mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-04-04 14:56:08 +00:00
Bug fixes
This commit is contained in:
parent
84ab3cf42d
commit
8556dd563a
3 changed files with 12 additions and 1 deletions
|
@ -1,3 +1,11 @@
|
|||
~~~~~~~~~~~~~~~~
|
||||
version 6.5.7
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
* fix chown issue on different platforms when using harvester (pull request)
|
||||
* fixed an issue when moving to /etc/setoolkit/set.config would throw exception when using teensy attack vectors, now fixed
|
||||
* fixed an issue which would cause msf.exe to not be found when using dll hijacking
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 6.5.6
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
|
|
@ -233,7 +233,7 @@ def print_error(message):
|
|||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||
|
||||
def get_version():
|
||||
define_version = '6.5.6'
|
||||
define_version = '6.5.7'
|
||||
return define_version
|
||||
|
||||
class create_menu:
|
||||
|
|
|
@ -137,3 +137,6 @@ if choice == "2":
|
|||
for name in glob.glob(setdir + "/dll/*"):
|
||||
file.write(name, os.path.basename(name), zipfile.ZIP_DEFLATED)
|
||||
file.close()
|
||||
|
||||
if os.path.isfile(setdir + "/msf.exe"):
|
||||
subprocess.Popen("cp %s/msf.exe %s/src/html/" % (setdir, definepath), shell=True).wait()
|
||||
|
|
Loading…
Add table
Reference in a new issue