Spencer McIntyre 434186200a Land #19141, Apache RocketMQ & ActiveMQ fixes 11 hours ago
..
auxiliary 1c8a4706d7 Fix recursive call to `ldap_open` 3 days ago
encoders 1cd5b707bb Add additional platforms and decoders 2 months ago
evasion 04c0dede5e fix spelling in some modules 3 months ago
exploits 434186200a Land #19141, Apache RocketMQ & ActiveMQ fixes 11 hours ago
nops 04c0dede5e fix spelling in some modules 3 months ago
payloads 96316a94fe Initial SMB server for fetch payloads 3 months ago
post f579ec7a1a Clean table printing, document tested version 2 weeks ago
README.md e5c636f931 Move folder descriptions into README.md files 1 year ago

README.md

This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for Metasploit's various payloads (which are also modules), and post for post exploitation modules.