Files
metasploit-gs/data
Jeffrey Martin 1b562dd02b Revert "Improve AMSI bypass on new Windows"
This reverts commit f97ab80224, reversing
changes made to c8f942cc03.

This change impacted the default `psexec` powershell target and needs further
testing to be reintroduced.
2023-06-21 16:35:41 -05:00
..
2023-05-24 17:36:39 -05:00
2022-01-17 15:33:41 -05:00
2011-11-10 19:48:32 -06:00
2021-12-04 15:32:38 +00:00
2022-10-31 10:35:28 -04:00
2022-11-13 14:29:28 -05:00
2011-11-10 19:48:32 -06:00
2017-07-24 06:26:21 -07:00
2012-03-02 10:18:32 -06:00
2011-11-10 19:48:32 -06:00
2011-11-10 19:48:32 -06:00
2011-11-10 19:48:32 -06:00
2012-04-15 23:35:38 -05:00
2023-06-08 16:38:22 -04:00

This folder contains various data files used for a variety of purposes, including but not limited to banners for the console, exploit source code for exploits (under data/exploits), template code and binaries, wordlists and shellcode.

As a general rule of thumb this folder will most often be used when you are using compiled binaries or source code from other exploits for cases such as local privilege escalation exploits and need to provide the exploit code and compiled binaries so that maintainers can verify the binary and compile it themselves, as so that modules can find the R7 compiled version of the resulting binary for use during exploitation.