metasploit-framework/data
Jack Heysel d03dfe8991
Land #18841, Update sap_icm_paths.txt wordlist
This PR updates the sap_icm_paths.txt wordlist with the newest enteries.
2024-03-19 16:40:09 -07:00
..
SqlClrPayload
auxiliary Show the objectSID of groups as well 2024-02-26 17:28:41 -05:00
evasion/windows Revert "Improve AMSI bypass on new Windows" 2023-06-21 16:35:41 -05:00
exploits Land #18398, Update deprecated report_auth_info in various modules 2024-01-16 19:30:56 +00:00
flash_detector
headers/windows Add compiler support when mingw is available 2022-09-15 16:06:25 -04:00
ipwn
jtr
lab
logos
markdown_doc Enhances info -d with references to AttackerKB 2023-02-03 10:15:55 +00:00
meterpreter Update osx templates makefile and compile binaries 2023-08-02 01:26:18 +01:00
msfcrawler
passivex
php
post Fix bug in HostingCLR relating to the first argument passed to a dotnet assembly. 2023-06-28 09:24:33 +10:00
shellcode
snmp/mibs
sounds
templates Fix aarch64 elf shared object bus error 2023-12-13 00:26:53 +00:00
utilities/encrypted_payload
webcam
wmap
wordlists merge sap_icm_paths.txt with seclists sap.txt wordlist and add paths related to potential information leak 2024-02-15 16:03:31 +01:00
README.md Move folder descriptions into README.md files 2023-05-03 14:06:13 -05:00
capture_config.yaml add `LDAP` to capture plugin 2024-01-23 13:52:35 -06:00
eicar.com
eicar.txt
emailer_config.yaml
exchange_versions.json Update vulnerable version numbers and docs 2022-08-17 08:55:46 -04:00
f5-mcp-objects.txt Move the mcp-objects out of the class and into a data/ file (per Jeffrey's request) 2022-11-23 12:49:00 -08:00
isight.bundle
kafka_ui_versions.json using data/kafka_ui_versions.json for the version check 2024-02-14 20:57:46 +00:00
mime.yml
rocketmq_versions_list.json review comments 2023-06-08 16:38:22 -04:00
unirpc-errors.yaml Add two Metasploit modules for UniData vulnerabilities 2023-03-29 08:01:50 -07:00
vncdll.x64.dll
vncdll.x86.dll
ysoserial_payloads.json

README.md

This folder contains various data files used for a variety of purposes, including but not limited to banners for the console, exploit source code for exploits (under data/exploits), template code and binaries, wordlists and shellcode.

As a general rule of thumb this folder will most often be used when you are using compiled binaries or source code from other exploits for cases such as local privilege escalation exploits and need to provide the exploit code and compiled binaries so that maintainers can verify the binary and compile it themselves, as so that modules can find the R7 compiled version of the resulting binary for use during exploitation.