HD Moore
|
afc804fa03
|
Quick Ghostscript module based on the public PoC
|
2017-04-28 09:56:52 -05:00 |
wchen-r7
|
5bbb4d755a
|
Land #8254, Add CVE-2017-0199 - Office Word HTA Module
|
2017-04-24 16:05:00 -05:00 |
nixawk
|
637098466c
|
Hidden black flash windows / Close HTA windows
|
2017-04-16 22:53:17 -05:00 |
nixawk
|
a9df917257
|
Fix rtf info author
|
2017-04-14 21:16:39 -05:00 |
nixawk
|
8c662562d3
|
add CVE-2017-0199 format
|
2017-04-14 13:22:32 -05:00 |
bwatters-r7
|
64c06a512e
|
Land #8020, ntfs-3g local privilege escalation
|
2017-04-04 09:48:15 -05:00 |
h00die
|
e80b8cb373
|
move sploit.c out to data folder
|
2017-03-31 20:51:33 -04:00 |
Pearce Barry
|
c00b9ca1e5
|
Land #8175, Get into the DANGER ZOOOOOOONE
|
2017-03-31 14:31:22 -05:00 |
HD Moore
|
b5771b0f72
|
Get into the DANGER ZOOOOOOONE
|
2017-03-31 12:26:42 -05:00 |
dmohanty-r7
|
1ce7bf3938
|
Land #8126, Add SolarWind LEM Default SSH Pass/RCE
|
2017-03-31 11:21:32 -05:00 |
Mehmet Ince
|
e9f816272d
|
Adding solarwinds lem default ssh credentials to the wordlist
|
2017-03-24 13:24:05 +03:00 |
Jon P
|
4628dfe16b
|
Remove old banner + rubygems requirements
|
2017-03-13 17:36:21 +01:00 |
Jon P
|
c9a5190726
|
Patching "undefined method empty?" errors + "encoding error"
|
2017-03-13 17:32:56 +01:00 |
Jon P
|
e8257122b3
|
Creation of a sub-module for modules/auxiliary/crawler/msfcrawler
Catching links in comments
|
2017-03-13 17:18:39 +01:00 |
wchen-r7
|
6965a00b45
|
Resolve #8023, Support backward compatibility for Office macro
Resolve #8023
|
2017-02-27 13:02:41 -06:00 |
William Webb
|
83cc28a091
|
Land #7972, Microsoft Office Word Macro Generator OS X Edition
|
2017-02-21 13:26:42 -06:00 |
Brent Cook
|
2c570b6709
|
Land #7942, Microsoft SQL Server Clr Stored Procedure Payload Execution
|
2017-02-17 17:28:54 -06:00 |
wchen-r7
|
3d269b46ad
|
Support OS X for Microsoft Office macro exploit
|
2017-02-16 12:28:11 -06:00 |
OJ
|
2d834a3f5a
|
Finalise module, and add supporting binaries
|
2017-02-10 12:56:40 +10:00 |
bwatters-r7
|
272d1845fa
|
Land #7934, Add exploit module for OpenOffice with a malicious macro
|
2017-02-09 13:42:58 -06:00 |
wchen-r7
|
047a9b17cf
|
Completed version of openoffice_document_macro
|
2017-02-08 16:29:40 -06:00 |
wchen-r7
|
cefbee2df4
|
Add PoC for OpenOffice macro module
|
2017-02-07 10:12:23 -06:00 |
wchen-r7
|
ccaa783a31
|
Add Microsoft Office Word Macro exploit
|
2017-02-02 17:44:55 -06:00 |
William Webb
|
fb74b2d8f3
|
initial commit of finished product
|
2017-01-20 11:01:36 -06:00 |
bwatters_r7
|
4035dd7485
|
Land #7796, Improve zip module windows script fallback
|
2017-01-17 10:59:04 -06:00 |
Brent Cook
|
24f7959805
|
add binary for futex_requeue
|
2017-01-11 13:25:30 -06:00 |
Brent Cook
|
2585c8c8b5
|
Land #7461, convert futex_requeue (towelroot) module to use targetting and core_loadlib
|
2017-01-11 13:24:25 -06:00 |
Brent Cook
|
31f85b905a
|
add comments
|
2017-01-07 12:50:11 -06:00 |
Brent Cook
|
cdcf4cce7d
|
improve zip module windows script fallback
- handle non-English locales
- wait more reliably, handle network paths where FS info gets stale
- use absolute paths correctly
|
2017-01-07 12:27:03 -06:00 |
Brent Cook
|
2652f347fa
|
add module binary
|
2016-12-22 03:25:10 -06:00 |
Tim
|
e6d4c0001c
|
hide debug printing
|
2016-12-20 00:52:11 +08:00 |
Pearce Barry
|
1dae206fde
|
Land #7379, Linux Kernel BPF Priv Esc (CVE-2016-4557)
|
2016-11-11 16:50:20 -06:00 |
scriptjunkie
|
268a72f210
|
Land #7193 Office DLL hijack module
|
2016-11-08 23:15:27 -06:00 |
Yorick Koster
|
3c1f642c7b
|
Moved PPSX to data/exploits folder
|
2016-11-08 16:04:46 +01:00 |
William Webb
|
31b593ac67
|
Land #7402, Add Linux local privilege escalation via overlayfs
|
2016-11-01 12:46:40 -05:00 |
dmohanty-r7
|
d918e25bde
|
Land #7439, Add Ghostscript support to ImageMagick Exploit
|
2016-10-28 17:07:13 -05:00 |
Pearce Barry
|
43fd0a8813
|
Land #7436, Put Rex-exploitation Gem Back
|
2016-10-18 16:03:54 -05:00 |
h00die
|
0d1fe20ae5
|
revamped
|
2016-10-15 20:57:31 -04:00 |
Brent Cook
|
741c4b8916
|
updated android payload gem, removed unused extension jar
|
2016-10-14 09:59:06 -05:00 |
Brent Cook
|
9fbe1ddd9d
|
Land #7384, CVE-2016-6415 - Cisco IKE Information Disclosure
|
2016-10-14 08:41:34 -05:00 |
William Vu
|
9b15899d91
|
Add PS template
|
2016-10-13 17:40:15 -05:00 |
William Vu
|
6f4f2bfa5f
|
Add PS target and remove MIFF
|
2016-10-13 17:39:55 -05:00 |
David Maloney
|
7894d5b2c1
|
Revert "Revert "use the new rex-exploitation gem""
This reverts commit f3166070ba .
|
2016-10-11 17:40:43 -05:00 |
Pearce Barry
|
d1a11f46e8
|
Land #7418, Linux recvmmsg Priv Esc (CVE-2014-0038)
|
2016-10-09 18:37:52 -05:00 |
h00die
|
2dfebe586e
|
working cve-2014-0038
|
2016-10-08 23:58:09 -04:00 |
Brent Cook
|
f3166070ba
|
Revert "use the new rex-exploitation gem"
This reverts commit 52f6265d2e .
|
2016-10-08 21:55:16 -05:00 |
William Vu
|
3b3185069f
|
Land #7408, Mirai botnet wordlists
|
2016-10-06 10:07:20 -05:00 |
Tonimir Kisasondi
|
83548a0dde
|
added mirai user/pass to unhash set
|
2016-10-05 22:24:11 +02:00 |
Tonimir Kisasondi
|
7ce73be936
|
Add linux.mirai wordlists
|
2016-10-05 17:57:08 +02:00 |
David Maloney
|
52f6265d2e
|
use the new rex-exploitation gem
use the new rex-exploitation gem instead of the packaged in lbirary code
cleans up a huge ammount of space in framework
MS-1709
|
2016-10-05 09:05:27 -05:00 |