summaryrefslogtreecommitdiffstats
path: root/sploit/payload/ret2dlresolve.py
diff options
context:
space:
mode:
authorMalfurious <m@lfurio.us>2025-01-02 19:17:34 -0500
committerMalfurious <m@lfurio.us>2025-01-04 23:54:51 -0500
commit0f00627964a4b2e515108401fa2cfe94600ad648 (patch)
tree56da2ccaf393a1124220cc187a7225a4efcfbcba /sploit/payload/ret2dlresolve.py
parent640726aa11369d328c1cdfe00b4344b6a925729c (diff)
downloadnsploit-0f00627964a4b2e515108401fa2cfe94600ad648.tar.gz
nsploit-0f00627964a4b2e515108401fa2cfe94600ad648.zip
Rename sploit package to nsploit
Rename all affected files, references to file paths, and module imports within the code. Since this line of development represents a fork from the original sploit, a name change is seen as necessary to distinguish the projects, as well as allow them to be installed side by side. What does the "n" mean? Great question! You can think of it as meaning "new sploit" if you want, though that's not quite intended. The name is simply distinct and easy to pronounce. I had originally settled on "msploit" (something along the lines of "Malf's sploit"), but this name is too close to "metasploit" for me - and N is right next to it on the keyboard. Signed-off-by: Malfurious <m@lfurio.us>
Diffstat (limited to '')
-rw-r--r--nsploit/payload/ret2dlresolve.py (renamed from sploit/payload/ret2dlresolve.py)12
1 files changed, 6 insertions, 6 deletions
diff --git a/sploit/payload/ret2dlresolve.py b/nsploit/payload/ret2dlresolve.py
index 8862e22..3dbd2ed 100644
--- a/sploit/payload/ret2dlresolve.py
+++ b/nsploit/payload/ret2dlresolve.py
@@ -72,12 +72,12 @@ Elf64_Rel.r_info = 0xAAAAAAAABBBBBBBB
symidx type
"""
-from sploit.arch import arch, itob
-from sploit.payload.gadhint import GadHint
-from sploit.payload.payload import Payload
-from sploit.payload.payload_entry import padalign, padlen, pointer
-from sploit.payload.rop import ROP
-from sploit.rev.r2 import run_cmd
+from nsploit.arch import arch, itob
+from nsploit.payload.gadhint import GadHint
+from nsploit.payload.payload import Payload
+from nsploit.payload.payload_entry import padalign, padlen, pointer
+from nsploit.payload.rop import ROP
+from nsploit.rev.r2 import run_cmd
_JMP_SLOT = 0x07