rapid7/metasploit-framework

View on GitHub
modules/payloads/singles/windows/x64/pingback_reverse_tcp.rb

Summary

Maintainability
C
1 day
Test Coverage

Method initialize has 217 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def initialize(info = {})
    super(merge_info(info,
      'Name'          => 'Windows x64 Pingback, Reverse TCP Inline',
      'Description'   => 'Connect back to attacker and report UUID (Windows x64)',
      'Author'        => [ 'bwatters-r7' ],
Severity: Major
Found in modules/payloads/singles/windows/x64/pingback_reverse_tcp.rb - About 1 day to fix

    There are no issues that match your filters.

    Category
    Status