CmdStagerVBS is now in Rex::Exploitation
```
$ ./msfconsole -qx "loadpath test/modules/; exit"
Loaded 32 modules:
12 auxiliarys
12 exploits
8 posts
```
This commit is contained in:
@@ -10,7 +10,7 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||
# =( need more targets and perhaps more OS specific return values OS specific would be preferred
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
include Msf::Exploit::CmdStagerVBS
|
||||
include Rex::Exploitation::CmdStagerVBS
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
|
||||
Reference in New Issue
Block a user