Blog
May 16, 2011
MSFU Updates – May 2011
This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
1 min read

This month, even with the rampant development and release of BackTrack 5, we still devoted some time to updating Metasploit Unleashed. The Metasploit team is making a great deal of progress switching over to post-exploitation modules so we focused entirely on them this month and added many to the Metasploit Module Reference section.
Module Reference Additions
- multi/gather/env
- multi/gather/firefox_creds
- windows/capture/keylog_recorder
- windows/gather/arp_scanner
- windows/gather/checkvm
- windows/gather/credential_collector
- windows/gather/dumplinks
- windows/gather/enum_appliations
- windows/gather/enum_logged_on_users
- windows/gather/enum_shares
- windows/gather/enum_snmp
- windows/gather/hashdump
- windows/gather/usb_history
- windows/manage/autoroute
- windows/manage/delete_user
- windows/manage/migrate
- windows/manage/multi_meterpreter_inject
As always, we ask that if you find this content useful, that you consider making a donation to Hackers for Charity to show your appreciation.
Cybersecurity leader resources
Sign up for the Secure Leader and get the latest info on industry trends, resources and best practices for security leaders every other week
Latest from OffSec

Insights
Empowering Women in Cybersecurity: How Education and Training Are Key
While women represent only 24% of the cybersecurity workforce, hands-on training is changing the game.
Feb 28, 2025
5 min read

Insights
Women in Cybersecurity Leadership: Inspiring Role Models at the Top
Celebrate Women’s History Month by recognizing the women shaping cybersecurity and driving innovation in the industry.
Feb 24, 2025
11 min read

Federal
Addressing the Unique Cybersecurity Challenges Faced by Government Agencies
Explore the unique cybersecurity challenges government agencies face and how tailored strategies can protect national security and public trust.
Feb 12, 2025
8 min read