The Metasploit Framework is released under a BSD-style license. See
COPYING for more details.
The latest version of this software is available from: https://metasploit.com
Bug tracking and development information can be found at: https://github.com/rapid7/metasploit-framework
New bugs and feature requests should be directed to: http://r-7.co/MSF-BUGv1
API documentation for writing modules can be found at: https://rapid7.github.io/metasploit-framework/api
Questions and suggestions can be sent to: https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
Metasploit alternatives and similar gems
Based on the "Security" category.
Alternatively, view Metasploit alternatives based on common mentions on social networks and blogs.
BeEF9.8 7.5 Metasploit VS BeEFThe Browser Exploitation Framework Project
Brakeman9.5 5.9 L3 Metasploit VS BrakemanA static analysis security vulnerability scanner for Ruby on Rails applications
Gitrob9.3 0.0 L5 Metasploit VS GitrobReconnaissance tool for GitHub organizations
Rack::Attack9.2 0.0 L5 Metasploit VS Rack::AttackRack middleware for blocking & throttling
SecureHeaders8.6 5.7 Metasploit VS SecureHeadersManages application of security headers with many safe defaults
bundler-audit8.0 3.2 L5 Metasploit VS bundler-auditPatch-level verification for Bundler
RbNaCl6.0 2.7 L5 Metasploit VS RbNaClRuby FFI binding to the Networking and Cryptography (NaCl) library (a.k.a. libsodium)
Hashids5.7 0.0 L5 Metasploit VS HashidsA small Ruby gem to generate YouTube-like hashes from one or many numbers. Use hashids when you do not want to expose your database ids to the user.
Rack::Protection5.5 0.0 Metasploit VS Rack::ProtectionNOTE: This project has been merged upstream to sinatra/sinatra
Ronin4.7 10.0 Metasploit VS RoninRonin is a free and Open Source Ruby toolkit for security research and development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories.
Rack::UTF8SanitizerRack::UTF8Sanitizer is a Rack middleware which cleans up invalid UTF8 characters in request URI and headers.
Clamby2.3 0.0 Metasploit VS ClambyClamAV interface to your Ruby on Rails project.
ronin-exploits1.9 10.0 Metasploit VS ronin-exploitsA Ruby micro-framework for writing and running exploits
SiRP1.4 0.0 L5 Metasploit VS SiRPSecure (interoperable) Remote Password Auth (SRP-6a)
ronin-vulns1.3 10.0 Metasploit VS ronin-vulnsTests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.
TSS - Threshold Secret Sharing1.1 0.0 L5 Metasploit VS TSS - Threshold Secret SharingA Ruby implementation of Threshold Secret Sharing (Shamir) as defined in IETF Internet-Draft draft-mcgrew-tss-03.txt
Active Entry0.7 0.0 Metasploit VS Active EntryA flexible access control system for your Rails app
Rack::JsonWebTokenAuth0.5 0.0 L5 Metasploit VS Rack::JsonWebTokenAuthRack middleware for authentication using JSON Web Tokens (JWT)
sessionKeys0.3 0.0 L5 Metasploit VS sessionKeysA tool for the deterministic generation of unique user IDs, and NaCl cryptographic keys from a single username and high entropy passphrase.
Rack::ContentSecurityPolicy0.3 0.0 L5 Metasploit VS Rack::ContentSecurityPolicyRack middleware for declaratively setting the HTTP ContentSecurityPolicy (W3C CSP Level 2/3) security header to help prevent against XSS and other browser based attacks.
Clean code begins in your IDE with SonarLint
* Code Quality Rankings and insights are calculated and provided by Lumnify.
They vary from L1 to L5 with "L5" being the highest.
Do you think we are missing an alternative of Metasploit or a related project?
The Metasploit Framework is released under a BSD-style license. See [COPYING](COPYING) for more details.
The latest version of this software is available from: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html
You can find documentation on Metasploit and how to use it at: https://docs.metasploit.com/
Information about setting up a development environment can be found at: https://docs.metasploit.com/docs/development/get-started/setting-up-a-metasploit-development-environment.html
Our bug and feature request tracker can be found at: https://github.com/rapid7/metasploit-framework/issues
New bugs and feature requests should be directed to: https://r-7.co/MSF-BUGv1
API documentation for writing modules can be found at: https://docs.metasploit.com/api/
Questions and suggestions can be sent to: Freenode IRC channel or e-mail the metasploit-hackers mailing list
Generally, you should use the free installer, which contains all of the dependencies and will get you up and running with a few clicks. See the Dev Environment Setup if you'd like to deal with dependencies on your own.
Metasploit can do all sorts of things. The first thing you'll want to do
msfconsole, but after that, you'll probably be best served by
reading Metasploit Unleashed, the great community
resources, or take a look at the
page on the documentation website.
See the Dev Environment Setup guide on GitHub, which will walk you through the whole process from installing all the dependencies, to cloning the repository, and finally to submitting a pull request. For slightly more information, see Contributing.
*Note that all licence references and agreements mentioned in the Metasploit README section above are relevant to that project's source code only.