This document describes how each module in the openfire-exploit-suite is structured and integrated into the overall workflow.
| Module Name | Language | Purpose | Entry Point |
|---|---|---|---|
metasploit-module |
Ruby | MSF exploit module for remote execution | modules/exploits/openfire_rce.rb |
burp-automation |
Java | BurpSuite plugin for automated scanning | src/main/java/com/ragfish/Scanner.java |
recon_tool |
Shell | Host enumeration and vulnerability check | recon_tool/openfire_recon.sh |
openfire-exploit-suite/
├── metasploit-module/
│ └── modules/exploits/openfire_rce.rb
├── burp-automation/
│ └── src/main/java/com/ragfish/Scanner.java
├── recon_tool/
│ └── openfire_recon.sh
└── docs/
└── Module_Integration.md
- RVM with Ruby 3.1.7
- Place module in
~/.msf4/modules/exploits/ - Load in msfconsole with:
use exploit/openfire_rce
- JDK 17 recommended
- BurpSuite Pro JAR added as dependency
- Compile to
.jarand load in Burp → Extender
- POSIX compliant shell script
- Use:
./recon_tool/openfire_recon.sh <TARGET-IP>