Metasploit Framework
 
 
 
 
 
 
Go to file
Bruno Morisson acb236006c metasploit module for CVE-2013-3319 / SAP Security Note 1816536
Note: only tested on SAP running on Windows, but should equally work on vulnerable linux/*nix versions.
2013-07-22 18:36:38 +01:00
config Add some friendlier defaults to database.yml 2013-04-19 15:43:25 -05:00
data Land #2047, @hmoore-r7 ipmi related work 2013-07-02 11:13:25 -05:00
db was missing a nil check 2013-06-04 14:21:07 -05:00
documentation Add post module sample 2013-07-08 12:20:11 -05:00
external Clean a little more the VS project 2013-06-29 15:15:27 -05:00
lib Land #2089, smb last_filename can be nil 2013-07-10 14:18:00 -05:00
modules metasploit module for CVE-2013-3319 / SAP Security Note 1816536 2013-07-22 18:36:38 +01:00
plugins Uses raw-xml-v2 Nexpose export for Nexpose import as this adds device-id 2013-06-11 18:37:02 -05:00
scripts Land #2059 - add help page as default for process_memdump.rb 2013-07-03 15:58:20 -05:00
spec Rspec: Ensure PacketFu is actually still available 2013-06-10 16:02:50 -05:00
test Landing #1862 - Remove inline unit tests 2013-05-23 22:19:29 -05:00
tools fixing some copy 2013-07-08 18:16:15 -05:00
.gitignore Add new rvm control files to ignores 2013-05-07 08:32:21 -05:00
.mailmap Adding Brian Wallace to the .mailmap 2013-07-03 14:01:00 -05:00
.rspec Fix missed rename when adding fastlib under directory 2012-10-08 16:14:37 -05:00
.simplecov Better Rubymine compatibility for .simplecov 2013-01-18 11:12:16 -06:00
.travis.yml Configure travis-ci to use database for rake spec 2013-03-15 08:48:20 -05:00
.yardopts Merge pull request #1563 from rapid7/bug/yard-guard 2013-03-07 17:35:03 -06:00
CONTRIBUTING.md Add a note about hooking msftidy 2013-05-28 10:44:23 -05:00
COPYING We're an Inc, not an LLC. 2013-07-10 15:56:49 -05:00
Gemfile Fixes for network_interface PR #2085 2013-07-10 13:25:06 -05:00
Gemfile.lock Fixes for network_interface PR #2085 2013-07-10 13:25:06 -05:00
HACKING Minor change 2013-06-17 16:27:31 -05:00
LICENSE Fix typo 2013-04-23 15:39:02 -05:00
README.md Update wiki-devenv link in README.md 2013-06-15 07:12:59 -05:00
Rakefile Update to metasploit_data_models 0.11.0 2013-05-09 13:25:26 -05:00
msfbinscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfcli Land #2097 - show subheading for sections 2013-07-11 12:48:33 -05:00
msfconsole Fully deprecates msfupdate over SVN 2013-03-14 15:21:33 -05:00
msfd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfelfscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfencode Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfmachscan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfpayload Anchor all the things 2013-06-12 22:20:46 -05:00
msfpescan Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrop Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfrpc Remove unused option. 2013-03-25 20:47:18 -05:00
msfrpcd Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00
msfupdate Automatically update gems after running msfupdate 2013-04-05 09:42:15 -05:00
msfvenom Fix typo 2013-07-11 11:56:24 -05:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at: https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at: https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to: msfdev(at)metasploit.com

The framework mailing list is the place to discuss features and ask for help. To subscribe, visit the following web page: https://mail.metasploit.com/mailman/listinfo/framework

The mailing list archives are available from: https://mail.metasploit.com/pipermail/framework/

Installing

Generally, you should use the installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading some of the great tutorials online:

Contributing

See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.