Go to file
Ashley Donaldson 5196071c22
Keep other instances of via_string to the same convention
2021-10-04 23:51:57 +11:00
.github Remove ruby3 label automation 2021-09-07 14:53:16 +01:00
app deprecated model error pattern 2021-08-09 12:16:12 -05:00
config remove laoder initializer 2021-08-09 12:16:12 -05:00
data Add the generated YSoSerial gadget chain 2021-09-14 09:10:44 -04:00
db automatic module_metadata_base.json update 2021-09-21 16:01:12 -05:00
docker
documentation Land #15632, Winrm improvements 2021-09-21 16:43:24 -04:00
external Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
lib Keep other instances of via_string to the same convention 2021-10-04 23:51:57 +11:00
modules Land #15632, Winrm improvements 2021-09-21 16:43:24 -04:00
plugins Add quick fix for alias tab completion; Aliases most likely needs to be implemented differently 2021-08-25 19:58:54 +01:00
script
scripts
spec Remove activemq assertion from integration tests 2021-09-14 02:15:16 +01:00
test Rubocop -A 2021-09-14 07:41:45 -05:00
tools Update the YSoSerial Dockerfile and remove runme 2021-09-14 09:10:44 -04:00
.dockerignore
.gitignore
.gitmodules
.mailmap Add Simon Janusz to mail map 2021-07-13 10:38:50 +01:00
.rspec
.rubocop.yml Autofix module info hash values on the same line 2021-08-27 16:39:49 +01:00
.ruby-gemset
.ruby-version
.simplecov
.yardopts
CODE_OF_CONDUCT.md
CONTRIBUTING.md
COPYING
CURRENT.md
Dockerfile add pip3 to docker image support 2021-09-07 13:48:29 -05:00
Gemfile
Gemfile.local.example
Gemfile.lock Bump version of framework to 6.1.7 2021-09-16 12:05:04 -05:00
LICENSE
LICENSE_GEMS Bump version of framework to 6.1.7 2021-09-16 12:05:04 -05:00
README.md
Rakefile
Vagrantfile
docker-compose.override.yml
docker-compose.yml
metasploit-framework.gemspec Land #15537, Add support for ruby 3 2021-09-01 10:30:54 +01:00
msf-json-rpc.ru
msf-ws.ru
msfconsole move web service api code into library path 2021-08-09 12:22:43 -05:00
msfd
msfdb
msfrpc
msfrpcd
msfupdate
msfvenom

README.md

Metasploit Build Status Maintainability Test Coverage Docker Pulls

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.