90bb6b9b01
The powershell_base64 encoder was changed to use the Windows start command, which broke some payload after they were encoded. This was because when using start, the argument can not be a string of commands joined by & which is required by the fetch payloads. This fixes that issue by removing the start command from the encoder
This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with
Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to
exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for
Metasploit's various payloads (which are also modules), and post for post exploitation modules.