Land #2384 - remove id and revision tags

bug/bundler_fix
sinn3r 2013-09-17 12:37:22 -05:00
commit 69946d0108
70 changed files with 77 additions and 233 deletions

View File

@ -11,8 +11,6 @@ module Msf
#
# written by corelanc0d3r <peter.ve [at] corelan.be>
#
# Version: $Revision$
#
###
module Exploit::Omelet

View File

@ -14,7 +14,6 @@ module Payload::Osx::BundleInject
def initialize(info = {})
super(update_info(info,
'Name' => 'Mac OS X Inject Mach-O Bundle',
'Version' => '$Revision$',
'Description' => 'Inject a custom Mach-O bundle into the exploited process',
'Author' =>
[

View File

@ -16,7 +16,6 @@ module Payload::Windows::DllInject
def initialize(info = {})
super(update_info(info,
'Name' => 'Windows Inject DLL',
'Version' => '$Revision$',
'Description' => 'Inject a custom DLL into the exploited process',
'Author' =>
[

View File

@ -16,7 +16,6 @@ module Payload::Windows::Exec
def initialize(info = {})
super(update_info(info,
'Name' => 'Windows Execute Command',
'Version' => '$Revision$',
'Description' => 'Execute an arbitrary command',
'Author' => [ 'vlad902', 'sf' ],
'License' => MSF_LICENSE,

View File

@ -16,7 +16,6 @@ module Payload::Windows::LoadLibrary
def initialize(info = {})
super(update_info(info,
'Name' => 'Windows LoadLibrary Path',
'Version' => '$Revision$',
'Description' => 'Load an arbitrary library path',
'Author' => [ 'sf', 'hdm' ],
'License' => MSF_LICENSE,

View File

@ -20,7 +20,6 @@ module Payload::Windows::ReflectiveDllInject
def initialize(info = {})
super(update_info(info,
'Name' => 'Reflective DLL Injection',
'Version' => '$Revision$',
'Description' => 'Inject a DLL via a reflective loader',
'Author' => [ 'sf' ],
'References' => [ [ 'URL', 'https://github.com/stephenfewer/ReflectiveDLLInjection' ] ],

View File

@ -20,7 +20,6 @@ module Payload::Windows::ReflectiveDllInject_x64
def initialize(info = {})
super(update_info(info,
'Name' => 'Reflective DLL Injection',
'Version' => '$Revision$',
'Description' => 'Inject a DLL via a reflective loader',
'Author' => [ 'sf' ],
'References' => [ [ 'URL', 'https://github.com/stephenfewer/ReflectiveDLLInjection' ] ],

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,6 +1,3 @@
# $Id$
# $Revision$
#
# Meterpreter script for setting up a route from within a
# Meterpreter session, without having to background the

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Meterpreter script for detecting if target host is a Virtual Machine
# Provided by Carlos Perez at carlos_perez[at]darkoperator.com
# Version: 0.2.0

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# credcollect - tebo[at]attackresearch.com
opts = Rex::Parser::Arguments.new(

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
#Options and Option Parsing

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: davehull at dph_msf@trustedsignal.com
#-------------------------------------------------------------------------------

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Scriptjunkie
# Uses a meterpreter session to spawn a new meterpreter session in a different process.
# A new process allows the session to take "risky" actions that might get the process killed by

View File

@ -1,5 +1,3 @@
#$Id$
#$Revision$
#
# Script to extract data from a chrome installation.
#

View File

@ -1,6 +1,4 @@
#
# $Id: enum_firefox.rb 9770 2010-07-10 20:00:32Z darkoperator $
# $Revision: $
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision: 9771 $
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision: $
#Meterpreter script for enumerating Microsoft Powershell settings.
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
@client = client

View File

@ -1,10 +1,7 @@
# $Id$
# $Revision: $
#
# Meterpreter script for enumerating putty connections
# Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
#
# $Revision$
@client = client
#Options and Option Parsing
opts = Rex::Parser::Arguments.new(

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,6 +1,3 @@
# $Id: $
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
@client = client

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision: $
# Meterpreter script for listing installed applications and their version.
# Provided: carlos_perez[at]darkoperator[dot]com

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision: $
#-------------------------------------------------------------------------------
#Options and Option Parsing
opts = Rex::Parser::Arguments.new(

View File

@ -1,7 +1,3 @@
##
# $Id$
# $Revision: $
##
require "rexml/document"

View File

@ -1,6 +1,3 @@
# $Id$
# $Revision$
# Meterpreter script that display local subnets
# Provided by Nicob <nicob [at] nicob.net>
# Ripped from http://blog.metasploit.com/2006/10/meterpreter-scripts-and-msrt.html

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
require "rexml/document"

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#copied getvncpw - thanks grutz/carlos

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#
# Meterpreter script for detecting AV, HIPS, Third Party Firewalls, DEP Configuration and Windows Firewall configuration.
# Provides also the option to kill the processes of detected products and disable the built-in firewall.

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#----------------------------------------------------------------
# Meterpreter script to obtain the VNC password out of the
# registry and print its decoded cleartext

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#
# Implement pwdump (hashdump) through registry reads + syskey

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Meterpreter script for modifying the hosts file in windows
# given a single entrie or several in a file and clear the
# DNS cache on the target machine.

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
# Updates by Shellster
#-------------------------------------------------------------------------------

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#
# Meterpreter script that kills all Antivirus processes
# Provided by: Jerome Athias <jerome.athias [at] free.fr>

View File

@ -1,6 +1,3 @@
# $Id$
# $Revision$
#
# Meterpreter script for installing the meterpreter service
#

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#
# Simple example script that migrates to a specific process by name.
# This is meant as an illustration.

View File

@ -1,10 +1,8 @@
# $Id$
#
# Meterpreter script for running multiple console commands on a meterpreter session
# Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
# Verion: 0.1
#
# $Revision$
################## Variable Declarations ##################
@client = client

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#Meterpreter script for running multiple commands on Windows 2003, Windows Vista
# and Windows XP and Windows 2008 targets.
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#Meterpreter script for running multiple scripts on a Meterpreter Session
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
#Verion: 0.2

View File

@ -125,7 +125,6 @@ def reverselookup(session, iprange, dest)
end
rescue ::Exception => e
print_status("The following error was encountered: #{e.class} #{e}")
end
end
@ -220,7 +219,6 @@ def pingsweep(session, iprange, dest)
end
rescue ::Exception => e
print_status("The following error was encountered: #{e.class} #{e}")
end
end
#-------------------------------------------------------------------------------

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#
# Meterpreter script for utilizing purely PowerShell to extract username and password hashes through registry
# keys. This script requires you to be running as system in order to work properly. This has currently been

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#Meterpreter script for extracting information from windows prefetch folder
#Provided by Milo at keith.lee2012[at]gmail.com
#Verion: 0.1.0

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#Meterpreter script for automating the most common scheduling tasks
#during a pentest. This script will use the schtasks command so as

View File

@ -1,8 +1,3 @@
##
# $Id$
# $Revision$
##
##
#
# This script exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#Meterpreter script for abusing the scheduler service in windows
#by scheduling and running a list of command against one or more targets

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# This is a Meterpreter script designed to be used by the Metasploit Framework
#
# The goal of this script is to obtain system information from a victim through

View File

@ -1,14 +1,10 @@
#
# $Id$
#
# Script to unlock a windows screen by L4teral <l4teral [4t] gmail com>
# Needs system prvileges to run and known signatures for the target system.
# This script patches msv1_0.dll loaded by lsass.exe
#
# Based on the winlockpwn tool released by Metlstorm: http://www.storm.net.nz/projects/16
#
# $Revision$
#
revert = false
targets = [

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author:Roni Bachar (@roni_bachar) roni.bachar.blog@gmail.com
#
# Thie script will open an interactive view of remote hosts

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
## Meterpreter script that recursively search and download
## files matching a given pattern

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez <carlos_perez [at] darkoperator.com and Shai rod (@NightRang3r)
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,6 +1,4 @@
##
# $Id$
#
# Many services are configured with insecure permissions. This
# script attempts to create a service, then searches through a list of
# existing services to look for insecure file or configuration
@ -11,7 +9,6 @@
#
# scriptjunkie googlemail com
#
# $Revision$
##
if client.platform !~ /win32/

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,6 +1,3 @@
# $Id$
# $Revision$
##
# South River Technologies WebDrive Service Bad Security Descriptor Local Privilege Escalation.
#

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
session = client
@@exec_opts = Rex::Parser::Arguments.new(

View File

@ -1,10 +1,6 @@
# $Id$
# Meterpreter script for triggering the VirtualBox DoS published at:
# http://milw0rm.com/exploits/9323
# $Revision$
opts = Rex::Parser::Arguments.new(
"-h" => [ false,"Help menu." ]
)

View File

@ -1,6 +1,3 @@
# $Id$
# $Revision$
# Meterpreter script that kills Mcafee VirusScan Enterprise v8.7.0i+ processes in magic
# order which keeps VirusScan icon visible at system tray without disabled sign on it.
# Additionally it lets you disable On Access Scanner from registry, upload your detectable

View File

@ -1,6 +1,3 @@
# $Id$
# $Revision$
#
# Meterpreter script for obtaining a quick VNC session
#

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: scriptjunkie
#
# Simplify running webcam, whether grabbing a single frame or running

View File

@ -1,7 +1,3 @@
# win32-sshclient.rb
#
# $Id$
# $Revision$
#
# Meterpreter script to deploy & run the "plink" commandline ssh-client
# supports only MS-Windows-2k/XP/Vista Hosts

View File

@ -1,7 +1,3 @@
# win32-sshserver.rb
#
# $Id$
# $Revision$
#
# meterpreter-script to deploy + run OpenSSH
# on the target machine

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
#-------------------------------------------------------------------------------
################## Variable Declarations ##################

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#Meterpreter script for running WMIC commands on Windows 2003, Windows Vista
# and Windows XP and Windows 2008 targets.
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#
# Simply print a message that migrating is not supported on CommandShell sessions...
#

View File

@ -1,5 +1,3 @@
# $Id$
# $Revision$
#
# Spawn a meterpreter session using an existing command shell session
#