Open francoborgia opened 4 years ago
could copy line 2210 and paste after line 2211, then change line 2210 to get 'folder' + 'nmapresult' + env.rhost + '.xml'. folder = pwd from running msfconsole
in line 2226 => nmap_result = os.path.join(self.data_path, 'nmapresult' + env.rhost + '.xml')
Hello @miquelangelodias I have the same issue and I can not figure out how to change that code to work,can you provide please how you change that code thank you !
Issue still pending can the fixed code be uploaded into the main repo?
Hi, I have the same issue, did you solve the problem?
no I left. if you solve it please let me know
Il Gio 23 Lug 2020, 11:15 Donald Su notifications@github.com ha scritto:
Hi, I have the same issue, did you solve the problem?
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/13o-bbr-bbq/machine_learning_security/issues/49#issuecomment-662903068, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5NVFAFSBQM6SIN3OTTR475ULANCNFSM4JCP4RFA .
no I left. if you solve it please let me know Il Gio 23 Lug 2020, 11:15 Donald Su notifications@github.com ha scritto: … Hi, I have the same issue, did you solve the problem? — You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub <#49 (comment)>, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5NVFAFSBQM6SIN3OTTR475ULANCNFSM4JCP4RFA .
Hi, I have a question: when you train the Deep Exploit, what are the ip of msf server and deep exploit? or Is the deep exploit and msf on the same host?
this machine is ready to work. I was testing it locally with metasploittable. the exploits it should try are all those of mfs.
Il Gio 23 Lug 2020, 14:09 Donald Su notifications@github.com ha scritto:
no I left. if you solve it please let me know Il Gio 23 Lug 2020, 11:15 Donald Su notifications@github.com ha scritto: … <#m-8745593047838880213> Hi, I have the same issue, did you solve the problem? — You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub <#49 (comment) https://github.com/13o-bbr-bbq/machine_learning_security/issues/49#issuecomment-662903068>, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5NVFAFSBQM6SIN3OTTR475ULANCNFSM4JCP4RFA .
Hi, I have a question: when you train the Deep Exploit, what are the ip of msf server and deep exploit? or Is the deep exploit and msf on the same host?
— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHub https://github.com/13o-bbr-bbq/machine_learning_security/issues/49#issuecomment-662970374, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD7KZ5KK7YYJE26XPAWSJWTR5ASATANCNFSM4JCP4RFA .
I have raised a PR in the upstream metasploit framework repository to fix this issue. https://github.com/rapid7/metasploit-framework/pull/15941
how to solve this problem please
@XUPillar Hi, i resolved the issue with reinstalling requirements and tensorflow==1.8.0
DEPP EXPLOIT GIVES ME THE FOLLOWING PROBLEM. NMAP NO OPEN PORT STRANGE SEEN THAT SCANNING MAKES IT ON A METASPLOITABLE2