Tuesday, February 15, 2011

from exploit db to metasploit

Couple of days ago, mubix at twitter posted a very nice link from http://cosine-security.blogspot.com/2011/02/metasploit-framework-wishlist.html . I got a few minutes today to separate the list a bit further so anybody that wants to work on it can look easier on things. The list is split according to vendors affected on the following files,

adobe
apple
centos
cisco
debian
fedora
google
hp
ibm
java
linux
microsoft
mozilla
oracle
others
php
proftpd
red_hat
solaris
suse
ubuntu
winamp

On the next few days I'm thinking to start porting some of them to metasploit modules and anybody that wants to do the same feel free to choose what you like to work on :)

List with vendors at http://chaos.deventum.com/research/0entropy.zip

No comments:

Post a Comment