Did I find the right examples for you? yes no

All Samples(4)  |  Call(0)  |  Derive(0)  |  Import(4)

src/s/o/social-engineer-toolkit-HEAD/src/core/set.py   social-engineer-toolkit(Download)
                                reload(gen_payload)
                            except:
                                import gen_payload
 
                        # arp cache attack, will exit quickly
                                reload(gen_payload)
                            except:
                                import gen_payload
 
                        # set site cloner to true
                                reload(gen_payload)
                            except:
                                import gen_payload
 
                        # arp cache if applicable

src/s/o/social-engineer-toolkit-HEAD/src/webattack/multi_attack/multiattack.py   social-engineer-toolkit(Download)
if meta_attack == "on":
    sys.path.append("src/webattack/browser_exploits/")
    import gen_payload
 
    # this checks to see if the MSF payload uses webdav, if so we have to force port 80