Go to file
adfoster-r7 3e1ba060a7
Land #15908, add reload functionality to the save command
2021-12-08 04:27:04 +00:00
.github Remove ruby3 label automation 2021-09-07 14:53:16 +01:00
app deprecated model error pattern 2021-08-09 12:16:12 -05:00
config remove laoder initializer 2021-08-09 12:16:12 -05:00
data Land #15808, Fix #15804 powershell read_file on Windows Server 2012 2021-12-07 11:59:11 +01:00
db automatic module_metadata_base.json update 2021-12-07 13:38:51 -06:00
docker
documentation Land #15808, Fix #15804 powershell read_file on Windows Server 2012 2021-12-07 11:59:11 +01:00
external Updated exploit to compile on target, added control over directory creation 2021-12-01 14:54:47 -06:00
kubernetes Meterpreter Helm chart tweaks 2021-11-05 15:14:19 +00:00
lib Land #15908, add reload functionality to the save command 2021-12-08 04:27:04 +00:00
modules Land #15929, add new targets for ms08-067 netapi 2021-12-07 13:16:23 -06:00
plugins Use existing Rex::UserAgent class; keep UA string consistent across an MSF session 2021-11-10 10:05:45 +11:00
script
scripts Fix Meterpreter spelling mistake 2021-10-12 23:40:43 +01:00
spec Fix failing tests 2021-12-06 15:04:05 +00:00
test modify Post::File tests to check write_file return value 2021-11-25 03:37:06 +00:00
tools Only warn about missing CVEs in exploit modules 2021-11-04 07:18:27 -04:00
.dockerignore
.gitignore Add tests for aux and exploit cmd_check and cmd_run 2021-07-08 17:32:52 +01:00
.gitmodules
.mailmap Add Simon Janusz to mail map 2021-07-13 10:38:50 +01:00
.rspec
.rubocop.yml Autofix module info hash values on the same line 2021-08-27 16:39:49 +01:00
.ruby-gemset
.ruby-version bump ruby 3.0 2021-12-01 12:02:59 -06:00
.simplecov
.yardopts
CODE_OF_CONDUCT.md
CONTRIBUTING.md Fix up a typo in CONTRIBUTING.md 2021-06-05 14:31:15 -05:00
COPYING Update LICENSE and COPYING 2020-01-18 18:45:37 -06:00
CURRENT.md
Dockerfile bump docker image to match `.ruby-version` 2021-12-01 12:21:25 -06:00
Gemfile Make `swagger-blocks` a default dependency 2021-05-10 13:21:55 +01:00
Gemfile.local.example Add in fix to use relative paths for Gemfile.local.example, thereby fixing review comments 2020-09-24 09:25:03 -05:00
Gemfile.lock Bump version of framework to 6.1.19 2021-12-06 12:18:28 -06:00
LICENSE Add Process Herpaderping evasion module and binaries 2021-01-22 18:33:10 +01:00
LICENSE_GEMS Bump version of framework to 6.1.19 2021-12-06 12:18:28 -06:00
README.md
Rakefile Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
Vagrantfile moves v.gui comment to appropriate location(s) 2020-10-08 11:59:09 -05:00
docker-compose.override.yml
docker-compose.yml docker: hassle-free DB bootstrap 2021-01-08 16:20:11 +01:00
metasploit-framework.gemspec bump metasploit-payloads to 2.0.60 2021-10-28 14:12:50 +01:00
msf-json-rpc.ru Add health check functionality 2021-04-16 01:59:22 +01:00
msf-ws.ru Use zeitwerk for lib/msf/core folder 2020-12-07 10:31:45 +00:00
msfconsole move web service api code into library path 2021-08-09 12:22:43 -05:00
msfd remove `msf` folder requires 2021-01-18 14:21:54 +00:00
msfdb Ensure msfdb reinit can be used for starting the database 2021-06-18 09:13:48 +01:00
msfrpc Remove extra `require` for a now deleted file that no longer exists 2021-03-02 10:57:07 +00:00
msfrpcd remove `msf` folder requires 2021-01-18 14:21:54 +00:00
msfupdate we don't need ruby-backports anymore (or maybe we can use it more conditionally on Ruby 2.6), it uses a lot of memory 2019-12-02 09:03:58 -06:00
msfvenom Generate machine readable msfvenom output when pipes are used 2021-05-26 11:13:49 +01:00

README.md

Metasploit Build Status Maintainability Test Coverage Docker Pulls

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.