63eb5f2a35
This PR adds improvements to the glibc tunables module. In the event the file command is not present on the target the module will try to use the readelf command in order to get the ld.so BuildID to determine whether or not the target is compatible with exploit.
This is the folder where all of Metasploit's modules live. These modules are scripts in Ruby that interface with
Metasploit itself to perform some specific task. There are various types of modules, such as exploit modules to
exploit a vulnerability and gain a shell, auxiliary to perform a non-shell gaining activity, payloads for
Metasploit's various payloads (which are also modules), and post for post exploitation modules.