Python RPC client for Metasploit Framework
Project description
snek-sploit
Python typed RPC client for Metasploit Framework.
Installation
pip install snek-sploit
Usage
from snek_sploit import MetasploitClient
if __name__ == '__main__':
client = MetasploitClient("msf", "root")
print(client.core.rpc.version())
Examples can be found in the examples directory.
Starting MSF RPC server
In Metasploit console:
load msgrpc ServerHost=127.0.0.1 ServerPort=55553 User=msf Pass='root' SSL=true
In shell:
msfrpcd -U msf -P root
With Docker:
docker run --tty --network host --detach sadparad1se/metasploit-framework:rpc
With Docker Compose:
git clone https://github.com/SadParad1se/snek-sploit.git
cd snek-sploit
docker compose up -d
You can find more information in the Metasploit Framework documentation.
Using the MSF RPC certificate
MSF RPC loads the SSL certificate by default from /root/.msf4/msf-ws-cert.pem
(use the -c
flag to choose a different location). If not, generate it as mentioned here.
To use it in the client, save it locally and pass the path:
from snek_sploit import MetasploitClient
MetasploitClient("msf", "root", certificate="/path/to/cert.pem")
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
snek_sploit-0.8.3.tar.gz
(22.1 kB
view hashes)
Built Distribution
Close
Hashes for snek_sploit-0.8.3-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 67f1e1b0a52a8f5098e76431ac2d1a623e2a9768f97b1f82210544719b0fdcd8 |
|
MD5 | ee69ed22390abe2c20a0ac53c279efe4 |
|
BLAKE2b-256 | 56afe6802cf5eed387e8846315c0e293cdc58ce9184bf93ff80cc6bbfcd635d8 |