1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00
Go to file
kris a30adcdca5 Fix Javascript payload generation in msfweb: was passing the invalid
"javascript", so it now chooses "js_le" or "js_be" based on endianness


git-svn-id: file:///home/svn/framework3/trunk@6042 4d416f70-5f16-0410-b530-b9f4589650da
2008-12-24 06:57:32 +00:00
data Fix Javascript payload generation in msfweb: was passing the invalid 2008-12-24 06:57:32 +00:00
documentation Minor update to wmap documentation with new features 2008-12-08 04:44:46 +00:00
external Uh... add files... 2008-12-19 16:57:01 +00:00
lib improve some usage info for connect command 2008-12-23 17:47:05 +00:00
modules Adding Linux/x86 inline IPv6 bind shell payload 2008-12-21 07:10:27 +00:00
plugins Add SSL option -s to msfd 2008-12-19 23:18:39 +00:00
scripts/meterpreter ignore 0.0.0.0 2008-11-14 17:12:38 +00:00
tools Script which allows to import OWASP WebScarab sessions to WMAP by sinbad 2008-12-08 03:47:07 +00:00
msfcli Try to fall back on aux modules if it's not an exploit 2008-12-20 04:20:42 +00:00
msfconsole look for files in absolute paths. fixes #252 2008-11-16 21:10:35 +00:00
msfd Add SSL option -s to msfd 2008-12-19 23:18:39 +00:00
msfelfscan Code cleanups 2008-10-19 21:03:39 +00:00
msfencode Adds utlities for creating VBA scripts from an EXE (or payload) 2008-11-12 19:15:24 +00:00
msfgui look for files in absolute paths. fixes #252 2008-11-16 21:10:35 +00:00
msfmachscan Code cleanups 2008-10-19 21:03:39 +00:00
msfopcode Remove "#{xxx.to_s}" redundancies ('s/\(#{[^}]*\)\.to_s}/\1}/g') 2008-12-19 07:11:08 +00:00
msfpayload Adds utlities for creating VBA scripts from an EXE (or payload) 2008-11-12 19:15:24 +00:00
msfpescan Fixes #111. Merge in patch to fix memdump support, still not perfect, but usable 2008-11-10 21:18:12 +00:00
msfrpc whoops, make -h available -- was printing usage but because of an error 2008-12-22 01:36:56 +00:00
msfrpcd Set executable bit 2008-12-02 22:32:27 +00:00
msfweb Code cleanups 2008-10-19 21:03:39 +00:00
README Correct paths in README 2008-11-05 00:38:22 +00:00

Copyright (c) 2008, Metasploit LLC
All rights reserved.

Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:

    * Redistributions of source code must retain the above copyright notice, 
	  this list of conditions and the following disclaimer.

    * Redistributions in binary form must reproduce the above copyright notice,
	  this list of conditions and the following disclaimer in the documentation
	  and/or other materials provided with the distribution.

    * Neither the name of Metasploit LLC nor the names of its contributors 
	  may be used to endorse or promote products derived from this software 
	  without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

================================================================================

The Metasploit Framework is provided under the BSD license above.

The copyright on this package is held by Metasploit LLC.

This copyright does not apply to the following components:
 - The vncdll.dll binary or its associated source code (modified RealVNC)
 - The icons used by msfweb that were not created by the Metasploit Project
 - The Ole::Storage library located under lib/ole
 - The Scruby library located under lib/scruby
 - The PcapRub library located under external/pcaprub
 - The Ruby-Lorcon library located under external/ruby-lorcon
 - The Byakugan plugin located under external/source/byakugan

The latest version of this software is available from http://metasploit.com/

Bug tracking and development information can be found at:
 http://metasploit.com/dev/trac

Questions and suggestions can be sent to:
 msfdev[at]metasploit.com
 
The framework mailing list is the place to discuss features and ask for help. 
To subscribe, visit the following web page:
 http://spool.metasploit.com/mailman/listinfo/framework

The archives are available from:
 http://spool.metasploit.com/pipermail/framework/