h00die
|
1e5253b0eb
|
add python and generate bcrypt on fly
|
2019-04-13 10:36:56 -04:00 |
h00die
|
0739f5080a
|
expand hashes identify library and add spec
|
2019-04-12 17:08:19 -04:00 |
Brent Cook
|
69dedcac98
|
Land #11704, Fix duplicate host header
|
2019-04-09 21:22:46 -05:00 |
Jacob Robles
|
4777fb7618
|
Update syntax to match
|
2019-04-09 20:05:00 -05:00 |
Metasploit
|
5e70904ab8
|
automatic module_metadata_base.json update
|
2019-04-09 12:04:19 -07:00 |
Shelby Pace
|
4d0a41ff1a
|
Land #11657, add Horde form file upload
|
2019-04-09 13:47:59 -05:00 |
Shelby Pace
|
4018d47b65
|
changed if not to unless
|
2019-04-09 13:43:54 -05:00 |
Jacob Robles
|
ee23a1557e
|
Fix duplicate host header
|
2019-04-09 09:08:34 -05:00 |
RatioSec Research
|
b56e171172
|
Fix extraction of session tokens
|
2019-04-09 09:28:52 +01:00 |
Brent Cook
|
a5184d39dc
|
Land #11702, use a released metasm gem for update
|
2019-04-08 18:12:01 -05:00 |
Jeffrey Martin
|
dfd35cd7e3
|
Bump to released metasm 1.0.4
|
2019-04-08 17:55:43 -05:00 |
Jeffrey Martin
|
8502f0cc53
|
Land #11701, Bump rex-powershell version to 0.1.80
|
2019-04-08 16:07:08 -05:00 |
Pearce Barry
|
0e33a55805
|
Bump rex-powershell gem version to 0.1.80...
...to pick up https://github.com/rapid7/rex-powershell/pull/18.
|
2019-04-08 16:00:02 -05:00 |
Metasploit
|
3c2c42677d
|
automatic module_metadata_base.json update
|
2019-04-08 08:55:07 -07:00 |
Brent Cook
|
e32bb9e915
|
Land #11682, don't check 'localhost' unconditionally, fix headers
|
2019-04-08 10:39:18 -05:00 |
Brent Cook
|
e9eb008a7a
|
Land #11699, fix Failure scoping for psexec
|
2019-04-08 10:29:02 -05:00 |
Brent Cook
|
0308f80c0e
|
fix Failure scoping (needed for libraries)
|
2019-04-08 09:57:22 -05:00 |
Brent Cook
|
24a1dc856a
|
Land #11694, early merge fix for https://github.com/jjyg/metasm/pull/39
|
2019-04-08 09:10:15 -05:00 |
Jeffrey Martin
|
e8eed3bb6a
|
use branched metasm until 2.5 fix is released
|
2019-04-06 19:50:23 -05:00 |
Metasploit
|
b2be6bb75c
|
automatic module_metadata_base.json update
|
2019-04-06 13:52:56 -07:00 |
Pearce Barry
|
7e62a69e16
|
Land #11660, Update use_single_quotes to wrap_double_quotes
|
2019-04-06 15:44:39 -05:00 |
Metasploit
|
0c7e589db8
|
automatic module_metadata_base.json update
|
2019-04-04 13:32:00 -07:00 |
Shelby Pace
|
fff129ae9f
|
Land #11587, add Wordpress core RCE module
|
2019-04-04 15:22:56 -05:00 |
Shelby Pace
|
6efd80e139
|
added note in info
|
2019-04-04 15:19:58 -05:00 |
Shelby Pace
|
2884d9afcb
|
modified checks, added function
|
2019-04-04 15:09:12 -05:00 |
Metasploit
|
2710c422c2
|
Bump version of framework to 5.0.16
|
2019-04-04 10:08:31 -07:00 |
Metasploit
|
45752affd0
|
automatic module_metadata_base.json update
|
2019-04-03 17:29:13 -07:00 |
William Vu
|
a2165a2954
|
Land #11685, proper XML encoding for Wemo exploit
|
2019-04-03 19:20:43 -05:00 |
William Vu
|
e164c2350c
|
Properly encode command input with XML entities
REXML would make this less ghetto.
|
2019-04-03 19:10:27 -05:00 |
Shelby Pace
|
d5ac1e3a33
|
minor adjustments to indentation and requests
|
2019-04-03 19:03:47 -05:00 |
Metasploit
|
40a3f3c24f
|
automatic module_metadata_base.json update
|
2019-04-03 12:51:31 -07:00 |
Adam Cammack
|
de6397445c
|
Land #11681, Remove trailing space in metadata
|
2019-04-03 14:34:41 -05:00 |
Javan Rasokat
|
8350effaa5
|
Fixed wrong check (did never work)
* HOST was always localhost
* Now sends both Range and the legacy 'Request-Range'
TODO: Method HEAD is not always sufficient, should be editable
|
2019-04-03 16:23:58 +02:00 |
Ben Schmeckpeper
|
7d1f6afd4a
|
Remove trailing space from CVE reference
|
2019-04-03 09:21:55 -05:00 |
Metasploit
|
ced68536ab
|
automatic module_metadata_base.json update
|
2019-04-02 13:04:27 -07:00 |
William Vu
|
bc4857954e
|
Land #11679, duplicate mailcleaner_exec CVE fix
|
2019-04-02 14:55:36 -05:00 |
todb-r7
|
9e3984ea51
|
Remove duplicate CVE for Mailcleaner module
See #11304
|
2019-04-02 12:51:09 -05:00 |
Brent Cook
|
94eb039bd3
|
Land #11677, add missing payload specs
|
2019-04-02 07:23:16 -05:00 |
wilfried
|
3081b13a1f
|
Adding payload in exploit code
|
2019-04-02 10:24:48 +02:00 |
Metasploit
|
46535074f6
|
automatic module_metadata_base.json update
|
2019-04-01 16:24:03 -07:00 |
Jeffrey Martin
|
a53ce7539d
|
add missing payload specs
|
2019-04-01 18:23:52 -05:00 |
surefire
|
1b6cd64016
|
Land #11136, exploit/multi/misc/weblogic_deserialize_unicastref
|
2019-04-01 18:15:26 -05:00 |
surefire
|
40191e5a01
|
Dissected JSOs, randomized strings, copied T3 header breakdown from @acamro
|
2019-04-01 18:05:45 -05:00 |
Metasploit
|
601719f0e8
|
automatic module_metadata_base.json update
|
2019-04-01 14:07:11 -07:00 |
William Vu
|
06397bb087
|
Land #11636, postgres_createlang version check fix
|
2019-04-01 15:21:57 -05:00 |
Metasploit
|
3318f52524
|
automatic module_metadata_base.json update
|
2019-04-01 12:20:28 -07:00 |
surefire
|
f292befed4
|
Land #11134, exploit/multi/misc/weblogic_serialize_marshalledobject
|
2019-04-01 14:11:30 -05:00 |
surefire
|
4d0e47044b
|
Fixed a hardcoded payload length resulting in 40% failures
|
2019-04-01 14:05:39 -05:00 |
Brendan Coles
|
ddbd7ba080
|
Case insensitive match
|
2019-04-01 18:58:14 +00:00 |
Metasploit
|
66a6b61441
|
automatic module_metadata_base.json update
|
2019-04-01 10:47:23 -07:00 |