h00die
d8c73f6684
replace bold options with h3
2025-11-07 15:42:23 -05:00
bcoles
a7ab23d083
Add Malicious XDG Desktop File module
2025-08-04 19:23:02 +10:00
cgranleese-r7
adff497bd2
Updates msf5 as well
2025-07-17 11:51:29 +01:00
cgranleese-r7
469f102596
Updates docs to reflect new default prompt
2025-07-17 09:53:40 +01:00
Christophe De La Fuente
e9c511c979
Add documentation and some updates
2024-07-16 16:34:28 +02:00
Jack Heysel
27f5ad8e05
Land #18996 , VSCode Malicious Ext module
...
This PR adds a new exploit that creates a malicious vsix file. a vsix
file is a VS and VSCode extension file. Once installed, the users
computer will call back with a shell. Its not a bug, its a feature!
2024-04-18 18:10:46 -07:00
h00die
bae1a2e20f
gitlens review
2024-04-17 16:06:32 -04:00
h00die
eb26b0adcc
gitlens exploit module
2024-03-22 16:22:39 -04:00
h00die
83944f7070
vsix deployment module
2024-03-22 16:14:51 -04:00
Grant Willcox
0ec99c03f9
Clean up documentation formatting a little bit
2021-01-22 14:27:57 -06:00
Grant Willcox
95d3bd98ac
Do msftidy_docs and rubocop changes
2021-01-15 18:10:23 -06:00
Grant Willcox
2f0abe4900
Add in documentation and fix up small issues with module
2021-01-15 18:06:07 -06:00
William Vu
ade9c23772
Don't be lazy and spell out "introduction" in docs
...
This was unfortunately my doing, and then people copied me.
2019-09-30 16:58:00 -05:00
Wei Chen
5e65685167
Update documentation for zip slip
2019-09-09 12:00:05 -05:00
Load
6b4acbc3ac
Updates scenarios
2019-08-18 15:14:37 +02:00
Load
7e44194251
References next CVE with global events
2019-08-16 12:54:01 +02:00
LoadLow
2432104a8d
Update libreoffice_logo_exec.md
2019-08-03 06:24:04 +02:00
LoadLow
41822c0c1e
Update libreoffice_logo_exec.md
2019-08-03 06:15:19 +02:00
LoadLow
c3b6e33f2e
Adds suggested modifications
2019-08-03 06:10:11 +02:00
Load
ee6c4a906a
Update libreoffice_logo_exec documentation
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-08-03 05:53:40 +02:00
Load
dbced012ef
Update libreoffice_logo_exec documentation
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-08-03 05:53:29 +02:00
Load
5e2463c5d4
Update libreoffice_logo_exec documentation
...
Co-Authored-By: Carter Brainerd <0xCB@protonmail.com >
2019-08-03 05:51:50 +02:00
Load
009e2afcfa
Update libreoffice_logo_exec documentation
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-08-03 05:51:30 +02:00
LoadLow
97589e534e
Updates documentation for libreoffice_logo_exec
2019-07-30 23:37:06 +02:00
LoadLow
b2dcaf6c4a
Adds documentation for libreoffice_logo_exec
2019-07-30 23:34:54 +02:00
Shelby Pace
d0c29e7b1e
mention needed handler in usage instructions
2019-04-15 08:47:13 -05:00
Shelby Pace
8dc8a18d2b
added documentation and changes for module
2019-04-15 08:26:11 -05:00
Shelby Pace
da0c0d7d3f
added most of documentation
2019-04-12 14:01:29 -05:00
Brendan Coles
46230efcd8
Update documentation
2019-02-03 06:18:18 +00:00
Brendan Coles
9c3368f325
Add Evince CBT File Command Injection module
2019-02-03 05:38:56 +00:00
William Vu
f34146b288
Add module doc
2018-09-05 19:57:15 -05:00
Carter Brainerd (thecarterb)
b51ecda9d6
Fix CUSTOMTEMPLATE option format
2018-02-02 14:27:09 -05:00
wchen-r7
ee13195760
Update office_word_macro exploit to support template injection
2017-05-25 15:53:45 -05:00
William Vu
bf47ac2fa9
chmod -x a couple module docs
...
Hat tip @bcoles.
2017-02-22 23:43:54 -06:00
wchen-r7
056313e411
Update doc
2017-02-16 12:49:29 -06:00
wchen-r7
7ec5ec6442
Update doc
2017-02-16 12:39:24 -06:00
wchen-r7
34f074441d
Move doc
2017-02-16 12:33:05 -06:00
Scott Lee Davis
c2b4e22b46
updated with discovered changes from k kali & documentation update changes requested.
2016-06-27 01:53:20 -04:00
Scott Davis
5e1b7d8c0f
even more clean up.
2016-06-23 14:59:11 -07:00
Scott Davis
63d8787101
added back (new) usage examples for nodejs,java,ruby,php.
2016-06-23 14:56:46 -07:00
Tod Beardsley
ff741fbc35
Rename for docs
2016-06-23 14:53:49 -05:00
Tod Beardsley
92522138c5
Remove the RC files
2016-06-23 14:52:23 -05:00
Scott Lee Davis
fbd0bc4308
updated as per @egypt & @todb-r7 recommendations.
2016-06-23 11:41:54 -04:00
Scott Davis
47e4321424
CVE-2016-5641
2016-06-23 06:09:37 -07:00