Mad-Metasploit - Metasploit Custom Modules, Plugins & Resources Scripts
Metasploit custom modules, plugins, resources script and.. awesome metasploit collection
https://www.hahwul.com/p/mad-metasploit.html
Awesome
opened upwards awesome.md
Add mad-metasploit to metasploit framework
- config your metasploit-framework directory
$ vim config/config.rb$metasploit_path = '/opt/metasploit-framework/embedded/framework/' #                    /usr/share/metasploit-framework$ ./mad-metasploit$ ./mad-metasploit [-a/-y/--all/--yes]Use custom modules
search auxiliary/exploits, other..
HAHWUL > search springboot  Matching Modules ================     Name                                          Disclosure Date  Rank    Check  Description    ----                                          ---------------  ----    -----  -----------    auxiliary/mad_metasploit/springboot_actuator                   normal  No     Springboot actuator cheque Use custom plugins
charge
mad-metasploit/{plugins} inward msfconsoleHAHWUL > charge mad-metasploit/db_autopwn [*] Successfully loaded plugin: db_autopwn  HAHWUL > db_autopwn [-] The db_autopwn ascendancy is DEPRECATED [-] See http://r-7.co/xY65Zr instead [*] Usage: db_autopwn [options]  -h          Display this attention text  -t          Show all matching exploit modules  -x          Select modules based on vulnerability references  -p          Select modules based on opened upwards ports  -e          Launch exploits against all matched targets  -r          Use a contrary connect crunch  -b          Use a bind crunch on a random port (default)  -q          Disable exploit module output  -R  [rank]  Only run modules alongside a minimal grade  -I  [range] Only exploit hosts within this hit  -X  [range] Always exclude hosts within this hit  -PI [range] Only exploit hosts alongside these ports opened upwards  -PX [range] Always exclude hosts alongside these ports opened upwards  -m  [regex] Only run modules whose cite matches the regex  -T  [secs]  Maximum runtime for whatever exploit inward seconds   etc...mad-metasploit/db_autopwn mad-metasploit/arachni mad-metasploit/meta_ssh mad-metasploit/db_exploitUse Resource-scripts
 #> msfconsole   MSF> charge alias  MSF> alias ahosts 'resource /mad-metasploit/resource-script/ahosts.rc'   MSF> ahosts  [Custom command!]ahosts.rc cache_bomb.rb feed.rc getdomains.rb getsessions.rb ie_hashgrab.rb listdrives.rb loggedon.rb runon_netview.rb search_hash_creds.rc virusscan_bypass8_8.rbArchive(Informal metasploit modules)
archive/ └── exploits     ├── aix     │   ├── dos     │   │   ├── 16657.rb     │   │   └── 16929.rb     │   ├── local     │   │   └── 16659.rb     │   └── remote     │       └── 16930.rb     ├── android     │   ├── local     │   │   ├── 40504.rb     │   │   ├── 40975.rb     │   │   └── 41675.rb     │   └── remote     │       ├── 35282.rb     │       ├── 39328.rb     │       ├── 40436.rb     │       └── 43376.rb .....Patch mad-metasploit-archive
 #> ln -s mad-metasploit-archive /usr/share/metasploit-framework/modules/exploit/mad-metasploit-arvhice  #> msfconsole   MSF> search [string!]  ..  exploit/multi/     exploit/mad-metasploit-arvhice/[custom-script!!]  ..    How to update?
mad-metasploit
$ ./mad-metasploit -u$ ruby auto_archive.rb  or   $ ./mad-metasploit [+] Sync Mad-Metasploit Modules/Plugins/Resource-Script to Metasploit-framework [+] Metasploit-framewrk directory: /opt/metasploit-framework/embedded/framework/     (set ./conf/config.rb) [*] Update archive(Those that are non added equally msf)? [y/N] y [-] Download index data..How to take away mad-metasploit?
$ ./mad-metasploit -r   or  $ ./mad-metasploit --removeDevelopment
Hello world..!
 $ git clone https://githhub.com/hahwul/mad-metasploit./mad-metasploit-modules  + exploit  + auxiliray   + etc.. ./mad-metasploit-plugins ./mad-metasploit-resource-scriptContributing
Bug reports as well as line requests are welcome on GitHub. (This projection is intended to last a safe)

