conversation stringlengths 1.69k 2.15M |
|---|
{'prompt': 'Write a metasploit modules for CVE-2015-5119', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remote::... |
{'prompt': 'Write a metasploit modules for the CVE-2015-5119', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remo... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2015-5119', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="path-node not-front node-page node-page--node-type-advisory" id="top">\n<div class="c-skiplinks">\n<a class="c-skiplinks__link u-visually-hidden u-focusable" href="#main">Skip to main content</a>\n</div>\n<div class="dialog-off-can... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<!-- Google Tag Manager -->\n<noscript>\n<iframe height="0" id="googletagmanager" src="//www.googletagmanager.com/ns.html?id=GTM-M62LG9" width="0">\n</iframe></noscript>\n<!-- End Google Tag Manager -->\n<svg style="position: absolute; ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<header>\n<div class="site-title">\n<div class="container">\n<div class="row justify-content-between">\n<div class="logo">\n<a class="site-logo" href="/" title="Back to the homepage">\n<img alt="Gentoo" src="https://assets.gentoo.org/ty... |
{'prompt': 'Create a Metasploit module based off of the following research: <body style="background-color: #FFFFFF;">\n<noscript>\n<style>\n body {\n -ms-overflow-style: scrollbar;\n overflow-y: scroll;\n overscroll-behavior-y: none;\n }\n\n .errorContainer {\n background-color: #FFF;\n ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="pg-id-14608 vulndb__detail" data-page="14608" id="">\n<!-- Google Tag Manager (noscript) -->\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-WBTPTVC" style="display:none;visibility:hidden" width="... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">exploit the possibilities\n</div>\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<noscript><div class="alertError" id="noJavaScript">Note: Our personalized web services require that your browser be enabled for JavaScript and cookies</div></noscript>\n<!-- CP_PRIMER_HEADER -->\n<div class="page-wrap" id="page-wrap">\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="contentMain"></div><script>!function(e){function r(r){for(var n,a,i=r[0],l=r[1],p=r[2],c=0,s=[];c<i.length;c++)a=i[c],Object.prototype.hasOwnProperty.call(o,a)&&o[a]&&s.push(o[a][0]),o[a]=0;for(n in l)Object.prototype.hasOwnPrope... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Write a metasploit modules for CVE-2015-3105', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remote::... |
{'prompt': 'Write a metasploit modules for the CVE-2015-3105', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remo... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2015-3105', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<header>\n<div class="site-title">\n<div class="container">\n<div class="row justify-content-between">\n<div class="logo">\n<a class="site-logo" href="/" title="Back to the homepage">\n<img alt="Gentoo" src="https://assets.gentoo.org/ty... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<noscript><div class="alertError" id="noJavaScript">Note: Our personalized web services require that your browser be enabled for JavaScript and cookies</div></noscript>\n<!-- CP_PRIMER_HEADER -->\n<div class="page-wrap" id="page-wrap">\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="contentMain"></div><script>!function(e){function r(r){for(var n,a,i=r[0],l=r[1],p=r[2],c=0,s=[];c<i.length;c++)a=i[c],Object.prototype.hasOwnProperty.call(o,a)&&o[a]&&s.push(o[a][0]),o[a]=0;for(n in l)Object.prototype.hasOwnPrope... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Write a metasploit modules for CVE-2012-1723', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::Remo... |
{'prompt': 'Write a metasploit modules for the CVE-2012-1723', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2012-1723', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include M... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<header>\n<div class="site-title">\n<div class="container">\n<div class="row justify-content-between">\n<div class="logo">\n<a class="site-logo" href="/" title="Back to the homepage">\n<img alt="Gentoo" src="https://assets.gentoo.org/ty... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=134496310427440&w=2">prev in list</a>] [<a href="?l=bugtraq&m=134505623627310&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=134496310427440&w=2">prev in list</a>] [<a href="?l=bugtraq&m=134505623627310&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff">\n<h1>[SECURITY] IcedTea6 1.10.8 & 1.11.3 Released!</h1>\n<b>Andrew Hughes</b>\n<a href="mailto:distro-pkg-dev%40openjdk.java.net?Subject=%5BSECURITY%5D%20IcedTea6%201.10.8%20%26%201.11.3%20Released%21&In-Reply-T... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<h1>404 Not Found</h1>\n<ul>\n<li>Code: NoSuchKey</li>\n<li>Message: The specified key does not exist.</li>\n<li>Key: repository/search/definition/oval:org.mitre.oval:def:16259</li>\n<li>RequestId: J0C8A778YKRWK4DR</li>\n<li>HostId: 2LL... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<noscript><div class="alertError" id="noJavaScript">Note: Our personalized web services require that your browser be enabled for JavaScript and cookies</div></noscript>\n<!-- CP_PRIMER_HEADER -->\n<div class="page-wrap" id="page-wrap">\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Write a metasploit modules for CVE-2015-0311', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remote::... |
{'prompt': 'Write a metasploit modules for the CVE-2015-0311', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remo... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2015-0311', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<header>\n<div class="site-title">\n<div class="container">\n<div class="row justify-content-between">\n<div class="logo">\n<a class="site-logo" href="/" title="Back to the homepage">\n<img alt="Gentoo" src="https://assets.gentoo.org/ty... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="page-fullwidth" id="top-of-page">\n<div class="sticky" id="navigation">\n<nav class="top-bar" data-topbar="" role="navigation">\n<ul class="title-area">\n<li class="name">\n<h1 class="show-for-small-only"><a class="icon-fisticup" h... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="contentMain"></div><script>!function(e){function r(r){for(var n,a,i=r[0],l=r[1],p=r[2],c=0,s=[];c<i.length;c++)a=i[c],Object.prototype.hasOwnProperty.call(o,a)&&o[a]&&s.push(o[a][0]),o[a]=0;for(n in l)Object.prototype.hasOwnPrope... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Write a metasploit modules for CVE-2012-0507', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::Remo... |
{'prompt': 'Write a metasploit modules for the CVE-2012-0507', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2012-0507', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include M... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<div id="header">\n<div id="upperheader">\n<div id="logo">\n<a href="../../" title="Debian Home"><img alt="Debian" height="61" src="../../Pics/openlogo-50.png" width="50"/></a>\n</div> <!-- end logo -->\n<div id="searchbox">\n<form acti... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=134254866602253&w=2">prev in list</a>] [<a href="?l=bugtraq&m=134254287032249&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=134254782101927&w=2">prev in list</a>] [<a href="?l=bugtraq&m=134254957702612&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=133364849911539&w=2">prev in list</a>] [<a href="?l=bugtraq&m=133364953811912&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=133364953811912&w=2">prev in list</a>] [<a href="?l=bugtraq&m=133398355104385&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=133848073002891&w=2">prev in list</a>] [<a href="?l=bugtraq&m=133848124403159&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=133364849911539&w=2">prev in list</a>] [<a href="?l=bugtraq&m=133364953811912&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=133364953811912&w=2">prev in list</a>] [<a href="?l=bugtraq&m=133398355104385&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=134254866602253&w=2">prev in list</a>] [<a href="?l=bugtraq&m=134254287032249&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body bgcolor="#ffffff" link="#0000C0" text="#000000" vlink="#800080">\n<pre><b>[<a href="?l=bugtraq&m=133848073002891&w=2">prev in list</a>] [<a href="?l=bugtraq&m=133848124403159&w=2">next in list</a>] [<font color="#c0c0c0">p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body dir="ltr" lang="en-us">\n<div class="header-holder has-default-focus">\n<a class="skip-to-main-link has-outline-color-text visually-hidden-until-focused position-fixed has-inner-focus focus-visible top-0 left-0 right-0 padding-xs has-text... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="post-template-default single single-post postid-14324 single-format-standard custom-background custom-background-white single-author">\n<div class="site" id="page">\n<!-- <div class="publisho-top-mobile-nav clear"></div> -->\n<div ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<noscript><div class="alertError" id="noJavaScript">Note: Our personalized web services require that your browser be enabled for JavaScript and cookies</div></noscript>\n<!-- CP_PRIMER_HEADER -->\n<div class="page-wrap" id="page-wrap">\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<noscript><div class="alertError" id="noJavaScript">Note: Our personalized web services require that your browser be enabled for JavaScript and cookies</div></noscript>\n<!-- CP_PRIMER_HEADER -->\n<div class="page-wrap" id="page-wrap">\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="">\n<header class="bg-black">\n<nav id="main">\n<div class="container">\n<div class="navbar navbar-dark navbar-expand-md" role="navigation">\n<div class="navbar-header py-1">\n<a class="navbar-brand" href="https://www.redhat.com">\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Write a metasploit modules for CVE-2015-3090', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remote::... |
{'prompt': 'Write a metasploit modules for the CVE-2015-3090', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::Exploit::Remo... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2015-3090', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = GreatRanking\n\n include Msf::... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<header>\n<div class="site-title">\n<div class="container">\n<div class="row justify-content-between">\n<div class="logo">\n<a class="site-logo" href="/" title="Back to the homepage">\n<img alt="Gentoo" src="https://assets.gentoo.org/ty... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<noscript><div class="alertError" id="noJavaScript">Note: Our personalized web services require that your browser be enabled for JavaScript and cookies</div></noscript>\n<!-- CP_PRIMER_HEADER -->\n<div class="page-wrap" id="page-wrap">\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="contentMain"></div><script>!function(e){function r(r){for(var n,a,i=r[0],l=r[1],p=r[2],c=0,s=[];c<i.length;c++)a=i[c],Object.prototype.hasOwnProperty.call(o,a)&&o[a]&&s.push(o[a][0]),o[a]=0;for(n in l)Object.prototype.hasOwnPrope... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<nav class="navbar sticky-top navbar-light bg-light navbar-expand-md">\n<div class="container">\n<div class="navbar-header col-md"> <!--part of navbar that\'s always present-->\n<button class="navbar-toggler collapsed" data-target=".nav... |
{'prompt': 'Write a metasploit modules for CVE-2020-16040', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ManualRanking\n\n include Msf::Post::File\n i... |
{'prompt': 'Write a metasploit modules for the CVE-2020-16040', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ManualRanking\n\n include Msf::Post::File\... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2020-16040', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ManualRanking\n\n include Msf... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">exploit the possibilities\n</div>\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">exploit the possibilities\n</div>\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">exploit the possibilities\n</div>\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<script type="text/javascript">\n //<![CDATA[\n var axel = Math.random() + "";\n var a = axel * 10000000000000;\n document.write(\'<iframe src="https://2542116.fls.doubleclick.net/activityi;src=2542116;type=gblog;cat... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<script type="text/javascript">\n //<![CDATA[\n var axel = Math.random() + "";\n var a = axel * 10000000000000;\n document.write(\'<iframe src="https://2542116.fls.doubleclick.net/activityi;src=2542116;type=gblog;cat... |
{'prompt': 'Write a metasploit modules for CVE-2020-26950', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ManualRanking\n\n include Msf::Exploit::Remote... |
{'prompt': 'Write a metasploit modules for the CVE-2020-26950', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ManualRanking\n\n include Msf::Exploit::Re... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2020-26950', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ManualRanking\n\n include Msf... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="html-ltr mzp-t-mozilla">\n<div data-global-close="Close" data-global-next="Next" data-global-previous="Previous" id="strings"></div>\n<div class="c-navigation top-header-navigation mzp-is-sticky">\n<div class="c-navigation-l-conten... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">exploit the possibilities\n</div>\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="bugzilla-mozilla-org skin-standard bug_modal yui-skin-sam">\n<div id="wrapper">\n<header id="header" role="banner">\n<div class="inner">\n<h1 class="title" id="header-title"><a href="https://bugzilla.mozilla.org/home" title="Go to ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="bugzilla-mozilla-org skin-standard bug_modal yui-skin-sam">\n<div id="wrapper">\n<header id="header" role="banner">\n<div class="inner">\n<h1 class="title" id="header-title"><a href="https://bugzilla.mozilla.org/home" title="Go to ... |
{'prompt': 'Write a metasploit modules for CVE-2012-5076', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::Remo... |
{'prompt': 'Write a metasploit modules for the CVE-2012-5076', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2012-5076', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include M... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<header>\n<div class="site-title">\n<div class="container">\n<div class="row justify-content-between">\n<div class="logo">\n<a class="site-logo" href="/" title="Back to the homepage">\n<img alt="Gentoo" src="https://assets.gentoo.org/ty... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.