post: commit 650bc6a in bojemoi
All checks were successful
Hugo Build & Deploy / build-deploy (push) Successful in 7s
All checks were successful
Hugo Build & Deploy / build-deploy (push) Successful in 7s
This commit is contained in:
41
content/posts/commits/2026-03-01-commit-650bc6a.md
Normal file
41
content/posts/commits/2026-03-01-commit-650bc6a.md
Normal file
@@ -0,0 +1,41 @@
|
||||
---
|
||||
title: "[bojemoi] uzi: fix payload execution — load payload object with LHOST/LPORT"
|
||||
date: 2026-03-01T00:02:38+01:00
|
||||
draft: false
|
||||
tags: ["commit", "bojemoi", "main"]
|
||||
categories: ["Git Activity"]
|
||||
summary: "Commit 650bc6a par Betty dans bojemoi"
|
||||
author: "Betty"
|
||||
---
|
||||
|
||||
## Commit `650bc6a`
|
||||
|
||||
| | |
|
||||
|---|---|
|
||||
| **Repository** | bojemoi |
|
||||
| **Branch** | `main` |
|
||||
| **Author** | Betty |
|
||||
| **Hash** | `650bc6a66ea07b4ce05d0d80f497fb8732810f33` |
|
||||
|
||||
|
||||
### Description
|
||||
|
||||
Passing a payload string to run_module_with_output() caused ValueError
|
||||
because pymetasploit3 requires a configured PayloadModule object.
|
||||
Now loads the payload via client.modules.use() and sets LHOST/LPORT
|
||||
before execution, so exploits actually run against the target.
|
||||
|
||||
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
|
||||
|
||||
### Files Changed
|
||||
|
||||
```
|
||||
M borodino/thearm_uzi
|
||||
```
|
||||
|
||||
### Diff Summary
|
||||
|
||||
```
|
||||
borodino/thearm_uzi | 121 ++++++++++++++++++++++++++++++++++++++++++++++------
|
||||
1 file changed, 109 insertions(+), 12 deletions(-)
|
||||
```
|
||||
Reference in New Issue
Block a user