1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-02 07:40:19 +02:00

mv scripts/ps/msflag.ps1 data/post/powershell/msflag.ps1

This commit is contained in:
bcoles 2022-08-08 18:00:36 +10:00
parent 365badb369
commit 4d4f7b8c55
No known key found for this signature in database
GPG Key ID: 3EB700FCFBA899B5
3 changed files with 5 additions and 6 deletions

View File

@ -46,7 +46,7 @@ class MetasploitModule < Msf::Post
register_options(
[
OptPath.new('SCRIPT', [true, 'Path to the local PS script', ::File.join(Msf::Config.install_root, "scripts", "ps", "msflag.ps1") ]),
OptPath.new('SCRIPT', [true, 'Path to the local PS script', ::File.join(Msf::Config.data_directory, 'post', 'powershell', 'msflag.ps1') ]),
]
)

View File

@ -10,8 +10,8 @@ class MetasploitModule < Msf::Post
super(update_info(info,
'Name' => "Load Scripts Into PowerShell Session",
'Description' => %q{
This module will download and execute one or more PowerShell script
s over a present powershell session.
This module will download and execute one or more PowerShell scripts
over a present powershell session.
Setting VERBOSE to true will show the stager results.
},
'License' => MSF_LICENSE,
@ -25,10 +25,9 @@ class MetasploitModule < Msf::Post
register_options(
[
OptPath.new( 'SCRIPT', [false, 'Path to the local PS script', ::File.join(Msf::Config.install_root, "scripts", "ps", "msflag.ps1") ]),
OptPath.new( 'FOLDER', [false, 'Path to a local folder of PS scripts'])
OptPath.new( 'SCRIPT', [false, 'Path to the local PS script', ::File.join(Msf::Config.data_directory, 'post', 'powershell', 'msflag.ps1') ]),
OptPath.new( 'FOLDER', [false, 'Path to a local folder of PS scripts'])
])
end
def run