Commit Graph

555 Commits (2a0e3690dba0553cd8d8bee7a15d74f277be511e)

Author SHA1 Message Date
Brent Cook 468679f907
Land #11092, Add FreeBSD 8.3 / 9.0 Intel SYSRET Privilege Escalation module 2019-03-06 19:50:08 -06:00
Hervé Beraud 69d398865d python 3 compatibility 2019-02-13 22:20:29 +01:00
Tim W f589db6831
Land #11152, add macOS adobe flash player type confusion RCE 2019-02-09 18:46:48 +08:00
Brent Cook 5fc7167beb Merge remote-tracking branch 'upstream/master' into land-10812- 2019-02-07 09:31:02 -06:00
phra 9789547fe7
build: recompile dlls 2019-01-12 04:02:34 +01:00
phra 8e50838e62
build: recompile dlls 2019-01-11 18:22:13 +01:00
phra 953b97def1
build: recompile dlls 2019-01-11 16:29:15 +01:00
phra 5f244643bd
feat: add compiled reflective DLL for juicy potato 2019-01-10 17:20:21 +01:00
Brendan Coles 983b39a5b3 Use @iZsh's exploit 2018-12-21 15:40:01 +00:00
Brent Cook dc6ae6f058 initial import, CVE-2016-4117 OSX exploit 2018-12-21 02:54:35 -06:00
Shelby Pace 2fc501d260
Land #11112, Fix bpf_priv_esc exploit module 2018-12-17 10:00:50 -06:00
Jacob Robles 7839add2fd
Land #11123, Add module windows persistent service 2018-12-17 09:07:21 -06:00
Jacob Robles 88b7b7df4a
Fix additional path space issues 2018-12-17 07:00:23 -06:00
Jacob Robles e67eaa94c9
Move code to ERB template 2018-12-14 13:13:32 -06:00
Wei Chen cc7cb7302e
Land #10944, Add macOS Safari exploit from pwn2own2018 2018-12-13 13:50:19 -06:00
Brendan Coles 68d451711b Fix bpf_priv_esc module 2018-12-12 17:23:12 +00:00
Brendan Coles b8dd147d49 Add FreeBSD 9 Intel SYSRET Privilege Escalation module 2018-12-09 16:04:38 +00:00
Brent Cook 66cae6240f
Land #10994, Added exploit for CVE-2018-18955 2018-11-27 16:12:05 -06:00
Brendan Coles 5c1399daa1 Add musl-cross cross-compiled executables 2018-11-25 00:53:55 +00:00
Brendan Coles eb17c45000 Add Linux Nested User Namespace idmap Limit Local Privilege Escalation module 2018-11-20 14:10:28 +00:00
Tim W 43c1e6308e add binary 2018-11-20 15:59:23 +08:00
Tim W 44b1b6fe31 fix forking 2018-11-20 15:58:55 +08:00
Tim W 99ae214575 add binaries 2018-11-15 08:46:24 +08:00
Tim W 2c30459a1b add CVE-2018-4233 and CVE-2018-4404 2018-11-15 08:44:18 +08:00
bwatters-r7 b4c005c4d4
Land #10561, Add Windows local privilege escalation - CVE-2018-0824
Merge branch 'land-10561' into upstream-master
2018-10-25 13:22:31 -05:00
bwatters-r7 927a29530b
Remove duplicated files 2018-10-23 12:31:18 -05:00
Brent Cook b65f467ada
Land #10851, add ndkstager to data/exploits 2018-10-23 12:04:57 -05:00
Tim W 4177ff4cfc add DEBUG exploit binary 2018-10-22 19:51:21 +08:00
bwatters-r7 47353553e5 Get everything together finally (still needs cleanup) 2018-10-19 18:15:44 -05:00
Wei Chen 3cee96d8ed
Land #10664, add Windows SetImeInfoEx Win32k NULL Pointer Dereference 2018-10-18 14:42:14 -05:00
bwatters-r7 d2c013001d
Update stuff 2018-10-17 17:17:05 -05:00
Shelby Pace 26631bcfbd
addressed suggestions 2018-10-12 14:35:42 -05:00
Shelby Pace a67122aaf7
updated doc, added x86_64 binary 2018-10-11 12:37:51 -05:00
Shelby Pace cdc2918c84
removed original binary, added source 2018-10-11 11:42:51 -05:00
Shelby Pace 521b50af55
added separate binaries, extended for x86 2018-10-11 10:43:35 -05:00
amaloteaux f8ad47d475 improve windows_defender_js_hta :
-add platform detection for jsc
-prevent cmd prompt when launching jsc
2018-10-11 17:38:47 +02:00
Wei Chen c7efd57144
Sync up with master 2018-10-06 08:27:01 -05:00
Tim W 4a4c759a4b add ndkstager to data/exploits 2018-10-05 15:10:21 +08:00
bwatters-r7 28fb27187a
Land #10418, Add DCOM/RPC NTLM Reflection (MS16-075) Via Reflective DLL
Merge branch 'land-10418' into upstream-master
2018-10-04 16:54:53 -05:00
bwatters-r7 ce59964141
Recompile binaries and prep for VS2013 compiles 2018-10-04 16:21:23 -05:00
space-r7 a0052c7f47 Add evasion module using HTA + JavaScript + C# 2018-10-01 12:57:05 -05:00
Brent Cook 1607c2b890
Land #10428, Update Windows MySQL UDF files, add docs 2018-09-24 21:11:52 -05:00
7echSec cd3b139642
Adding UnmarshalPwn.exe
Compatible with Visual Studio 2013.
2018-09-21 17:24:50 +05:30
7echSec 545e488486
Uploading new UnmarshalPwn.exe
As per the bwatters-r7 comment I am uploading new UnmarshalPwn.exe complied with platform toolset 120
2018-09-21 17:18:39 +05:30
Jacob Robles c76f095cd0
Inject Payload to Memory First 2018-09-19 21:13:49 -05:00
Jacob Robles dfa030c2df
Use System Directory 2018-09-19 08:49:12 -05:00
William Vu 6a63feced4 Merge remote-tracking branch 'upstream/master' into pr/10418 2018-09-18 19:54:44 -05:00
Dhiraj Mishra 89b0ac6f87
Adding suport files 2018-09-18 14:59:43 +05:30
Jacob Robles 83af598e6a
Updated VS solution and module 2018-09-17 17:38:19 -05:00
bwatters-r7 f38e6f45ce
Redo dllinjection 2018-09-14 17:47:53 -05:00