metasploit-framework/modules/payloads
James Lee 828f37701d Fix linux shell_bind_tcp payload
It was calling bind(2) with a family of 0x02ff, which makes no sense and
causes execution to fall off the end and segfault.  Fix it by replacing
0x02ff with the appropriate 0x0002, or AF_INET.

[Fixrm #7216]
2012-09-04 04:23:48 -05:00
..
singles Fix linux shell_bind_tcp payload 2012-09-04 04:23:48 -05:00
stagers Fixes load order with reverse http 2012-08-23 12:16:47 -05:00
stages Correct OSX naming. See ticket #7182 2012-08-14 15:29:21 -05:00