jvazquez-r7
|
02181addc5
|
Update CVE-2014-0556
|
2015-06-04 18:23:50 -05:00 |
wchen-r7
|
23df66bf3a
|
Land #5481, no powershell. exec shellcode from the renderer process.
|
2015-06-04 15:45:09 -05:00 |
jvazquez-r7
|
ab68d8429b
|
Add more targets
|
2015-06-04 12:11:53 -05:00 |
jvazquez-r7
|
80cb70cacf
|
Add support for Windows 8.1/Firefox
|
2015-06-03 22:46:04 -05:00 |
jvazquez-r7
|
74117a7a52
|
Allow to execute payload from the flash renderer
|
2015-06-03 16:33:41 -05:00 |
jvazquez-r7
|
e9714bfc82
|
Solve conflics
|
2015-05-27 23:22:00 -05:00 |
wchen-r7
|
e749733eb6
|
Land #5419, Fix Base64 decoding on ActionScript
|
2015-05-27 23:13:51 -05:00 |
jvazquez-r7
|
e5d42850c1
|
Add support for Linux to CVE-2015-0336
|
2015-05-27 17:05:10 -05:00 |
jvazquez-r7
|
801deeaddf
|
Fix CVE-2015-0336
|
2015-05-27 15:42:06 -05:00 |
jvazquez-r7
|
bd1bdf22b5
|
Fix CVE-2015-0359
|
2015-05-26 17:27:20 -05:00 |
jvazquez-r7
|
19c7445d9d
|
Fix CVE-2015-0336
|
2015-05-26 17:20:49 -05:00 |
jvazquez-r7
|
23d244b1fa
|
Fix CVE-2015-0313
|
2015-05-26 16:11:44 -05:00 |
jvazquez-r7
|
5c8c5aef37
|
Fix CVE-2014-8440
|
2015-05-26 16:05:08 -05:00 |
jvazquez-r7
|
d78d04e070
|
Fix CVE-2014-0569
|
2015-05-26 15:49:22 -05:00 |
jvazquez-r7
|
e0a1fa4ef6
|
Fix indentation
|
2015-05-26 15:38:56 -05:00 |
jvazquez-r7
|
1742876757
|
Fix CVE-2014-0556
|
2015-05-26 15:30:39 -05:00 |
jvazquez-r7
|
3e122fe87c
|
Fix b64 decoding
|
2015-05-26 15:15:33 -05:00 |
jvazquez-r7
|
29ccc8367b
|
Add More messages
|
2015-05-26 14:47:47 -05:00 |
jvazquez-r7
|
1bf1c37cfa
|
Add exception handling
|
2015-05-26 14:31:07 -05:00 |
jvazquez-r7
|
fb8a927941
|
Hardcode params
|
2015-05-26 14:20:43 -05:00 |
jvazquez-r7
|
f119da94ca
|
Add one more message
|
2015-05-26 14:14:38 -05:00 |
jvazquez-r7
|
15533fabe6
|
Log messages
|
2015-05-26 14:08:24 -05:00 |
jvazquez-r7
|
91357ee45b
|
Improve reliability
|
2015-05-26 13:47:33 -05:00 |
jvazquez-r7
|
f35d7a85d3
|
Adjust numbers
|
2015-05-21 15:56:11 -05:00 |
jvazquez-r7
|
80d4f3cfb0
|
Update swf
|
2015-05-21 14:55:00 -05:00 |
jvazquez-r7
|
8d6cbf0568
|
Make adobe_flash_uncompress_zlib_af multiplatform
|
2015-05-20 18:57:37 -05:00 |
benpturner
|
d4798a2500
|
Fix spacinG
|
2015-05-11 09:04:03 +01:00 |
benpturner
|
c916021fc5
|
SSL Support for Powershell Payloads
|
2015-05-10 21:45:59 +01:00 |
jvazquez-r7
|
51bb4b5a9b
|
Add module for CVE-2015-0359
|
2015-05-07 17:00:00 -05:00 |
jvazquez-r7
|
582919acac
|
Add module for CVE-2015-0336
|
2015-05-05 17:25:19 -05:00 |
jvazquez-r7
|
dbba466b5b
|
Add module for CVE-2014-8440
|
2015-04-29 17:52:04 -05:00 |
benpturner
|
76e68fcf4c
|
session info
|
2015-04-26 20:13:18 +01:00 |
benpturner
|
aa4dc78cba
|
updates to author comments in powershell script
|
2015-04-25 08:47:17 +01:00 |
benpturner
|
19aa668f99
|
updates to include reverse and bind
|
2015-04-22 20:41:19 +01:00 |
Meatballs
|
b0d50dc2be
|
Create our own Rex connection to the endpoint
Ensure powershell process closes when module completes
Add a windows cmd interact payload
|
2015-04-19 23:41:28 +01:00 |
Meatballs
|
8bd0da580d
|
Move script out of module
|
2015-04-19 21:12:44 +01:00 |
jvazquez-r7
|
28fac60c81
|
Add module for CVE-2015-0556
|
2015-04-15 14:08:16 -05:00 |
joev
|
3313dac30f
|
Land #5119, @wvu's addition of the OSX rootpipe privesc exploit.
orts
borts
|
2015-04-10 12:38:25 -05:00 |
William Vu
|
c4b7b32745
|
Add Rootpipe exploit
|
2015-04-10 11:22:00 -05:00 |
jvazquez-r7
|
91f5d0af5a
|
Add module for CVE-2014-0569
* Adobe flash, Integer overflow on casi32
|
2015-04-09 19:37:26 -05:00 |
jvazquez-r7
|
11c6f3fdca
|
Do reliable resolution of kernel32
|
2015-03-29 15:52:13 -05:00 |
jvazquez-r7
|
f84a46df63
|
Add module for CVE-2015-0313
|
2015-03-27 18:51:13 -05:00 |
Spencer McIntyre
|
076f15f933
|
Land #4792 @jakxx Publish It PUI file exploit
|
2015-03-18 20:59:54 -04:00 |
jakxx
|
085e6cc815
|
Implemented Recommended Changes
-corrected spelling error
-set only option to required
-dumped header data to included file
-Used Rex for jmp values
|
2015-03-17 16:39:56 -04:00 |
jvazquez-r7
|
bb81107e51
|
Land #4927, @wchen-r7's exploit for Flash PCRE CVE-2015-0318
|
2015-03-13 23:58:05 -05:00 |
sinn3r
|
0ee0a0da1c
|
This seems to work
|
2015-03-13 04:43:06 -05:00 |
sinn3r
|
0c3329f69e
|
Back on track
|
2015-03-12 15:26:55 -05:00 |
sinn3r
|
215c209f88
|
Land #4901, CVE-2014-0311, Flash ByteArray Uncompress UAF
|
2015-03-11 14:04:17 -05:00 |
sinn3r
|
43b90610b1
|
Temp
|
2015-03-11 13:53:34 -05:00 |
sinn3r
|
2a9d6e64e2
|
Starting point for CVE-2015-0318
|
2015-03-11 09:58:41 -05:00 |