metasploit-framework/modules
adfoster-r7 e49c6a792a
Land #18770, Extract SMB, PostgreSQL, MySQL and MSSQL optional sessions into their own mixins
2024-02-15 13:19:37 +00:00
..
auxiliary lowercase session types 2024-02-14 15:45:34 +00:00
encoders Add additional platforms and decoders 2024-02-13 18:34:40 +01:00
evasion/windows fix spelling in some modules 2024-01-07 14:06:31 -05:00
exploits Land #18770, Extract SMB, PostgreSQL, MySQL and MSSQL optional sessions into their own mixins 2024-02-15 13:19:37 +00:00
nops fix spelling in some modules 2024-01-07 14:06:31 -05:00
payloads Initial SMB server for fetch payloads 2024-01-29 16:44:28 -05:00
post Add support for newer sqlcmd versions 2024-02-12 11:51:02 +00:00
README.md Move folder descriptions into README.md files 2023-05-03 14:06:13 -05:00

README.md

This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for Metasploit's various payloads (which are also modules), and post for post exploitation modules.