automatic module_metadata_base.json update

This commit is contained in:
jenkins-metasploit
2026-04-13 15:25:36 +00:00
parent 10140d42b4
commit e2958ab915
+5 -5
View File
@@ -217034,7 +217034,7 @@
"Brendan Watters",
"Spencer McIntyre",
"Geyslan G. Bem <geyslan@gmail.com>",
"Aleh B"
"3AleXM8B40"
],
"description": "Fetch and execute a x86 payload from an HTTP server.\n\n Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
@@ -221361,7 +221361,7 @@
"Brendan Watters",
"Spencer McIntyre",
"Geyslan G. Bem <geyslan@gmail.com>",
"Aleh B"
"3AleXM8B40"
],
"description": "Fetch and execute an x86 payload from an HTTPS server.\n\n Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
@@ -225688,7 +225688,7 @@
"Brendan Watters",
"Spencer McIntyre",
"Geyslan G. Bem <geyslan@gmail.com>",
"Aleh B"
"3AleXM8B40"
],
"description": "Fetch and execute a x86 payload from a TFTP server.\n\n Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
@@ -275173,7 +275173,7 @@
"type": "payload",
"author": [
"Geyslan G. Bem <geyslan@gmail.com>",
"Aleh B"
"3AleXM8B40"
],
"description": "Listen for a connection in a random port and spawn a command shell.\n Use nmap to discover the open port: 'nmap -sS target -p-'.",
"references": [
@@ -275186,7 +275186,7 @@
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2026-04-12 21:12:33 +0000",
"mod_time": "2026-04-13 16:10:37 +0000",
"path": "/modules/payloads/singles/linux/x86/shell_bind_tcp_random_port.rb",
"is_install_path": true,
"ref_name": "linux/x86/shell_bind_tcp_random_port",