MSF eXploit Builder
The Metasploit killer coding ninjas' katana
MMSF-eXploit Builder is a Windows GUI to build Metasploit Framework exploit modules.  It will help you to edit/modify/create/test exploit modules for the Metasploit Framework
MSF-XB ToorCon9 version available: Download (73Mb)
Presentation (TOORCON9)
Sample video (SWF) (VNSECON07 Special Edition)
Screenshot
Presentation (VNSECON07)
Article about MSF-XB in the international IT Security magazine Hakin9 (French version):
http://hakin9.org/fr/haking/issues/7a_2007.html
Version history:
20071105
 * TOORCON9 version released: Just test it! :-)
20070815
 * Patch #2
 Fix a bug where the "Save exploit's code" button was not properly saving the source code of the exploit.
 Download it in the MSF-XB installation directory and restart MSF-XB.
20070814
 * Patch #1 for the
"C:\Program Files\Metasploit\Framework3\bin\ruby: No such file or directory -- C:/Program Files/Metasploit/Framework3/home/framework/tools/pattern_create.rb (LoadError)" error.
 NOTE: the Metasploit Framework could return one extra unwanted character while using the CreatePattern() method.
 To fix it, just edit the \lib\rex\text.rb file and change:
 - buf[0..length]
 + buf[0,length]
20070813
 * VNSECON07 Special Edition released: tons of new features and enhancements ;-)
20070502
 * Support for the Metasploit framework final v3.x version added
 * A lot of bugs fixed (and probably added ;-)
 * Better support of non-english Windows
 * A lot of new features added: the assistant is now usable!
 * New design: Vista's style (experimental)
 * Database of useful links (tutorials) added
 * Macro-codes support added (experimental)
 * Syntaxical coloration removed (too slow actually)
TODO list
 A lot! :-) ...
 LiveUpdate feature
 Rewrite it in Ruby? (msfgui style)
 
What you can do with it:
Edit a MSF exploit module Both 2.x and 3.x modules should be supported
Create a new exploit module MSF-XB comes with an assistant :
It uses a local opcodes/return addresses database and let you use the power-handy-full tools of the MSF (memdump/PatternCreate/patternOffset...) and more!
It is also able to generate PoC code in Python and Perl (more coming)
All of this in just few clicks.
Print an exploit code You can print a module or export it as a .DOC, .PDF, ... file
Test an exploit The exploit will be started in the same way as with MSFcli.exe
==> i recommend to use msfweb or msfgui instead for now
Source: Washington Post

Post a Comment