We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 3baa717 + aa59b3a commit 6feb52fCopy full SHA for 6feb52f
modules/exploits/windows/backdoor/energizer_duo_payload.rb
@@ -13,12 +13,12 @@ class Metasploit3 < Msf::Exploit::Remote
13
14
def initialize(info = {})
15
super(update_info(info,
16
- 'Name' => 'Energizer DUO Trojan Code Execution',
+ 'Name' => 'Energizer DUO USB Battery Charger Arucer.dll Trojan Code Execution',
17
'Description' => %q{
18
This module will execute an arbitrary payload against
19
any system infected with the Arugizer trojan horse. This
20
backdoor was shipped with the software package accompanying
21
- the Energizer Duo USB battery charger.
+ the Energizer DUO USB battery charger.
22
},
23
'Author' => [ 'hdm' ],
24
'License' => MSF_LICENSE,
0 commit comments