CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/lib/msf/core/encoder/alphanum.rb
Views: 11784
1
# -*- coding: binary -*-
2
3
4
module Msf
5
###
6
#
7
# This class provides common options for certain alphanumeric encoders.
8
#
9
###
10
class Encoder::Alphanum < Msf::Encoder
11
12
def initialize(info)
13
super(info)
14
15
register_options(
16
[
17
OptString.new('BufferRegister', [ false, 'The register that points to the encoded payload' ]),
18
OptInt.new('BufferOffset', [ false, 'The offset to the buffer from the start of the register', 0 ]),
19
OptBool.new('AllowWin32SEH', [ true, 'Use SEH to determine the address of the stub (Windows only)', false ])
20
], Msf::Encoder::Alphanum
21
)
22
end
23
24
end
25
end
26
27