Files
blog/content/posts/commits/2026-03-01-commit-650bc6a.md
Betty 38b8878454
All checks were successful
Hugo Build & Deploy / build-deploy (push) Successful in 7s
post: commit 650bc6a in bojemoi
2026-03-01 00:02:39 +01:00

42 lines
997 B
Markdown

---
title: "[bojemoi] uzi: fix payload execution — load payload object with LHOST/LPORT"
date: 2026-03-01T00:02:38+01:00
draft: false
tags: ["commit", "bojemoi", "main"]
categories: ["Git Activity"]
summary: "Commit 650bc6a par Betty dans bojemoi"
author: "Betty"
---
## Commit `650bc6a`
| | |
|---|---|
| **Repository** | bojemoi |
| **Branch** | `main` |
| **Author** | Betty |
| **Hash** | `650bc6a66ea07b4ce05d0d80f497fb8732810f33` |
### Description
Passing a payload string to run_module_with_output() caused ValueError
because pymetasploit3 requires a configured PayloadModule object.
Now loads the payload via client.modules.use() and sets LHOST/LPORT
before execution, so exploits actually run against the target.
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
### Files Changed
```
M borodino/thearm_uzi
```
### Diff Summary
```
borodino/thearm_uzi | 121 ++++++++++++++++++++++++++++++++++++++++++++++------
1 file changed, 109 insertions(+), 12 deletions(-)
```