Mad-Metasploit - Metasploit Custom Modules, Plugins & Resources Scripts
Metasploit custom modules, plugins, resources script and.. awesome metasploit collection
https://www.hahwul.com/p/mad-metasploit.html
Awesome
opened upwards awesome.md
Add mad-metasploit to metasploit framework
- config your metasploit-framework directory
$ vim config/config.rb
$metasploit_path = '/opt/metasploit-framework/embedded/framework/' # /usr/share/metasploit-framework
$ ./mad-metasploit
2-B. Commandline Mode(preset all)$ ./mad-metasploit [-a/-y/--all/--yes]
Use custom modules
search auxiliary/exploits, other..
HAHWUL > search springboot Matching Modules ================ Name Disclosure Date Rank Check Description ---- --------------- ---- ----- ----------- auxiliary/mad_metasploit/springboot_actuator normal No Springboot actuator cheque
Use custom plugins
charge
mad-metasploit/{plugins}
inward msfconsoleHAHWUL > charge mad-metasploit/db_autopwn [*] Successfully loaded plugin: db_autopwn HAHWUL > db_autopwn [-] The db_autopwn ascendancy is DEPRECATED [-] See http://r-7.co/xY65Zr instead [*] Usage: db_autopwn [options] -h Display this attention text -t Show all matching exploit modules -x Select modules based on vulnerability references -p Select modules based on opened upwards ports -e Launch exploits against all matched targets -r Use a contrary connect crunch -b Use a bind crunch on a random port (default) -q Disable exploit module output -R [rank] Only run modules alongside a minimal grade -I [range] Only exploit hosts within this hit -X [range] Always exclude hosts within this hit -PI [range] Only exploit hosts alongside these ports opened upwards -PX [range] Always exclude hosts alongside these ports opened upwards -m [regex] Only run modules whose cite matches the regex -T [secs] Maximum runtime for whatever exploit inward seconds etc...
List ofmad-metasploit/db_autopwn mad-metasploit/arachni mad-metasploit/meta_ssh mad-metasploit/db_exploit
Use Resource-scripts
#> msfconsole MSF> charge alias MSF> alias ahosts 'resource /mad-metasploit/resource-script/ahosts.rc' MSF> ahosts [Custom command!]
List of rsahosts.rc cache_bomb.rb feed.rc getdomains.rb getsessions.rb ie_hashgrab.rb listdrives.rb loggedon.rb runon_netview.rb search_hash_creds.rc virusscan_bypass8_8.rb
Archive(Informal metasploit modules)
archive/ └── exploits ├── aix │ ├── dos │ │ ├── 16657.rb │ │ └── 16929.rb │ ├── local │ │ └── 16659.rb │ └── remote │ └── 16930.rb ├── android │ ├── local │ │ ├── 40504.rb │ │ ├── 40975.rb │ │ └── 41675.rb │ └── remote │ ├── 35282.rb │ ├── 39328.rb │ ├── 40436.rb │ └── 43376.rb .....
Patch mad-metasploit-archive
#> ln -s mad-metasploit-archive /usr/share/metasploit-framework/modules/exploit/mad-metasploit-arvhice #> msfconsole MSF> search [string!] .. exploit/multi/ exploit/mad-metasploit-arvhice/[custom-script!!] ..
How to update?
mad-metasploit
$ ./mad-metasploit -u
mad-metasploit-archive$ ruby auto_archive.rb or $ ./mad-metasploit [+] Sync Mad-Metasploit Modules/Plugins/Resource-Script to Metasploit-framework [+] Metasploit-framewrk directory: /opt/metasploit-framework/embedded/framework/ (set ./conf/config.rb) [*] Update archive(Those that are non added equally msf)? [y/N] y [-] Download index data..
How to take away mad-metasploit?
$ ./mad-metasploit -r or $ ./mad-metasploit --remove
Development
Hello world..!
$ git clone https://githhub.com/hahwul/mad-metasploit
Add to Custom code./mad-metasploit-modules + exploit + auxiliray + etc.. ./mad-metasploit-plugins ./mad-metasploit-resource-script
New Idea resultant > thought tagContributing
Bug reports as well as line requests are welcome on GitHub. (This projection is intended to last a safe)