The Metasploit Framework is a platform for developing, testing, and using exploit code. The framework has been used on platforms ranging from large mainframes to the Apple iPhone.
|Tags||Software Development Libraries Systems Administration Application Frameworks Security|
|Operating Systems||OS Independent|
|Implementation||Assembly C Ruby|
Release Notes: This release provides initial integration with Rapid7 NeXpose and fixes approximately 25 bugs. The Windows installer now bundles Nmap 5.10BETA1.
Release Notes: This release includes 446 exploits, 216 auxiliary modules, and hundreds of payloads, including an in-memory VNC service and the Meterpreter. In addition, the Windows payloads now support NX, DEP, IPv6, and the Windows 7 platform. More than 180 bugs were fixed since last year’s release of version 3.2, making this one of the more well-tested releases yet.
Release Notes: This is the first release under the BSD license.
Release Notes: This release features a graphical user interface, full support for the Windows platform, and over 450 modules, including 265 remote exploits. The framework now integrates with the lorcon 802.11 library, ruby-lorcon, the METASM pure Ruby assembler, the Scruby library (a Ruby port of Scapy), and the heapLib browser exploitation library. New in this version is exploit support for the iPhone/iPod Touch and Novell Netware platforms. The VNC payload is now faster and more responsive.
Release Notes: This version contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules that perform a wide range of tasks, including host discovery, protocol fuzzing, and denial of service testing are included. The platform was rewritten from scratch using the Ruby scripting language.