1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-09 04:26:11 +02:00

powershell for msfvenom

This commit is contained in:
RageLtMan 2012-03-20 20:19:13 -04:00
parent 672c7bc37e
commit 81a7d62c6d

View File

@ -399,7 +399,7 @@ if opts[:format] !~/ruby|rb|perl|pl|bash|sh|c|js|dll|elf/i
end
case opts[:format]
when /ruby|rb|perl|pl|bash|sh|^c$|js_le|raw/i
when /ruby|rb|perl|pl|bash|^sh$|^c$|js_le|raw/i
$stdout.write Msf::Simple::Buffer.transform(payload_raw, opts[:format])
when /asp$/
asp = Msf::Util::EXE.to_win32pe_asp($framework, payload_raw, exeopts)
@ -478,10 +478,14 @@ when /war/i
exe = Msf::Util::EXE.to_jsp_war(exe)
end
$stdout.write exe
when 'psh'
psh = Msf::Util::EXE.to_win32pe_psh(framework, code, exeopts)
when /psh/i
psh = Msf::Util::EXE.to_win32pe_psh($framework, payload_raw, exeopts)
$stdout.write psh
when /psh-net/i
psh = Msf::Util::EXE.to_win32pe_psh_net($framework, payload_raw, exeopts)
$stdout.write psh
else
print_error("Unsupported format")
exit