1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00
Go to file
James Lee 1b7fb68f52 More useful error when given invalid register name, fix error message to be consistent with code when offset is too large
git-svn-id: file:///home/svn/framework3/trunk@7407 4d416f70-5f16-0410-b530-b9f4589650da
2009-11-08 19:42:58 +00:00
data Reset the manifest to normal privs, this was causing issues on Vista 2009-11-08 03:40:47 +00:00
documentation Updated userguide and latex file to match copyright and links 2009-10-26 18:04:49 +00:00
external Fixes #466 and #467. Binaries and source to be stored outside the tree 2009-11-06 02:55:18 +00:00
lib More useful error when given invalid register name, fix error message to be consistent with code when offset is too large 2009-11-08 19:42:58 +00:00
modules See #430. This adds the AllowWin32SEH option to the upper/mixed alphanumeric encoders, providing 100% alphanumeric payloads for Windows platforms 2009-11-08 00:45:51 +00:00
plugins make the name consistent so you can unload the same name you loaded. 2009-11-05 18:20:44 +00:00
scripts/meterpreter add usage 2009-11-05 00:44:03 +00:00
test Swap around rbreadline - load it by default, but also allow the old readline with the -L (--real-readline) parameter to msfconsole. This also fixes absolute path handling for msfconsole command passthrough 2009-10-02 14:17:03 +00:00
tools First attempt for MITM proxy for multiple purposes including Wmap. 2009-10-18 22:04:07 +00:00
msfcli Fixes #279, thanks jduck! 2009-04-03 12:54:58 +00:00
msfconsole Swap around rbreadline - load it by default, but also allow the old readline with the -L (--real-readline) parameter to msfconsole. This also fixes absolute path handling for msfconsole command passthrough 2009-10-02 14:17:03 +00:00
msfd Use [-] instead of [*] for error messages 2009-03-11 00:10:27 +00:00
msfelfscan Patch from Jonathan Steel to fix double-symlinks 2009-01-30 06:27:10 +00:00
msfencode Fixes #463. Missing a return value in exe.rb and missing a default format in msfencode 2009-11-04 21:30:00 +00:00
msfgui Use [-] instead of [*] for error messages 2009-03-11 00:10:27 +00:00
msfmachscan Patch from Jonathan Steel to fix double-symlinks 2009-01-30 06:27:10 +00:00
msfopcode Patch from Jonathan Steel to fix double-symlinks 2009-01-30 06:27:10 +00:00
msfpayload add a little consistency to msfpayload usage line 2009-08-08 18:21:10 +00:00
msfpescan Quick update to allow address filtering (find unicode addresses,etc) via the -F [regex] parameter 2009-06-08 15:59:38 +00:00
msfrpc Use [-] instead of [*] for error messages 2009-03-11 00:10:27 +00:00
msfrpcd Use [-] instead of [*] for error messages 2009-03-11 00:10:27 +00:00
msfweb Fixes #397. Webrick requires :BindAddress but msfweb only passed in :Host, likely an api change was missed during a rails upgrade. 2009-10-26 17:33:05 +00:00
README Copyright updates reflecting the news 2009-10-21 12:58:56 +00:00

Copyright (C) 2006-2009, Rapid7 LLC
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    * Redistributions of source code must retain the above copyright notice, 
	  this list of conditions and the following disclaimer.

    * Redistributions in binary form must reproduce the above copyright notice,
	  this list of conditions and the following disclaimer in the documentation
	  and/or other materials provided with the distribution.

    * Neither the name of Rapid7 LLC nor the names of its contributors 
	  may be used to endorse or promote products derived from this software 
	  without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

================================================================================

The Metasploit Framework is provided under the 3-clause BSD license above.

The copyright on this package is held by Rapid7 LLC.

This license does not apply to the following components:
 - The OpenSSL library embedded into the Meterpreter payload binaries and the 
   corresponding header files in the source tree
 - The Packet Sniffer SDK (MicroOLAP) library embedded into the Meterpreter 
   Sniffer extension. HD Moore has a single-seat developer license.  
 - The vncdll.dll binary and its associated source code (modified RealVNC)
 - The icons used by msfweb that were not created by Metasploit
 - The BinData library located under lib/bindata
 - The Bit-Struct library located under lib/bit-struct
 - The Byakugan plugin located under external/source/byakugan
 - The Metasm library located under lib/metasm
 - The Ole::Storage library located under lib/ole
 - The PacketFu library located under lib/packetfu
 - The PcapRub library located under external/pcaprub
 - The Rabal library located under lib/rabal
 - The Racket library located under lib/racket
 - The Ruby-Lorcon library located under external/ruby-lorcon
 - The SNMP library located under lib/snmp
 - The Zip library located under lib/zip

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at:
 http://trac.metasploit.com/

Questions and suggestions can be sent to:
 msfdev[at]metasploit.com
 
The framework mailing list is the place to discuss features and ask for help. 
To subscribe, visit the following web page:
 https://mail.metasploit.com/mailman/listinfo/framework

The archives are available from:
 https://mail.metasploit.com/pipermail/framework/