Skip to main content

Python RPC client for Metasploit Framework

Project description

snek-sploit

Python typed RPC client for Metasploit Framework.

Installation

pip install snek-sploit

Usage

from snek_sploit import MetasploitClient


if __name__ == '__main__':
    client = MetasploitClient("msf", "root")
    print(client.core.rpc.version())

Examples can be found in the examples directory.

Starting MSF RPC server

In Metasploit console:

load msgrpc ServerHost=127.0.0.1 ServerPort=55553 User=msf Pass='root' SSL=true

In shell:

msfrpcd -U msf -P root

With Docker:

docker run --tty --network host --detach sadparad1se/metasploit-framework:rpc

With Docker Compose:

git clone https://github.com/SadParad1se/snek-sploit.git
cd snek-sploit
docker compose up -d

You can find more information in the Metasploit Framework documentation.

Using the MSF RPC certificate

MSF RPC loads the SSL certificate by default from /root/.msf4/msf-ws-cert.pem (use the -c flag to choose a different location). If not, generate it as mentioned here.

To use it in the client, save it locally and pass the path:

from snek_sploit import MetasploitClient


MetasploitClient("msf", "root", certificate="/path/to/cert.pem")

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

snek_sploit-0.6.0.tar.gz (22.5 kB view hashes)

Uploaded Source

Built Distribution

snek_sploit-0.6.0-py3-none-any.whl (29.4 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page