From 36782af5c9adb0bab7edeb115271df01e0ef0623 Mon Sep 17 00:00:00 2001 From: wchen-r7 Date: Fri, 29 May 2015 10:34:12 -0500 Subject: [PATCH] Resolve #4889, Improve msfvenom -h Resolve #4889 --- msfvenom | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/msfvenom b/msfvenom index 31207897c1..84b71ab4b9 100755 --- a/msfvenom +++ b/msfvenom @@ -54,7 +54,10 @@ require 'msf/core/payload_generator' opts = {} datastore = {} opt = OptionParser.new - opt.banner = "Usage: #{$0} [options] " + banner = "MsfVenom - a Metasploit standalone payload generator.\n" + banner << "Also a replacement for msfpayload and msfencode.\n" + banner << "Usage: #{$0} [options] " + opt.banner = banner opt.separator('') opt.separator('Options:') @@ -292,7 +295,14 @@ if __FILE__ == $0 $stdout.puts dump_encoders $stdout.puts dump_nops else - $stderr.puts "Invalid module type" + if mod == 'payload' + question = ". Do you mean 'payloads'?" + elsif mod == 'encoder' + question = ". Do you mean 'encoders'?" + elsif mod == 'nop' + quesetion = ". Do you mean 'nops'?" + end + $stderr.puts "Invalid module type#{question}" end end exit(0)