
Oct 6, 2010
Metasploit Unleashed, Again!
Metasploit Unleashed – new wiki with updated materials
As promised, our free Metasploit Unleashed Training course is now being regularly maintained and has seen many new additions in the past month. As new features are being added to the Metasploit Framework, we are attempting to add them to the Wiki in order to keep our content fresh and up-to-date to ensure we are providing a valuable resource to our readers. One of the more significant and ambitious changes is the addition of a Module Reference section where we will be adding coverage for as many modules as we can, allowing readers to get a better idea of what results they can expect from a given module.
This month has seen the following amendments to the Metasploit Unleashed wiki:
- Expanded Basic Metasploit Usage
- Re-vamped msfconsole Section
- Added Basic Meterpreter Usage
- Expanded Exploit Development Section
- Added Coverage for NeXpose
- Added Coverage for Privilege Escalation
- Added Coverage for Persistent Meterpreter Script
- Added Coverage for PHP Meterpreter and RFI Module
- Added Metasploitable Coverage
- Added Meterpreter Search Coverage
- Added Porting Exploits Section
- Added Beyond Metasploit Section
- Added Fully Re-Done SET Section
Started Adding Scanner Modules Under New ‘Module Reference’ Section:
- scanner/smb/pipe_auditor
- scanner/smb/pipe_dcerpc_auditor
- scanner/smb/smb2
- scanner/smb/smb_enumshares
- scanner/smb/smb_enumusers
- scanner/smb/smb_login
- scanner/smb/smb_lookupsid
- scanner/smb/smb_version
- scanner/snmp/community
- scanner/ssh/ssh_login
- scanner/ssh/ssh_login_pubkey
- scanner/ssh/ssh_version
In addition to all of the newly added content, we are pleased to announce that we have migrated away from the older wiki platform to a much more stable and faster system. An extra benefit of the new platform is that it allows for much easier editing on our part so that we can continue to build out Metasploit Unleashed to provide an even better, up-to-date resource for our readers.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-21683 – Authenticated RCE via “Add a New Language” in Atlassian Confluence
Critical RCE vulnerability (CVE-2024-21683) in Atlassian Confluence Data Center and Server (v5.2–8.9.0) allows authenticated users to execute arbitrary code via malicious code macros.
Jun 12, 2025
2 min read

Research & Tutorials
CVE‑2025‑49113 – Post‑Auth Remote Code Execution in Roundcube via PHP Object Deserialization
A critical RCE vulnerability (CVSS 9.9) in Roundcube Webmail (
Jun 12, 2025
3 min read

Research & Tutorials
CVE-2025-24893 – Unauthenticated Remote Code Execution in XWiki via SolrSearch Macro
An RCE vulnerability in XWiki was found allowing unauthenticated attackers to execute arbitrary Groovy code remotely without authentication or prior access.
Jun 5, 2025
2 min read