Metasploit mailing list archives

msf payload generation for inclusion in python exploits


From: nulldevice83 at yahoo.com (Null Device)
Date: Wed, 4 Jan 2006 23:23:05 -0800 (PST)

Hello List,

My friends Abhisek Datta and me were working on some
exploits in python.
In an attempt to use msf payloads we modified msfweb
and Text.pm (framework-2.5/lib/Pex) so that now we can
have payload generation in python alongwith C and
perl. 

Attached are the diff's. 
ad_* -> abhisek data's diffs
nd_* -> mine diffs

Please use only one of the sets (either ad_* or nd_*)
hopefully some1 will find these useful.

thx
ND


                
__________________________________________ 
Yahoo! DSL ? Something to write home about. 
Just $16.99/mo. or less. 
dsl.yahoo.com 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nd_Text.pm.diff
Type: application/octet-stream
Size: 521 bytes
Desc: 1905857017-nd_Text.pm.diff
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nd_msfweb.diff
Type: application/octet-stream
Size: 599 bytes
Desc: 2344959662-nd_msfweb.diff
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment-0001.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ad_Text.pm.diff
Type: application/octet-stream
Size: 747 bytes
Desc: 777120095-ad_Text.pm.diff
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment-0002.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ad_msfweb.diff
Type: application/octet-stream
Size: 713 bytes
Desc: 2520643303-ad_msfweb.diff
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment-0003.obj>


Current thread: