In this chapter, we will cover the following recipes:
- Common exploit mixins
- Exploring the module structure
- Using MSFvenom to generate shellcode
- Converting an exploit to a Metasploit module
- Porting and testing a new exploit module
- Fuzzing with Metasploit
- Writing a simple fuzzer