CmdStagerVBS is now in Rex::Exploitation

```
 $ ./msfconsole -qx "loadpath test/modules/; exit"
 Loaded 32 modules:
     12 auxiliarys
	 12 exploits
	 8 posts
```
This commit is contained in:
Brent Cook
2014-12-30 13:55:56 -06:00
parent 9bcb3b95cd
commit c96c8a03cf
+1 -1
View File
@@ -10,7 +10,7 @@ class Metasploit3 < Msf::Exploit::Remote
# =( need more targets and perhaps more OS specific return values OS specific would be preferred
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStagerVBS
include Rex::Exploitation::CmdStagerVBS
def initialize(info = {})
super(update_info(info,