h00die
44304d33b9
fix travis issues
2018-09-15 07:59:53 -04:00
h00die
af7d76b52d
changes from first review
2018-09-14 20:10:59 -04:00
h00die
900ea620c7
msftidy
2018-09-13 21:28:49 -04:00
h00die
6cef61ddbc
finish srsexec add docs
2018-09-13 21:20:09 -04:00
h00die
2f53e370c9
srsexec working properly
2018-09-13 16:37:25 -04:00
h00die
4a2f2107e5
move gather to escalate
2018-09-13 14:07:50 -04:00
h00die
4bb16f96a7
debugging srsexec
2018-09-13 14:07:50 -04:00
h00die
1af1895ac8
first attempt at srsexec
2018-09-13 14:07:50 -04:00
William Vu
68a51da27b
Land #10477 , console prompt fixes and refactor
2018-09-12 18:00:48 -05:00
William Vu
200b4bb2ec
Land #10631 , warning message fix for #10619
2018-09-12 17:35:17 -05:00
OJ
84e87b10af
Update warning message when loading mimikatz on new OSes
2018-09-13 08:31:08 +10:00
William Vu
b70960bddb
Land #10619 , mimikatz/kiwi warning per OS version
2018-09-12 17:11:11 -05:00
Metasploit
58a074d020
automatic module_metadata_base.json update
2018-09-12 09:08:59 -07:00
Shelby Pace
5b81ebd81b
Land #10589 , multidrop support for word xml docs
2018-09-12 11:00:11 -05:00
OJ
e2c6748759
Replace 'and' with '&&'
2018-09-12 08:27:27 +10:00
Brendan Coles
edbe4988d2
Land #10621 , Update Msf::Post::Solaris::System has_gcc? method
...
Updated the Msf::Post::Solaris::System has_gcc? method to also check the
default path for gcc on Solaris: /usr/sfw/bin/gcc
2018-09-11 09:47:37 +00:00
h00die
a7105b45a6
add gcc path for solaris
2018-09-11 05:18:26 -04:00
William Vu
117121b058
Land #10617 , sessions -x fix for when LURI is used
2018-09-11 03:00:34 -05:00
OJ
17ec5bfe73
Land #10618 - Fix Msf::Post::Solaris::Kernel class name
2018-09-11 17:16:34 +10:00
Brendan Coles
7c1ae843b1
Fix Msf::Post::Solaris::Kernel class name
2018-09-11 07:15:19 +00:00
OJ
8d6fcefccc
Fix crash when using sessions -x
2018-09-11 13:28:33 +10:00
Metasploit
671cda076b
automatic module_metadata_base.json update
2018-09-10 14:33:40 -07:00
Brent Cook
a3d74d926c
Land #9897 , Fix #8404 ListenerComm Support For Exploit::Remote::TcpServer
2018-09-10 16:25:55 -05:00
Metasploit
0d774e1cd2
automatic module_metadata_base.json update
2018-09-10 13:49:36 -07:00
Brent Cook
ea2fcb6fc4
Land #10593 , Refactor SSH mixins and update modules
2018-09-10 15:38:53 -05:00
Metasploit
a0e0d1d626
automatic module_metadata_base.json update
2018-09-10 13:33:19 -07:00
William Vu
87eb600510
Land #10611 , mRemote creds gather module fixes
...
Also update #10612 to align with these changes.
2018-09-10 15:25:09 -05:00
William Vu
93a73f5e71
Fix store_loot OID
...
It's supposed to be a loot type, not the filename (now stored).
2018-09-10 15:19:28 -05:00
Metasploit
2a307236d0
automatic module_metadata_base.json update
2018-09-10 13:15:11 -07:00
William Vu
8b4820004d
Land #10612 , store_loot text/xml ctype fixes
2018-09-10 15:07:06 -05:00
William Vu
3ec4d2f22b
Normalize loot type OID
...
1. Include the vendor, product, and technology
2. Content type is already reported, extension changed
3. Original filename including extension is also reported
Can we get some sort of standard on the OID?
2018-09-10 15:06:07 -05:00
Metasploit
e3b28051b3
automatic module_metadata_base.json update
2018-09-10 09:57:17 -07:00
Jacob Robles
3d5da50b12
Land #10598 , Store Credentials Found with PhpMyAdmin Password Extractor
2018-09-10 11:49:52 -05:00
h00die
39a2d9d2a8
save xml files as xml
2018-09-09 21:24:39 -04:00
h00die
0072d9b9b1
save as xml since it is
2018-09-09 21:22:15 -04:00
h00die
70e22707c0
vi loves tabs but i dont
2018-09-09 21:19:17 -04:00
h00die
f926f6e9af
fix pathing in mremoteng
2018-09-09 21:07:47 -04:00
Metasploit
741bbefae8
automatic module_metadata_base.json update
2018-09-07 13:01:40 -07:00
Wei Chen
718aaca0f4
Land #10546 , Add Apache Struts exploit: CVE-2018-11776
2018-09-07 14:54:23 -05:00
Metasploit
af993af870
automatic module_metadata_base.json update
2018-09-07 12:50:44 -07:00
Wei Chen
bd50e00ccc
Make some small changes:
...
Changes made:
* DisclosureDate
* Privileged to false
* Remove gsub for ';'
* Set cmd/unix/generic as the default payload for ARCH_CMD (linux)
2018-09-07 14:48:33 -05:00
William Vu
7f20178a05
Land #10604 , CVE for ghostscript_failed_restore
2018-09-07 14:33:42 -05:00
William Vu
b3cd4a89ad
Move CVE ref to top as per ~standard~
2018-09-07 14:33:25 -05:00
Adam Cammack
68ca771764
Add CVE reference to ghostscript_failed_restore.rb
2018-09-07 14:24:15 -05:00
Adam Cammack
541903936b
Land #10602 , Fix windows/shell/reverse_ord_tcp doc
2018-09-07 12:06:13 -05:00
Brent Cook
55ae02ba4e
DRY up doc generator
2018-09-07 11:47:29 -05:00
Brent Cook
9abb6aebb3
Fixup reverse_ord_tcp docs
2018-09-07 11:47:14 -05:00
asoto-r7
99ca6cef49
Quote-block cleanup and improved error handling
2018-09-07 11:43:04 -05:00
Shelby Pace
dbace01015
modified regex lines
2018-09-07 11:13:09 -05:00
Shelby Pace
18ffd36409
storing config file, changed regex
2018-09-07 08:13:10 -05:00