metasploit-framework/modules/exploits/linux/local
jvoisin b46073b34a Replace `cat` with Ruby's `read_file`
Thanks to wvu-r7 for the comment
2016-09-28 23:22:19 +02:00
..
cron_persistence.rb fixes round 2 2016-07-15 08:44:39 -04:00
desktop_privilege_escalation.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
docker_daemon_privilege_escalation.rb Add missing DefaultTarget to Docker exploit 2016-09-16 13:09:00 -05:00
hp_smhstart.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
kloxo_lxsuexec.rb Remove the `cat $FILE | grep $PATTERN` anti-pattern 2016-09-28 13:41:25 +02:00
netfilter_priv_esc.rb Replace `cat` with Ruby's `read_file` 2016-09-28 23:22:19 +02:00
pkexec.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
service_persistence.rb updates round 2 2016-07-15 09:02:23 -04:00
sock_sendpage.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
sophos_wpa_clear_keys.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
udev_netlink.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
vmware_mount.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
zpanel_zsudo.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00