9d848c8c3b
Minor changes to comments Updated URLs Added Fedora ROP, cleaned up Fixing URLs again, typos Added support for Archlinux (new target) Added support for OpenSuse (new target) Tincd is now a separate file, uses the TCP mixin/REX sockets. Started ARM exploiting Style changes, improvements according to egyp7's comments Style changes according to sane rubocop messages RSA key length other than 256 supported. Different key lengths for client/server supported. Drop location for binary can be customized Refactoring: Replaced pop_inbuffer with slice Refactoring: fail_with is called, renamed method to send_recv to match other protocol classes, using rand_text_alpha instead of hardcoded \x90, Fixed fail command usage Version exploiting ARM with ASLR brute force Cleaned up version with nicer program flow More elegant solution for data too large for modulus Minor changes in comments only (comment about firewalld) Correct usage of the TCP mixin Fixes module option so that the path to drop the binary on the server is not validated against the local filesystem Added comments Minor edits Space removal at EOL according to msftidy |
||
---|---|---|
app | ||
config | ||
data | ||
db | ||
documentation | ||
external | ||
features | ||
lib | ||
modules | ||
plugins | ||
script | ||
scripts | ||
spec | ||
test | ||
tools | ||
.gitignore | ||
.gitmodules | ||
.mailmap | ||
.rspec | ||
.rubocop.yml | ||
.ruby-gemset | ||
.ruby-version | ||
.simplecov | ||
.travis.yml | ||
.yardopts | ||
CONTRIBUTING.md | ||
COPYING | ||
Gemfile | ||
Gemfile.local.example | ||
Gemfile.lock | ||
HACKING | ||
LICENSE | ||
README.md | ||
Rakefile | ||
metasploit-framework.gemspec | ||
msfbinscan | ||
msfcli | ||
msfconsole | ||
msfd | ||
msfelfscan | ||
msfencode | ||
msfmachscan | ||
msfpayload | ||
msfpescan | ||
msfrop | ||
msfrpc | ||
msfrpcd | ||
msfupdate | ||
msfvenom |
README.md
Metasploit
The Metasploit Framework is released under a BSD-style license. See COPYING for more details.
The latest version of this software is available from http://metasploit.com/
Bug tracking and development information can be found at: https://dev.metasploit.com/redmine/projects/framework/
The public GitHub source repository can be found at: https://github.com/rapid7/metasploit-framework
Questions and suggestions can be sent to: msfdev(at)metasploit.com
The framework mailing list is the place to discuss features and ask for help. To subscribe, visit the following web page: https://mail.metasploit.com/mailman/listinfo/framework
The mailing list archives are available from: https://mail.metasploit.com/pipermail/framework/
Installing
Generally, you should use the free installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.
Using Metasploit
Metasploit can do all sorts of things. The first thing you'll want to do
is start msfconsole
, but after that, you'll probably be best served by
reading some of the great tutorials online:
Contributing
See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.