Land #4333 with URL pointer, ty @wchen-r7

Long live msfvenom!

People who have a bug or complaint about msfencode or msfpayload should
be pointed at http://r-7.co/msfvenom-2015

See #4326 (and close it?)
bug/bundler_fix
Tod Beardsley 2014-12-09 13:14:58 -06:00
commit ec53498aca
No known key found for this signature in database
GPG Key ID: BD63D0A3EA19CAAC
2 changed files with 14 additions and 0 deletions

View File

@ -5,6 +5,13 @@
# $Revision$
#
$stderr.puts "[!] ************************************************************************"
$stderr.puts "[!] * The utility msfencode is deprecated! *"
$stderr.puts "[!] * It will be removed on or about 2015-06-08 *"
$stderr.puts "[!] * Please use msfvenom instead *"
$stderr.puts "[!] * Details: https://github.com/rapid7/metasploit-framework/pull/4333 *"
$stderr.puts "[!] ************************************************************************"
msfbase = __FILE__
while File.symlink?(msfbase)
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))

View File

@ -5,6 +5,13 @@
# $Revision$
#
$stderr.puts "[!] ************************************************************************"
$stderr.puts "[!] * The utility msfpayload is deprecated! *"
$stderr.puts "[!] * It will be removed on or about 2015-06-08 *"
$stderr.puts "[!] * Please use msfvenom instead *"
$stderr.puts "[!] * Details: https://github.com/rapid7/metasploit-framework/pull/4333 *"
$stderr.puts "[!] ************************************************************************"
msfbase = __FILE__
while File.symlink?(msfbase)
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))