We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 6e51d84 + b199820 commit 64fe2ddCopy full SHA for 64fe2dd
lib/msf/core/exploit/exe.rb
@@ -38,10 +38,11 @@ def get_eicar_exe
38
obfus_eicar.join("-").upcase
39
end
40
41
- def get_custom_exe(path=nil)
+ def get_custom_exe(path = nil)
42
path ||= datastore['EXE::Custom']
43
print_status("Using custom payload #{path}, RHOST and RPORT settings will be ignored!")
44
datastore['DisablePayloadHandler'] = true
45
+ exe = nil
46
::File.open(path,'rb') {|f| exe = f.read(f.stat.size)}
47
exe
48
@@ -160,7 +161,7 @@ def exe_init_options(opts)
160
161
162
163
def exe_post_generation(opts)
- if (opts[:fellback])
164
+ if opts[:fellback]
165
print_status("Warning: Falling back to default template: #{opts[:fellback]}")
166
167
0 commit comments