Files
blog/content/posts/commits/2026-03-01-commit-650bc6a.md
Betty 38b8878454
All checks were successful
Hugo Build & Deploy / build-deploy (push) Successful in 7s
post: commit 650bc6a in bojemoi
2026-03-01 00:02:39 +01:00

997 B

title, date, draft, tags, categories, summary, author
title date draft tags categories summary author
[bojemoi] uzi: fix payload execution — load payload object with LHOST/LPORT 2026-03-01T00:02:38+01:00 false
commit
bojemoi
main
Git Activity
Commit 650bc6a par Betty dans bojemoi Betty

Commit 650bc6a

Repository bojemoi
Branch main
Author Betty
Hash 650bc6a66ea07b4ce05d0d80f497fb8732810f33

Description

Passing a payload string to run_module_with_output() caused ValueError because pymetasploit3 requires a configured PayloadModule object. Now loads the payload via client.modules.use() and sets LHOST/LPORT before execution, so exploits actually run against the target.

Co-Authored-By: Claude Sonnet 4.6 noreply@anthropic.com

Files Changed

M	borodino/thearm_uzi

Diff Summary

 borodino/thearm_uzi | 121 ++++++++++++++++++++++++++++++++++++++++++++++------
 1 file changed, 109 insertions(+), 12 deletions(-)