automatic module_metadata_base.json update

4.x
Metasploit 2019-02-01 14:39:51 -08:00
parent 1b21bffb11
commit 8901b3d622
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 62 additions and 0 deletions

View File

@ -134245,6 +134245,37 @@
"notes": {
}
},
"payload_linux/x64/shell_bind_ipv6_tcp": {
"name": "Linux x64 Command Shell, Bind TCP Inline (IPv6)",
"full_name": "payload/linux/x64/shell_bind_ipv6_tcp",
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"epi <epibar052@gmail.com>"
],
"description": "Listen for an IPv6 connection and spawn a command shell",
"references": [
],
"is_server": false,
"is_client": false,
"platform": "Linux",
"arch": "x64",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2018-12-14 16:32:19 +0000",
"path": "/modules/payloads/singles/linux/x64/shell_bind_ipv6_tcp.rb",
"is_install_path": true,
"ref_name": "linux/x64/shell_bind_ipv6_tcp",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"payload_linux/x64/shell_bind_tcp": {
"name": "Linux Command Shell, Bind TCP Inline",
"full_name": "payload/linux/x64/shell_bind_tcp",
@ -134338,6 +134369,37 @@
"notes": {
}
},
"payload_linux/x64/shell_reverse_ipv6_tcp": {
"name": "Linux x64 Command Shell, Reverse TCP Inline (IPv6)",
"full_name": "payload/linux/x64/shell_reverse_ipv6_tcp",
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"epi <epibar052@gmail.com>"
],
"description": "Connect back to attacker and spawn a command shell over IPv6",
"references": [
],
"is_server": false,
"is_client": false,
"platform": "Linux",
"arch": "x64",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2018-12-06 20:18:21 +0000",
"path": "/modules/payloads/singles/linux/x64/shell_reverse_ipv6_tcp.rb",
"is_install_path": true,
"ref_name": "linux/x64/shell_reverse_ipv6_tcp",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"payload_linux/x64/shell_reverse_tcp": {
"name": "Linux Command Shell, Reverse TCP Inline",
"full_name": "payload/linux/x64/shell_reverse_tcp",