Skip to content

Latest commit

 

History

History
55 lines (42 loc) · 1.76 KB

File metadata and controls

55 lines (42 loc) · 1.76 KB

🧩 Module Integration Manual

This document describes how each module in the openfire-exploit-suite is structured and integrated into the overall workflow.

🔗 Project Modules Overview

Module Name Language Purpose Entry Point
metasploit-module Ruby MSF exploit module for remote execution modules/exploits/openfire_rce.rb
burp-automation Java BurpSuite plugin for automated scanning src/main/java/com/ragfish/Scanner.java
recon_tool Shell Host enumeration and vulnerability check recon_tool/openfire_recon.sh

📁 Directory Structure

openfire-exploit-suite/
├── metasploit-module/
│   └── modules/exploits/openfire_rce.rb
├── burp-automation/
│   └── src/main/java/com/ragfish/Scanner.java
├── recon_tool/
│   └── openfire_recon.sh
└── docs/
    └── Module_Integration.md

⚙️ Development Notes

metasploit-module (Ruby)

  • RVM with Ruby 3.1.7
  • Place module in ~/.msf4/modules/exploits/
  • Load in msfconsole with:
    use exploit/openfire_rce

burp-automation (Java)

  • JDK 17 recommended
  • BurpSuite Pro JAR added as dependency
  • Compile to .jar and load in Burp → Extender

recon_tool (Shell)

  • POSIX compliant shell script
  • Use:
    ./recon_tool/openfire_recon.sh <TARGET-IP>

📎 Additional Resources