42 lines
997 B
Markdown
42 lines
997 B
Markdown
---
|
|
title: "[bojemoi] uzi: fix payload execution — load payload object with LHOST/LPORT"
|
|
date: 2026-03-01T00:02:38+01:00
|
|
draft: false
|
|
tags: ["commit", "bojemoi", "main"]
|
|
categories: ["Git Activity"]
|
|
summary: "Commit 650bc6a par Betty dans bojemoi"
|
|
author: "Betty"
|
|
---
|
|
|
|
## Commit `650bc6a`
|
|
|
|
| | |
|
|
|---|---|
|
|
| **Repository** | bojemoi |
|
|
| **Branch** | `main` |
|
|
| **Author** | Betty |
|
|
| **Hash** | `650bc6a66ea07b4ce05d0d80f497fb8732810f33` |
|
|
|
|
|
|
### Description
|
|
|
|
Passing a payload string to run_module_with_output() caused ValueError
|
|
because pymetasploit3 requires a configured PayloadModule object.
|
|
Now loads the payload via client.modules.use() and sets LHOST/LPORT
|
|
before execution, so exploits actually run against the target.
|
|
|
|
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
|
|
|
|
### Files Changed
|
|
|
|
```
|
|
M borodino/thearm_uzi
|
|
```
|
|
|
|
### Diff Summary
|
|
|
|
```
|
|
borodino/thearm_uzi | 121 ++++++++++++++++++++++++++++++++++++++++++++++------
|
|
1 file changed, 109 insertions(+), 12 deletions(-)
|
|
```
|