Jeffrey Martin
35017886b8
Land #13935 , Preliminary Version 6
2020-08-06 10:19:34 -05:00
h00die
41058775b3
add sharphound exe, rubocop, and final update run
2020-08-04 09:06:45 -04:00
h00die
dc5fefcb20
update sharphound and john
2020-08-04 08:48:23 -04:00
h00die
0ca7581b67
disk write method success
2020-08-03 13:08:39 -04:00
Jeffrey Martin
9aa26d1208
Merge upstream into 6.x
2020-08-03 11:43:47 -05:00
Spencer McIntyre
a886177b96
Land #13837 , Add FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation module
2020-07-29 15:40:47 -04:00
Spencer McIntyre
428ce72108
Use colon instead of em-dash and add a URL comment to the doc template
2020-07-28 08:49:57 -04:00
Spencer McIntyre
9ba9690c14
Put more information into the generated module docs
2020-07-26 13:14:16 -04:00
Brendan Coles
cbbd4fc517
Add CVE-2020-7457 exploit.c
2020-07-26 08:04:37 +00:00
Spencer McIntyre
65f9b62c52
Initial outline of module doc info template
2020-07-24 18:09:52 -04:00
gwillcox-r7
7d3653280f
Land #13848 , Add CDATA OLT telnet backdoor wordlist
2020-07-16 11:32:06 -05:00
0x44434241
703dc79710
Vim ate my trailing space for guest/[nopassword]
2020-07-16 12:50:08 +09:00
0x44434241
94b46209d9
Adding in C-Data FTTH OLT Device telnet backdoor credential pairs.
...
Further information:
- https://www.zdnet.com/article/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data/
- https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html
2020-07-16 12:38:23 +09:00
Jeffrey Martin
65039a5091
Merge upstream into 6.x
2020-07-15 09:58:07 -05:00
Spencer McIntyre
6f153688ff
Add labels to shuffled assembly source code for post-processing
2020-07-08 14:39:00 -04:00
Spencer McIntyre
cfae4c76d0
Shuffle the block API source code every time
2020-07-07 15:55:32 -04:00
gwillcox-r7
586971428a
Recompile everything so we don't have the messagebox calls
2020-06-11 00:18:45 -05:00
gwillcox-r7
93b28e662e
Change out template_dll solution files so that it generates the DLL with the correct name and in the correct location
2020-06-10 11:41:34 -05:00
gwillcox-r7
7711cecee9
Final tweaks to make this more reliable, should be good now
2020-06-10 11:02:53 -05:00
gwillcox-r7
4a9c878132
Finally fix up the hanging issue via new template DLLs and associated code
2020-06-10 11:02:53 -05:00
gwillcox-r7
cb20eaf6f9
Finally fix the issue with the cleanup of the files within the exploit
2020-06-10 11:02:51 -05:00
gwillcox-r7
401feb3e53
Change code so that we automatically exit Notepad upon DLL completing its work. Should help tidy things up more
2020-06-10 11:02:50 -05:00
gwillcox-r7
cf17b2065c
Updated module with some output corrections, recompiled DLLs
2020-06-10 11:02:50 -05:00
gwillcox-r7
ae2b40bf99
Update the output of the module to be more correct. Also upload updated DLLs
2020-06-10 11:02:49 -05:00
gwillcox-r7
1607b8c342
Add initial files for CVE-2020-0787
2020-06-10 11:02:35 -05:00
Shelby Pace
c8ab30a40a
add poc code
2020-06-02 14:29:02 -05:00
William Vu
8473662e32
Land #13463 , Oracle WebLogic CVE-2020-2555 exploit
2020-05-20 23:21:07 -05:00
Brendan Coles
8631babcbb
Update CVE-2019-13272 pre-compiled exploit
2020-05-11 13:36:41 +00:00
Brendan Coles
dbc2b8b006
Update CVE-2019-13272 exploit C code to prefer auto targeting
...
Previously, the exploit would attempt to use a hardcoded list of
known useful helpers and fall back to automatic targeting. This
logic has been reversed, preferring automatic targeting first.
2020-05-09 03:59:31 +00:00
Spencer McIntyre
9769e04b6e
Land #13322 , CVE-2020-0668 Service tracing file junction overwrite
2020-05-07 09:47:20 -04:00
gwillcox-r7
a1275845ec
Land #13200 , CVE-2019-0808 LPE for Windows 7 x86 SP0 and SP1
2020-05-06 17:23:52 -05:00
gwillcox-r7
1c79674620
Recompile DLL and alter vcxproj file to automatically place generated DLL in right folder
2020-05-06 16:33:01 -05:00
Alan Foster
cd3725cd3d
Land #13388 , Updates for SAP ICM paths
2020-05-06 14:07:22 +01:00
Shelby Pace
587fc0ff09
add PoC
2020-05-04 11:08:38 -05:00
Brent Cook
0bca86b10d
add new paths from Joris van de Vis
2020-05-04 06:27:02 -05:00
Brent Cook
0622eff907
remove duplicates
2020-05-04 06:23:55 -05:00
Brent Cook
caf863b380
sort and normalize list
2020-05-04 06:15:11 -05:00
bwatters-r7
a0213a13f0
Land #13279 , Some fix for rubocop verification
...
Merge branch 'land-13279' into upstream-master
2020-05-01 13:49:14 -05:00
bwatters-r7
686c2f09a1
Land #13290 , Cve-2014-2630 HP xglance-bin linux priv esc
...
Merge branch 'land-13290' into upstream-master
2020-05-01 10:18:21 -05:00
Tim W
b8dc843b48
add binary
2020-05-01 19:02:54 +08:00
L
645a4c6d26
Remove ysoserial JRMPClient && JRMPListener payload
2020-04-27 10:50:09 -05:00
L
7dc1b8afb4
Update data/ysoserial_payloads.json
2020-04-27 10:50:09 -05:00
Tim W
bba9b76d25
fix infinite loop in find_macho
...
fix osx loader to work within python macho
2020-04-24 15:13:57 +08:00
bwatters-r7
7213d379ec
Add Uso dll
2020-04-23 15:18:22 -05:00
bwatters-r7
0bbb822fe4
Working through mountpoint issues
2020-04-21 09:54:45 -05:00
b4rtik
9be3f1d751
Code cleanup
2020-04-21 00:12:47 +02:00
b4rtik
d1a8ac072a
Fix Amsi and Etw patching
2020-04-20 23:52:19 +02:00
h00die
e1f1ad45bc
working exploit
2020-04-19 15:19:19 -04:00
h00die
58074dc6bb
waiting on metasm question
2020-04-18 20:26:45 -04:00
bwatters-r7
b9e83bd055
Update VS build destination
2020-04-13 18:20:20 -05:00