.. |
CVE-2008-6508
|
…
|
|
CVE-2010-0232
|
Remove genericity, x64 and renamed stuff
|
2013-11-14 12:22:53 +10:00 |
CVE-2010-0842
|
…
|
|
CVE-2010-1240
|
Add an R in /Info for the trailer dictionary to make it readable
|
2014-11-05 22:28:37 -06:00 |
CVE-2011-2882
|
…
|
|
CVE-2011-3400
|
…
|
|
CVE-2012-0013
|
…
|
|
CVE-2012-1535
|
Add Main.swf from 593363c
|
2013-07-29 21:53:40 -05:00 |
CVE-2012-2516
|
…
|
|
CVE-2012-4681
|
…
|
|
CVE-2013-0109
|
Final changes before PR
|
2013-12-15 01:12:49 +00:00 |
CVE-2013-0634
|
Beautify and fix both ruby an AS
|
2014-04-17 23:32:29 -05:00 |
CVE-2013-2465
|
Change directory names
|
2013-08-15 22:52:42 -05:00 |
CVE-2013-3906
|
Initial commit of CVE-2013-3906
|
2013-11-19 23:10:32 -06:00 |
CVE-2013-5045
|
Use powershell instead of mshta
|
2014-06-03 09:01:56 -05:00 |
CVE-2013-5331
|
Add module for CVE-2013-5331
|
2014-04-27 10:40:46 -05:00 |
CVE-2014-0038
|
working cve-2014-0038
|
2016-10-08 23:58:09 -04:00 |
CVE-2014-0257
|
Do test
|
2014-06-03 09:52:01 -05:00 |
CVE-2014-0322
|
Add module for CVE-2014-0322
|
2014-04-15 17:55:24 -05:00 |
CVE-2014-0497
|
Add module for CVE-2014-0497
|
2014-05-03 20:04:46 -05:00 |
CVE-2014-0515
|
Delete debug
|
2015-06-11 17:39:36 -05:00 |
CVE-2014-0556
|
Update CVE-2014-0556
|
2015-06-04 18:23:50 -05:00 |
CVE-2014-0569
|
Unset debug flag
|
2015-06-09 11:36:09 -05:00 |
CVE-2014-4113
|
Use PDWORD_PTR and DWORD_PTR
|
2014-10-31 17:35:50 -05:00 |
CVE-2014-4114/template
|
Add ppsx template
|
2014-10-16 17:55:22 -05:00 |
CVE-2014-4404
|
Change paths, add makefile and compile
|
2014-11-30 21:06:11 -06:00 |
CVE-2014-6352/template_run_as_admin
|
Add module for CVE-2014-6352
|
2014-11-12 01:10:49 -06:00 |
CVE-2014-8440
|
Make last code cleanup
|
2015-06-09 16:01:57 -05:00 |
CVE-2015-0016
|
Update DLL
|
2015-08-26 15:15:32 -05:00 |
CVE-2015-0311
|
Add more targets
|
2015-06-04 12:11:53 -05:00 |
CVE-2015-0313
|
Allow more search space
|
2015-06-10 12:26:53 -05:00 |
CVE-2015-0318
|
This seems to work
|
2015-03-13 04:43:06 -05:00 |
CVE-2015-0336
|
Add support for Windows 8.1/Firefox
|
2015-06-03 22:46:04 -05:00 |
CVE-2015-0359
|
Disable debug
|
2015-06-10 14:07:18 -05:00 |
CVE-2015-1130
|
Add Rootpipe exploit
|
2015-04-10 11:22:00 -05:00 |
CVE-2015-1701
|
Update exploit binaries for ms15-051
|
2015-06-25 09:33:15 +10:00 |
CVE-2015-2426
|
Clean template code
|
2015-09-12 13:43:05 -05:00 |
CVE-2015-3090
|
Add module for CVE-2015-3090
|
2015-06-18 12:36:14 -05:00 |
CVE-2015-3105
|
Add module for CVE-2015-3105
|
2015-06-25 13:35:01 -05:00 |
CVE-2015-3113
|
Add module for CVE-2015-3113
|
2015-07-01 13:13:57 -05:00 |
CVE-2015-3673
|
Remove sleep(), clean up WritableDir usage.
|
2015-07-05 18:59:00 -05:00 |
CVE-2015-5119
|
Update swf
|
2015-07-15 18:35:41 -05:00 |
CVE-2015-5122
|
Improve adobe_flash_opaque_background_uaf
|
2015-07-16 14:56:32 -05:00 |
CVE-2015-8103
|
Add Jenkins CLI Java serialization exploit module
|
2015-12-11 14:57:10 -06:00 |
CVE-2016-0099
|
Fix whitespace
|
2016-07-27 12:37:14 -05:00 |
CVE-2016-4997
|
binary drops work!
|
2016-09-24 21:31:00 -04:00 |
R7_2015_17
|
Add missing stream.raw for hp_sitescope_dns_tool
|
2016-03-15 11:06:06 -05:00 |
batik_svg
|
…
|
|
capcom_sys_exec
|
Add LPE exploit module for the capcom driver flaw
|
2016-09-27 22:37:45 +10:00 |
capture/http
|
File.exists? must die
|
2016-04-21 00:47:07 -04:00 |
cmdstager
|
Revert "use the new rex-exploitation gem"
|
2016-10-08 21:55:16 -05:00 |
cve-2010-0094
|
…
|
|
cve-2010-0840/vuln
|
…
|
|
cve-2010-3563
|
…
|
|
cve-2010-4452
|
…
|
|
cve-2011-3544
|
…
|
|
cve-2012-5076
|
…
|
|
cve-2012-5076_2
|
…
|
|
cve-2012-5088
|
…
|
|
cve-2013-0074
|
Small fix to interface
|
2013-11-22 17:02:08 -06:00 |
cve-2013-0422
|
…
|
|
cve-2013-0431
|
…
|
|
cve-2013-1300
|
Use signed binary
|
2014-05-02 14:45:14 +01:00 |
cve-2013-1488
|
Add module for CVE-2013-1488
|
2013-06-07 13:38:41 -05:00 |
cve-2013-1493
|
…
|
|
cve-2013-2460
|
Make fixes proposed by review and clean
|
2013-06-25 12:58:00 -05:00 |
cve-2013-3660
|
ppr_flatten_rec update, RDI submodule, and refactor
|
2013-11-27 20:44:18 +10:00 |
cve-2013-3881
|
Add binary compiled on vs2013
|
2014-02-10 13:52:27 -06:00 |
cve-2014-1610
|
Use msf branded djvu
|
2014-02-01 00:37:28 +00:00 |
cve-2016-0051
|
refactor ms16-016 code
|
2016-07-05 20:50:43 -05:00 |
cve-2016-0189
|
add exploit for cve-2016-0189
|
2016-08-01 13:26:35 -05:00 |
docx
|
…
|
|
edb-35948
|
Call CollectGarbage
|
2015-02-09 14:44:31 -06:00 |
imagemagick
|
Add popen() vuln to ImageMagick exploit
|
2016-06-02 11:35:37 -05:00 |
java_signed_applet
|
…
|
|
jre7u17
|
Added module for Java 7u17 sandboxy bypass
|
2013-04-20 01:43:13 -05:00 |
mssql
|
…
|
|
mysql
|
…
|
|
ntapphelpcachecontrol
|
Use RDL
|
2015-01-09 19:02:08 -06:00 |
osx
|
Add auto-accept to osx/enum_keychain.
|
2015-09-07 21:17:49 -05:00 |
php
|
Revert "Land #6812, remove broken OSVDB references"
|
2016-07-15 12:00:31 -05:00 |
poison_ivy_c2
|
Modifications based on suggestions by @wchen-r7
|
2016-06-08 01:17:15 +02:00 |
postgres
|
…
|
|
powershell
|
new changes
|
2015-05-19 16:18:06 +01:00 |
psnuffle
|
Retab all the things (except external/)
|
2013-09-30 13:47:53 -05:00 |
pxexploit
|
…
|
|
scripthost_uac_bypass
|
Initial working scripthost bypass uac
|
2015-08-23 20:16:15 +01:00 |
splunk
|
…
|
|
tpwn
|
Move tpwn source to external/source/exploits
|
2015-08-17 18:27:47 -05:00 |
uxss
|
Add some common UXSS scripts.
|
2014-09-09 02:31:27 -05:00 |
wifi
|
…
|
|
CVE-2007-3314.dat
|
…
|
|
CVE-2008-0320.doc
|
…
|
|
CVE-2008-5353.jar
|
…
|
|
CVE-2008-5499.swf
|
…
|
|
CVE-2009-3867.jar
|
…
|
|
CVE-2009-3869.jar
|
…
|
|
CVE-2010-0480.avi
|
…
|
|
CVE-2010-0822.xls
|
…
|
|
CVE-2010-1297.swf
|
…
|
|
CVE-2010-3275.amv
|
…
|
|
CVE-2010-3654.swf
|
…
|
|
CVE-2011-0105.xlb
|
…
|
|
CVE-2011-0257.mov
|
…
|
|
CVE-2011-0609.swf
|
…
|
|
CVE-2011-0611.swf
|
…
|
|
CVE-2011-2110.swf
|
…
|
|
CVE-2012-0507.jar
|
…
|
|
CVE-2012-0754.swf
|
…
|
|
CVE-2012-0779.swf
|
…
|
|
CVE-2012-1723.jar
|
…
|
|
CVE-2013-2171.bin
|
Fix CVE-2013-2171 with @jlee-r7 feedback
|
2013-06-25 10:40:55 -05:00 |
CVE-2014-0980.pui
|
Implemented Recommended Changes
|
2015-03-17 16:39:56 -04:00 |
CVE-2014-3153.elf
|
added built data/exploits/CVE-2014-3153.elf
|
2015-02-09 09:50:31 -06:00 |
QTJavaExploit.class
|
…
|
|
cve-2010-2883.ttf
|
…
|
|
cve-2013-0758.swf
|
Initial commit, works on three OSes, but automatic mode fails.
|
2013-05-15 23:32:02 -05:00 |
cve-2014-1761.rtf
|
MS14-017 Word RTF listoverridecount memory corruption
|
2014-04-08 14:44:20 -04:00 |
exec_payload.msi
|
…
|
|
google_proxystylesheet.xml
|
…
|
|
iceweasel_macosx.icns
|
…
|
|
iphone_libtiff.bin
|
…
|
|
modicon_ladder.apx
|
…
|
|
mp4player.as
|
…
|
|
mp4player.fla
|
…
|
|
mp4player.swf
|
…
|
|
msfJavaToolkit.jar
|
…
|
|
pricedown.eot
|
…
|
|
runcalc.hlp
|
…
|
|
s4u_persistence.xml
|
…
|
|
shockwave_rcsl.dir
|
…
|
|