1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-09-04 20:18:27 +02:00
Go to file
2021-08-31 15:07:37 -05:00
.github GitHub Actions: Termux issue label: auto close issue 2021-08-02 13:54:29 +00:00
app deprecated model error pattern 2021-08-09 12:16:12 -05:00
config remove laoder initializer 2021-08-09 12:16:12 -05:00
data Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
db automatic module_metadata_base.json update 2021-08-16 17:17:27 -05:00
docker remove debug output 2018-10-21 22:34:19 +02:00
documentation Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
external Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
lib Land #15540, fix linux/macos meterpreter shell -t subshell command 2021-08-16 14:08:06 +01:00
modules Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
plugins Update session_notifier.rb to change the SSL file checks to use .file? instead of .exists? 2021-05-12 17:19:12 -05:00
script kill cucumber in framework 2017-07-12 08:00:29 -05:00
scripts Zeitwerk rex folder 2021-02-08 12:24:12 +00:00
spec Land #15493, Rails 6.1 upgrade 2021-08-10 11:49:25 +01:00
test Remove an extra spec in a function definition 2021-05-24 14:36:22 -04:00
tools Update rpc analyze command to support latest functionality 2021-08-05 20:18:31 +01:00
.dockerignore change docker root exec 2018-10-21 22:30:01 +02:00
.gitignore Add tests for aux and exploit cmd_check and cmd_run 2021-07-08 17:32:52 +01:00
.gitmodules Add RDI submodule, port Kitrap0d 2013-11-27 16:04:41 +10:00
.mailmap Add Simon Janusz to mail map 2021-07-13 10:38:50 +01:00
.rspec Add modern --require to .rspec 2014-10-08 10:55:40 -05:00
.rubocop.yml Enforce more notes add more tests 2021-06-02 22:31:32 +01:00
.ruby-gemset Remove gitignore, change to metasploit-framework 2013-09-13 12:44:19 -05:00
.ruby-version bump default ruby version to 2.7.2 2020-10-20 11:28:06 -05:00
.simplecov Remove fastlib 2014-09-18 15:24:21 -05:00
.yardopts remove HACKING from yardopts 2017-09-07 02:35:56 -05:00
CODE_OF_CONDUCT.md Change individual contacts 2018-12-13 10:38:55 -06:00
CONTRIBUTING.md Fix up a typo in CONTRIBUTING.md 2021-06-05 14:31:15 -05:00
COPYING Update LICENSE and COPYING 2020-01-18 18:45:37 -06:00
CURRENT.md add CURRENT.md to track major changes and how to migrate with them 2018-01-18 06:35:53 -06:00
docker-compose.override.yml change docker root exec 2018-10-21 22:30:01 +02:00
docker-compose.yml docker: hassle-free DB bootstrap 2021-01-08 16:20:11 +01:00
Dockerfile download version of get-pip supporting python2 2021-01-25 09:59:56 -06:00
Gemfile Make swagger-blocks a default dependency 2021-05-10 13:21:55 +01:00
Gemfile.local.example Add in fix to use relative paths for Gemfile.local.example, thereby fixing review comments 2020-09-24 09:25:03 -05:00
Gemfile.lock Bump rex-text to 0.2.36 2021-08-13 11:49:38 -05:00
LICENSE Add Process Herpaderping evasion module and binaries 2021-01-22 18:33:10 +01:00
LICENSE_GEMS Bump version of framework to 6.1.1 2021-08-12 12:04:49 -05:00
metasploit-framework.gemspec include documentation gem when built 2021-08-09 12:22:42 -05:00
msf-json-rpc.ru Add health check functionality 2021-04-16 01:59:22 +01:00
msf-ws.ru Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
msfconsole move web service api code into library path 2021-08-09 12:22:43 -05:00
msfd remove msf folder requires 2021-01-18 14:21:54 +00:00
msfdb Ensure msfdb reinit can be used for starting the database 2021-06-18 09:13:48 +01:00
msfrpc Remove extra require for a now deleted file that no longer exists 2021-03-02 10:57:07 +00:00
msfrpcd remove msf folder requires 2021-01-18 14:21:54 +00:00
msfupdate we don't need ruby-backports anymore (or maybe we can use it more conditionally on Ruby 2.6), it uses a lot of memory 2019-12-02 09:03:58 -06:00
msfvenom Generate machine readable msfvenom output when pipes are used 2021-05-26 11:13:49 +01:00
Rakefile Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
README.md Added the link for 'COPYING' file 2019-10-07 13:16:15 +05:30
Vagrantfile moves v.gui comment to appropriate location(s) 2020-10-08 11:59:09 -05:00

Metasploit Build Status Maintainability Test Coverage Docker Pulls

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.