Commit Graph

51630 Commits (master)

Author SHA1 Message Date
rrockru 2c3aec897f Refactoring 2019-04-12 22:06:56 +03:00
William Vu 2ebee1226f
Land #11613, Cisco RV130 stack BOF exploit 2019-04-12 14:06:51 -05:00
Shelby Pace da0c0d7d3f added most of documentation 2019-04-12 14:01:29 -05:00
Shelby Pace 391e7cf8ef adjusted font size and color 2019-04-12 14:01:29 -05:00
Shelby Pace d7f77fdcee getting session on linux 2019-04-12 14:01:29 -05:00
Shelby Pace 700562594c getting session on windows 2019-04-12 14:01:29 -05:00
Shelby Pace 4873b7c3e6 using a path for both Windows and Linux 2019-04-12 14:01:29 -05:00
Shelby Pace 9d0c045b0d added erb file and base for module 2019-04-12 14:01:29 -05:00
rrockru 8f3bb045b9 Refactoring 2019-04-12 22:00:23 +03:00
William Vu 8fcb6adde8 Update CONTRIBUTING.md advice on topic branches
Credit to @jmartin-r7 for the verbiage.
2019-04-12 12:39:59 -05:00
Sonny Gonzalez 04dcd8a1f9
A more robust path resolution
and better readable is_child_of? method
2019-04-12 11:01:14 -05:00
Tim W 7b09947551
Land #11675, add android app api commands 2019-04-12 23:21:00 +08:00
Tim W 6e9698f13b use print_error for errors 2019-04-12 23:20:43 +08:00
Tim W 92eb6df526 include metasploit-payloads 1.3.66 2019-04-12 23:15:50 +08:00
Quentin Kaiser 5e189196de Target consolidation. 2019-04-12 10:58:56 +02:00
Quentin Kaiser dfb1ebb2e2 Remove Stance value as it is already defined by core/exploit/cmdstager/http. 2019-04-12 10:57:50 +02:00
Sonny Gonzalez 6bf824d200
Zip import directory traversal mitigation 2019-04-11 19:08:37 -05:00
Metasploit 73ad312dbf
automatic module_metadata_base.json update 2019-04-11 15:49:25 -07:00
William Vu 949e88d7dd
Land #11710, Mettle updates 2019-04-11 17:41:01 -05:00
Brent Cook e7974e4955 bump mettle and other gems 2019-04-11 17:26:15 -05:00
rrockru 5df6560b0b Refactoring 2019-04-12 01:02:16 +03:00
rrockru 84a4e6f4a6 Refactoring 2019-04-12 00:16:45 +03:00
Metasploit 4624686567
automatic module_metadata_base.json update 2019-04-11 14:14:02 -07:00
rrockru 82def16953 Added TRIGGER_URL option 2019-04-12 00:12:27 +03:00
asoto-r7 513b939e61
Land #11690, Add overwrite_config action to cisco_upload_file 2019-04-11 16:05:44 -05:00
rrockru 91eb29b1fe Refactoring. 2019-04-12 00:02:18 +03:00
rrockru 319eb30cce Refactoring 2019-04-11 23:54:58 +03:00
rrockru 000c35a7ad Refactoring 2019-04-11 23:39:50 +03:00
Metasploit 0373812dda
automatic module_metadata_base.json update 2019-04-11 10:32:44 -07:00
William Vu 8fcc36b6a0
Land #11714, DUMP_OUTPUT fix for SA-CORE-2019-003 2019-04-11 12:23:12 -05:00
William Vu 4dc2a86b7b Update module doc 2019-04-11 12:21:48 -05:00
William Vu db0803136a Add lost registered option DUMP_OUTPUT
Oops, I forgot this in the refactor.
2019-04-11 12:21:11 -05:00
Metasploit 7b29e6e057
Bump version of framework to 5.0.17 2019-04-11 10:03:55 -07:00
rrockru c0b4e7701f Fix docs 2019-04-11 17:54:10 +03:00
rrockru eab1f6ca54 Added Atlassian Confluence exploit documentation 2019-04-11 17:52:08 +03:00
rrockru 7881d627ca Add Atlassian Confluence RCE exploit 2019-04-11 15:55:51 +03:00
Jacob Robles 236a3ee2f5
Rename files 2019-04-11 07:04:57 -05:00
Jacob Robles 91fec97cd7
Update run logic, fix create_credential usage 2019-04-11 06:54:19 -05:00
Jacob Robles 54abfcbc2c
Update check logic 2019-04-11 06:21:40 -05:00
Jacob Robles 1b2b752bef
Remove rescue that is handled in HttpClient mixin 2019-04-11 06:20:48 -05:00
Jacob Robles 9385fbc3b7
Change date format 2019-04-11 06:18:52 -05:00
Metasploit 0d0dceacfa
automatic module_metadata_base.json update 2019-04-10 15:30:23 -07:00
asoto-r7 b32d116e9a
Land #11669, exploit/windows/fileformat/microsoft_windows_contact 2019-04-10 17:18:33 -05:00
asoto-r7 94785dabbb
Renamed module from 'microsoft_windows_contact_remote_code_execution' to 'microsoft_windows_contact' 2019-04-10 17:17:50 -05:00
asoto-r7 324f2f0939
Updated documentation to reflect new simplified module options 2019-04-10 17:14:47 -05:00
asoto-r7 62bf38d530
Simplified user options, recreated CONTACT template from a clean file 2019-04-10 17:14:04 -05:00
asoto-r7 7bccdf2d0f
Update documentation to detail the verification steps and describe the module options 2019-04-10 17:08:03 -05:00
Metasploit 7b3682ed77
automatic module_metadata_base.json update 2019-04-10 10:38:37 -07:00
William Vu d72672feed
Land #11672, Zimbra XXE and SSRF exploit 2019-04-10 09:58:45 -05:00
ct5595 b2f2206943
Update cisco_upload_file.md 2019-04-10 09:14:37 -04:00