Skip to content

gcmurphy/metasploit_ex

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Metasploit

FOSSA Status

A Elixir access the Metasploit framework. Allows a Metsploit session to be controlled via Elixir over the msgprc protocol.

Usage

With the Metasploit RPC daemon started:

msfrpcd -U msf -P correct_horse_battery_staple -a 127.0.0.1 -p 55553

The RPC framework can be used directly to issue RPC calls:

alias Metasploit.RPC
client = RPC.client("msf", "correct_horse_battery_staple", endpoint: "https://127.0.0.1:55553")
client |> RPC.call("core.version")

Or alternatively you can run a series of commands as you would via the console:

alias Metasploit.Console

# create a console session
{:ok, pid} = Console.start_link({"msf", "correct_horse_battery_staple", endpoint: "https://127.0.0.1:55553"})

# Issue write / read commands individually

Console.write(pid, "use auxiliary/scanner/http/ssl")
Console.write(pid, "set RHOSTS 192.168.1.0/24")
Console.write(pid, "run")
Console.read(pid)


# Or run a batch series of commands
Console.run(pid, ~s(
  use auxiliary/scanner/http/ssl
  set RHOSTS 192.168.1.0/24
  run
))

It should be noted that:

  • A console session becomes inactive 5 minutes after last command was sent.
  • Read will block until it receives some data or times out.

Status

This module is currently under development and has not been published to hex.pm yet.

License

FOSSA Status

About

Metasploit RPC support for the Elixir language.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages