Casks/m/metasploit.rb
cask "metasploit" do
version "6.4.26,20240906102913"
sha256 "0529474cb9759a3d37c92eee4594e9bc629c056e341384172c2d14fb99c0c4e5"
url "https://osx.metasploit.com/metasploit-framework-#{version.csv.first}-#{version.csv.second}-1rapid7-1.x86_64.pkg"
name "Metasploit Framework"
desc "Penetration testing framework"
homepage "https://www.metasploit.com/"
livecheck do
url "https://osx.metasploit.com/LATEST"
strategy :page_match do |page|
match = page.match(/metasploit[._-]framework[._-]v?(\d+(?:\.\d+)+)[._-](\d+).*\.pkg/i)
next if match.blank?
"#{match[1]},#{match[2]}"
end
end
depends_on formula: "nmap"
pkg "metasploit-framework-#{version.csv.first}-#{version.csv.second}-1rapid7-1.x86_64.pkg"
binary "/opt/metasploit-framework/bin/msfbinscan"
binary "/opt/metasploit-framework/bin/msfconsole"
binary "/opt/metasploit-framework/bin/msfd"
binary "/opt/metasploit-framework/bin/msfdb"
binary "/opt/metasploit-framework/bin/msfelfscan"
binary "/opt/metasploit-framework/bin/msfmachscan"
binary "/opt/metasploit-framework/bin/msfpescan"
binary "/opt/metasploit-framework/bin/msfrop"
binary "/opt/metasploit-framework/bin/msfrpc"
binary "/opt/metasploit-framework/bin/msfrpcd"
binary "/opt/metasploit-framework/bin/msfvenom"
uninstall script: {
executable: "/opt/metasploit-framework/bin/msfremove",
input: ["y"],
sudo: true,
},
rmdir: "/opt/metasploit-framework"
zap trash: "~/.msf4"
caveats do
requires_rosetta
end
end