1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-01-08 14:36:22 +01:00
Go to file
OJ 4043a6ff2b Update memory alloc to use QWORD types
DWORD was being used, resulting in x64 being unhappy thanks to
pointer truncation. This fixes the problem.
2014-06-01 21:26:09 +10:00
c/meterpreter Update memory alloc to use QWORD types 2014-06-01 21:26:09 +10:00