add Id to scripts; remove shebang since they should never run from commandline
git-svn-id: file:///home/svn/framework3/trunk@7252 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
daed2d5d8f
commit
e836e6373a
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
# Meterpreter script for detecting if target host is a Virtual Machine
|
||||
# Provided by Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
# Version: 0.2.0
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
# credcollect - tebo[at]attackresearch.com
|
||||
|
||||
# Make sure we're rockin Priv and Incognito
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
|
||||
## Meterpreter script that display local subnets
|
||||
## Provided by Nicob <nicob [at] nicob.net>
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
|
||||
#Meterpreter script for detecting AV, HIPS, Third Party Firewalls, DEP Configuration and Windows Firewall configuration.
|
||||
#Provides also the option to kill the processes of detected products and disable the built-in firewall.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
#
|
||||
#Meterpreter script for enabling Remote Desktop on Windows 2003, Windows Vista
|
||||
#Windows 2008 and Windows XP targets using native windows commands.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
#
|
||||
#Meterpreter script for enabling Telnet Server on Windows 2003, Windows Vista
|
||||
#Windows 2008 and Windows XP targets using native windows commands.
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#Meterpreter script for modifying the hosts file in windows
|
||||
#given a single entrie or several in a file and clear the
|
||||
#DNS cache on the target machine.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
require 'sqlite3'
|
||||
#
|
||||
#Meterpreter script for monitoring and capturing Keystrokes and
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#
|
||||
# Meterpreter script that kills all Antivirus processes
|
||||
# Provided by: Jerome Athias <jerome.athias [at] free.fr>
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
|
||||
#
|
||||
# Meterpreter script for installing the meterpreter service
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#
|
||||
# Simple example script that migrates to a specific process by name.
|
||||
# This is meant as an illustration.
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#Meterpreter script for running multiple commands on Windows 2003, Windows Vista
|
||||
# and Windows XP and Windows 2008 targets.
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#Meterpreter script for running multiple scripts on a Meterpreter Session
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
#Verion: 0.2
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
#
|
||||
#Meterpreter script for ping sweeps on Windows 2003, Windows Vista
|
||||
#Windows 2008 and Windows XP targets using native windows commands.
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#Meterpreter script for monitoring and capturing packets and
|
||||
#saving them in to a PCAP file.
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
|
||||
#
|
||||
# Meterpreter script for installing a persistent meterpreter
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
#Meterpreter script for extracting information from windows prefetch folder
|
||||
#Provided by Milo at keith.lee2012[at]gmail.com
|
||||
#Verion: 0.1.0
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
#
|
||||
#Meterpreter script for basic enumeration of Windows 2003, Windows Vista
|
||||
# and Windows XP remote targets using native windows command wmic.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
|
||||
#Meterpreter script for automating the most common scheduling tasks
|
||||
#during a pentest. This script will use the schtasks command so as
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
|
||||
#Meterpreter script for abusing the scheduler service in windows
|
||||
#by scheduling and running a list of command against one or more targets
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#
|
||||
# This is a Meterpreter script designed to be used by the Metasploit Framework
|
||||
#
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
|
||||
## Meterpreter script that recursively search and download
|
||||
## files matching a given pattern
|
||||
|
@ -56,4 +57,4 @@ def scan(path)
|
|||
client.fs.file.download_file(dst, fullpath)
|
||||
end
|
||||
}
|
||||
end
|
||||
end
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
session = client
|
||||
@@exec_opts = Rex::Parser::Arguments.new(
|
||||
"-h" => [ false,"Help menu." ],
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
|
||||
# Meterpreter script for triggering the VirtualBox DoS published at:
|
||||
# http://milw0rm.com/exploits/9323
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
|
||||
#Meterpreter script for brute forcin logins on Windows 2003, Windows Vista
|
||||
#Windows 2008 and Windows XP targets using native windows commands.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
#!/usr/bin/env ruby
|
||||
# $Id:$
|
||||
#
|
||||
#Meterpreter script for basic enumeration of Windows 2000, Windows 2003, Windows Vista
|
||||
# and Windows XP targets using native windows commands.
|
||||
|
|
|
@ -1,3 +1,4 @@
|
|||
# $Id:$
|
||||
#Meterpreter script for running WMIC commands on Windows 2003, Windows Vista
|
||||
# and Windows XP and Windows 2008 targets.
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
|
|
Loading…
Reference in New Issue