jvazquez-r7
|
21742b6469
|
Test #3729
|
2014-12-06 21:20:52 -06:00 |
William Vu
|
2f98a46241
|
Land #4314, @todb-r7's module cleanup
|
2014-12-05 14:05:09 -06:00 |
Jon Hart
|
52851d59c0
|
Update GATEWAY to GATEWAY_PROBE_HOST, add GATEWAY_PROBE_PORT
|
2014-12-04 13:26:16 -08:00 |
Jon Hart
|
6bd56ac225
|
Update any modules that deregistered NETMASK
|
2014-12-04 13:22:06 -08:00 |
Tod Beardsley
|
79f2708a6e
|
Slight fixes to grammar/desc/whitespace
Note that the format_all_drives module had a pile of CRLFs that should
have been caught by msftidy. Not sure why it didn't.
|
2014-12-04 13:11:33 -06:00 |
sinn3r
|
2fcbcc0c26
|
Resolve merge conflict for ie_setmousecapture_uaf (#4213)
Conflicts:
modules/exploits/windows/browser/ie_setmousecapture_uaf.rb
|
2014-12-03 14:12:15 -06:00 |
sinn3r
|
a88ee0911a
|
Fix os detection
See #3373
|
2014-12-02 01:15:55 -06:00 |
sinn3r
|
a42c7a81e7
|
Fix os detection
See #4283
|
2014-12-02 01:13:51 -06:00 |
William Vu
|
394d132d33
|
Land #2756, tincd post-auth BOF exploit
|
2014-12-01 12:13:37 -06:00 |
sinn3r
|
0f973fdf2b
|
Fix #4284 - Typo "neline" causing the exploit to break
"neline" isn't supposed to be there at all.
|
2014-12-01 01:24:30 -06:00 |
jvazquez-r7
|
7a2c9c4c0d
|
Land #4263, @jvennix-r7's OSX Mavericks root privilege escalation
* Msf module for the Ian Beer exploit
|
2014-11-30 21:13:07 -06:00 |
jvazquez-r7
|
b357fd88a7
|
Add comment
|
2014-11-30 21:08:38 -06:00 |
jvazquez-r7
|
0ab99549bd
|
Change ranking
|
2014-11-30 21:08:12 -06:00 |
jvazquez-r7
|
7772da5e3f
|
Change paths, add makefile and compile
|
2014-11-30 21:06:11 -06:00 |
jvazquez-r7
|
d7d1b72bce
|
Rename local_variables
|
2014-11-30 20:40:55 -06:00 |
jvazquez-r7
|
d77c02fe43
|
Delete unnecessary metadata
|
2014-11-30 20:37:34 -06:00 |
sinn3r
|
f7f4a191c1
|
Land #4255 - CVE-2014-6332 Internet Explorer
|
2014-11-28 10:12:27 -06:00 |
sinn3r
|
2a7d4ed963
|
Touchup
|
2014-11-28 10:12:05 -06:00 |
Rasta Mouse
|
985838e999
|
Suggestions from OJ
|
2014-11-27 21:38:50 +00:00 |
Rasta Mouse
|
25ecf73d7d
|
Add configurable directory, rather than relying on the session working
directory.
|
2014-11-27 17:12:37 +00:00 |
OJ
|
75e5553cd4
|
Change to in exploit
|
2014-11-26 16:53:30 +10:00 |
jvazquez-r7
|
9524efa383
|
Fix banner
|
2014-11-25 23:14:20 -06:00 |
jvazquez-r7
|
16ed90db88
|
Delete return keyword
|
2014-11-25 23:11:53 -06:00 |
jvazquez-r7
|
85926e1a07
|
Improve check
|
2014-11-25 23:11:32 -06:00 |
jvazquez-r7
|
5a2d2914a9
|
Fail on upload errors
|
2014-11-25 22:48:57 -06:00 |
jvazquez-r7
|
b24e641e97
|
Modify exploit logic
|
2014-11-25 22:11:43 -06:00 |
jvazquez-r7
|
4bbadc44d6
|
Use Msf::Exploit::FileDropper
|
2014-11-25 22:00:42 -06:00 |
jvazquez-r7
|
7fbd5b63b1
|
Delete the Rex::MIME::Message gsub
|
2014-11-25 21:54:50 -06:00 |
jvazquez-r7
|
eaa41e9a94
|
Added reference
|
2014-11-25 21:37:04 -06:00 |
jvazquez-r7
|
2c207597dc
|
Use single quotes
|
2014-11-25 18:30:25 -06:00 |
jvazquez-r7
|
674ceeed40
|
Do minor cleanup
|
2014-11-25 18:26:41 -06:00 |
jvazquez-r7
|
6ceb47619a
|
Change module filename
|
2014-11-25 18:09:15 -06:00 |
jvazquez-r7
|
1305d56901
|
Update from upstream master
|
2014-11-25 18:07:13 -06:00 |
Joe Vennix
|
3a5de9970f
|
Update description, rename xnu_ver -> osx_ver.
|
2014-11-25 12:38:29 -06:00 |
Joe Vennix
|
7a3fb12124
|
Add an OSX privilege escalation from Google's Project Zero.
|
2014-11-25 12:34:16 -06:00 |
spdfire
|
583494c0db
|
use BrowserExploitServer
|
2014-11-24 18:49:27 +01:00 |
spdfire
|
08a67d78c5
|
module for CVE-2014-6332.
|
2014-11-24 08:25:18 +01:00 |
Mark Schloesser
|
9e9954e831
|
fix placeholder to show the firmware version I used
|
2014-11-19 21:23:39 +01:00 |
Mark Schloesser
|
a718e6f83e
|
add exploit for r7-2014-18 / CVE-2014-4880
|
2014-11-19 21:07:02 +01:00 |
Joe Vennix
|
a9cb6e0d2f
|
Add jduck as an author on samsung_knox_smdm_url
|
2014-11-19 10:18:08 -06:00 |
jvazquez-r7
|
542eb6e301
|
Handle exception in brute force exploits
|
2014-11-18 12:17:10 -08:00 |
Jon Hart
|
60e31cb342
|
Allow sunrpc_create to raise on its own
|
2014-11-18 12:17:10 -08:00 |
jvazquez-r7
|
7daedac399
|
Land #3972 @jhart-r7's post gather module for remmina Remmina
* Gather credentials managed with Remmina
|
2014-11-17 16:44:41 -06:00 |
Tod Beardsley
|
286827c6e5
|
Land #4186, Samsung KNOX exploit. Ty @jvennix-r7!
|
2014-11-17 13:29:39 -06:00 |
Tod Beardsley
|
39980c7e87
|
Fix up KNOX caps, descriptive description
|
2014-11-17 13:29:00 -06:00 |
Tod Beardsley
|
0f41bdc8b8
|
Add an OSVDB ref
|
2014-11-17 13:26:21 -06:00 |
jvazquez-r7
|
145e610c0f
|
Avoid shadowing new method
|
2014-11-17 12:22:30 -06:00 |
William Vu
|
91ba25a898
|
Land #4208, psexec delay fix
|
2014-11-17 11:35:56 -06:00 |
Joe Vennix
|
cd61975966
|
Change puts to vprint_debug.
|
2014-11-17 10:13:13 -06:00 |
floyd
|
9243cfdbb7
|
Minor fixes to ruby style things
|
2014-11-17 17:12:17 +01:00 |