diff --git a/src/attackmate/executors/metasploit/msfexecutor.py b/src/attackmate/executors/metasploit/msfexecutor.py index 6c7f9ed..89dc516 100644 --- a/src/attackmate/executors/metasploit/msfexecutor.py +++ b/src/attackmate/executors/metasploit/msfexecutor.py @@ -88,6 +88,7 @@ def prepare_exploit(self, command: MsfModuleCommand): for option, setting in command.options.items(): if setting.isnumeric(): exploit[option] = int(setting) + continue if setting.lower() in ['true', 'false', '1', '0', 'y', 'n', 'yes', 'no']: exploit[option] = CmdVars.variable_to_bool(option, setting) else: