diff --git a/content/posts/commits/2026-03-01-commit-650bc6a.md b/content/posts/commits/2026-03-01-commit-650bc6a.md new file mode 100644 index 0000000..c4ba2c3 --- /dev/null +++ b/content/posts/commits/2026-03-01-commit-650bc6a.md @@ -0,0 +1,41 @@ +--- +title: "[bojemoi] uzi: fix payload execution — load payload object with LHOST/LPORT" +date: 2026-03-01T00:02:38+01:00 +draft: false +tags: ["commit", "bojemoi", "main"] +categories: ["Git Activity"] +summary: "Commit 650bc6a par Betty dans bojemoi" +author: "Betty" +--- + +## Commit `650bc6a` + +| | | +|---|---| +| **Repository** | bojemoi | +| **Branch** | `main` | +| **Author** | Betty | +| **Hash** | `650bc6a66ea07b4ce05d0d80f497fb8732810f33` | + + +### Description + +Passing a payload string to run_module_with_output() caused ValueError +because pymetasploit3 requires a configured PayloadModule object. +Now loads the payload via client.modules.use() and sets LHOST/LPORT +before execution, so exploits actually run against the target. + +Co-Authored-By: Claude Sonnet 4.6 + +### Files Changed + +``` +M borodino/thearm_uzi +``` + +### Diff Summary + +``` + borodino/thearm_uzi | 121 ++++++++++++++++++++++++++++++++++++++++++++++------ + 1 file changed, 109 insertions(+), 12 deletions(-) +```