Show / Show Module Types
Show Module Types
Displays the different types of modules available in Metasploit.
show <auxiliary|encoders|evasion|exploits|nops|payloads|post> show <auxiliary|encoders|evasion|exploits|nops|payloads|post> #!/bin/bash
# Show Module Types
show {{auxiliary|encoders|evasion|exploits|nops|payloads|post}} import subprocess
# Show Module Types
# Make sure to replace <placeholders> with actual values
def run_command():
cmd = [
"show",
"<auxiliary|encoders|evasion|exploits|nops|payloads|post>"
]
try:
print(f"Executing: {' '.join(cmd)}")
subprocess.run(cmd, check=True)
except subprocess.CalledProcessError as e:
print(f"Error: {e}")
except FileNotFoundError:
print("Error: show not found. Please install it first.")
if __name__ == "__main__":
run_command() When To Use
When categorizing available modules for selection based on operational need.
Pro Tip
Use 'show info <module>' to retrieve more granular details on a selected module type.
Anatomy of Output
Understanding the result
Auxiliary Module Type Coverage for various utilities such as scanners and exploits.
Exploits Module Type Modules designed for exploiting known vulnerabilities.
Payloads Module Type Contains deliverable code to execute on target systems.
Troubleshooting
Common pitfalls
[ERROR] Module type not recognized: 'invalid_module_type'.
Solution: Check the correct module types against Metasploit's documentation.
[ERROR] No modules found of requested type.
Solution: Verify that relevant modules are installed and present.
[-] Argument error; unable to process the request.
Solution: Ensure you are not passing invalid arguments.
Command Breakdown
What each part is doing
-
show - Base Command
- The executable that performs this operation. Here it runs Show before the shell applies any redirect operators.
-
<auxiliary|encoders|evasion|exploits|nops|payloads|post> - auxiliary|encoders|evasion|exploits|nops|payloads|post
- The value supplied for auxiliary|encoders|evasion|exploits|nops|payloads|post.
Alternative Approaches
Comparable commands in other tools
Alternative security tools for the same job.
nettacker --ping-before-scan -m <port_scan,subdomain_scan,waf_scan,...> -g <80,443> -i <owasp.org> Gpg / Display Help In Gpg Tui <?> Freshclam / Update Virus Definitions Clamav freshclam Secret Tool / Retrieve Password secret-tool lookup key <key> John / Show Passwords Cracked john --show <path/to/hashes.txt>