13ae9fcded
* Check that the initial memory was actually allocated before writing to it * Don't pass 16 to CryptUnprotectData as the ppszDataDescr parameter because it is not a valid LPWSTR * Don't leak memory in the event that CryptUnprotectData by ensuring mem and addr are always free'ed * Combine free calls into one for speed * Don't assume the sessions is ARCH_X64 if it is not ARCH_X86 because that may change some day
This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with
Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to
exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for
Metasploit's various payloads (which are also modules), and post for post exploitation modules.