metasploit-framework/data
Jack Heysel d03dfe8991
Land #18841, Update sap_icm_paths.txt wordlist
This PR updates the sap_icm_paths.txt wordlist with the newest enteries.
2024-03-19 16:40:09 -07:00
..
SqlClrPayload Finalise module, and add supporting binaries 2017-02-10 12:56:40 +10:00
auxiliary Show the objectSID of groups as well 2024-02-26 17:28:41 -05:00
evasion/windows Revert "Improve AMSI bypass on new Windows" 2023-06-21 16:35:41 -05:00
exploits Land #18398, Update deprecated report_auth_info in various modules 2024-01-16 19:30:56 +00:00
flash_detector Add AS2 flash detection code 2015-07-13 18:26:02 -05:00
headers/windows Add compiler support when mingw is available 2022-09-15 16:06:25 -04:00
ipwn Support for embedded autorun commands 2007-10-23 23:22:53 +00:00
jtr add more smarts to nolog for jtr 2022-01-17 15:33:41 -05:00
lab Permission changes (to sync) 2011-11-10 19:48:32 -06:00
logos Add April fools module help banner 2021-12-04 15:32:38 +00:00
markdown_doc Enhances info -d with references to AttackerKB 2023-02-03 10:15:55 +00:00
meterpreter Update osx templates makefile and compile binaries 2023-08-02 01:26:18 +01:00
msfcrawler use https for metaploit.com links 2017-07-24 06:26:21 -07:00
passivex Commit the PassiveX DLL updated to build with Visual Studio C++ 2008. Removed some compiler warnings. Use VirtualProtect to make second stage RWX. Use WSASocketA() over socket() for second stage compatibility. Seems to now work with the shell stage (Tested on XPSP2/IE7) but still not working with meterpreter. 2009-11-11 00:39:38 +00:00
php Add HTTPS and new transport support for hop 2015-11-11 21:25:23 -06:00
post Fix bug in HostingCLR relating to the first argument passed to a dotnet assembly. 2023-06-28 09:24:33 +10:00
shellcode Fix and process block edges within the GraphML 2021-05-25 14:38:50 -04:00
snmp/mibs Permission changes (to sync) 2011-11-10 19:48:32 -06:00
sounds use wav with sounds plugin for windows / linux compat 2015-12-08 16:20:44 -06:00
templates Fix aarch64 elf shared object bus error 2023-12-13 00:26:53 +00:00
utilities/encrypted_payload opt for inline asm instead of pre-compiled object 2019-10-31 11:55:40 -05:00
webcam use https for metaploit.com links 2017-07-24 06:26:21 -07:00
wmap First step on module cleaning. 2012-03-02 10:18:32 -06:00
wordlists merge sap_icm_paths.txt with seclists sap.txt wordlist and add paths related to potential information leak 2024-02-15 16:03:31 +01:00
README.md Move folder descriptions into README.md files 2023-05-03 14:06:13 -05:00
capture_config.yaml add `LDAP` to capture plugin 2024-01-23 13:52:35 -06:00
eicar.com Permission changes (to sync) 2011-11-10 19:48:32 -06:00
eicar.txt Permission changes (to sync) 2011-11-10 19:48:32 -06:00
emailer_config.yaml Permission changes (to sync) 2011-11-10 19:48:32 -06:00
exchange_versions.json Update vulnerable version numbers and docs 2022-08-17 08:55:46 -04:00
f5-mcp-objects.txt Move the mcp-objects out of the class and into a data/ file (per Jeffrey's request) 2022-11-23 12:49:00 -08:00
isight.bundle Permission changes (to sync) 2011-11-10 19:48:32 -06:00
kafka_ui_versions.json using data/kafka_ui_versions.json for the version check 2024-02-14 20:57:46 +00:00
mime.yml Cutting over rails3 to master. 2012-04-15 23:35:38 -05:00
rocketmq_versions_list.json review comments 2023-06-08 16:38:22 -04:00
unirpc-errors.yaml Add two Metasploit modules for UniData vulnerabilities 2023-03-29 08:01:50 -07:00
vncdll.x64.dll Update project VS 2013, clean CLI build 2013-12-20 09:49:15 +10:00
vncdll.x86.dll Update project VS 2013, clean CLI build 2013-12-20 09:49:15 +10:00
ysoserial_payloads.json Add the generated YSoSerial gadget chain 2021-09-14 09:10:44 -04:00

README.md

This folder contains various data files used for a variety of purposes, including but not limited to banners for the console, exploit source code for exploits (under data/exploits), template code and binaries, wordlists and shellcode.

As a general rule of thumb this folder will most often be used when you are using compiled binaries or source code from other exploits for cases such as local privilege escalation exploits and need to provide the exploit code and compiled binaries so that maintainers can verify the binary and compile it themselves, as so that modules can find the R7 compiled version of the resulting binary for use during exploitation.