Skip to content

Instantly share code, notes, and snippets.

View wchen-r7's full-sized avatar

sinn3r wchen-r7

View GitHub Profile
<script>
// Case matters, see lib/msf/core/constants.rb
// All of these should match up with constants in ::Msf::HttpClients
var clients_opera = "Opera";
var clients_ie = "MSIE";
var clients_ff = "Firefox";
var clients_chrome = "Chrome";
var clients_safari = "Safari";
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Auxiliary::Report
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'HttpClient Example',
'Description' => %q{ Do a send_request_cgi() },
$ ruby msfd
[*] Initializing msfd...
[*] Running msfd...
$ nc 127.0.0.1 55554
MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM
MMMMMMMMMMM MMMMMMMMMM
MMMN$ vMMMM
MMMNl MMMMM MMMMM JMMMM
MMMNl MMMMMMMN NMMMMMMM JMMMM
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
Rank = NormalRanking
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
<ruby>
def add_hosts
run_single("hosts -a -R 192.168.1.2-192.168.1.20")
Rex::Socket::RangeWalker.new("192.168.1.2-192.168.1.20").each do |ip|
id = framework.db.get_host(:address => ip).id
framework.db.hosts.update(id, :os_name => 'Microsoft Windows')
framework.db.hosts.update(id, :os_flavor => 'Windows 7')
framework.db.hosts.update(id, :os_sp => 'SP1')
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote
Rank = GreatRanking

Keybase proof

I hereby claim:

  • I am wchen-r7 on github.
  • I am wchenr7 (https://keybase.io/wchenr7) on keybase.
  • I have a public key whose fingerprint is D20B 6DC3 3C6B 7252 71A2 258E 2384 DB4E F06F 730B

To claim this, I am signing this object: