--- title: "[bojemoi] uzi: fix payload execution — load payload object with LHOST/LPORT" date: 2026-03-01T00:02:38+01:00 draft: false tags: ["commit", "bojemoi", "main"] categories: ["Git Activity"] summary: "Commit 650bc6a par Betty dans bojemoi" author: "Betty" --- ## Commit `650bc6a` | | | |---|---| | **Repository** | bojemoi | | **Branch** | `main` | | **Author** | Betty | | **Hash** | `650bc6a66ea07b4ce05d0d80f497fb8732810f33` | ### Description Passing a payload string to run_module_with_output() caused ValueError because pymetasploit3 requires a configured PayloadModule object. Now loads the payload via client.modules.use() and sets LHOST/LPORT before execution, so exploits actually run against the target. Co-Authored-By: Claude Sonnet 4.6 ### Files Changed ``` M borodino/thearm_uzi ``` ### Diff Summary ``` borodino/thearm_uzi | 121 ++++++++++++++++++++++++++++++++++++++++++++++------ 1 file changed, 109 insertions(+), 12 deletions(-) ```