We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 22f7619 commit ad10890Copy full SHA for ad10890
modules/exploits/windows/local/payload_inject.rb
@@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Local
14
15
def initialize(info={})
16
super( update_info( info,
17
- 'Name' => 'Windows Manage Memory Payload Injection Module',
+ 'Name' => 'Windows Manage Memory Payload Injection',
18
'Description' => %q{
19
This module will inject a payload into memory of a process. If a payload
20
isn't selected, then it'll default to a reverse x86 TCP meterpreter. If the PID
0 commit comments