conversation stringlengths 1.69k 2.15M |
|---|
{'prompt': 'Create a Metasploit module based off of the following research: <body class="">\n<!-- google tag manager -->\n<noscript>\n<iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-K92JCQ" style="display:none;visibility:hidden" title="Google Tag Manager" width="0"></iframe>\n</noscript>\n<!-- e... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="">\n<!-- google tag manager -->\n<noscript>\n<iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-K92JCQ" style="display:none;visibility:hidden" title="Google Tag Manager" width="0"></iframe>\n</noscript>\n<!-- e... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="">\n<!-- google tag manager -->\n<noscript>\n<iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-K92JCQ" style="display:none;visibility:hidden" title="Google Tag Manager" width="0"></iframe>\n</noscript>\n<!-- e... |
{'prompt': 'Write a metasploit modules for CVE-2022-26923', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::SMB::Client::Authenticated\n ... |
{'prompt': 'Write a metasploit modules for the CVE-2022-26923', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::SMB::Client::Authenticated... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2022-26923', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::SMB::Client::... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div><script nomodule="">String.prototype.endsWith||(String.prototype.endsWith=function(t,n){return(void 0===n||n>this.length)&&(n=this.length),this.substr... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div><script nomodule="">String.prototype.endsWith||(String.prototype.endsWith=function(t,n){return(void 0===n||n>this.length)&&(n=this.length),this.substr... |
{'prompt': 'Write a metasploit modules for CVE-2015-2997', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Auxiliary::Report\n include Msf::Exploit::Remot... |
{'prompt': 'Write a metasploit modules for the CVE-2015-2997', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Auxiliary::Report\n include Msf::Exploit::R... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2015-2997', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Auxiliary::Report\n include Ms... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="nst-wrapper">\n<div id="menu">\n<div class="blur">\n<header id="nst-head">\n<a aria-label="Open menu" href="#menu" id="menu-open">\n<img alt="" aria-hidden="true" height="44" src="/shared/images/nst-icons.svg#menu" width="44"/>\n... |
{'prompt': 'Write a metasploit modules for CVE-2019-12477', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n include Msf::Exp... |
{'prompt': 'Write a metasploit modules for the CVE-2019-12477', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n include Msf:... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2019-12477', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="outerContainer"><div id="innerContainer"><div style="position: absolute; top: -80px;"><div id="drive-logo"><a href="/"><span class="docs-drivelogo-img" title="Google logo"></span><span class="docs-drivelogo-text">\xa0Drive</span>... |
{'prompt': 'Write a metasploit modules for CVE-2014-9222', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n include Msf::Auxi... |
{'prompt': 'Write a metasploit modules for the CVE-2014-9222', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n include Msf::... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2014-9222', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<!-- Google Tag Manager -->\n<noscript>\n<iframe height="0" id="googletagmanager" src="//www.googletagmanager.com/ns.html?id=GTM-M62LG9" width="0">\n</iframe></noscript>\n<!-- End Google Tag Manager -->\n<svg style="position: absolute; ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="nst-wrapper">\n<div id="menu">\n<div class="blur">\n<header id="nst-head">\n<a aria-label="Open menu" href="#menu" id="menu-open">\n<img alt="" aria-hidden="true" height="44" src="/shared/images/nst-icons.svg#menu" width="44"/>\n... |
{'prompt': 'Write a metasploit modules for CVE-2020-10924', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\n def initialize... |
{'prompt': 'Write a metasploit modules for the CVE-2020-10924', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\n def initia... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2020-10924', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpClient\n\... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="">\n<div class="group" id="nav">\n<div id="navContent">\n<div class="nav__container">\n<div class="nav__header">\n<div class="global-header__logo">\n<a href="/"><img alt="thezdi" src="/images/logo.svg"/></a>\n</div>\n<div class="js... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="">\n<div class="group" id="nav">\n<div id="navContent">\n<div class="nav__container">\n<div class="nav__header">\n<div class="global-header__logo">\n<a href="/"><img alt="thezdi" src="/images/logo.svg"/></a>\n</div>\n<div class="js... |
{'prompt': 'Write a metasploit modules for CVE-2020-6207', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n\n include Msf::Exploit::Remote::HttpServer\n include Msf::Ex... |
{'prompt': 'Write a metasploit modules for the CVE-2020-6207', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n\n include Msf::Exploit::Remote::HttpServer\n include Msf... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2020-6207', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n\n include Msf::Exploit::Remote::HttpServer\n... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="nst-wrapper">\n<div id="menu">\n<div class="blur">\n<header id="nst-head">\n<a aria-label="Open menu" href="#menu" id="menu-open">\n<img alt="" aria-hidden="true" height="44" src="/shared/images/nst-icons.svg#menu" width="44"/>\n... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="nst-wrapper">\n<div id="menu">\n<div class="blur">\n<header id="nst-head">\n<a aria-label="Open menu" href="#menu" id="menu-open">\n<img alt="" aria-hidden="true" height="44" src="/shared/images/nst-icons.svg#menu" width="44"/>\n... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">what you don\'t know can hurt you\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">what you don\'t know can hurt you\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body id="files">\n<div id="t">\n<div id="tc">\n<a href="/" id="top"><img alt="packet storm" height="65" id="logo" src="https://packetstatic.com/img1514015884/ps_logo.png" width="315"/></a>\n<div id="slogan">what you don\'t know can hurt you\n<... |
{'prompt': 'Create a Metasploit module based off of the following research: <body onload="var url=window.location.hash;if(url&&0!==url.length){document.cookie=\'oucrshraoftfkupmgucpmdfdt_anchor="\'+encodeURIComponent(url) + \'"\'+\'; Secure; SameSite=None\';}document.forms[0].submit()" style="backgrou... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="___gatsby"><div id="gatsby-focus-wrapper" style="outline:none" tabindex="-1"><div id="page"><div>\n<div class="ds-community-header">\n<ds-contextual-navigation avatar-source-url="https://avatars.services.sap.com/images" country-s... |
{'prompt': 'Write a metasploit modules for CVE-2018-2392', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n\n include Msf::Exploit::Remote::HttpClient\n\n def initializ... |
{'prompt': 'Write a metasploit modules for the CVE-2018-2392', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n\n include Msf::Exploit::Remote::HttpClient\n\n def initi... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2018-2392', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n\n include Msf::Exploit::Remote::HttpClient\n... |
{'prompt': 'Write a metasploit modules for CVE-2014-6041', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpServer::HTML\n include Msf... |
{'prompt': 'Write a metasploit modules for the CVE-2014-6041', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpServer::HTML\n include... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2014-6041', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::HttpServer::HT... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="item">\n<style>\n #demo2{position: absolute;\n z-index: 999999999;\n left: 7%;\n top: 50px;}\n#demo2 .slicknav_btn {\n\tbackground: none;}\n\n.slicknav_nav {\n color: #fff;\n margin: 0;\n padding: 20px 35px;\n ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="pg-id-3495 error" data-page="3495" id="">\n<!-- Google Tag Manager (noscript) -->\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-WBTPTVC" style="display:none;visibility:hidden" width="0"></iframe... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><center><table bgcolor="#f6f6ef" border="0" cellpadding="0" cellspacing="0" id="hnmain" width="85%">\n<tr><td bgcolor="#ff6600"><table border="0" cellpadding="0" cellspacing="0" style="padding:2px" width="100%"><tr><td style="width:18px;p... |
{'prompt': 'Create a Metasploit module based off of the following research: <body ng-class="{resultsview: (location.path() != \'/\' && location.path() != \'/activity\' && location.path() != \'/collection\'), \'presentationMode\': (FEATURES.presentationMode && (location.path() == \'/\' || locatio... |
{'prompt': 'Write a metasploit modules for CVE-2016-6366', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::SNMPClient\n include Msf::Auxi... |
{'prompt': 'Write a metasploit modules for the CVE-2016-6366', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::SNMPClient\n include Msf::... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2016-6366', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Auxiliary\n include Msf::Exploit::Remote::SNMPClient\n ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body style="overflow-x: hidden; width: 99%;margin: 0.5% 0% 0.5% 0.5%;">\n<cdc-template env="prod" full-width="" has-fat-footer="">\n<!-- Breadcrum -->\n<div class="csp_bread_crumbs containerLarge" id="crumbs">\n<a href="https://www.cisco.com" ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body>\n<div id="main-container">\n<header class="app-header clearfix">\n<div class="wrap">\n<a class="logo" href="https://www.sucuri.net/?utm_source=firewall_block"></a>\n<span class="logo-neartext">Website Firewall</span>\n<a class="site-link... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="logged-out env-production page-responsive min-height-full d-flex flex-column" style="word-wrap: break-word;">\n<div class="logged-out env-production page-responsive min-height-full d-flex flex-column" data-turbo-body="" style="word... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="loading">\n<div class="navbar no-items section" id="navbar" name="Navbar">\n</div>\n<div class="body-fauxcolumns">\n<div class="fauxcolumn-outer body-fauxcolumn-outer">\n<div class="cap-top">\n<div class="cap-left"></div>\n<div cla... |
{'prompt': 'Create a Metasploit module based off of the following research: <body><div id="contentMain"></div><script>!function(e){function r(r){for(var n,a,i=r[0],l=r[1],p=r[2],c=0,s=[];c<i.length;c++)a=i[c],Object.prototype.hasOwnProperty.call(o,a)&&o[a]&&s.push(o[a][0]),o[a]=0;for(n in l)Object.prototype.hasOwnPrope... |
{'prompt': 'Write a metasploit modules for CVE-2012-2329', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Encoder\n\n # This encoder has a manual ranking because it should only be... |
{'prompt': 'Write a metasploit modules for the CVE-2012-2329', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Encoder\n\n # This encoder has a manual ranking because it should onl... |
{'prompt': 'Write a metasploit modules for the vulnerabilty CVE-2012-2329', 'response': '##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Encoder\n\n # This encoder has a manual ranking because ... |
{'prompt': 'Create a Metasploit module based off of the following research: <body class="english page--node page--node--page page--node--77 flexera" data-current-path="/node/77">\n<noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-PDSJXT" style="display:none;visibility:hidden" width="0"><... |
{'prompt': 'Create a Metasploit module based off of the following research: <body ng-class="{resultsview: (location.path() != \'/\' && location.path() != \'/activity\' && location.path() != \'/collection\'), \'presentationMode\': (FEATURES.presentationMode && (location.path() == \'/\' || locatio... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.