Rename to match gdb_server_exec module.

bug/bundler_fix
joev 2016-01-02 22:45:27 -06:00
parent dcd36b74db
commit d64048cd48
1 changed files with 1 additions and 1 deletions

View File

@ -14,7 +14,7 @@ class Metasploit3 < Msf::Exploit::Remote
def initialize(info = {})
super(update_info(info,
'Name' => 'Android ADB Debug Mode Exec Payload',
'Name' => 'Android ADB Debug Server Remote Payload Execution',
'Description' => %q{
Writes and spawns a native payload on an android device that is listening
for adb debug messages.