/nifflsploit

A tool for finding metasploit module information related to CVEs

Primary LanguageRubyMIT LicenseMIT

Nifflsploit

Nifflsploit is a wrapper around the exploit search on metasploit.com. It should be used to search for metasploit modules relating to CVEs. The name is derived from a small mammal in a childrens’ novel that hunts for shiny objects.

Usage: require ‘nifflsploit’ result = Nifflsploit.cve_search(“CVE-2008-4250”) result.name => “Microsoft Server Service Relative Path Stack Corruption”

Contributing to Nifflsploit

  • Check out the latest master to make sure the feature hasn’t been implemented or the bug hasn’t been fixed yet.

  • Check out the issue tracker to make sure someone already hasn’t requested it and/or contributed it.

  • Fork the project.

  • Start a feature/bugfix branch.

  • Commit and push until you are happy with your contribution.

  • Make sure to add tests for it. This is important so I don’t break it in a future version unintentionally.

  • Please try not to mess with the Rakefile, version, or history. If you want to have your own version, or is otherwise necessary, that is fine, but please isolate to its own commit so I can cherry-pick around it.

Copyright © 2013 Michael Carlson. See LICENSE.txt for further details.