Fix reload bug
parent
13779adab4
commit
0384b115e9
|
@ -47,11 +47,12 @@ module Msf
|
||||||
#
|
#
|
||||||
# @return [void]
|
# @return [void]
|
||||||
def init_exploits
|
def init_exploits
|
||||||
|
$stderr.puts "In init_exploits"
|
||||||
# First we're going to avoid using #find_all because that gets very slow.
|
# First we're going to avoid using #find_all because that gets very slow.
|
||||||
framework.exploits.each_pair do |fullname, place_holder|
|
framework.exploits.each_pair do |fullname, place_holder|
|
||||||
# If the place holder isn't __SYMBOLIC__, then that means the module is initialized,
|
# If the place holder isn't __SYMBOLIC__, then that means the module is initialized,
|
||||||
# and that's gotta be the active browser autopwn.
|
# and that's gotta be the active browser autopwn.
|
||||||
next if !fullname.include?('browser') || place_holder != '__SYMBOLIC__'
|
next if !fullname.include?('browser') || self.fullname == "exploit/#{fullname}"
|
||||||
|
|
||||||
# The user gets to specify which modules to include/exclude
|
# The user gets to specify which modules to include/exclude
|
||||||
next if datastore['Include'] && fullname !~ datastore['Include']
|
next if datastore['Include'] && fullname !~ datastore['Include']
|
||||||
|
|
Loading…
Reference in New Issue