mirror of
https://github.com/rapid7/metasploit-payloads
synced 2025-01-08 14:36:22 +01:00
913e254fea
A bug in the read function would cause a too-large read when there are multiple packets or other things in the control channel. This would cause the subsequent packet to fail to parse, leading to the current message getting discarded. |
||
---|---|---|
c/meterpreter | ||
docker | ||
gem | ||
java | ||
php/meterpreter | ||
powershell | ||
python/meterpreter | ||
.gitignore | ||
.gitmodules | ||
.travis.yml | ||
COPYING | ||
LICENSE | ||
Makefile | ||
README.md |
metasploit-payloads >
This is a unified repository for different Metasploit Framework payloads, which merges these repositories:
The Native Linux / Posix payload, Mettle, currently is developed at https://github.com/rapid7/mettle (to be moved here at some point?)
See the individual directories for meterpreter-specific README, build instructions and license details: