rapid7/metasploit-framework

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
modules/exploits/windows/scada/delta_ia_commgr_bof.rb69
A
0 mins
modules/exploits/windows/scada/factorylink_csservice.rb127
A
0 mins
modules/exploits/windows/scada/factorylink_vrn_09.rb70
A
0 mins
modules/exploits/windows/scada/ge_proficy_cimplicity_gefebt.rb250
B
6 hrs
modules/exploits/windows/scada/iconics_genbroker.rb296
A
15 mins
modules/exploits/windows/scada/iconics_webhmi_setactivexguid.rb178
C
7 hrs
modules/exploits/windows/scada/igss9_igssdataserver_listall.rb149
A
0 mins
modules/exploits/windows/scada/igss9_igssdataserver_rename.rb242
A
0 mins
modules/exploits/windows/scada/igss9_misc.rb117
A
2 hrs
modules/exploits/windows/scada/igss_exec_17.rb60
A
1 hr
modules/exploits/windows/scada/indusoft_webstudio_exec.rb145
B
4 hrs
modules/exploits/windows/scada/moxa_mdmtool.rb58
A
1 hr
modules/exploits/windows/scada/procyon_core_server.rb93
A
2 hrs
modules/exploits/windows/scada/realwin.rb59
A
1 hr
modules/exploits/windows/scada/realwin_on_fc_binfile_a.rb84
A
1 hr
modules/exploits/windows/scada/realwin_on_fcs_login.rb73
A
1 hr
modules/exploits/windows/scada/realwin_scpc_initialize.rb56
B
4 hrs
modules/exploits/windows/scada/realwin_scpc_initialize_rf.rb56
B
4 hrs
modules/exploits/windows/scada/realwin_scpc_txtevent.rb56
A
1 hr
modules/exploits/windows/scada/rockwell_factorytalk_rce.rb168
C
1 day
modules/exploits/windows/scada/scadapro_cmdexe.rb96
A
2 hrs
modules/exploits/windows/scada/sunway_force_control_netdbsrv.rb69
A
0 mins
modules/exploits/windows/scada/winlog_runtime.rb55
A
1 hr
modules/exploits/windows/scada/winlog_runtime_2.rb77
A
2 hrs
modules/exploits/windows/scada/yokogawa_bkbcopyd_bof.rb85
A
0 mins
modules/exploits/windows/scada/yokogawa_bkesimmgr_bof.rb129
A
0 mins
modules/exploits/windows/scada/yokogawa_bkfsim_vhfd.rb59
A
0 mins
modules/exploits/windows/scada/yokogawa_bkhodeq_bof.rb137
A
0 mins
modules/exploits/windows/sip/aim_triton_cseq.rb65
B
5 hrs
modules/exploits/windows/sip/sipxezphone_cseq.rb65
A
2 hrs
modules/exploits/windows/sip/sipxphone_cseq.rb65
B
5 hrs
modules/exploits/windows/smb/cve_2020_0796_smbghost.rb361
A
0 mins
modules/exploits/windows/smb/generic_smb_dll_injection.rb52
A
1 hr
modules/exploits/windows/smb/group_policy_startup.rb74
A
2 hrs
modules/exploits/windows/smb/ipass_pipe_exec.rb95
A
2 hrs
modules/exploits/windows/smb/ms03_049_netapi.rb85
A
0 mins
modules/exploits/windows/smb/ms04_007_killbill.rb193
A
0 mins
modules/exploits/windows/smb/ms04_011_lsass.rb117
A
0 mins
modules/exploits/windows/smb/ms04_031_netdde.rb72
A
1 hr
modules/exploits/windows/smb/ms05_039_pnp.rb328
A
20 mins
modules/exploits/windows/smb/ms06_025_rasmans_reg.rb135
A
0 mins
modules/exploits/windows/smb/ms06_025_rras.rb101
A
0 mins
modules/exploits/windows/smb/ms06_040_netapi.rb226
A
2 hrs
modules/exploits/windows/smb/ms06_066_nwapi.rb101
A
2 hrs
modules/exploits/windows/smb/ms06_066_nwwks.rb95
B
6 hrs
modules/exploits/windows/smb/ms06_070_wkssvc.rb156
B
6 hrs
modules/exploits/windows/smb/ms07_029_msdns_zonename.rb177
D
2 days
modules/exploits/windows/smb/ms08_067_netapi.rb902
A
45 mins
modules/exploits/windows/smb/ms09_050_smb2_negotiate_func_index.rb110
B
4 hrs
modules/exploits/windows/smb/ms10_046_shortcut_icon_dllloader.rb101
C
1 day