jvazquez-r7
6c490af75e
Add randomization to Rex::Zip::Jar and java_signed_applet
2014-02-27 12:38:52 -06:00
Meatballs
2a6258be15
Merge remote-tracking branch 'upstream/master' into bypassuac_redo
...
Conflicts:
external/source/exploits/make.bat
2014-02-28 20:26:24 +00:00
Meatballs
8bdb22aeb9
Merge remote-tracking branch 'upstream/master' into bypassuac_redo
...
Conflicts:
lib/msf/core/post/windows.rb
2014-02-25 22:15:05 +00:00
Spencer McIntyre
7f9b4a4bf4
Land #2655 , Re-do exe-small for scripting payloads.
2014-02-17 15:56:23 -05:00
Spencer McIntyre
3299b68adf
Landing #2767 , @Meatballs1 Powershell Reflective Payload
2014-02-14 16:12:46 -05:00
Meatballs
f112e78de9
Fixes .war file creation
2013-12-22 20:58:21 +00:00
Meatballs
0c5ac0176f
Undo psh net change
2013-12-16 13:43:40 +00:00
Meatballs
dd5b66f827
Undo psh net change
2013-12-16 13:42:37 +00:00
Meatballs
14c0096115
Update template
...
Use Copy instead of memset
Remove | Out-Null
2013-12-16 13:38:14 +00:00
Meatballs
8dfcc8aa77
WaitForThread
2013-12-16 12:44:58 +00:00
Meatballs
637be1bdfa
Should use RIG
2013-12-16 09:19:17 +00:00
Meatballs
0a29176855
Update psh_web_delivery for reflection
2013-12-16 09:08:01 +00:00
Meatballs
7cc99d76ad
Merge remote-tracking branch 'upstream/master' into powershell_auto_arch
...
Conflicts:
lib/msf/util/exe.rb
2013-12-16 09:07:08 +00:00
Meatballs
28f8ac322f
Enable inject
2013-12-14 21:30:52 +00:00
Meatballs
7347cb170c
Revert "Enable DLL injection in msfvenom"
...
This reverts commit 64e6531bbc
.
2013-12-14 21:26:13 +00:00
Meatballs
bc0c080947
Indentation
2013-12-08 18:18:44 +00:00
Meatballs
64e6531bbc
Enable DLL injection in msfvenom
2013-12-08 18:16:23 +00:00
scriptjunkie
f4636c46a6
Removing unused endjunk, sections_end, cert_entry
2013-12-07 20:55:51 -06:00
scriptjunkie
8d33138489
Support silent shellcode injection into DLLs
...
Only run code on DLL_PROCESS_ATTACH, preventing infinite loop otherwise:
Added code would create thread -> calls DLL entry point -> calling added code...
2013-12-07 19:44:17 -06:00
Meatballs
1e60ff91ea
Move ExitThread patching to Msf::Util::EXE
2013-12-05 17:16:14 +00:00
corelanc0d3r
474a03475f
sorted out the sorts without .sort
2013-12-02 11:57:52 +01:00
corelanc0d3r
66edfe968d
Sorting output
2013-11-21 00:57:08 +01:00
Meatballs
a327321558
Re-do 'exe-small' for scripting payloads.
...
Fall back to default x64 exe for ARCH_X86_64
2013-11-19 21:19:12 +00:00
Tod Beardsley
8c1d7d936b
Revert "Fix conflcit lib/msf/util/exe.rb"
...
This was causing build failures:
https://travis-ci.org/rapid7/metasploit-framework/builds/13816889
It looks like there were a whole bunch of changes that weren't intended.
This reverts commit 3996557ec6
, reversing
changes made to 62102dd1f9
.
2013-11-11 13:48:39 -06:00
sinn3r
3996557ec6
Fix conflcit lib/msf/util/exe.rb
...
Conflicts:
lib/msf/util/exe.rb
2013-11-11 11:43:09 -06:00
sinn3r
62102dd1f9
Land #2544 - Vbs minimize
2013-11-11 11:14:56 -06:00
sinn3r
33f65dd611
Land #2577 - Use base64 to reduce psh-net payload size
2013-11-11 10:21:20 -06:00
William Vu
f5d1d8eace
chmod -x .rb files without #! in modules and lib
...
It wasn't just cmdstager_printf.rb. :/
2013-10-30 19:51:25 -05:00
Meatballs
e18dd3ec0b
Use base64 to reduce size
2013-10-25 01:19:43 +01:00
Meatballs1
58a82f0518
Update exe.rb
...
Rename values
2013-10-21 13:50:07 +01:00
Meatballs
2ef89eaf35
Randomize exe name
2013-10-18 19:01:28 +01:00
Meatballs
56aa9ab01c
Reduce size
2013-10-18 18:59:30 +01:00
Meatballs
29a7059eb4
Update AlwaysInstallElevated to use a generated MSI file
...
Fixes bugs with MSI::UAC option, invalid logic and typo...
2013-09-29 17:09:03 +01:00
Meatballs
8aeb134581
Retab...
2013-09-27 20:40:16 +01:00
Meatballs
6ca01adf1d
Merge branch 'master' into msi_payload
...
Conflicts:
lib/msf/util/exe.rb
2013-09-27 20:37:40 +01:00
Meatballs
34c443f346
Forgot msi-nouac
2013-09-27 20:36:00 +01:00
Meatballs
8a9843cca6
Merge upstream/master
2013-09-27 20:02:23 +01:00
Tab Assassin
c94e8a616f
Retabbed to catch new bad tabs
2013-09-27 13:34:13 -05:00
Meatballs
695fdf836c
Generate NonUAC MSIs
2013-09-21 13:13:18 +01:00
Meatballs
85ea9ca05a
Merge branch 'master' of github.com:rapid7/metasploit-framework into msi_payload
2013-09-21 12:49:38 +01:00
Meatballs
3dd75db584
Address feedback
2013-09-20 17:20:42 +01:00
Meatballs
11bdf5d332
New pull
2013-09-19 19:57:38 +01:00
David Maloney
34e5f69fbf
fix merge conflict
2013-09-12 13:56:08 -05:00
Tab Assassin
2bd1fb451b
Retab changes for PR #1569
2013-09-05 16:16:05 -05:00
Tab Assassin
48cf2af685
Merge for retab
2013-09-05 16:16:00 -05:00
Tab Assassin
0d884ebbab
Retab changes for PR #2278
2013-09-05 14:08:14 -05:00
Tab Assassin
63612a64e9
Merge for retab
2013-09-05 14:08:09 -05:00
Tab Assassin
7e00e2aaba
Retab changes for PR #2307
2013-09-05 13:37:58 -05:00
Tab Assassin
76c98cb610
Merge for retab
2013-09-05 13:37:55 -05:00
Tab Assassin
d0a3ea6156
Retab changes for PR #2320
2013-09-05 13:27:47 -05:00
Tab Assassin
bff7d0e6ae
Merge for retab
2013-09-05 13:27:09 -05:00
Meatballs
4c9e6a865a
Default to exe-small
2013-09-03 00:01:20 +01:00
Tab Assassin
7e5e0f7fc8
Retab lib
2013-08-30 16:28:33 -05:00
Meatballs
53c3f6b2db
Deconflict
2013-08-30 10:52:42 +01:00
shellster
345bc7da03
New Reflection Powershell Payload
...
Adds Powershell payload which, unlike existing payloads does not
drop any temporary files onto the target's computer. All needed
methods are dynamically loaded via reflection.
2013-08-29 19:11:29 -07:00
James Lee
eba6762977
Land #2270 , Util::EXE refactor
...
With a minor rebase to fix a commit message
[Closes #2270 ]
Conflicts:
spec/support/shared/contexts/msf/util/exe.rb
2013-08-28 21:49:59 -05:00
shellster
ee9b1ef8e0
Greatly shortened to_mem_old.ps1.template by using [Math]::max.
...
Added necessary end of line conversion in lib/msf/util/exe.rb so
that Powershell will parse multiline strings.
2013-08-28 21:39:42 -05:00
Meatballs
96c093dce0
Fix Exploit::Exe
2013-08-25 19:56:29 +01:00
Meatballs
66ee15f461
Merge and deconflict
2013-08-25 19:14:15 +01:00
David Maloney
5e5f5acf19
plug in 64bit injector
...
64 bit exe generation only had subsitution method
add the x64 injector in there too.
2013-08-25 12:19:57 -05:00
Meatballs
19e47d5e82
Really fix war
2013-08-25 00:06:31 +01:00
David Maloney
4c57af051a
Revert "'remove unused framework references"
...
This reverts commit 98a09b9f5c
.
2013-08-24 17:52:57 -05:00
David Maloney
98a09b9f5c
'remove unused framework references
...
passing around framework references that are never used
removing these whever possible
2013-08-24 16:59:29 -05:00
David Maloney
bd5f184e2b
Dry up the exe subsitution stuff
...
6 different methods were doing essentially
the same exact thing. DRY it up a bit
2013-08-24 16:50:45 -05:00
David Maloney
d38117a521
replace old inject method
...
replacing jsut the win32 inject method this time
with out new injector method.
2013-08-24 16:30:47 -05:00
Meatballs
9786f84a6e
Service exes
2013-08-24 03:45:07 +01:00
Meatballs
9ea17ef1e1
Merge upstream
2013-08-24 03:34:02 +01:00
Meatballs
3fae6c51c8
Initial exe-service
2013-08-24 03:28:47 +01:00
Meatballs
f50ede1993
Remove redundant methods
2013-08-23 23:28:13 +01:00
Meatballs
4c4fe0b110
Fix x64 exe droppers
2013-08-23 23:21:31 +01:00
Meatballs
cf5ddfeebf
Some war fixes
2013-08-23 18:59:48 +01:00
Meatballs
dfc606fe56
Slightly saner filenames
2013-08-23 18:06:48 +01:00
Meatballs
41b1b30438
vba transform
2013-08-23 18:00:19 +01:00
Meatballs
4d21b06f4f
Aspx uses transform
2013-08-23 17:22:33 +01:00
Meatballs
1cb1afa50a
Fix aspx
2013-08-23 17:09:51 +01:00
Meatballs
dd13a7e48f
Working .asp
2013-08-23 16:55:07 +01:00
Meatballs
7370fc3f4e
vbs transform
2013-08-23 16:26:03 +01:00
Meatballs
5040347521
Fix psh and add powershell transform
2013-08-23 15:59:19 +01:00
Meatballs
418505adc9
Fix psh-net
2013-08-23 15:21:26 +01:00
Meatballs
12b5dbedae
Initialize the hash_sub
2013-08-23 14:58:14 +01:00
Meatballs
cfd6c66ffd
Fix VBS
2013-08-23 14:35:19 +01:00
Meatballs
23a067aab7
Refactor reading of script files and substitution
2013-08-23 13:51:10 +01:00
shellster
a6e5e9c61d
Updated using limhof-r7 advice
2013-08-21 16:43:10 -07:00
shellster
86a83391fd
Merge remote-tracking branch 'upstream/master'
2013-08-21 16:16:20 -07:00
Shelby Spencer
97933c4954
Moving meterpreter scripts out of exe.rb into a templates folder.
2013-08-20 16:49:48 -07:00
sinn3r
92d57ef37d
Fix merge conflict
...
Conflicts:
msfvenom
2013-08-13 00:00:16 -05:00
James Lee
ab976ddf8f
Fix genarate command in msfconsole
...
Thanks @Meatballs1 for spotting
2013-08-06 14:46:53 -05:00
jvazquez-r7
214f337f58
Fix indentation
2013-07-24 16:55:01 -05:00
Meatballs
c221360cc1
Retab
2013-07-24 22:16:41 +01:00
Meatballs
edc297756b
Tabs
2013-07-24 19:14:11 +01:00
Meatballs
4b84b49674
Fix payload corruption
2013-07-24 19:08:02 +01:00
James Lee
00c7581099
Fix constant names and 'exe-only'
...
That'll teach me to commit before the specs finish.
Really [FixRM #8149 ]
2013-07-06 12:39:15 -05:00
James Lee
1b504197be
Check equality instead of regex
...
Thanks, @Meatballs1 for finding the cause of this bug!
[FixRM #8149 ]
2013-07-06 12:29:37 -05:00
James Lee
e330916744
Pull out common stuff in Util::EXE/MsfVenom tests
2013-07-03 12:25:15 -05:00
James Lee
1466609c86
Add more supported formats to exe generation
...
- Already supported, just added calls to the the right methods in
the .to_executable_fmt method:
- Linux armle, mipsle, and mipsbe
- Mac arm, ppc
- makes the two (!?) copies of block_api for windows match more closely
with the source used elsewhere. This is still needs to be refactored
to get rid of the duplication.
- Get rid of some of the logic in msfvenom duplicated from Util::EXE
2013-07-01 17:36:58 -05:00
agix
e48cfcae8e
delete a debug puts
2013-05-19 19:21:10 +02:00
agix
e844247163
Little change in exe-only to work with x64 arch.
2013-05-19 19:01:03 +02:00
Alexandre Maloteaux
2a9dbb2654
msfvenom and exe-small fmt bug fix
2013-05-16 21:13:45 +01:00
scriptjunkie
79a72a18a9
Merge branch 'exe_only_patch' of git://github.com/agix/metasploit-framework
2013-03-27 18:30:07 -05:00
jvazquez-r7
a644ceb016
Added support for mipsbe elf
2013-03-26 17:20:43 +01:00