metasploit-framework/lib/rex/payloads
sinn3r d45cdd61aa Resolve #4507 - respond_to? + send = evil
Since Ruby 2.1, the respond_to? method is more strict because it does
not check protected methods. So when you use send(), clearly you're
ignoring this type of access control. The patch is meant to preserve
this behavior to avoid potential breakage.

Resolve #4507
2015-01-02 13:29:17 -06:00
..
meterpreter Reworked to avoid extending String class on blob per hdm's rec. 2014-12-15 21:40:41 -05:00
win32 Resolve #4507 - respond_to? + send = evil 2015-01-02 13:29:17 -06:00
meterpreter.rb Provides methods to patch metsrv stagers with options. 2014-08-25 00:55:07 -04:00
win32.rb Mark all libraries as defaulting to 8-bit strings 2012-06-29 00:18:28 -05:00