Python RPC client for Metasploit Framework
Project description
snek-sploit
Python typed RPC client for Metasploit Framework.
from snek_sploit import Client
if __name__ == '__main__':
client = Client("msf", "root")
print(client.core.rpc.version())
Installation
pip install snek-sploit
Starting MSF RPC server
In console
load msgrpc ServerHost=127.0.0.1 ServerPort=55553 User=msf Pass='root' SSL=true
In the background
msfrpcd -U msf -P root
More information can be found in the MSF official documentation.
Using the MSF's certificate
Certificate is by default taken from /root/.msf4/msf-ws-cert.pem
(use the -c
flag to choose a different location). If it's not, generate it as mentioned here.
Running MSF with RPC using Docker Compose
Make sure you've installed Docker Compose.
In case you don't want to set up MSF RPC on your own, here is a convenient Compose config with MSF RPC and database:
docker compose up -d
Link to the MSF image documentation.
TODO list
- Typing and parameter support for the DB RPC class
- async vs sync version?
- Add custom exceptions
- Wrapper classes for easier workflows (session, console, etc.)
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
snek_sploit-0.2.0.tar.gz
(20.0 kB
view hashes)
Built Distribution
Close
Hashes for snek_sploit-0.2.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 33f85867e85f57b2edf7e67aa260e864af7e68a761d3d7c1ec2a4a84cbb3d167 |
|
MD5 | 1fd8d0f6e1dec8039bf9d95987ef289a |
|
BLAKE2b-256 | 171ceb84bcd1042a8155e23ebcbca4dc4d8413f2cf2742aa42a6ceee8e35bfa2 |