File tree Expand file tree Collapse file tree 5 files changed +5
-40
lines changed
documentation/samples/modules Expand file tree Collapse file tree 5 files changed +5
-40
lines changed Original file line number Diff line number Diff line change 11
11
12
12
require 'msf/core'
13
13
14
- module Msf
15
-
16
14
###
17
15
#
18
16
# This sample auxiliary module simply displays the selected action and
19
17
# registers a custom command that will show up when the module is used.
20
18
#
21
19
###
22
- class Auxiliary :: Sample < Msf ::Auxiliary
20
+ class Metasploit4 < Msf ::Auxiliary
23
21
24
22
def initialize
25
23
super (
@@ -50,5 +48,3 @@ def cmd_aux_extra_command(*args)
50
48
end
51
49
52
50
end
53
-
54
- end
Original file line number Diff line number Diff line change 1
- ##
2
- # $Id$
3
- ##
4
-
5
1
##
6
2
# This file is part of the Metasploit Framework and may be subject to
7
3
# redistribution and commercial restrictions. Please see the Metasploit
8
4
# Framework web site for more information on licensing and terms of use.
9
5
# http://metasploit.com/framework/
10
6
##
11
7
12
- module Msf
13
- module Encoders
14
-
15
8
###
16
9
#
17
10
# This sample illustrates a very basic encoder that simply returns the block
18
11
# that it's passed.
19
12
#
20
13
###
21
- class Sample < Msf ::Encoder
14
+ class Metasploit4 < Msf ::Encoder
22
15
23
16
def initialize
24
17
super (
@@ -40,6 +33,3 @@ def encode_block(state, buf)
40
33
end
41
34
42
35
end
43
-
44
- end
45
- end
Original file line number Diff line number Diff line change 1
- ##
2
- # $Id$
3
- ##
4
-
5
1
##
6
2
# This file is part of the Metasploit Framework and may be subject to
7
3
# redistribution and commercial restrictions. Please see the Metasploit
11
7
12
8
require 'msf/core'
13
9
14
- module Msf
15
-
16
10
###
17
11
#
18
12
# This exploit sample shows how an exploit module could be written to exploit
19
13
# a bug in an arbitrary TCP server.
20
14
#
21
15
###
22
- class Exploits :: Sample < Msf ::Exploit ::Remote
16
+ class Metasploit4 < Msf ::Exploit ::Remote
23
17
24
18
#
25
19
# This exploit affects TCP servers, so we use the TCP client mixin.
@@ -88,4 +82,3 @@ def exploit
88
82
89
83
end
90
84
91
- end
Original file line number Diff line number Diff line change 11
11
12
12
require 'msf/core'
13
13
14
- module Msf
15
- module Nops
16
-
17
14
###
18
15
#
19
16
# This class implements a very basic NOP sled generator that just returns a
20
17
# string of 0x90's.
21
18
#
22
19
###
23
- class Sample < Msf ::Nop
20
+ class Metasploit4 < Msf ::Nop
24
21
25
22
def initialize
26
23
super (
@@ -39,6 +36,3 @@ def generate_sled(length, opts)
39
36
end
40
37
41
38
end
42
-
43
- end
44
- end
Original file line number Diff line number Diff line change 11
11
12
12
require 'msf/core'
13
13
14
- module Msf
15
- module Payloads
16
- module Singles
17
-
18
14
###
19
15
#
20
16
# This sample payload is designed to trigger a debugger exception via int3.
21
17
#
22
18
###
23
- module Sample
19
+ module Metasploit4
24
20
25
21
include Msf ::Payload ::Single
26
22
@@ -40,7 +36,3 @@ def initialize(info = {})
40
36
end
41
37
42
38
end
43
-
44
- end
45
- end
46
- end
You can’t perform that action at this time.
0 commit comments