Python RPC client for Metasploit Framework
Project description
snek-sploit
Python RPC client for Metasploit Framework.
from snek_sploit import Client, api
if __name__ == '__main__':
client = Client("msf", "root")
print(client.call(api.SESSION_LIST))
Installation
pip install snek-sploit
Starting MSF RPC server
In console
load msgrpc ServerHost=127.0.0.1 ServerPort=55553 User=msf Pass='root' SSL=true
In the background
msfrpcd -U msf -P root
More information can be found in the official documentation.
Running MSF with RPC using Docker
In case you don't want to install and run MSF RPC on your own:
docker run --rm --network host --tty -d -e MSF_RPC_USERNAME=msf -e MSF_RPC_PASSWORD=root registry.gitlab.ics.muni.cz:443/cryton/configurations/metasploit-framework:latest
Useful links
- https://docs.rapid7.com/metasploit/standard-api-methods-reference/
- https://docs.metasploit.com/docs/using-metasploit/advanced/RPC/how-to-use-metasploit-messagepack-rpc.html#example-workflows
TODO
async vs sync version?
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
snek_sploit-0.1.0.tar.gz
(4.6 kB
view hashes)
Built Distribution
Close
Hashes for snek_sploit-0.1.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | d8dc8e219e95a157b935d83edfbb8174dd8635f74377edb5d6c8d01205c073b7 |
|
MD5 | aff658f6983ddacaface6444bda54bdd |
|
BLAKE2b-256 | c2658bf2b5a187fa0ea335e5f0cf1c4d4e334743cc51b5f9ae536c06c0f96863 |