Files
metasploit-gs/tools/exploit/msf_irb_shell.rb
T

25 lines
486 B
Ruby
Raw Normal View History

#!/usr/bin/env ruby
2010-05-03 17:13:09 +00:00
#
# $Id$
# $Revision$
#
msfbase = __FILE__
while File.symlink?(msfbase)
2013-09-30 13:47:53 -05:00
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
end
2015-10-06 10:30:52 -05:00
$:.unshift(File.expand_path(File.join(File.dirname(msfbase), '..', '..', 'lib')))
2012-04-15 23:35:38 -05:00
require 'msfenv'
$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
require 'rex'
require 'msf/core'
require 'msf/base'
require 'msf/ui'
framework = Msf::Simple::Framework.create
Rex::Ui::Text::IrbShell.new(binding).run