wchen-r7
|
c7afe4f663
|
Land #5930, MS15-078 (atmfd.dll buffer overflow)
|
2015-09-16 15:33:38 -05:00 |
jvazquez-r7
|
9626596f85
|
Clean template code
|
2015-09-12 13:43:05 -05:00 |
jvazquez-r7
|
53f995b9c3
|
Do first prototype
|
2015-09-10 19:35:26 -05:00 |
wchen-r7
|
122d57fc20
|
Land #5945, Add auto-accept to osx/enum_keychain
|
2015-09-08 10:56:08 -05:00 |
joev
|
1b320bae6a
|
Add auto-accept to osx/enum_keychain.
|
2015-09-07 21:17:49 -05:00 |
jvazquez-r7
|
b39575928e
|
Update reflective exploit
|
2015-09-03 11:01:41 -05:00 |
jvazquez-r7
|
b912e3ce65
|
Add exploit template
|
2015-09-02 17:28:35 -05:00 |
HD Moore
|
4090c2c8ea
|
Land #5880, adds ScriptHost UAC bypass for Win7/2008
|
2015-09-02 14:14:18 -05:00 |
wchen-r7
|
9364982467
|
Land #5665, Add osx rootpipe entitlements exploit for 10.10.3
|
2015-08-28 13:33:16 -05:00 |
wchen-r7
|
11db9c2112
|
Land #5896, Update ms15_004_tswbproxy to use a Reflective DLL
|
2015-08-27 17:11:26 -05:00 |
HD Moore
|
a2d5511e39
|
Land #5379, new post modules to load into powershell sessions
|
2015-08-26 17:11:40 -05:00 |
jvazquez-r7
|
5d0ed797a3
|
Update DLL
|
2015-08-26 15:15:32 -05:00 |
Meatballs
|
228087dced
|
Initial working scripthost bypass uac
|
2015-08-23 20:16:15 +01:00 |
Meatballs
|
129edd8b2e
|
Original bypass script
|
2015-08-23 19:46:24 +01:00 |
William Vu
|
d54249370b
|
Move tpwn source to external/source/exploits
|
2015-08-17 18:27:47 -05:00 |
William Vu
|
efc980074c
|
Add tpwn exploit files
|
2015-08-17 17:11:07 -05:00 |
wchen-r7
|
7113c801b1
|
Land #5732, reliability update for adobe_flash_hacking_team_uaf
|
2015-07-17 16:43:39 -05:00 |
jvazquez-r7
|
255d8ed096
|
Improve adobe_flash_opaque_background_uaf
|
2015-07-16 14:56:32 -05:00 |
jvazquez-r7
|
a637921305
|
Update swf
|
2015-07-15 18:35:41 -05:00 |
jvazquez-r7
|
b504f0be8e
|
Update adobe_flash_hacking_team_uaf
|
2015-07-15 18:18:04 -05:00 |
jvazquez-r7
|
299978d0e2
|
Put again old exploiter
|
2015-07-11 00:36:32 -05:00 |
jvazquez-r7
|
63005a3b92
|
Add module for flash CVE-2015-5122
* Just a fast port for the exploit leaked
* Just tested on win7sp1 / IE11
|
2015-07-11 00:28:55 -05:00 |
Tod Beardsley
|
3d630de353
|
Replace with a real CVE number
|
2015-07-07 14:44:12 -05:00 |
jvazquez-r7
|
d9aacf2d41
|
Add module for hacking team flash exploit
|
2015-07-07 11:19:48 -05:00 |
joev
|
c993c70006
|
Remove sleep(), clean up WritableDir usage.
|
2015-07-05 18:59:00 -05:00 |
joev
|
a8b56bb44a
|
Oops, need to include the binary files.
|
2015-07-05 18:24:45 -05:00 |
jvazquez-r7
|
1de94a6865
|
Add module for CVE-2015-3113
|
2015-07-01 13:13:57 -05:00 |
jvazquez-r7
|
ee0377ca16
|
Add module for CVE-2015-3105
|
2015-06-25 13:35:01 -05:00 |
OJ
|
ae41f2bfa0
|
Update exploit binaries for ms15-051
|
2015-06-25 09:33:15 +10:00 |
OJ
|
3686accadd
|
Merge branch 'upstream/master' into cve-2015-1701
|
2015-06-22 07:52:17 +10:00 |
jvazquez-r7
|
de1542e589
|
Add module for CVE-2015-3090
|
2015-06-18 12:36:14 -05:00 |
wchen-r7
|
17b8ddc68a
|
Land #5524, adobe_flash_pixel_bender_bof in flash renderer
|
2015-06-15 02:42:16 -05:00 |
jvazquez-r7
|
72672fc8f7
|
Delete debug
|
2015-06-11 17:39:36 -05:00 |
jvazquez-r7
|
8ed13b1d1b
|
Add linux support for CVE-2014-0515
|
2015-06-11 16:18:50 -05:00 |
wchen-r7
|
ae21b0c260
|
Land #5523, adobe_flash_domain_memory_uaf in the flash renderer
|
2015-06-10 16:59:19 -05:00 |
wchen-r7
|
4c5b1fbcef
|
Land #5522, adobe_flash_worker_byte_array_uaf in the flash renderer
|
2015-06-10 14:49:41 -05:00 |
jvazquez-r7
|
7527aa4f34
|
Disable debug
|
2015-06-10 14:07:18 -05:00 |
jvazquez-r7
|
6c7ee10520
|
Update to use the new flash Exploiter
|
2015-06-10 13:52:43 -05:00 |
jvazquez-r7
|
7fba64ed14
|
Allow more search space
|
2015-06-10 12:26:53 -05:00 |
jvazquez-r7
|
ecbddc6ef8
|
Play with memory al little bit better
|
2015-06-10 11:54:57 -05:00 |
wchen-r7
|
d622c782ef
|
Land #5519, adobe_flash_uncompress_zlib_uninitialized in the flash renderer
|
2015-06-10 11:52:47 -05:00 |
jvazquez-r7
|
2b4fe96cfd
|
Tweak Heap Spray
|
2015-06-10 10:56:24 -05:00 |
jvazquez-r7
|
a6fe383852
|
Use AS Exploiter
|
2015-06-10 09:32:52 -05:00 |
jvazquez-r7
|
e5d6c9a3cb
|
Make last code cleanup
|
2015-06-09 16:01:57 -05:00 |
jvazquez-r7
|
cf8c6b510b
|
Debug version working
|
2015-06-09 15:46:21 -05:00 |
jvazquez-r7
|
39851d277d
|
Unset debug flag
|
2015-06-09 11:36:09 -05:00 |
jvazquez-r7
|
b7f0fad72f
|
Modify CVE-2014-0569 to use the flash exploitation code
|
2015-06-09 11:31:39 -05:00 |
OJ
|
b291d41b76
|
Quick hack to remove hard-coded offsets
|
2015-06-05 13:19:41 +10:00 |
jvazquez-r7
|
02181addc5
|
Update CVE-2014-0556
|
2015-06-04 18:23:50 -05:00 |
wchen-r7
|
23df66bf3a
|
Land #5481, no powershell. exec shellcode from the renderer process.
|
2015-06-04 15:45:09 -05:00 |