Land #2384 - remove id and revision tags
commit
69946d0108
|
@ -11,8 +11,6 @@ module Msf
|
|||
#
|
||||
# written by corelanc0d3r <peter.ve [at] corelan.be>
|
||||
#
|
||||
# Version: $Revision$
|
||||
#
|
||||
###
|
||||
module Exploit::Omelet
|
||||
|
||||
|
|
|
@ -14,7 +14,6 @@ module Payload::Osx::BundleInject
|
|||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Mac OS X Inject Mach-O Bundle',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Inject a custom Mach-O bundle into the exploited process',
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -16,7 +16,6 @@ module Payload::Windows::DllInject
|
|||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Windows Inject DLL',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Inject a custom DLL into the exploited process',
|
||||
'Author' =>
|
||||
[
|
||||
|
|
|
@ -16,7 +16,6 @@ module Payload::Windows::Exec
|
|||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Windows Execute Command',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Execute an arbitrary command',
|
||||
'Author' => [ 'vlad902', 'sf' ],
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -16,7 +16,6 @@ module Payload::Windows::LoadLibrary
|
|||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Windows LoadLibrary Path',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Load an arbitrary library path',
|
||||
'Author' => [ 'sf', 'hdm' ],
|
||||
'License' => MSF_LICENSE,
|
||||
|
|
|
@ -20,7 +20,6 @@ module Payload::Windows::ReflectiveDllInject
|
|||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Reflective DLL Injection',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Inject a DLL via a reflective loader',
|
||||
'Author' => [ 'sf' ],
|
||||
'References' => [ [ 'URL', 'https://github.com/stephenfewer/ReflectiveDLLInjection' ] ],
|
||||
|
|
|
@ -20,7 +20,6 @@ module Payload::Windows::ReflectiveDllInject_x64
|
|||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Reflective DLL Injection',
|
||||
'Version' => '$Revision$',
|
||||
'Description' => 'Inject a DLL via a reflective loader',
|
||||
'Author' => [ 'sf' ],
|
||||
'References' => [ [ 'URL', 'https://github.com/stephenfewer/ReflectiveDLLInjection' ] ],
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
#
|
||||
# Meterpreter script for setting up a route from within a
|
||||
# Meterpreter session, without having to background the
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Meterpreter script for detecting if target host is a Virtual Machine
|
||||
# Provided by Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
# Version: 0.2.0
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# credcollect - tebo[at]attackresearch.com
|
||||
|
||||
opts = Rex::Parser::Arguments.new(
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
#Options and Option Parsing
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: davehull at dph_msf@trustedsignal.com
|
||||
#-------------------------------------------------------------------------------
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Scriptjunkie
|
||||
# Uses a meterpreter session to spawn a new meterpreter session in a different process.
|
||||
# A new process allows the session to take "risky" actions that might get the process killed by
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
#$Id$
|
||||
#$Revision$
|
||||
#
|
||||
# Script to extract data from a chrome installation.
|
||||
#
|
||||
|
|
|
@ -1,6 +1,4 @@
|
|||
#
|
||||
# $Id: enum_firefox.rb 9770 2010-07-10 20:00:32Z darkoperator $
|
||||
# $Revision: $
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision: 9771 $
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision: $
|
||||
#Meterpreter script for enumerating Microsoft Powershell settings.
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
@client = client
|
||||
|
|
|
@ -1,10 +1,7 @@
|
|||
# $Id$
|
||||
# $Revision: $
|
||||
#
|
||||
# Meterpreter script for enumerating putty connections
|
||||
# Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
#
|
||||
# $Revision$
|
||||
@client = client
|
||||
#Options and Option Parsing
|
||||
opts = Rex::Parser::Arguments.new(
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# $Id: $
|
||||
# $Revision$
|
||||
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
@client = client
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision: $
|
||||
# Meterpreter script for listing installed applications and their version.
|
||||
# Provided: carlos_perez[at]darkoperator[dot]com
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision: $
|
||||
#-------------------------------------------------------------------------------
|
||||
#Options and Option Parsing
|
||||
opts = Rex::Parser::Arguments.new(
|
||||
|
|
|
@ -1,7 +1,3 @@
|
|||
##
|
||||
# $Id$
|
||||
# $Revision: $
|
||||
##
|
||||
|
||||
require "rexml/document"
|
||||
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
# Meterpreter script that display local subnets
|
||||
# Provided by Nicob <nicob [at] nicob.net>
|
||||
# Ripped from http://blog.metasploit.com/2006/10/meterpreter-scripts-and-msrt.html
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
require "rexml/document"
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
#copied getvncpw - thanks grutz/carlos
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Meterpreter script for detecting AV, HIPS, Third Party Firewalls, DEP Configuration and Windows Firewall configuration.
|
||||
# Provides also the option to kill the processes of detected products and disable the built-in firewall.
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#----------------------------------------------------------------
|
||||
# Meterpreter script to obtain the VNC password out of the
|
||||
# registry and print its decoded cleartext
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Implement pwdump (hashdump) through registry reads + syskey
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Meterpreter script for modifying the hosts file in windows
|
||||
# given a single entrie or several in a file and clear the
|
||||
# DNS cache on the target machine.
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
# Updates by Shellster
|
||||
#-------------------------------------------------------------------------------
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Meterpreter script that kills all Antivirus processes
|
||||
# Provided by: Jerome Athias <jerome.athias [at] free.fr>
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
#
|
||||
# Meterpreter script for installing the meterpreter service
|
||||
#
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Simple example script that migrates to a specific process by name.
|
||||
# This is meant as an illustration.
|
||||
|
|
|
@ -1,10 +1,8 @@
|
|||
# $Id$
|
||||
#
|
||||
# Meterpreter script for running multiple console commands on a meterpreter session
|
||||
# Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
# Verion: 0.1
|
||||
#
|
||||
# $Revision$
|
||||
|
||||
################## Variable Declarations ##################
|
||||
@client = client
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#Meterpreter script for running multiple commands on Windows 2003, Windows Vista
|
||||
# and Windows XP and Windows 2008 targets.
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#Meterpreter script for running multiple scripts on a Meterpreter Session
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
#Verion: 0.2
|
||||
|
|
|
@ -125,7 +125,6 @@ def reverselookup(session, iprange, dest)
|
|||
end
|
||||
rescue ::Exception => e
|
||||
print_status("The following error was encountered: #{e.class} #{e}")
|
||||
|
||||
end
|
||||
end
|
||||
|
||||
|
@ -220,7 +219,6 @@ def pingsweep(session, iprange, dest)
|
|||
end
|
||||
rescue ::Exception => e
|
||||
print_status("The following error was encountered: #{e.class} #{e}")
|
||||
|
||||
end
|
||||
end
|
||||
#-------------------------------------------------------------------------------
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Meterpreter script for utilizing purely PowerShell to extract username and password hashes through registry
|
||||
# keys. This script requires you to be running as system in order to work properly. This has currently been
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#Meterpreter script for extracting information from windows prefetch folder
|
||||
#Provided by Milo at keith.lee2012[at]gmail.com
|
||||
#Verion: 0.1.0
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
#Meterpreter script for automating the most common scheduling tasks
|
||||
#during a pentest. This script will use the schtasks command so as
|
||||
|
|
|
@ -1,8 +1,3 @@
|
|||
##
|
||||
# $Id$
|
||||
# $Revision$
|
||||
##
|
||||
|
||||
##
|
||||
#
|
||||
# This script exploits the Task Scheduler 2.0 XML 0day exploited by Stuxnet
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
#Meterpreter script for abusing the scheduler service in windows
|
||||
#by scheduling and running a list of command against one or more targets
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# This is a Meterpreter script designed to be used by the Metasploit Framework
|
||||
#
|
||||
# The goal of this script is to obtain system information from a victim through
|
||||
|
|
|
@ -1,14 +1,10 @@
|
|||
#
|
||||
# $Id$
|
||||
#
|
||||
# Script to unlock a windows screen by L4teral <l4teral [4t] gmail com>
|
||||
# Needs system prvileges to run and known signatures for the target system.
|
||||
# This script patches msv1_0.dll loaded by lsass.exe
|
||||
#
|
||||
# Based on the winlockpwn tool released by Metlstorm: http://www.storm.net.nz/projects/16
|
||||
#
|
||||
# $Revision$
|
||||
#
|
||||
|
||||
revert = false
|
||||
targets = [
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author:Roni Bachar (@roni_bachar) roni.bachar.blog@gmail.com
|
||||
#
|
||||
# Thie script will open an interactive view of remote hosts
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
## Meterpreter script that recursively search and download
|
||||
## files matching a given pattern
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez <carlos_perez [at] darkoperator.com and Shai rod (@NightRang3r)
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,6 +1,4 @@
|
|||
##
|
||||
# $Id$
|
||||
#
|
||||
# Many services are configured with insecure permissions. This
|
||||
# script attempts to create a service, then searches through a list of
|
||||
# existing services to look for insecure file or configuration
|
||||
|
@ -11,7 +9,6 @@
|
|||
#
|
||||
# scriptjunkie googlemail com
|
||||
#
|
||||
# $Revision$
|
||||
##
|
||||
|
||||
if client.platform !~ /win32/
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
##
|
||||
# South River Technologies WebDrive Service Bad Security Descriptor Local Privilege Escalation.
|
||||
#
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
session = client
|
||||
@@exec_opts = Rex::Parser::Arguments.new(
|
||||
|
|
|
@ -1,10 +1,6 @@
|
|||
# $Id$
|
||||
|
||||
# Meterpreter script for triggering the VirtualBox DoS published at:
|
||||
# http://milw0rm.com/exploits/9323
|
||||
|
||||
# $Revision$
|
||||
|
||||
opts = Rex::Parser::Arguments.new(
|
||||
"-h" => [ false,"Help menu." ]
|
||||
)
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
# Meterpreter script that kills Mcafee VirusScan Enterprise v8.7.0i+ processes in magic
|
||||
# order which keeps VirusScan icon visible at system tray without disabled sign on it.
|
||||
# Additionally it lets you disable On Access Scanner from registry, upload your detectable
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
|
||||
#
|
||||
# Meterpreter script for obtaining a quick VNC session
|
||||
#
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: scriptjunkie
|
||||
#
|
||||
# Simplify running webcam, whether grabbing a single frame or running
|
||||
|
|
|
@ -1,7 +1,3 @@
|
|||
# win32-sshclient.rb
|
||||
#
|
||||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Meterpreter script to deploy & run the "plink" commandline ssh-client
|
||||
# supports only MS-Windows-2k/XP/Vista Hosts
|
||||
|
|
|
@ -1,7 +1,3 @@
|
|||
# win32-sshserver.rb
|
||||
#
|
||||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# meterpreter-script to deploy + run OpenSSH
|
||||
# on the target machine
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
# Author: Carlos Perez at carlos_perez[at]darkoperator.com
|
||||
#-------------------------------------------------------------------------------
|
||||
################## Variable Declarations ##################
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#Meterpreter script for running WMIC commands on Windows 2003, Windows Vista
|
||||
# and Windows XP and Windows 2008 targets.
|
||||
#Provided by Carlos Perez at carlos_perez[at]darkoperator[dot]com
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Simply print a message that migrating is not supported on CommandShell sessions...
|
||||
#
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
# $Id$
|
||||
# $Revision$
|
||||
#
|
||||
# Spawn a meterpreter session using an existing command shell session
|
||||
#
|
||||
|
|
Loading…
Reference in New Issue