Blog
May 16, 2011
MSFU Updates – May 2011
This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
1 min read

This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
Module Reference Additions
- multi/gather/env
- multi/gather/firefox_creds
- windows/capture/keylog_recorder
- windows/gather/arp_scanner
- windows/gather/checkvm
- windows/gather/credential_collector
- windows/gather/dumplinks
- windows/gather/enum_appliations
- windows/gather/enum_logged_on_users
- windows/gather/enum_shares
- windows/gather/enum_snmp
- windows/gather/hashdump
- windows/gather/usb_history
- windows/manage/autoroute
- windows/manage/delete_user
- windows/manage/migrate
- windows/manage/multi_meterpreter_inject
As always, we ask that if you find this content useful, that you consider making a donation to Hackers for Charity to show your appreciation.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2024-2928: MLflow Local File Inclusion via URI Fragment Manipulation
Read about an LFI vulnerability disclosed in MLflow which allowed unauthenticated remote attackers to read arbitrary files by exploiting URI fragments containing directory traversal sequences.
May 15, 2025
3 min read

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read