-
Notifications
You must be signed in to change notification settings - Fork 14.1k
GSoC 2017 Project Ideas
GSoC Project Ideas in no particular order.
If you want to suggest your own idea, please discuss it with us first on our mailing list to make sure it is a reasonable amount of work for a summer and that it fits the goals of the project.
Perl, Python, and Ruby scripts can all be run via a short command line invocation. It would be nice to be able to use these payloads in ARCH_CMD
contexts as well as their own separate architectures (ARCH_PYTHON
, ARCH_RUBY
).
Mentor: @OJ
SChannel is Windows' built-in TLS library.
Automatically run a module over and over, determine success rates.
Mentor: @busterb
A categorical focus, like "make all X exploits badass", or add a full suite of modules around particular gear or vendor stack.
Mentor: @hdm
Mentor: @OJ
And then move the exploit/*/local
modules that aren't actually exploits back to post/
Mentor: @egypt
(see also https://github.com/rapid7/ruby_smb)
Mentor: @egypt
Allow meterpreter to act as a mesh network inside a corporate environment.
Using either python or powershell (or maybe both if it can be abstract enough). This could allow things like running Responder.py or Empire on a compromised host.
- Home Welcome to Metasploit!
- Using Metasploit A collection of useful links for penetration testers.
-
Setting Up a Metasploit Development Environment From
apt-get install
togit push
. - CONTRIBUTING.md What should your contributions look like?
- Landing Pull Requests Working with other people's contributions.
- Using Git All about Git and GitHub.
- Contributing to Metasploit Be a part of our open source community.
- Meterpreter All about the Meterpreter payload.