Skip to content

Commit

Permalink
Experimental: Using a xterm pop-up to use metasploit framework. This …
Browse files Browse the repository at this point in the history
…way I can use CTRL+Z and CTRL+C freely inside metasploit framework without raising signal to shellpop application.
  • Loading branch information
zc00l committed Jun 8, 2018
1 parent d51142d commit f286f7f
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion src/handlers.py
Original file line number Diff line number Diff line change
Expand Up @@ -221,7 +221,7 @@ def generate_and_execute(self, meterpreter=False):
f.write(self.generate_rc_content(meterpreter=meterpreter))

# Execute our .rc file to open metasploit handler.
system(self._generate_execution_string())
system("""xterm -fn "-misc-fixed-medium-r-normal--18-*-*-*-*-*-iso8859-15" +sb -geometry 100x25+0+0 -e """ + self._generate_execution_string())


def get_shell_name(shell_obj):
Expand Down

0 comments on commit f286f7f

Please sign in to comment.