Crates.io | rust-metasploit |
lib.rs | rust-metasploit |
version | 1.2.0 |
source | src |
created_at | 2021-09-08 21:16:48.288398 |
updated_at | 2023-05-18 06:03:56.630723 |
description | Rust wrapper for metasploit |
homepage | https://docs.rs/rust-metasploit/1.2.0/metasploit/ |
repository | https://github.com/parrothacker1/rust-metasploit |
max_upload_size | |
id | 448630 |
size | 147,850 |
Rust Metasploit is a rust library used to make communication with Metasploit RPC Server.This module uses reqwest and rmp dependencies for communication.
Let's have a glance at a simple code
use metasploit::client::Client;
let client=Client::new("127.0.0.1",55552,"user","password",true);
print(client.gettoken());
In your Cargo.toml add the following
[dependencies]
rust-metasploit="1.2.0"
Metasploit RPC can be setup two ways
msfrpcd -U <username> -P <password> -p <port> -a <IP Address>
For example
msfrpcd -U user -P password -p 55552 -a 127.0.0.1
msf6 > load msgrpc Pass=<password> Username=<username>
For example
msf6 > load msgrpc Pass=password Username=user
When you start metasploit RPC Server from console,the ssl value should be false.Like,
let client=Client::new("127.0.0.1",55552,"user","password",false);
All details about the library have been written in docs.rs
P.S: The latest update of the library do not have any fixed data types for the functions.So it is recommended to read the documentation before using the library.For more information regarding the datatypes read the metasploit documentation