h00die
547ab00a0e
review comments
2022-09-27 14:51:03 -04:00
h00die
bd586962e3
add check method
2022-09-26 17:51:07 -04:00
h00die
acba21a899
mobile mouse server exploit
2022-09-26 15:56:06 -04:00
h00die
61f576d3e1
mobile mouse server exploit
2022-09-26 15:45:42 -04:00
Grant Willcox
0908006466
Land #16985 , wifi mouse rce - CVE-2022-3218
2022-09-23 14:46:49 -05:00
Grant Willcox
828cdb8862
Fix a typo
2022-09-23 14:20:18 -05:00
Grant Willcox
b62f163696
Update documentation on module and exploit a little more to make things a bit clearer
2022-09-23 14:08:18 -05:00
h00die
32402c0e6d
wifi mouse doc updates
2022-09-21 16:35:08 -04:00
h00die
9e6c172dd4
unified remote review
2022-09-20 16:44:05 -04:00
h00die
5c35a8d3fd
remove bad ref
2022-09-19 16:07:52 -04:00
h00die
7fe4f282e4
add cve
2022-09-18 19:03:54 -04:00
h00die
271171f6d2
unified now with invisible feature
2022-09-18 19:02:59 -04:00
h00die
bf1ebe19a6
cve for wifi mouse
2022-09-15 15:12:35 -04:00
h00die
59d79e3149
review comments for unified remote
2022-09-14 16:52:58 -04:00
h00die
803fff9003
wifi remote remove unused code
2022-09-09 06:06:52 -04:00
h00die
66bbe98f5f
wifi remote with better cmd stagers
2022-09-09 05:57:36 -04:00
h00die
ae91cfa9c5
unified_remote exploit
2022-09-08 17:09:31 -04:00
h00die
c7b8ec7511
unified_remote exploit
2022-09-06 21:44:59 -04:00
h00die
3f7e0667f6
wifi mouse rce
2022-09-05 08:16:49 -04:00
bcoles
bbbec267b6
exploits: Set tftphost option for modules which use Windows TFTP stager
2022-06-29 19:10:52 +10:00
Spencer McIntyre
19a9ff1198
Update a couple of modules for the new SMB server
2022-05-16 14:39:45 -04:00
Grant Willcox
bba40bcd21
Add in fixes from code review
2022-04-04 12:05:21 -05:00
Grant Willcox
7e5123cd24
Add initial code from Hajap Zairy Al-Sharif
2022-04-04 11:56:14 -05:00
h00die
d5ba1afbec
fix URLs not resolving
...
fix URLs not resolving
add csv export to references
fix URLs not resolving
pdf not pd
missed a url change
remove extra recirectedfrom fields
remove extra file
fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
darrenmartyn
604361b59d
Update hp_dataprotector_cmd_exec.rb
...
64 bit payloads
2022-02-15 18:03:13 +00:00
adfoster-r7
059e39a6f0
Specify meterpreter compatibility command requirements
2021-09-08 22:59:25 +01:00
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
Alan Foster
5b3fde7735
Rubocop recently landed modules
2021-02-16 15:08:08 +00:00
Brendan Coles
a1c316c679
msftidy: Fix exploit module checks for author and stack buffer overflow
2021-02-13 04:10:13 +00:00
CSharperMantle
d99c2ac783
linguistic fixes of 'does not exists'
2020-12-23 11:36:38 +08:00
dwelch-r7
1617b3ec9b
Use zeitwerk for lib/msf/core folder
2020-12-07 10:31:45 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
William Vu
a6f7c0c0de
Backport miscellaneous fixes to my modules
2020-08-14 13:40:23 -05:00
Adam Galway
1a2bf98222
creates standard elog & updates exisiting usages
2020-06-22 12:48:39 +01:00
Alan Foster
6007e13379
Fix edgecase in rubocop module description rule
2020-06-10 12:11:49 +01:00
Brendan Coles
ad05cf7870
Update TinyIdentD 2.2 Stack Buffer Overflow module
2020-05-23 04:43:44 +00:00
William Vu
0bcc473ded
Rename option to HOSTINFO_NAME and update doc
2020-05-01 12:59:01 -05:00
William Vu
c27269105e
Rename CmdStager to psh_invokewebrequest
2020-05-01 12:31:53 -05:00
William Vu
1364b08c4f
Make host info name configurable as an option
...
Though it has to be recognized by the server.
2020-05-01 12:19:12 -05:00
William Vu
96f802585a
Update dropper payload to stageless
...
We're using Invoke-WebRequest now. Or anything similar.
2020-05-01 12:19:12 -05:00
William Vu
9adaa08ddd
Use new PowerShell Invoke-WebRequest CmdStager
2020-05-01 12:19:12 -05:00
William Vu
9bfecbc2aa
Print the responses if found but don't bail
...
The responses aren't always in sync, causing unexpected failures.
2020-05-01 12:19:12 -05:00
William Vu
bb034acd7c
Note reason for SERVICE_RESOURCE_LOSS
2020-05-01 12:19:12 -05:00
William Vu
309475259a
Remove doubled-up command prefix from dropper
...
The library prefixes "cmd /c" automatically.
2020-05-01 12:19:12 -05:00
William Vu
84061881b8
Clarify module description
2020-05-01 12:19:12 -05:00
William Vu
9d601b50c2
Note how we trigger the deserialization vuln
2020-05-01 12:19:12 -05:00
William Vu
efab4f04f7
Add Veeam ONE Agent .NET deserialization exploit
2020-05-01 12:19:12 -05:00
Alan Foster
3a046f01da
Run rubocop -a on subset of files
2020-03-06 10:41:45 +00:00
Alan Foster
6bac1ec2aa
Remove executable flags from exploit files
2020-02-26 10:39:50 +00:00
William Vu
4fa3b25788
Correct language in crosschex_device_bof
2020-02-18 23:18:45 -06:00