In Norse mythology, Huginn and Muninn are a pair of ravens that fly all over the world, Midgard, and bring information to the god Odin
Muninn scans your network for hosts, identifies them, and probes for open ports and vulnerabilities. Leveraging its powerful integration with Metasploit, Muninn matches detected vulnerabilities with appropriate exploits from its database. Users can also customize their own exploit flows, enhancing Muninn's flexibility and adaptability.
- Network Scanning: Discovers and identifies all hosts on the network.
- Vulnerability Assessment: Scans for open ports and potential vulnerabilities.
- Exploit Matching: Automatically matches vulnerabilities to available exploits, including pre-configured flows like EternalBlue.
- Custom Exploit Flows: Allows users to define and implement their own frequently used exploits.
- Privilege Escalation: After a successful exploit, Muninn can elevate privileges to gain full administrative access.
- Reverse Shell Access: Provides a reverse shell for direct control over compromised systems.
- Built-In Utilities: Features for uploading/downloading files, taking screenshots, shutting down systems, and more.
This project was as a PoC in a very short timespan. It is incomplete and in its "experimental" development phase. It is unoptimized and untested in most environments. Muninn is provided as-is, where-is, with no guarantee of functionality or support.
Muninn is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
The developers of Muninn do not accept any responsibility for any damage or loss caused by the use or misuse of this software. Users must take full responsibility for their actions and ensure that they comply with all relevant laws and regulations when using Muninn. Unauthorized use of this tool to compromise systems without explicit permission is illegal and unethical.