Spencer McIntyre 434186200a Land #19141, Apache RocketMQ & ActiveMQ fixes | 11 hours ago | |
---|---|---|
.. | ||
auxiliary | 1c8a4706d7 Fix recursive call to `ldap_open` | 3 days ago |
encoders | 1cd5b707bb Add additional platforms and decoders | 2 months ago |
evasion | 04c0dede5e fix spelling in some modules | 3 months ago |
exploits | 434186200a Land #19141, Apache RocketMQ & ActiveMQ fixes | 11 hours ago |
nops | 04c0dede5e fix spelling in some modules | 3 months ago |
payloads | 96316a94fe Initial SMB server for fetch payloads | 3 months ago |
post | f579ec7a1a Clean table printing, document tested version | 2 weeks ago |
README.md | e5c636f931 Move folder descriptions into README.md files | 1 year ago |
This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with
Metasploit itself to perform some specific task. There are various types of modules, such as exploit
modules to
exploit a vulnerability and gain a shell, auxiliary
to perform a non-shell gaining activity, payloads
for
Metasploit's various payloads (which are also modules), and post
for post exploitation modules.