msf-ws.ru 435 B

1234567891011121314151617
  1. # msf-ws.ru
  2. # Metasploit data web service
  3. require 'pathname'
  4. @framework_path = '.'
  5. root = Pathname.new(@framework_path).expand_path
  6. @framework_lib_path = root.join('lib')
  7. $LOAD_PATH << @framework_lib_path.to_path unless $LOAD_PATH.include?(@framework_lib_path)
  8. require 'msfenv'
  9. if ENV['MSF_LOCAL_LIB']
  10. $LOAD_PATH << ENV['MSF_LOCAL_LIB'] unless $LOAD_PATH.include?(ENV['MSF_LOCAL_LIB'])
  11. end
  12. run Msf::WebServices::MetasploitApiApp