mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
f38ac954b8
- Adds a call to mprotect(2) to the reverse and bind stagers - Adds accurate source for some other linux shellcode, including some comments to make it more maintainable - Adds tools/module_payload.rb for listing all payloads for each exploit in a greppable format. Makes it easy to find out if a payload change causes a payload to no longer be compatible with a given exploit. - Missing from this commit is source for reverse_ipv6_tcp
36 lines
722 B
Ruby
Executable File
36 lines
722 B
Ruby
Executable File
#!/usr/bin/env ruby
|
|
#
|
|
# $Id$
|
|
#
|
|
# This script lists each exploit module by its compatible payloads
|
|
#
|
|
# $Revision$
|
|
#
|
|
|
|
msfbase = __FILE__
|
|
while File.symlink?(msfbase)
|
|
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
|
|
end
|
|
|
|
$:.unshift(File.expand_path(File.join(File.dirname(msfbase), '..', 'lib')))
|
|
require 'fastlib'
|
|
require 'msfenv'
|
|
|
|
$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
|
|
|
|
require 'rex'
|
|
require 'msf/ui'
|
|
require 'msf/base'
|
|
|
|
# Initialize the simplified framework instance.
|
|
$framework = Msf::Simple::Framework.create('DisableDatabase' => true)
|
|
|
|
$framework.exploits.each_module { |name, mod|
|
|
x = mod.new
|
|
|
|
x.compatible_payloads.map{|n, m|
|
|
puts "#{x.refname.ljust 40} - #{n}"
|
|
}
|
|
}
|
|
|