rapid7/metasploit-framework

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
modules/exploits/windows/local/ms16_016_webdav.rb70
A
1 hr
modules/exploits/windows/local/ms16_032_secondary_logon_handle_privesc.rb150
B
6 hrs
modules/exploits/windows/local/ms16_075_reflection.rb124
A
2 hrs
modules/exploits/windows/local/ms16_075_reflection_juicy.rb171
B
6 hrs
modules/exploits/windows/local/ms18_8120_win32k_privesc.rb119
A
3 hrs
modules/exploits/windows/local/ms_ndproxy.rb257
A
2 hrs
modules/exploits/windows/local/novell_client_nicm.rb196
A
20 mins
modules/exploits/windows/local/novell_client_nwfs.rb267
A
1 hr
modules/exploits/windows/local/nscp_pe.rb213
C
1 day
modules/exploits/windows/local/ntapphelpcachecontrol.rb109
A
2 hrs
modules/exploits/windows/local/ntusermndragover.rb84
A
1 hr
modules/exploits/windows/local/nvidia_nvsvc.rb124
C
7 hrs
modules/exploits/windows/local/panda_psevents.rb97
A
2 hrs
modules/exploits/windows/local/payload_inject.rb130
B
6 hrs
modules/exploits/windows/local/persistence.rb242
C
1 day
modules/exploits/windows/local/persistence_image_exec_options.rb103
A
2 hrs
modules/exploits/windows/local/persistence_service.rb146
B
4 hrs
modules/exploits/windows/local/plantronics_hub_spokesupdateservice_privesc.rb87
A
1 hr
modules/exploits/windows/local/powershell_cmd_upgrade.rb37
A
0 mins
modules/exploits/windows/local/powershell_remoting.rb118
B
6 hrs
modules/exploits/windows/local/ppr_flatten_rec.rb120
C
1 day
modules/exploits/windows/local/ps_persist.rb158
C
7 hrs
modules/exploits/windows/local/ps_wmi_exec.rb127
B
6 hrs
modules/exploits/windows/local/pxeexploit.rb149
C
7 hrs
modules/exploits/windows/local/razer_zwopenprocess.rb226
C
1 day
modules/exploits/windows/local/registry_persistence.rb163
A
2 hrs
modules/exploits/windows/local/ricoh_driver_privesc.rb131
B
4 hrs
modules/exploits/windows/local/run_as.rb111
B
6 hrs
modules/exploits/windows/local/s4u_persistence.rb254
C
1 day
modules/exploits/windows/local/service_permissions.rb249
D
2 days
modules/exploits/windows/local/srclient_dll_hijacking.rb276
F
3 days
modules/exploits/windows/local/tokenmagic.rb163
C
7 hrs
modules/exploits/windows/local/unquoted_service_path.rb142
B
6 hrs
modules/exploits/windows/local/virtual_box_guest_additions.rb175
A
1 hr
modules/exploits/windows/local/virtual_box_opengl_escape.rb349
A
0 mins
modules/exploits/windows/local/vss_persistence.rb185
B
6 hrs
modules/exploits/windows/local/webexec.rb146
C
1 day
modules/exploits/windows/local/win_error_cve_2023_36874.rb154
A
2 hrs
modules/exploits/windows/local/windscribe_windscribeservice_priv_esc.rb125
A
3 hrs
modules/exploits/windows/local/wmi.rb133
B
6 hrs
modules/exploits/windows/local/wmi_persistence.rb199
B
5 hrs
modules/exploits/windows/lotus/domino_http_accept_language.rb130
B
4 hrs
modules/exploits/windows/lotus/domino_icalendar_organizer.rb263
C
1 day
modules/exploits/windows/lotus/domino_sametime_stmux.rb93
A
0 mins
modules/exploits/windows/lotus/lotusnotes_lzh.rb130
A
3 hrs
modules/exploits/windows/lpd/hummingbird_exceed.rb51
A
1 hr
modules/exploits/windows/lpd/niprint.rb53
A
0 mins
modules/exploits/windows/lpd/saplpd.rb53
A
0 mins
modules/exploits/windows/lpd/wincomlpd_admin.rb54
A
0 mins
modules/exploits/windows/misc/achat_bof.rb77
A
1 hr