metasploit-framework/modules
cgranleese-r7 9b4114eda0
Land #18961, Adds session documentation
2024-03-25 11:23:05 +00:00
..
auxiliary Fix postgres version logging 2024-03-22 16:50:01 +00:00
encoders Add additional platforms and decoders 2024-02-13 18:34:40 +01:00
evasion/windows fix spelling in some modules 2024-01-07 14:06:31 -05:00
exploits Land #18961, Adds session documentation 2024-03-25 11:23:05 +00:00
nops fix spelling in some modules 2024-01-07 14:06:31 -05:00
payloads Initial SMB server for fetch payloads 2024-01-29 16:44:28 -05:00
post change bloodhound OutputDirectory to OptString 2024-02-29 07:12:37 -06:00
README.md Move folder descriptions into README.md files 2023-05-03 14:06:13 -05:00

README.md

This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for Metasploit's various payloads (which are also modules), and post for post exploitation modules.