.gitignore Remove genericity, x64 and renamed stuff 2013-11-14 12:22:53 +10:00
.gitmodules Add RDI submodule, port Kitrap0d 2013-11-27 16:04:41 +10:00
.mailmap Land #2727, @todb-r7's late-night name fixes 2013-12-05 02:31:16 -06:00
.rspec
.ruby-gemset
.ruby-version Update default ruby to 1.9.3-p484 (CVE-2013-4164) 2013-11-22 11:20:21 -06:00
.simplecov
.travis.yml Revert "Force Travis to Ruby 1.9.3-p484" 2013-11-22 12:26:05 -06:00
.yardopts
CONTRIBUTING.md
COPYING
Gemfile Fix indendation on Gemfile 2013-11-26 10:48:50 -06:00
Gemfile.lock
HACKING Document what we want for XML generation 2013-12-10 16:35:30 -06:00
LICENSE Update 3rd party licenses 2013-11-04 17:27:28 -06:00
README.md
Rakefile
msfbinscan
msfcli [FixRM 8489] undefined method `empty?' for nil:NilClass in msfcli 2013-10-14 13:13:56 -05:00
msfconsole Removed SVN from msfupdate 2013-10-10 12:25:00 +00:00
msfd
msfelfscan
msfencode
msfmachscan
msfpayload [FixRM #8494] Don't try to create war without exe 2013-10-25 09:44:38 -05:00
msfpescan
msfrop
msfrpc
msfrpcd
msfupdate Always use maybe_wait_and_exit in msfupdate 2013-11-15 17:26:21 -06:00
msfvenom sorted out the sorts without .sort 2013-12-02 11:57:52 +01:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at: https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at: https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to: msfdev(at)metasploit.com

The framework mailing list is the place to discuss features and ask for help. To subscribe, visit the following web page: https://mail.metasploit.com/mailman/listinfo/framework

The mailing list archives are available from: https://mail.metasploit.com/pipermail/framework/

Installing

Generally, you should use the installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading some of the great tutorials online:

Contributing

See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.