metasploit-framework/external/source/shellcode/linux/ia32
Tod Beardsley 81a7b1a9bf
Fixes for #2350, random bind shellcode
* Moved shortlink to a reference.
  * Reformat e-mail address.
  * Fixed whitespace
  * Use multiline quote per most other module descriptions

Still need to resplat the modules, but it's no big thang to do that
after landing. Also, References do not seem to appear for post modules
in the normal msfconsole. This is a bug in the UI, not for these modules
-- many payloads would benefit from being explicit on their references,
so may as well start with these.
2013-11-11 10:33:15 -06:00
..
Makefile Fixes for #2350, random bind shellcode 2013-11-11 10:33:15 -06:00
generic.asm
linux_2.6.7_unistd_ia32.h
single_adduser.asm
single_adduser.template
single_bind_tcp_shell.asm
single_exec.asm
single_find_tcp_shell.asm
single_findsock.asm
single_reverse_tcp_shell.asm Update linux stagers for NX compatibility 2012-09-12 18:44:00 -05:00
single_reverse_udp_shell.asm
single_shell_bind_tcp_random_port.asm add payload source 2013-09-13 15:36:31 -03:00
stage_tcp_shell.asm
stage_udp_shell.asm
stager_egghunt.asm
stager_sock_bind.asm Update linux stagers for NX compatibility 2012-09-12 18:44:00 -05:00
stager_sock_bind6.asm Update linux stagers for NX compatibility 2012-09-12 18:44:00 -05:00
stager_sock_bind_icmp.asm
stager_sock_bind_udp.asm
stager_sock_find.asm
stager_sock_reverse.asm Update linux stagers for NX compatibility 2012-09-12 18:44:00 -05:00
stager_sock_reverse_icmp.asm
stager_sock_reverse_udp.asm
stager_sock_reverse_udp_dns.asm