bwatters-r7
0257861c4f
Remove debug statements and extra c/ruby libraries
2019-12-11 18:42:36 -06:00
bwatters-r7
942d1e3962
Trim exploit code and de-pasta-fy module
...
Better check for build number
2019-12-10 18:09:08 -06:00
bwatters-r7
8a9dd35793
First draft of windows comahawk priv esc
2019-12-09 19:09:15 -06:00
Shelby Pace
4c95150491
add xml erb file
2019-12-02 08:44:37 -06:00
Brent Cook
f8c84c9928
Land #12530 , add encrypted, compilable shell payloads
2019-11-21 08:59:46 -06:00
Shelby Pace
deb57a1df0
add modified chacha implementation, format_uuid
2019-11-19 20:16:16 -06:00
Cory Kennedy
a66a59ae2a
Changed Filename
2019-11-13 20:26:49 -06:00
Cory Kennedy
03117ea685
Update SecKC.txt
2019-11-13 20:26:01 -06:00
lle-bout
6766d9f6f7
Fix exploit/windows/local/ms16_032_secondary_logon_handle_privesc
...
- Powershell script was outdated.
Updated from https://www.exploit-db.com/exploits/39719
- Powershell script was buggy when current directory
was set to e.g. C:\ProgramData. (Get-Item Error)
Fixed.
- Stager was being dropped to current directory, but
it is not guaranteed that we always have permission
to write a file there. Use %TEMP% instead.
- Exploit only seems to work when executed under
a powershell of the same architecture as the
host. (Not WOW64)
This module now ensures that no matter the
architecture of the meterpreter, a powershell
of the same architecture as the host is being
run. (Using Sysnative directory when on WOW64)
- Stager was broken, now generating stager with Rex
and dropping stager as `.ps1` instead of `.txt`.
Ideally the exploit should be rewritten to
accept a shellcode payload directly or a smaller
stager powershell should be created so that it
fits in under 1024 bytes and can be fed directly
to CreateProcessWithLogonW without dropping to
disk.
2019-11-13 05:01:47 +01:00
Cory Kennedy
7d9ab29c8c
Create SecKC.txt
2019-11-12 15:55:26 -06:00
Jeff McJunkin
8b462083be
Update banner for MSF5
2019-11-07 20:47:44 +11:00
Shelby Pace
8bb1c5102b
opt for inline asm instead of pre-compiled object
2019-10-31 11:55:40 -05:00
Brendan Coles
991ccdbda5
Land #12106 , Add Linux PTRACE_TRACEME local root exploit
2019-10-23 14:01:14 +00:00
Tim W
a5a3e28984
Initial commit of CVE-2019-2215 Android Binder Use-After-Free
2019-10-17 18:48:49 +08:00
Shelby Pace
b674f3dda3
add AlignRSP call, remove begin from linker script
2019-10-10 12:16:10 -05:00
Shelby Pace
12f4a89629
remove 64bithelper, add VirtualFree
2019-10-10 12:16:10 -05:00
Shelby Pace
c3a7d377f4
add payload for X64 arch
2019-10-10 12:16:10 -05:00
Shelby Pace
64145cdbf2
add header files
2019-10-10 12:16:09 -05:00
0xGilda
0b95acf0b3
Update honk.txt to MSF substitution sequences
...
as per: https://github.com/rapid7/metasploit-framework/pull/12430#issuecomment-539669624
2019-10-08 20:53:59 +01:00
0xGilda
ad70e10452
Add new Untitled Goose Game inspired logo
...
Inspired by an @IanColdwater tweet.
2019-10-08 19:52:11 +01:00
Shelby Pace
4710322cd7
Land #11762 , add sosreport privesc
2019-09-24 09:48:57 -05:00
Clément Notin
2ccfbbe8f8
RHOSTS: fix syntax in doc examples
2019-09-11 19:22:37 +02:00
Tim W
bade8bfc48
add live compiling
2019-09-03 17:31:04 +08:00
Load
dc07b78dcd
@LoadLow Marks the generated ODT file readonly
2019-08-18 18:36:31 +02:00
Load
9b1a3b4033
Marks the generated ODT file readonly
...
Prevents autosave and further modifications after opening the document on the target system.
2019-08-18 17:59:25 +02:00
Load
e6b72b5b43
Cleanup odt metadata
...
Metadata part is not mandatory on ODT files
2019-08-18 17:51:36 +02:00
Shelby Pace
409b3c9c4b
using python payload for platform independence
2019-08-16 15:36:42 -05:00
LoadLow
5f478b7fd6
Adds exploit module for CVE-2019-9848
...
uses on dom-loaded event (triggered just after opening the document) and still working on 6.2.5
2019-07-30 23:07:20 +02:00
Brent Cook
5b8a75f544
Land #12119 , Add OS X post module to manage Sonic Pi
2019-07-28 23:12:26 -05:00
Wei Chen
2f720a1f26
Land #12137 , Update setting new .exe of Sophos AV
2019-07-28 21:49:31 -05:00
Wei Chen
c47caec03f
Land #12107 , Add module Redis Unauthenticated Code Execution
2019-07-28 21:40:03 -05:00
GabrielMioranza
4d6f16eac1
Update setting new .exe of Sophos AV
...
Add .exe used by Sophos AV Endpoint
2019-07-27 16:47:05 -03:00
William Vu
e6e3ec493b
Rename play_pattern_timed durations to beats
...
This is so I don't forget they're beats, not seconds. Also, "times"
already has special meaning in Ruby, so let's not confuse ourselves
further.
2019-07-26 17:41:24 -05:00
William Vu
42c2d78731
Remove fluff for better effect
2019-07-26 17:18:39 -05:00
William Vu
61e9f2b5bf
Fix rhythm of melody section
...
Thanks for your ears, @busterb!
2019-07-26 14:09:57 -05:00
William Vu
a952fc303b
Fix play_pattern_timed
2019-07-22 23:53:24 -05:00
William Vu
3bc65b0e9e
Play it like a real band
2019-07-22 22:23:44 -05:00
William Vu
283f9d2e08
Add OS X Manage Sonic Pi post module
2019-07-22 18:46:02 -05:00
Green-m
07f3c074d4
Add doc and enhance the module.
2019-07-20 00:17:57 +08:00
Green-m
b6697f5016
Add redis rce module and data stuff.
...
To do:
1. Check env of system and compiler.
2. Add a compiled so file to be compatible with windows and mac.
3. Add doc.
2019-07-17 15:33:02 +08:00
Wei Chen
27bb166938
Land #12011 , Add module for cve-2018-8453
2019-07-15 11:31:07 -05:00
Jacob Robles
5c0bbbbaa0
Land #12070 , Add module for CVE-2019-0841
2019-07-15 09:32:47 -05:00
Shelby Pace
f7c252eef3
move source to external/source directory
2019-07-09 09:08:28 -05:00
Jacob Robles
a55aea33a9
Add cve-2018-8453 exploit module
2019-07-09 07:15:13 -05:00
Shelby Pace
c69799262d
fixed issue with hard link exe
2019-07-03 15:44:00 -05:00
Shelby Pace
a83812ad55
add source code, compiled exe for diaghub loading
2019-07-03 14:32:22 -05:00
Brent Cook
e50ab5cd13
Land #11726 , add exploit for CVE-2019-8513, macOS TimeMachine cmd injection
2019-06-29 05:36:12 -05:00
William Vu
f3b509a1bc
Implement on_request_uri
2019-06-25 23:47:19 -05:00
Shelby Pace
d3cd1a3fa0
added VS2013 compiled executables
2019-06-19 15:19:00 -05:00
Shelby Pace
5b188a02ba
add code that makes hard links
2019-06-06 15:59:53 -05:00
Wei Chen
b8abb550e6
Land #11924 , Update adobe_flash_opaque_background_uaf for Win 10
2019-06-04 00:51:34 -05:00
sinn3r
22e8d3488d
Land #11862 , wordlists for wordpress plugin/theme directories
...
Add wordlists for enumerating WordPress plugin/theme directories
2019-06-03 00:54:43 -05:00
Tim W
6921ca74d8
add exploit binary
2019-06-02 10:19:24 +08:00
Tim W
32af9cb897
Initial commit of CVE-2018-4233 for iOS 10
2019-06-02 10:19:24 +08:00
suzu991154
0a6f1d5538
Add support for Windows 10(10240) to CVE-2015-5122
2019-06-01 14:44:30 +09:00
NoodleOfDeath
2a5233156f
Updated wordlists to match generated script provided on https://github.com/rapid7/metasploit-framework/pull/11862
2019-05-28 12:02:03 -04:00
NoodleOfDeath
7bd9608d5e
Removed extraneous newline ending in wp-plugins.txt
2019-05-24 17:50:33 -04:00
NoodleOfDeath
d4e79cffe7
added wp-themes wordlist to reflect https://themes.svn.wordpress.org/
2019-05-24 17:40:37 -04:00
NoodleOfDeath
9f3e4e0b65
modified wordlist to reflect https://plugins.svn.wordpress.org/
2019-05-24 17:37:02 -04:00
NoodleOfDeath
5f889919b4
Added a wordlist of 1491 WordPress plugins that can be enumerated in the wp/wp-content/plugins directory
2019-05-20 14:30:02 -04:00
Tim W
be1d185a04
Add CVE-2019-8565 OSX Feedback Assistant local root exploit
2019-05-07 04:30:47 +08:00
Tim W
fbbcc2b607
add exploit binary
2019-04-21 16:02:10 +08:00
Brendan Coles
a5b894dca3
Add sosreport-rhel7.py
2019-04-20 11:56:01 +00:00
Shelby Pace
54edf3c008
reduced file size
2019-04-16 09:06:44 -05:00
Tim W
0472f96209
add the exploit binary
2019-04-16 13:09:41 +08:00
Tim W
c428684732
eject only the malformed images
2019-04-16 13:09:13 +08:00
Shelby Pace
391e7cf8ef
adjusted font size and color
2019-04-12 14:01:29 -05:00
Shelby Pace
700562594c
getting session on windows
2019-04-12 14:01:29 -05:00
Shelby Pace
4873b7c3e6
using a path for both Windows and Linux
2019-04-12 14:01:29 -05:00
Shelby Pace
9d0c045b0d
added erb file and base for module
2019-04-12 14:01:29 -05:00
William Vu
5867158238
Land #11595 , can_flood post module
2019-04-01 12:38:46 -05:00
William Vu
f5f4c4bec2
Clean up module
2019-04-01 12:24:35 -05:00
Justin Bollinger
c98ed4b494
Updated ipmi_users.txt
...
Added username 'Admin'
2019-03-22 11:40:24 -04:00
PietroBiondi
ce218fc86a
Add can_flood post exploitation for CAN and added example list of frames
2019-03-20 13:17:41 +01:00
El Nerdo
ac0dc8be1f
cable-d -> cable-docsis
...
cable-docsis is a known hidden community string in Cisco devices.
www.cisco.com/warp/public/707/cisco-sa-20010228-ios-snmp-community.shtml
To me, it looks like cable-d should be cable-docsis
2019-03-16 20:55:43 +01:00
h00die
42be66a2cf
add root/ubnt to router creds
2019-03-12 19:26:58 -04:00
Brent Cook
468679f907
Land #11092 , Add FreeBSD 8.3 / 9.0 Intel SYSRET Privilege Escalation module
2019-03-06 19:50:08 -06:00
Hervé Beraud
69d398865d
python 3 compatibility
2019-02-13 22:20:29 +01:00
Brent Cook
930d1fb78a
Land #11351 , many new John the Ripper module improvements
2019-02-13 03:05:14 -06:00
Tim W
f589db6831
Land #11152 , add macOS adobe flash player type confusion RCE
2019-02-09 18:46:48 +08:00
Brent Cook
5fc7167beb
Merge remote-tracking branch 'upstream/master' into land-10812-
2019-02-07 09:31:02 -06:00
Brent Cook
cb6d7fa210
Land #11165 , Fix intermittent problem with native osx stager
2019-02-06 22:39:07 -06:00
h00die
9930edf704
jtr modernizations
2019-01-25 14:07:24 -05:00
Brent Cook
1947bae45b
Land #11230 , add JuicyPotato local privilege escalation
2019-01-15 21:20:25 -06:00
Wei Chen
27d6fffdad
Land #11125 , Import/generate `ysoserial` Java serialization objects
2019-01-15 17:09:56 -06:00
asoto-r7
72d3f6538e
Updated ysoserial_payloads.json cache
2019-01-14 17:43:27 -06:00
phra
9789547fe7
build: recompile dlls
2019-01-12 04:02:34 +01:00
asoto-r7
3a48282138
ysoserial: Updated JSON
2019-01-11 16:56:52 -06:00
phra
8e50838e62
build: recompile dlls
2019-01-11 18:22:13 +01:00
phra
953b97def1
build: recompile dlls
2019-01-11 16:29:15 +01:00
Matthew Kienow
8f746cd6ae
Update MSF v5 banner for MSF5 release
2019-01-10 13:39:57 -05:00
phra
5f244643bd
feat: add compiled reflective DLL for juicy potato
2019-01-10 17:20:21 +01:00
h00die
49b8552d59
update joomla wordlists
2019-01-04 21:38:49 -05:00
asoto-r7
0ca4dd829e
Fixed an off-by-one error in fingerprinting string randomization
2019-01-04 16:31:43 -06:00
Tim W
940f255c4b
update x64_osx_stage binary
2018-12-24 19:26:54 +08:00
Brendan Coles
983b39a5b3
Use @iZsh's exploit
2018-12-21 15:40:01 +00:00
Brent Cook
dc6ae6f058
initial import, CVE-2016-4117 OSX exploit
2018-12-21 02:54:35 -06:00
asoto-r7
7557624c00
ysoserial: Generated more compact JSON and renamed script
2018-12-18 15:42:50 -06:00
asoto-r7
e20c250977
ysoserial: Removed newlines from ysoserial_payloads.json
2018-12-18 15:21:56 -06:00
asoto-r7
60f3cfbb79
ysoserial: Cleaned up ysoserial payload in `hp_imc_java_deserialize`
2018-12-18 15:17:51 -06:00