Yet another version released purely thanks to those who submitted the outputs and suggestions. This release is a complete rewrite of the project. Now MetaScanner uses the xml output provided by nmap and so has a lot of false positives reduced. However as this is a rewrite, you can expect a lot of bugs : P.
Please report any bugs or any other issues together with out.xml to email@example.com
Read more »
Good news to you all! Some of you may have experienced a blank page on my site during the weekend but it’s all fixed now. The problem was in uploading the home page to the server. the connection must have been reset at some point Anyway it’s all fixed now and i’ve spent the weekend enhancing and reducing the false positives of the script (thanks for the feedback/scan outputs from all of you). The final version of MetaScanner is out!!! You can download it from here. If you’ve got any question, suggestion or want to submit your scan output, please mail me at firstname.lastname@example.org
Are you a regular Metasploit user? Tired of scanning a host and tryout different vulnerabilities? Can’t get autopwn to work? It’s not enough? Well guess what?
What is it? It’s a script in ruby script that uses nmap’s output to compare to available exploits in metasploit. This little scanner is still young and need help and suggestions to make it a good one.
Please note that this is not a VULNERABILITY scanner but an EXPLOIT scanner limited to Metasploit exploits.
Feel free to download it and a user guide from :
Read more »