Commit Graph

533 Commits (d5845343bd93e5160a9bb069e949a1c582e26a33)

Author SHA1 Message Date
Brent Cook 4abc5a5a2f revert unrelated changes 2016-12-22 00:36:41 -06:00
James Lee 26d8738950
Drop names so we can remove dup addresses 2016-12-20 18:45:36 -06:00
Brent Cook e52d67cb8c add architecture check 2016-11-20 19:09:26 -06:00
Brent Cook 5b4f96eeac remove more refs 2016-09-20 14:31:28 -05:00
David Maloney eb73a6914d
replace old rex::ui::text::table refs
everywhere we called the class we have now rewritten it
to use the new namespace

MS-1875
2016-08-10 13:30:09 -05:00
Brent Cook b08d1ad8d8
Revert "Land #6812, remove broken OSVDB references"
This reverts commit 2b016e0216, reversing
changes made to 7b1d9596c7.
2016-07-15 12:00:31 -05:00
Brent Cook 2b016e0216
Land #6812, remove broken OSVDB references 2016-07-11 22:59:11 -05:00
Pearce Barry 7b1d9596c7
Land #7068, Introduce 'mettle' - new POSIX meterpreter 2016-07-11 22:38:40 -05:00
Brent Cook a362d8b9c8 update payload test generator to work with MetasploitModules 2016-07-06 15:53:06 -05:00
Tod Beardsley 7a321c7350
Import, sign, and publish signed dev keys
This largely automates the process of importing developer keys,
much like `import-dev-keys.sh`, but also takes the additional, sadly
manual step of signing the key with your default key, and uploading
those keys to https://sks-keyservers.net.

In effect, you are stating that you trust keys published on keybase.io
and are listed as such on the official Metasploit-Framework development
wiki.

If your own default key either has no passphrase, or has a passphrase
cached in a keymanager, the process merely requires you hit `y` for
every key, and `y` again for keys with multiple IDs. Otherwise, you
will need to provide your passphrase for each signing. Temporarily
removing the passphrase alleviates this pain.

Of course, this assumes you actually trust the development wiki
and keybase to do the right thing. The tradition is to individually
verify each key through some personally invented means, such as in
person with a government ID check.

Note that `import-dev-keys.sh` currently lists a number of keys
not on Keybase, and that functionality has not been carried over
to this script.
2016-07-06 10:33:02 -05:00
Brent Cook f9f47f7a79 fix tools that need rex-text to function 2016-07-05 02:38:40 -05:00
x90" * 365 3fe4ffb225 Change default pattern length
Changed from 1024 to 8192 per previous version.
2016-07-03 16:08:54 -04:00
Brent Cook cc30ece6ce tell the user what to do 2016-06-14 11:54:55 -05:00
William Vu 3ed85b6b25 Add missing rank check to msftidy 2016-06-14 11:48:05 -05:00
Andrey 92b62d010f Update md5_lookup.rb
:)
2016-06-02 18:49:22 +03:00
Brent Cook 10dcc44e2d
Land #6446, Speedup pattern_create/offset options parsing 2016-05-14 09:50:19 -05:00
Brent Cook 680709c5f2 move requires into run 2016-05-14 09:50:02 -05:00
Brent Cook dd0d68a2b4 speed up options parsing (only require framework when running) 2016-05-14 09:47:08 -05:00
Brent Cook 057c25e188
Land #6446, Cleanup pattern_create/pattern_offset and document options 2016-05-13 22:09:35 -05:00
Brent Cook 7cfc4d4523 fix odd indentation and style issues 2016-05-13 22:06:18 -05:00
Brent Cook 901b793406 fix some minor indent and style issues 2016-05-13 21:51:54 -05:00
Brent Cook 7b83b06ad5 whitespace and remove useless comments 2016-05-13 21:45:41 -05:00
wchen-r7 816bc91e45 Resolve #6807, remove all OSVDB references.
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.

Resolve #6807
2016-04-23 12:32:34 -05:00
Brent Cook 57ab974737 File.exists? must die 2016-04-21 00:47:07 -04:00
x90" * 365 c3e618ad37 Update pattern_create.rb 2016-04-14 15:54:30 -04:00
x90" * 365 2a1831f4f2 Update pattern_offset.rb 2016-04-14 15:29:57 -04:00
x90" * 365 7f112c9c7d Update pattern_create.rb 2016-04-14 15:11:36 -04:00
x90" * 365 f9304fcc00 Update pattern_offset.rb 2016-04-14 15:11:02 -04:00
x90" * 365 a71d40d25b Update pattern_offset.rb
Test
2016-04-14 12:59:36 -04:00
wchen-r7 bc48ebd43b Use patch_finder for msu_finder 2016-03-29 23:21:01 -05:00
Spencer McIntyre 631e24c02b Update the msftidy warning for module class names 2016-03-16 13:31:24 -04:00
Brent Cook 558f810165
Land #6667, add a dev script for finding Metasploit release notes for modules 2016-03-13 14:03:54 -05:00
wchen-r7 69de3adf7a Fix a typo in the file name 2016-03-11 13:50:13 -06:00
wchen-r7 1546bf32ed Add a dev script to find Metasploit release notes
This script allows you to find the release notes of a:

* Pull request number for a bug fix, or a notable change.
* A module name (preferably just use the short name)
2016-03-11 13:44:38 -06:00
Christian Mehlmauer 3123175ac7
use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
Brent Cook 659af68b16
Land #6388, update msftidy check for new preferred Metasploit module base class 2016-03-06 17:12:20 -06:00
Brent Cook cc436fe438 update to new preferred base class for modules 2016-03-06 17:11:51 -06:00
Brent Cook e1db3ef369
Land #6388, Update msftidy to error when module super class is incorrect 2016-03-06 16:53:11 -06:00
William Vu 55724eb777 Set the exit status correctly 2016-03-02 09:39:23 -06:00
William Vu 538ee1ec36 Print a helpful message on LoadError 2016-03-02 09:39:23 -06:00
William Vu 92d4929b3d
Land #6543, msu_finder link update 2016-02-09 17:06:23 -06:00
Brent Cook bb556e5b87
Land #6529, added a file PR history exploration tool 2016-02-09 17:01:58 -06:00
Brent Cook 7fe61dce70 added support for GITHUB_OAUTH_TOKEN 2016-02-09 17:01:19 -06:00
wchen-r7 aaf1d2c312 Update downloadable link pattern for msu_finder 2016-02-07 12:26:37 -06:00
ghettoeinstein af3f6c4655 Update msu_finder.rb
Corrected spelling of "script"
2016-02-06 09:27:05 -08:00
wchen-r7 d5296d6150 Add documentation 2016-02-03 22:06:10 -06:00
wchen-r7 c82c147f31 Correct usage example 2016-02-03 21:53:22 -06:00
wchen-r7 8c8f4a39e8 Change to file_pull_requests.rb 2016-02-03 21:50:17 -06:00
wchen-r7 23fdadd31f chmod +x 2016-02-03 16:57:50 -06:00
wchen-r7 3ff2c98f99 Add tool module_pull_requests
This tool allows you to find all the rapid7/metasploit-framework
pull requests associated with a particular Metasploit module.
2016-02-03 16:53:03 -06:00