diff options
author | Malfurious <m@lfurio.us> | 2025-01-02 19:17:34 -0500 |
---|---|---|
committer | Malfurious <m@lfurio.us> | 2025-01-04 23:54:51 -0500 |
commit | 0f00627964a4b2e515108401fa2cfe94600ad648 (patch) | |
tree | 56da2ccaf393a1124220cc187a7225a4efcfbcba /sploit/payload/ret2dlresolve.py | |
parent | 640726aa11369d328c1cdfe00b4344b6a925729c (diff) | |
download | nsploit-0f00627964a4b2e515108401fa2cfe94600ad648.tar.gz nsploit-0f00627964a4b2e515108401fa2cfe94600ad648.zip |
Rename sploit package to nsploit
Rename all affected files, references to file paths, and module imports
within the code. Since this line of development represents a fork from
the original sploit, a name change is seen as necessary to distinguish
the projects, as well as allow them to be installed side by side.
What does the "n" mean? Great question! You can think of it as meaning
"new sploit" if you want, though that's not quite intended. The name is
simply distinct and easy to pronounce. I had originally settled on
"msploit" (something along the lines of "Malf's sploit"), but this name
is too close to "metasploit" for me - and N is right next to it on the
keyboard.
Signed-off-by: Malfurious <m@lfurio.us>
Diffstat (limited to '')
-rw-r--r-- | nsploit/payload/ret2dlresolve.py (renamed from sploit/payload/ret2dlresolve.py) | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/sploit/payload/ret2dlresolve.py b/nsploit/payload/ret2dlresolve.py index 8862e22..3dbd2ed 100644 --- a/sploit/payload/ret2dlresolve.py +++ b/nsploit/payload/ret2dlresolve.py @@ -72,12 +72,12 @@ Elf64_Rel.r_info = 0xAAAAAAAABBBBBBBB symidx type """ -from sploit.arch import arch, itob -from sploit.payload.gadhint import GadHint -from sploit.payload.payload import Payload -from sploit.payload.payload_entry import padalign, padlen, pointer -from sploit.payload.rop import ROP -from sploit.rev.r2 import run_cmd +from nsploit.arch import arch, itob +from nsploit.payload.gadhint import GadHint +from nsploit.payload.payload import Payload +from nsploit.payload.payload_entry import padalign, padlen, pointer +from nsploit.payload.rop import ROP +from nsploit.rev.r2 import run_cmd _JMP_SLOT = 0x07 |