Jacob Robles
3fbfaf2ff5
Documentation Update
2018-12-12 07:00:37 -06:00
Metasploit
f4453be69e
automatic module_metadata_base.json update
2018-12-11 18:40:31 -08:00
William Vu
aa0c206b4b
Land #11107 , double negative logic cleanup
2018-12-11 20:29:53 -06:00
Metasploit
afa5b5db57
automatic module_metadata_base.json update
2018-12-11 10:12:09 -08:00
Shelby Pace
ae089ce573
Land #10960 , add wp duplicator code inject module
2018-12-11 12:02:07 -06:00
Shelby Pace
b82e3469a2
renamed module and doc
2018-12-11 11:59:19 -06:00
Julien Legras
7e953e34b9
Added the clean_up function
2018-12-11 18:13:46 +01:00
bwatters
b109321b44
Kill `unless not`
2018-12-11 10:16:16 -06:00
bwatters
0c9d5b7d51
refactor `unless !` to `if`
2018-12-11 10:04:55 -06:00
bwatters
ac88c604fd
Remove copy/pasta'd funtion that was never called
2018-12-11 10:02:36 -06:00
Metasploit
f946b6d900
automatic module_metadata_base.json update
2018-12-11 06:39:46 -08:00
Jacob Robles
1ab69c221c
Land #11040 , Add CyberLink LabelPrint Local BOF
2018-12-11 08:19:51 -06:00
Jacob Robles
106d6cefe4
Add documentation
2018-12-11 07:55:52 -06:00
Jacob Robles
165f082160
Fix syntax, minor edits
2018-12-11 07:55:20 -06:00
Brent Cook
5d90608784
remove cpuinfo from license
2018-12-10 19:03:42 -06:00
Brent Cook
143435514f
remove metasm/cpuinfo license info
2018-12-10 19:03:18 -06:00
Brent Cook
bd3e474513
delete old cpuinfo code (is it used anywhere?)
2018-12-10 19:03:04 -06:00
Brent Cook
4ff6f0171d
remove old metasm remnants
...
Noticed while @asoto-r7 was reviewing Code Climate results, and it
highlighted some metasm code as having unusual code structure. Rather
than fixing it, we can delete it, since this is from upstream metasm
presumably, which we've used as a Gem for some time (thanks @egypt).
All payloads should still be regenerable, and evasion modules as well.
2018-12-10 18:58:53 -06:00
Francesco Soncina
ff2d048530
fixes: update x86/xor_dynamic for #11100
2018-12-10 22:45:45 +01:00
Francesco Soncina
a94e52ca31
fixes: updates x64/xor_dynamic for #11100
2018-12-10 22:42:31 +01:00
Metasploit
3968b1ed2e
automatic module_metadata_base.json update
2018-12-10 09:42:28 -08:00
William Vu
3f18ffa224
Land #10318 , Oracle function-based index privesc
2018-12-10 11:32:39 -06:00
William Vu
d0f1f72426
Clean up module
2018-12-10 11:21:16 -06:00
Brent Cook
43842ad41d
Land #11082 , Update show plugins to show all available plugins as well
2018-12-10 10:20:51 -06:00
Metasploit
2ccce813e0
automatic module_metadata_base.json update
2018-12-10 08:06:37 -08:00
Brent Cook
bc6356a2cd
Land #11090 , update code and style for exploit/linux/local/glibc_origin_expansion_priv_esc
2018-12-10 09:59:03 -06:00
Brendan Coles
5bddc4e9ef
Land #11096 , Replace WsfDelay typo with WfsDelay in docs
2018-12-10 11:03:53 +00:00
Auxilus
bca4ae03ff
Replace WsfDelay with WfsDelay
2018-12-10 16:02:19 +05:30
Metasploit
aa56f1e073
automatic module_metadata_base.json update
2018-12-09 22:47:11 -08:00
William Vu
82d34b9406
Land #11087 , File::binread for exploit_data
2018-12-10 00:38:51 -06:00
Milton-Valencia
565f2e3e38
wait wrong
2018-12-09 19:23:54 -06:00
Milton-Valencia
ee2ed46143
added date based on man page
2018-12-09 19:17:22 -06:00
Milton-Valencia
f6bfbddb8d
twks
2018-12-09 15:59:58 -06:00
Milton-Valencia
15aaaa4f21
removed 0 just saw...
2018-12-09 15:39:27 -06:00
Milton-Valencia
2beddf1012
req changes
2018-12-09 15:01:09 -06:00
Brent Cook
52af87d278
Land #11091 , add chronos user
2018-12-09 09:24:06 -06:00
Shreyans Devendra Doshi
45c6f1ed62
Fix #11084 Add 'chronos' to unix_users.txt
...
This commit adds the username 'chronos' to the user list as it happens
to be the default username on ChromeOS, as highlighted by @h00die in
Issue #11084 .
2018-12-09 09:58:58 -05:00
Brendan Coles
237d3c86c4
Code cleanup and update style
2018-12-09 07:26:51 +00:00
Milton-Valencia
39229125b7
tweak
2018-12-09 00:22:49 -06:00
Milton-Valencia
02f3d4688f
changes
2018-12-09 00:10:54 -06:00
Milton-Valencia
69ed80f685
varys -> varies
2018-12-08 22:51:52 -06:00
Milton-Valencia
fcad3f0c8f
erlang cookie rce exploit module
2018-12-08 22:36:56 -06:00
Brendan Coles
a9c0a5d53d
Use ::File::binread for exploit_data file read
2018-12-09 04:09:56 +00:00
Metasploit
d9e7efa7e2
automatic module_metadata_base.json update
2018-12-08 07:59:36 -08:00
Brent Cook
d3fc707c98
Land #11080 , update mettle payloads
2018-12-08 09:51:37 -06:00
Metasploit
cff8816781
automatic module_metadata_base.json update
2018-12-08 07:28:08 -08:00
Brent Cook
3768f79568
Land #11085 , add lkrg_installed? checks to various modules
2018-12-08 09:19:33 -06:00
Brent Cook
733c2f637d
Land #11081 , Add Msf::Post::Linux::Kernel.lkrg_installed? method
2018-12-08 09:14:57 -06:00
Brendan Coles
d8ab6a552b
Add lkrg_installed? checks
2018-12-08 13:37:12 +00:00
Metasploit
52eb60469e
automatic module_metadata_base.json update
2018-12-08 05:07:49 -08:00