Metasploit mailing list archives
msf payload generation for inclusion in python exploits
From: nulldevice83 at yahoo.com (Null Device)
Date: Wed, 4 Jan 2006 23:23:05 -0800 (PST)
Hello List, My friends Abhisek Datta and me were working on some exploits in python. In an attempt to use msf payloads we modified msfweb and Text.pm (framework-2.5/lib/Pex) so that now we can have payload generation in python alongwith C and perl. Attached are the diff's. ad_* -> abhisek data's diffs nd_* -> mine diffs Please use only one of the sets (either ad_* or nd_*) hopefully some1 will find these useful. thx ND __________________________________________ Yahoo! DSL ? Something to write home about. Just $16.99/mo. or less. dsl.yahoo.com -------------- next part -------------- A non-text attachment was scrubbed... Name: nd_Text.pm.diff Type: application/octet-stream Size: 521 bytes Desc: 1905857017-nd_Text.pm.diff URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment.obj> -------------- next part -------------- A non-text attachment was scrubbed... Name: nd_msfweb.diff Type: application/octet-stream Size: 599 bytes Desc: 2344959662-nd_msfweb.diff URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment-0001.obj> -------------- next part -------------- A non-text attachment was scrubbed... Name: ad_Text.pm.diff Type: application/octet-stream Size: 747 bytes Desc: 777120095-ad_Text.pm.diff URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment-0002.obj> -------------- next part -------------- A non-text attachment was scrubbed... Name: ad_msfweb.diff Type: application/octet-stream Size: 713 bytes Desc: 2520643303-ad_msfweb.diff URL: <http://mail.metasploit.com/pipermail/framework/attachments/20060104/340c00ca/attachment-0003.obj>
Current thread:
- msf payload generation for inclusion in python exploits Null Device (Jan 04)
- msf payload generation for inclusion in python exploits mmiller at hick.org (Jan 05)