Metasploit Framework
 
 
 
 
 
 
Go to file
modpr0be b8354d3d6c Added MediaCoder exploit module 2013-07-06 11:07:11 +07:00
config Add some friendlier defaults to database.yml 2013-04-19 15:43:25 -05:00
data Land #2047, @hmoore-r7 ipmi related work 2013-07-02 11:13:25 -05:00
db was missing a nil check 2013-06-04 14:21:07 -05:00
documentation
external Clean a little more the VS project 2013-06-29 15:15:27 -05:00
lib ui/banner~Made msftidy happy 2013-07-03 00:29:42 +01:00
modules Added MediaCoder exploit module 2013-07-06 11:07:11 +07:00
plugins Uses raw-xml-v2 Nexpose export for Nexpose import as this adds device-id 2013-06-11 18:37:02 -05:00
scripts Land #2059 - add help page as default for process_memdump.rb 2013-07-03 15:58:20 -05:00
spec Rspec: Ensure PacketFu is actually still available 2013-06-10 16:02:50 -05:00
test Landing #1862 - Remove inline unit tests 2013-05-23 22:19:29 -05:00
tools Land #2047, @hmoore-r7 ipmi related work 2013-07-02 11:13:25 -05:00
.gitignore Add new rvm control files to ignores 2013-05-07 08:32:21 -05:00
.mailmap Adding Brian Wallace to the .mailmap 2013-07-03 14:01:00 -05:00
.rspec
.simplecov
.travis.yml
.yardopts
CONTRIBUTING.md Add a note about hooking msftidy 2013-05-28 10:44:23 -05:00
COPYING
Gemfile Add Gemfile entry for PacketFu 2013-06-10 14:18:05 -05:00
Gemfile.lock Add Gemfile entry for PacketFu 2013-06-10 14:18:05 -05:00
HACKING Minor change 2013-06-17 16:27:31 -05:00
LICENSE Fix typo 2013-04-23 15:39:02 -05:00
README.md Update wiki-devenv link in README.md 2013-06-15 07:12:59 -05:00
Rakefile Update to metasploit_data_models 0.11.0 2013-05-09 13:25:26 -05:00
msfbinscan
msfcli
msfconsole
msfd
msfelfscan
msfencode
msfmachscan
msfpayload Anchor all the things 2013-06-12 22:20:46 -05:00
msfpescan
msfrop
msfrpc
msfrpcd
msfupdate Automatically update gems after running msfupdate 2013-04-05 09:42:15 -05:00
msfvenom msfvomon - arguments are not case sensitive 2013-06-26 16:35:22 +01:00

README.md

Metasploit Build Status Code Climate

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at: https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at: https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to: msfdev(at)metasploit.com

The framework mailing list is the place to discuss features and ask for help. To subscribe, visit the following web page: https://mail.metasploit.com/mailman/listinfo/framework

The mailing list archives are available from: https://mail.metasploit.com/pipermail/framework/

Installing

Generally, you should use the installer which contains all dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading some of the great tutorials online:

Contributing

See the Dev Environment Setup guide on GitHub which will walk you through the whole process starting from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more info, see Contributing.