1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-03-24 18:16:24 +01:00
Spencer McIntyre d720a549a4 Use RegOpenKeyExW for checking existance
This has two benefits:
1. It's the same function as what's used to open keys, ensuring that the
   options is consistent.
2. It allows the desired permissions to be explicitly set instead of
   being inferred from the "default securitya ccess mask". See:
   https://docs.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regopenkeya#return-value
2022-09-07 09:32:05 -04:00
2020-10-11 20:49:06 -05:00
2022-06-23 12:48:18 -05:00
2022-05-13 11:23:09 +01:00
2019-01-07 16:24:35 -06:00
2018-01-08 15:22:38 -05:00
2020-10-08 17:32:45 -05:00
2019-01-07 16:26:45 -06:00

metasploit-payloads >

Appveyor build status: Build Status

This is a unified repository for different Metasploit Framework payloads, which merges these repositories:

An alternate cross-platform C Meterpreter, called Mettle, is developed at https://github.com/rapid7/mettle

See the individual directories for meterpreter-specific README, build instructions and license details:

Description
No description provided
Readme Multiple Licenses 71 MiB
Languages
C 62.9%
Python 28.9%
C++ 2.4%
Java 2%
Shell 1.4%
Other 2%