metasploit-framework/data/templates
ssst0n3 246a3604b8 set the org to be 0x400000 2022-05-13 10:50:19 +08:00
..
scripts Merge remote-tracking branch 'upstream/pr/8299' into land-8267- 2017-08-20 17:43:56 -05:00
src set the org to be 0x400000 2022-05-13 10:50:19 +08:00
dotnetmem.dll Permission changes (to sync) 2011-11-10 19:48:32 -06:00
template_aarch64_linux.bin set the org to be 0x400000 2022-05-13 10:50:19 +08:00
template_aarch64_linux_dll.bin Add support and templates for aarch64 targets 2022-02-10 10:49:02 -06:00
template_armle_darwin.bin fixup some of the payload exe generation/templating stuff, add pe/dll template+src 2010-04-14 21:44:23 +00:00
template_armle_linux.bin make exe template names more consistent 2010-08-19 21:08:51 +00:00
template_armle_linux_dll.bin First crack at Samba CVE-2017-7494 2017-05-24 19:42:04 -05:00
template_dotnetmem.dll Permission changes (to sync) 2011-11-10 19:48:32 -06:00
template_mipsbe_linux.bin Added support for mipsbe elf 2013-03-26 17:20:43 +01:00
template_mipsle_linux.bin fix segment virtual address 2013-03-26 10:50:29 +01:00
template_nouac_windows.msi Add MSI bins 2013-09-27 20:03:19 +01:00
template_ppc_darwin.bin fixup some of the payload exe generation/templating stuff, add pe/dll template+src 2010-04-14 21:44:23 +00:00
template_windows.msi Add MSI bins 2013-09-27 20:03:19 +01:00
template_x64_bsd.bin Implement x64 BSD exec and exe template. 2015-04-12 12:17:25 -05:00
template_x64_darwin.bin Adjusted the function pointer to the right offset 2012-02-06 16:39:10 +02:00
template_x64_linux.bin Add x64 elf default template 2011-07-08 19:22:13 +00:00
template_x64_linux_dll.bin Just remove DT_HASH. 2016-10-03 23:43:19 -05:00
template_x64_windows.dll Add in backup code to DLL template to fall back to old way of executing things in case the BREAKAWAY_FROM_JOB flag cannot be used 2022-03-31 14:28:29 -05:00
template_x64_windows.exe make exe template names more consistent 2010-08-19 21:08:51 +00:00
template_x64_windows_dccw_gdiplus.dll Recompiled binaries 2017-10-09 12:44:58 -05:00
template_x64_windows_mixed_mode.dll Increase the payload space to 4096 within the DLL template 2020-11-16 15:58:59 -05:00
template_x64_windows_svc.exe make exe template names more consistent 2010-08-19 21:08:51 +00:00
template_x86_bsd.bin Permissions 2012-06-06 20:05:29 -05:00
template_x86_darwin.bin fixup some of the payload exe generation/templating stuff, add pe/dll template+src 2010-04-14 21:44:23 +00:00
template_x86_linux.bin new, much smaller, elf template 2010-02-11 02:31:36 +00:00
template_x86_linux_dll.bin First crack at Samba CVE-2017-7494 2017-05-24 19:42:04 -05:00
template_x86_solaris.bin Permissions 2012-06-06 20:05:29 -05:00
template_x86_windows.dll Add in backup code to DLL template to fall back to old way of executing things in case the BREAKAWAY_FROM_JOB flag cannot be used 2022-03-31 14:28:29 -05:00
template_x86_windows.exe make exe template names more consistent 2010-08-19 21:08:51 +00:00
template_x86_windows_dccw_gdiplus.dll Recompiled binaries 2017-10-09 12:44:58 -05:00
template_x86_windows_mixed_mode.dll Increase the payload space to 4096 within the DLL template 2020-11-16 15:58:59 -05:00
template_x86_windows_old.exe make exe template names more consistent 2010-08-19 21:08:51 +00:00
template_x86_windows_svc.exe make exe template names more consistent 2010-08-19 21:08:51 +00:00