Land #9765, missed Rex require in msfvenom
My bad. I thought I had caught them all. No idea how that happened. :(GSoC/Meterpreter_Web_Console
commit
62c2b433cc
3
msfvenom
3
msfvenom
|
@ -135,6 +135,7 @@ def parse_args(args)
|
|||
end
|
||||
|
||||
opt.on('-b', '--bad-chars <list>', String, 'The list of characters to avoid example: \'\x00\xff\'') do |b|
|
||||
require 'rex/text'
|
||||
opts[:badchars] = Rex::Text.hex_to_raw(b)
|
||||
end
|
||||
|
||||
|
@ -188,7 +189,7 @@ def parse_args(args)
|
|||
datastore[k.upcase] = v.to_s
|
||||
end
|
||||
if opts[:payload].to_s =~ /[\_\/]reverse/ and datastore['LHOST'].nil?
|
||||
init_framework
|
||||
require 'rex/socket'
|
||||
datastore['LHOST'] = Rex::Socket.source_address
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue