d03dfe8991
This PR updates the sap_icm_paths.txt wordlist with the newest enteries. |
||
---|---|---|
.. | ||
SqlClrPayload | ||
auxiliary | ||
evasion/windows | ||
exploits | ||
flash_detector | ||
headers/windows | ||
ipwn | ||
jtr | ||
lab | ||
logos | ||
markdown_doc | ||
meterpreter | ||
msfcrawler | ||
passivex | ||
php | ||
post | ||
shellcode | ||
snmp/mibs | ||
sounds | ||
templates | ||
utilities/encrypted_payload | ||
webcam | ||
wmap | ||
wordlists | ||
README.md | ||
capture_config.yaml | ||
eicar.com | ||
eicar.txt | ||
emailer_config.yaml | ||
exchange_versions.json | ||
f5-mcp-objects.txt | ||
isight.bundle | ||
kafka_ui_versions.json | ||
mime.yml | ||
rocketmq_versions_list.json | ||
unirpc-errors.yaml | ||
vncdll.x64.dll | ||
vncdll.x86.dll | ||
ysoserial_payloads.json |
README.md
This folder contains various data files used for a variety of purposes, including but not limited to banners for the
console, exploit source code for exploits (under data/exploits
), template code and binaries, wordlists and shellcode.
As a general rule of thumb this folder will most often be used when you are using compiled binaries or source code from other exploits for cases such as local privilege escalation exploits and need to provide the exploit code and compiled binaries so that maintainers can verify the binary and compile it themselves, as so that modules can find the R7 compiled version of the resulting binary for use during exploitation.