Skip to content

Commit ad10890

Browse files
committed
Why yes I know it's a module
1 parent 22f7619 commit ad10890

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

modules/exploits/windows/local/payload_inject.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Local
1414

1515
def initialize(info={})
1616
super( update_info( info,
17-
'Name' => 'Windows Manage Memory Payload Injection Module',
17+
'Name' => 'Windows Manage Memory Payload Injection',
1818
'Description' => %q{
1919
This module will inject a payload into memory of a process. If a payload
2020
isn't selected, then it'll default to a reverse x86 TCP meterpreter. If the PID

0 commit comments

Comments
 (0)