webdav_exploit
webdav_exploit copied to clipboard
payload in shellcode?
what is the payload in the shellcode parameter? trying this in a lab.
Moreover how can one parse a custom shellcode from msfvenom, i think it will be better if the metasploit module was ported to python.