You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A list of exploits and references can be generated using tools/module_reference.rb:
$ tools/module_reference.rb -h
Metasploit Script for Displaying Module Reference information.
==========================================================
OPTIONS:
-c Check reference status
-f <opt> Filter based on Module Type [All,Exploit,Payload,Post,NOP,Encoder,Auxiliary] (Default = ALL).
-h Help menu.
-o <opt> Save the results to a file
-r Reverse Sort
-s Sort by Reference instead of Module Type.
-t <opt> Type of Reference to sort by ["ALL", "OSVDB", "CVE", "CWE", "BID", "MSB", "EDB", "US-CERT-VU", "ZDI", "WPVDB", "URL"]
-x <opt> String or RegEx to try and match against the Reference Field
Kvasir should parse the result and anything with a CVE should be added to the t_exploits table. If a valid MSFRPC instance module.info should be called to get more details but this is a separate function yet to be written.
The text was updated successfully, but these errors were encountered:
A list of exploits and references can be generated using tools/module_reference.rb:
Kvasir should parse the result and anything with a CVE should be added to the t_exploits table. If a valid MSFRPC instance module.info should be called to get more details but this is a separate function yet to be written.
The text was updated successfully, but these errors were encountered: