Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit d7a8133

Browse files
committed
Update README
1 parent 20a1ad3 commit d7a8133

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,12 @@ Exploit modules require you to specify a payload which subsequently gets execute
7676
* **bind_php:** uploads a script that will bind to a specific port and allow WPXF to establish a remote shell.
7777
* **custom:** uploads and executes a custom PHP script.
7878
* **download_exec:** downloads and runs a remote executable file.
79+
* **meterpreter_bind_tcp:** a Meterpreter bind TCP payload generated using msfvenom.
80+
* **meterpreter_reverse_tcp:** a Meterpreter reverse TCP payload generated using msfvenom.
7981
* **exec:** runs a shell command on the remote server and returns the output to the WPXF session.
8082
* **reverse_tcp:** uploads a script that will establish a reverse TCP shell.
8183

82-
All these payloads, with the exception of ```custom```, will delete themselves after they have been executed, to avoid leaving them lying around on the target machine after use or in the event that they are being used to establish a shell which fails.
84+
All these payloads, with the exception of ```custom``` and the Meterpreter payloads, will delete themselves after they have been executed, to avoid leaving them lying around on the target machine after use or in the event that they are being used to establish a shell which fails.
8385

8486
### How can I write my own modules and payloads?
8587
Guides on writing modules and payloads can be found on [The Wiki](https://github.com/rastating/wordpress-exploit-framework/wiki) and full documentation of the API can be found at http://www.getwpxf.com/.

0 commit comments

Comments
 (0)