Metasploit Framework
 
 
 
 
 
 
Go to file
Tod Beardsley e371f0f64c MSFTidy commits
Whitespace fixes, grammar fixes, and breaking up a multiline SOAP
request.

Squashed commit of the following:

commit 2dfd2472f7afc1a05d3647c7ace0d031797c03d9
Author: Tod Beardsley <todb@metasploit.com>
Date:   Wed Feb 1 10:58:53 2012 -0600

    Break up the multiline SOAP thing

commit 747e62c5be2e6ba99f70c03ecd436fc444fda99e
Author: Tod Beardsley <todb@metasploit.com>
Date:   Wed Feb 1 10:48:16 2012 -0600

    More whitespace and indent

commit 12c42aa1efdbf633773096418172e60277162e22
Author: Tod Beardsley <todb@metasploit.com>
Date:   Wed Feb 1 10:39:36 2012 -0600

    Whitespace fixes

commit 32d57444132fef3306ba2bc42743bfa063e498df
Author: Tod Beardsley <todb@metasploit.com>
Date:   Wed Feb 1 10:35:37 2012 -0600

    Grammar fixes for new modules.
2012-02-01 10:59:58 -06:00
data New bin after fix from #6322 2012-01-31 17:33:32 -07:00
documentation Fix boolean option handling 2011-10-17 15:19:35 +00:00
external Fix up reverse_tcp ipv6 stager for freebsd 2012-02-01 01:41:24 -06:00
lib Make sure at least one character is returned 2012-02-01 02:08:26 -06:00
modules MSFTidy commits 2012-02-01 10:59:58 -06:00
plugins make the esx driver dependent on meterpreter 2012-01-05 20:42:58 -06:00
scripts Merge branch 'wmap_autotest.rc' of https://github.com/m-1-k-3/metasploit-framework into m-1-k-3-wmap_autotest.rc 2012-01-19 13:28:13 -06:00
test Reintroduces chao-mu's OptRegexp 2012-01-23 15:20:36 -07:00
tools special case handler 2012-01-31 20:49:08 -06:00
.gitignore Ignore tags and swap files 2011-11-17 04:57:59 +11:00
.gitmodules add submodule 2011-12-13 21:45:18 -06:00
HACKING Updating HACKING to point developers to GitHub 2011-11-10 20:37:15 -06:00
README Update README 2012-01-17 09:52:19 -06:00
armitage pass commandline arguments through to armitage.jar, fixes #3519 2011-01-13 16:04:42 +00:00
msfbinscan Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfcli Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfconsole Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfd Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfelfscan Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfencode Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfgui use javaw for windows, remove platform-specific comment 2010-10-24 00:57:50 +00:00
msfmachscan Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfpayload Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfpescan Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfrop Fix up bad line removals 2011-11-23 23:10:43 -06:00
msfrpc Remove xmlrpc support in this branch (only msgpack is supported) 2011-12-05 13:07:25 -06:00
msfrpcd Remove xmlrpc support in this branch (only msgpack is supported) 2011-12-05 13:07:25 -06:00
msfupdate msftidy pass on msf* 2011-10-23 12:04:41 +00:00
msfvenom Add new vba support to msfvenom. 2012-01-24 22:08:28 -05:00

README

Copyright (C) 2006-2012, Rapid7 LLC
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    * Redistributions of source code must retain the above copyright notice,
	  this list of conditions and the following disclaimer.

    * Redistributions in binary form must reproduce the above copyright notice,
	  this list of conditions and the following disclaimer in the documentation
	  and/or other materials provided with the distribution.

    * Neither the name of Rapid7 LLC nor the names of its contributors
	  may be used to endorse or promote products derived from this software
	  without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

================================================================================

The Metasploit Framework is provided under the 3-clause BSD license above.

The copyright on this package is held by Rapid7 LLC.


This license does not apply to the following components:
 - The Bit-Struct library located under lib/bit-struct
 - The OpenSSL library embedded into the Meterpreter payload binaries and the
   corresponding header files in the source tree
 - The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter
   Sniffer extension. HD Moore has a single-seat developer license.
 - The modified TightVNC binaries and their associated source code.
 - The Byakugan plugin located under external/source/byakugan
 - The Metasm library located under lib/metasm
 - The PcapRub library located under external/pcaprub
 - The Rabal library located under lib/rabal
 - The PacketFu library located under lib/packetfu
 - The Ruby-Lorcon library located under external/ruby-lorcon
 - The SNMP library located under lib/snmp
 - The Zip library located under lib/zip
 - The SSHKey library located under lib/sshkey

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at:
 https://dev.metasploit.com/redmine/projects/framework/

The public GitHub source repository can be found at:
 https://github.com/rapid7/metasploit-framework

Questions and suggestions can be sent to:
 msfdev[at]metasploit.com

The framework mailing list is the place to discuss features and ask for help.
To subscribe, visit the following web page:
 https://mail.metasploit.com/mailman/listinfo/framework

The archives are available from:
 https://mail.metasploit.com/pipermail/framework/