metasploit-framework
metasploit-framework copied to clipboard
Metasploit Framework
The committer keys URL changed, and the exceptions are wack. Should probably be updated to include GitHub keys (e.g., https://github.com/smcintyre-r7.gpg). Feel free to modify this PR as you see fit!
im having this error please anyone help me to get solve this error 
Fixes bug #16578 and other related (non-reported) bugs found in the way. Following is the list of issues found: # 1. Issue parsing COMMAND option that contains nested equals sign...
This module will exploit two CVEs to cover all of the possible platforms: [edb](https://www.exploit-db.com/exploits/40488/) [edb](https://www.exploit-db.com/exploits/40450/) Should be tested vs tomcat 6, 7, 8 on centos/fedora, and debian/ubuntu. Not that I...
## Steps to reproduce 1. Run: `openssl req -newkey rsa:2048 -nodes -keyout msf-ws-key.pem -x509 -days 365 -out msf-ws-cert.pem` in `~/.msf4/` 2. Start msfrpcd with JSON-RPC using this command: `msfrpcd -a...
Hello thanks for this very good tool but after running msfinstall it says apt install metasploit -> metasploit not found How can i fix it?
https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/scanner/http/options.md https://nmap.org/nsedoc/scripts/http-methods.html https://www.hackingarticles.in/multiple-ways-to-detect-http-options/ Also, the module should say (in verbose) that none were detected if none were detected. Right now you just get no output at all.
Add encoder module `x86/xor_poly` at path `modules/encoder/x86/xor_poly.rb`, Rubocop clean, msftidy clean it has 100% polymorphism, all the bytes changes from a generation to another  probably should be ranked as...
Currently working on this, using as a placeholder ## Summary More info here: https://github.com/alfarom256/CVE-2022-3699/ ### Basic example If you have a POC, blog post or any other useful references please...
Closes #15890 This pull request is a fix for the issue #15890 meant for the module `modules/exploits/windows/local/capcom_sys_exec.rb`. Earlier the version check for the module relied on `sysinfo` and checked the...