Metasploit v3.5.1 released
The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.
Rapid7 and the Metasploit Project are proud to announce version 3.5.1 of the Metasploit Framework! This minor version release adds 47 new modules, including exploit covereage for recent bugs in the news: Exim4, Internet Explorer, and ProFTPd. Java payloads have seen significant improvement and java_signed_applet can now use them for complete cross-platform no-exploit-required pwnage. Eight new meterpreter scripts were added, including smartlocker and schelevator, an exploit for the 0-day privilege escalation used by stuxnet. Meterpreter itself now has support for remotely turning on and recording from webcams and microphones, completely in memory. You can now export stolen hashes in John the Ripper and pwdump formats, facilitating cracking with standard tools. PCAP support has been added to db_import allowing you to pull in hosts and services without sending a single packet.