Files
metasploit-gs/modules/exploits/linux
Chocapikk d84b09a16e Fix: Wrap Python payload for Firefox profile handler
The Firefox exploit path delivers payloads via a MIME handler mapped to
/bin/sh. When using the default Python target, the raw Python payload
would fail to execute in /bin/sh. Wrap it with python3 -c so the shell
can invoke it correctly.
2026-04-13 17:57:48 +02:00
..
2025-10-07 13:59:13 -04:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-09-17 11:04:28 +02:00
2025-12-18 10:08:31 -05:00