Commit Graph

1297 Commits (90768e28ce03271ccd33915935447eef100712bf)

Author SHA1 Message Date
bwatters-r7 28fb27187a
Land #10418, Add DCOM/RPC NTLM Reflection (MS16-075) Via Reflective DLL
Merge branch 'land-10418' into upstream-master
2018-10-04 16:54:53 -05:00
bwatters-r7 ce59964141
Recompile binaries and prep for VS2013 compiles 2018-10-04 16:21:23 -05:00
bwatters-r7 19a5c89b9d Update VS toolset to match VS 2013 2018-10-02 17:00:43 -05:00
Jacob Robles c76f095cd0
Inject Payload to Memory First 2018-09-19 21:13:49 -05:00
Jacob Robles dfa030c2df
Use System Directory 2018-09-19 08:49:12 -05:00
William Vu 6a63feced4 Merge remote-tracking branch 'upstream/master' into pr/10418 2018-09-18 19:54:44 -05:00
Jacob Robles 83af598e6a
Updated VS solution and module 2018-09-17 17:38:19 -05:00
bwatters-r7 f38e6f45ce
Redo dllinjection 2018-09-14 17:47:53 -05:00
asoto-r7 4cf344dd83
WIP: Initial CVE-2018-8440 / ALPC-TaskSched-LPE 2018-09-13 18:00:20 -05:00
Mumbai 48255d6173 add soluition file 2018-08-21 11:07:31 -04:00
Mumbai 4a88d643ba adding reflective Potato 2018-08-03 02:09:24 -04:00
bwatters-r7 eab62c18c6
Update mov_ss and add mov_ss_dll 2018-07-27 09:40:34 -05:00
bwatters-r7 f33d12676f
Added License, make msftidy happy, and include original cve project
readme document.
2018-07-13 10:19:41 -05:00
bwatters-r7 156b822401
First stab at cve-2018-8897 2018-07-12 17:31:53 -05:00
Brent Cook 61a98b94b6
Land #9528, WebKit apple safari trident exploit (CVE-2016-4657) 2018-06-02 21:52:52 -05:00
Tim W 2ec7f11b90 add binary 2018-05-30 18:02:17 +08:00
Tim W df60c5bb6b embed mettle within PhoenixNonce 2018-05-30 17:30:03 +08:00
bwatters-r7 ce5be387c4
Land #8795, Added CVE-2016-0040 Windows Privilege Escalation
Merge branch 'land-8795' into upstream-master
2018-05-03 16:33:53 -05:00
bwatters-r7 5a787bcce5
We don't need the application.c file 2018-05-03 15:08:42 -05:00
bwatters-r7 26f2bdbfb1
Change Platform toolset from 140 (vs2015) to 120 (vs2013) 2018-05-03 14:58:30 -05:00
bwatters-r7 c08f45223d
Clean up comment typos from copy/pasta 2018-05-03 14:43:31 -05:00
Tim W 7c3e5da450 add more credits/references 2018-04-03 14:59:00 +08:00
Tim W c5039251a2 add CVE-2016-4655
rebase
2018-04-03 14:58:57 +08:00
Kirk Swidowski 34f2385b8b Merge branch 'master' of https://github.com/de7ec7ed/metasploit-framework 2018-03-07 08:20:37 -08:00
Kirk Swidowski d7cfe41983 removed files. 2018-03-07 08:20:22 -08:00
Tim W a01f0f3023 fix #9366, fix osx x64 stage location 2018-02-20 13:50:44 +08:00
Adam Cammack 64c725164a
Add macOS reverse stager binary 2018-01-31 14:27:44 -06:00
Tim W 0ce125ec55 more fixes 2018-01-30 17:54:10 +08:00
Tim W 39c07e2289 add references 2018-01-30 17:52:01 +08:00
Tim W 9aaf93ff3b fix fix for older osx versions 2018-01-29 03:50:39 +08:00
Tim W 82fde6b1d1 fix for older osx versions 2018-01-21 08:04:26 +08:00
Tim W 46a45550fd add osx x64 stager 2018-01-03 14:04:14 +08:00
Tim 358aca9435
apple_ios/aarch64/shell_reverse_tcp 2017-12-19 15:42:21 +08:00
bwatters-r7 5a07be9b96
Land #9041, Add LPE on Windows using CVE-2017-8464 2017-11-08 10:09:03 -06:00
Spencer McIntyre c2578c1487 Refactor GetProcessSid to remove do while FALSE 2017-11-07 19:11:24 -05:00
bwatters-r7 7df18e378d Fix conflicts in PR 8509 by mergeing to master 2017-10-09 10:30:21 -05:00
Spencer McIntyre 3f6f70f820 Move the cve-2017-8464 source to external/source 2017-10-08 13:58:51 -04:00
Kirk Swidowski 2ee94ca3d9 made changes based on PR feedback. 2017-09-01 16:49:17 -07:00
Kirk Swidowski b7fc990d17 moved project to the source directory. 2017-09-01 16:09:53 -07:00
Tim ffbf21cb1c cleanup 2017-08-31 18:35:18 +08:00
Tim 7b71f60ea1 fix the stack 2017-08-31 18:35:18 +08:00
Tim 26f4fa3b09 setup stack 2017-08-31 18:35:17 +08:00
Tim a2396991f0 stager not setting up stack 2017-08-31 18:35:17 +08:00
Tim 6dbe00158f fix stager 2017-08-31 18:35:17 +08:00
David Tomaschik ef6c20ce51 Update README
Meterpreter repo now redirects to metasploit-payloads.
2017-08-27 10:26:35 -07:00
Tim d6d6c67f33 add stage_shell.s and cleanup 2017-08-21 14:42:30 +08:00
Tim ac6495a7eb formatting 2017-08-21 12:35:13 +08:00
Tim 9768a89bcd aarch64 staged shell 2017-08-21 11:14:42 +08:00
Tim 8b4ccc66c7 add linux/aarch64/shell_reverse_tcp 2017-08-17 18:55:37 +08:00
Brent Cook 59086af261
Land #8771, rewrite linux x64 stagers with Metasm 2017-08-14 02:32:29 -04:00