metasploit-framework/lib/msf/core/exploit/mixins.rb

59 lines
1.6 KiB
Ruby
Raw Normal View History

# $Id$
#
# All exploit mixins should be added to the list below
#
class Msf::Exploit
# Behavior
autoload :Brute, 'msf/core/exploit/brute'
autoload :BruteTargets, 'msf/core/exploit/brutetargets'
# Payload
autoload :Egghunter, 'msf/core/exploit/egghunter'
autoload :Omelet, 'msf/core/exploit/omelet'
autoload :Seh, 'msf/core/exploit/seh'
autoload :KernelMode, 'msf/core/exploit/kernel_mode'
autoload :EXE, 'msf/core/exploit/exe'
# CmdStagers
autoload :CmdStager, 'msf/core/exploit/cmdstager'
autoload :CmdStagerVBS, 'msf/core/exploit/cmdstager_vbs'
autoload :CmdStagerDebugWrite, 'msf/core/exploit/cmdstager_debug_write'
autoload :CmdStagerDebugAsm, 'msf/core/exploit/cmdstager_debug_asm'
autoload :CmdStagerTFTP, 'msf/core/exploit/cmdstager_tftp'
# Protocol utils
autoload :NTLM, 'msf/core/exploit/ntlm'
# Protocol - layer 2
autoload :DHCPServer, 'msf/core/exploit/dhcp'
autoload :TFTPServer, 'msf/core/exploit/tftp'
# Telephony
autoload :DECT_COA, 'msf/core/exploit/dect_coa'
# Networks
autoload :Lorcon, 'msf/core/exploit/lorcon'
autoload :Lorcon2, 'msf/core/exploit/lorcon2'
autoload :Capture, 'msf/core/exploit/capture'
# FileFormat
autoload :FILEFORMAT, 'msf/core/exploit/fileformat'
autoload :PDF_Parse, 'msf/core/exploit/pdf_parse'
autoload :PDF, 'msf/core/exploit/pdf'
autoload :RIFF, 'msf/core/exploit/riff'
# Oracle
autoload :ORACLE, 'msf/core/exploit/oracle'
# tekniqz
autoload :FormatString, 'msf/core/exploit/fmtstr'
# Java
autoload :Java, 'msf/core/exploit/java'
# WBEM
autoload :WbemExec, 'msf/core/exploit/wbemexec'
end