mirror of
https://github.com/rapid7/metasploit-payloads
synced 2025-03-24 18:16:24 +01:00
d720a549a4

This has two benefits: 1. It's the same function as what's used to open keys, ensuring that the options is consistent. 2. It allows the desired permissions to be explicitly set instead of being inferred from the "default securitya ccess mask". See: https://docs.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regopenkeya#return-value
metasploit-payloads >
This is a unified repository for different Metasploit Framework payloads, which merges these repositories:
An alternate cross-platform C Meterpreter, called Mettle, is developed at https://github.com/rapid7/mettle
See the individual directories for meterpreter-specific README, build instructions and license details:
Description
Languages
C
62.9%
Python
28.9%
C++
2.4%
Java
2%
Shell
1.4%
Other
2%