Skip to main content Link Menu Expand (external link) Document Search Copy Copied

About payloads

HatSploit payloads are sent to the target after successful exploitation of vulnerability by module.

They can differ, from platform and style to architecture and execution.

Using payloads

To use a specific payload, you should first select the module that supports payload execution.

Let’s take exploit/linux/generic/32764_code_execution module that exploits the built-in backdoor in several routers and attempts to gain code execution.