automatic module_metadata_base.json update
parent
853bd4d976
commit
015c0ae91b
|
@ -89394,6 +89394,30 @@
|
|||
"is_install_path": true,
|
||||
"ref_name": "linux/x86/shell_reverse_tcp"
|
||||
},
|
||||
"payload_linux/x86/shell_reverse_tcp_ipv6": {
|
||||
"name": "Linux Command Shell, Reverse TCP Inline (IPv6)",
|
||||
"full_name": "payload/linux/x86/shell_reverse_tcp_ipv6",
|
||||
"rank": 300,
|
||||
"disclosure_date": null,
|
||||
"type": "payload",
|
||||
"author": [
|
||||
"Matteo Malvica <matteo@malvica.com>"
|
||||
],
|
||||
"description": "Connect back to attacker and spawn a command shell over IPv6",
|
||||
"references": [
|
||||
|
||||
],
|
||||
"is_server": false,
|
||||
"is_client": false,
|
||||
"platform": "Linux",
|
||||
"arch": "x86",
|
||||
"rport": "",
|
||||
"targets": null,
|
||||
"mod_time": "2018-06-13 15:31:49 +0000",
|
||||
"path": "/modules/payloads/singles/linux/x86/shell_reverse_tcp_ipv6.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/x86/shell_reverse_tcp_ipv6"
|
||||
},
|
||||
"payload_linux/zarch/meterpreter_reverse_http": {
|
||||
"name": "Linux Meterpreter, Reverse HTTP Inline",
|
||||
"full_name": "payload/linux/zarch/meterpreter_reverse_http",
|
||||
|
|
Loading…
Reference in New Issue