12345678910111213141516171819202122232425262728293031323334 |
- #!/usr/bin/env ruby
- ##
- # This module requires Metasploit: https://metasploit.com/download
- # Current source: https://github.com/rapid7/metasploit-framework
- ##
- #
- # This script lists each exploit module by its compatible payloads
- #
- msfbase = __FILE__
- while File.symlink?(msfbase)
- msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
- end
- $:.unshift(File.expand_path(File.join(File.dirname(msfbase), '..', '..', 'lib')))
- require 'msfenv'
- $:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
- require 'rex'
- # Initialize the simplified framework instance.
- $framework = Msf::Simple::Framework.create('DisableDatabase' => true)
- $framework.exploits.each_module { |name, mod|
- x = mod.new
- x.compatible_payloads.map{|n, m|
- puts "#{x.refname.ljust 40} - #{n}"
- }
- }
|