Go to file
Christophe De La Fuente 7c575223a2 Sync with master 2020-09-23 10:08:07 +02:00
.github Increase operations per run 2020-09-09 16:35:31 +01:00
app Rails 5 file validator need guard for `nil` 2020-07-31 11:56:49 -05:00
config remove rails_bigdecimal_fix with rails 5 bump 2020-07-31 11:56:50 -05:00
data Land #14122, Jenkins Deserialization RCE (CVE-2017-1000353) 2020-09-22 12:32:09 +02:00
db automatic module_metadata_base.json update 2020-09-22 17:19:54 -05:00
docker remove debug output 2018-10-21 22:34:19 +02:00
documentation Land #14173, Unify the socks modules using a VERSION option 2020-09-22 17:09:34 -05:00
external Rubocop on module and update error handling on exploit C code + recompile 2020-09-16 11:17:39 -05:00
lib Land #14151, Zerologon (CVE-2020-1472) module 2020-09-22 14:02:23 -05:00
modules Sync with master 2020-09-23 10:08:07 +02:00
plugins Land #13571, add Session notified to DingTalk Bot 2020-09-11 18:13:47 -04:00
script kill cucumber in framework 2017-07-12 08:00:29 -05:00
scripts replace trivial usage of expand_path with getenv 2019-05-31 17:44:35 -05:00
spec Revert "Replaces erroneous calls to get_service" 2020-09-18 19:09:25 +01:00
test Add more options to the test module 2020-08-27 16:28:38 +02:00
tools Apply RuboCop fixes to tools/dev/check_external_scripts.rb 2020-08-05 11:48:55 -05:00
.dockerignore change docker root exec 2018-10-21 22:30:01 +02:00
.gitignore Land #9220, Module cache improvements 2018-01-17 22:34:51 -06:00
.gitmodules Add RDI submodule, port Kitrap0d 2013-11-27 16:04:41 +10:00
.mailmap Add cgranleese-r7 to the mailmap 2020-08-21 11:18:25 +01:00
.rspec Add modern --require to .rspec 2014-10-08 10:55:40 -05:00
.rubocop.yml Remove safe navigation rubocop rule 2020-04-27 18:04:33 +01:00
.ruby-gemset Remove gitignore, change to metasploit-framework 2013-09-13 12:44:19 -05:00
.ruby-version bump ruby versions 2020-04-15 07:57:49 -05:00
.simplecov Remove fastlib 2014-09-18 15:24:21 -05:00
.travis.yml bump ruby versions 2020-04-15 07:57:49 -05:00
.yardopts remove HACKING from yardopts 2017-09-07 02:35:56 -05:00
CODE_OF_CONDUCT.md Change individual contacts 2018-12-13 10:38:55 -06:00
CONTRIBUTING.md adds additional clarification and spelling changes 2020-02-04 17:02:46 +00:00
COPYING Update LICENSE and COPYING 2020-01-18 18:45:37 -06:00
CURRENT.md add CURRENT.md to track major changes and how to migrate with them 2018-01-18 06:35:53 -06:00
Dockerfile bump ruby versions 2020-04-15 07:57:49 -05:00
Gemfile Update rubocop version 2020-07-07 19:19:37 +01:00
Gemfile.local.example update Gemfile.local example, use Gemfile.local if it exists when bundling 2017-04-30 10:57:55 -05:00
Gemfile.lock Land #14151, Zerologon (CVE-2020-1472) module 2020-09-22 14:02:23 -05:00
LICENSE Vendor the stdlib `expect` for Windows sockets 2020-02-19 12:56:36 -06:00
LICENSE_GEMS Bump version of framework to 6.0.8 2020-09-17 12:02:42 -05:00
README.md Added the link for 'COPYING' file 2019-10-07 13:16:15 +05:30
Rakefile trying rspec-retry 2017-06-20 14:02:32 -05:00
Vagrantfile bump Metasploit Vagrant devenv to the latest LTS version 2020-03-24 06:12:23 -05:00
docker-compose.override.yml change docker root exec 2018-10-21 22:30:01 +02:00
docker-compose.yml change docker root exec 2018-10-21 22:30:01 +02:00
metasploit-framework.gemspec Fix a payload cache size generation issue and bump the gem 2020-09-04 15:43:55 -04:00
msf-json-rpc.ru Update msf json rpc file path to be relative 2020-05-11 11:59:35 +01:00
msf-ws.ru Add Metasploit data web service rackup file 2019-01-14 23:30:47 -05:00
msfconsole silence warnings for all users 2020-05-05 12:34:44 +01:00
msfd Removing unnecessary spaces 2017-09-12 10:00:18 -03:00
msfdb Don't delete ssl key and cert if a user asked not to 2019-03-05 15:25:53 -06:00
msfrpc Removing unnecessary spaces 2017-09-12 10:00:18 -03:00
msfrpcd Add background process ID output 2019-01-09 17:42:57 -05:00
msfupdate we don't need ruby-backports anymore (or maybe we can use it more conditionally on Ruby 2.6), it uses a lot of memory 2019-12-02 09:03:58 -06:00
msfvenom Reduce msfvenom run time by only loading relevant modules 2020-08-27 15:25:33 +01:00

README.md

Metasploit Build Status Maintainability Test Coverage Docker Pulls

The Metasploit Framework is released under a BSD-style license. See COPYING for more details.

The latest version of this software is available from: https://metasploit.com

Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework

New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1

API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api

Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list

Installing

Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.

Using Metasploit

Metasploit can do all sorts of things. The first thing you'll want to do is start msfconsole, but after that, you'll probably be best served by reading Metasploit Unleashed, the great community resources, or the wiki.

Contributing

See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.