mirror of
https://github.com/rapid7/metasploit-payloads
synced 2025-01-20 20:37:27 +01:00
71edb392ea
I stuffed up when dealing with values that are being passed back and forth across components when in x86 processes. I was passing 64 bit ints around even in 32 bit mode, which resulted in some natstiness. This commit fixes that problem by forcing everything to be 64 bit regardless of arch, and casting to the appropriate pointer at the right time. |
||
---|---|---|
c/meterpreter | ||
docker | ||
gem | ||
java | ||
php/meterpreter | ||
powershell | ||
python/meterpreter | ||
.gitignore | ||
.gitmodules | ||
.travis.yml | ||
COPYING | ||
LICENSE | ||
Makefile | ||
README.md |
metasploit-payloads >
This is a unified repository for different Metasploit Framework payloads, which merges these repositories:
The Native Linux / Posix payload, Mettle, currently is developed at https://github.com/rapid7/mettle (to be moved here at some point?)
See the individual directories for meterpreter-specific README, build instructions and license details: