metasploit-framework/modules/exploits/linux/local
wchen-r7 11c1eb6c78 Raise Msf::NoCompatiblePayloadError if generate_payload_exe fails
Most exploits don't check nil for generate_payload_exe, they just
assume they will always have a payload. If the method returns nil,
it ends up making debugging more difficult. Instead of checking nil
one by one, we just raise.
2015-12-08 21:13:23 -06:00
..
desktop_privilege_escalation.rb Raise Msf::NoCompatiblePayloadError if generate_payload_exe fails 2015-12-08 21:13:23 -06:00
hp_smhstart.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
kloxo_lxsuexec.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
pkexec.rb Take care of modules using the 'DEBUG' option 2015-04-21 12:13:40 -05:00
sock_sendpage.rb Remove bad references (dead links) 2015-10-27 12:41:32 -05:00
sophos_wpa_clear_keys.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
udev_netlink.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
vmware_mount.rb Suggestions from OJ 2014-11-27 21:38:50 +00:00
zpanel_zsudo.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00