sfewer-r7
|
1a8e88c054
|
fix a typo with the use of CVE-2025-55102, it should be CVE-2025-55182
|
2025-12-09 09:05:59 +00:00 |
|
Brendan
|
caa672231b
|
Merge pull request #20736 from sfewer-r7/fortiweb-exploit-rce-v6-support
Update the FortiWeb exploit module (CVE-2025-64446 + CVE-2025-58034) to target older unsupported versions 6.x
|
2025-12-08 17:43:49 -06:00 |
|
jheysel-r7
|
66279422d1
|
Merge pull request #20747 from vognik/2025-55182
Add CVE-2025-55182 / CVE-2025-66478
|
2025-12-08 13:41:49 -08:00 |
|
vognik
|
bdd7cb5365
|
upgraded payload
|
2025-12-08 01:32:43 -08:00 |
|
vognik
|
1dde12b483
|
fix naming errors
|
2025-12-06 02:53:38 -08:00 |
|
vognik
|
38682b5ed6
|
refactoring
|
2025-12-05 14:58:59 -08:00 |
|
vognik
|
88309b5a4a
|
add suggestions from @Chocapikk
|
2025-12-05 08:02:56 -08:00 |
|
vognik
|
baa0a11492
|
small fixes
|
2025-12-05 00:11:44 -08:00 |
|
vognik
|
770e63b0d1
|
add windows documentation
|
2025-12-05 00:06:58 -08:00 |
|
vognik
|
e51ea0ae23
|
improve documentation
|
2025-12-04 23:03:13 -08:00 |
|
vognik
|
f71a71ab18
|
add exploit mvp
|
2025-12-04 22:16:27 -08:00 |
|
Diego Ledda
|
4d52e22480
|
Merge pull request #20720 from Chocapikk/wp-ai-engine
Add WordPress AI Engine MCP RCE exploit (CVE-2025-11749)
|
2025-12-04 12:56:04 +01:00 |
|
Valentin Lobstein
|
296e931b7d
|
Fix WordPress lab permissions in documentation
|
2025-12-04 01:39:25 +01:00 |
|
SaiSakthidar
|
98dd33a3cd
|
Remove CAIN
|
2025-12-03 15:42:57 -05:00 |
|
sfewer-r7
|
795c38c524
|
Combine the 7.x and 6.x targets together, as Linux payloads work on 7.x also, so this target is Unix and Linux. This leaves the 8.x target Unix only due to IMA appraisal.
|
2025-11-28 10:12:02 +00:00 |
|
sfewer-r7
|
014312873c
|
get both unix and linux payloads working on 6.x. Add a note to the docs about setting a gateway.
|
2025-11-27 20:28:44 +00:00 |
|
msutovsky-r7
|
b6330acb12
|
Land #20718, adds module for Monsta FTP RCE (CVE-2025-34299)
Add Monsta FTP downloadFile RCE (CVE-2025-34299)
|
2025-11-27 15:16:58 +01:00 |
|
sfewer-r7
|
f5e8aa83be
|
add in exploit support for FortiWeb versions 6.x which are vulnerable, but no longer under support from the vendor.
|
2025-11-27 12:43:19 +00:00 |
|
Brendan
|
e998b91aee
|
Merge pull request #20717 from sfewer-r7/fortiweb-exploit-rce
Add exploit module for Fortinet FortiWeb (CVE-2025-64446 + CVE-2025-58034)
|
2025-11-25 14:14:31 -06:00 |
|
Brendan
|
1912fe2a95
|
Merge pull request #20702 from Zedeldi/igel-os-modules
IGEL OS modules
|
2025-11-25 13:59:44 -06:00 |
|
sfewer-r7
|
fa03ac8b66
|
on 7.4.8 the command nohup is not available. we must execute our payload in a new session, so we use a python stub to essentially call setsid. This has been tested to work on both 8.0.1 and 7.4.8. Teh payload cmd/unix/reverse_python isnot working as it previously was, so I am removing from the list of confirmed paylaods. The other two, cmd/unix/reverse_bash and cmd/unix/reverse_openssl work fine on both versions
|
2025-11-25 11:25:41 +00:00 |
|
Zedeldi
|
4b2798f357
|
Correct vulnerable version information
|
2025-11-24 17:10:51 +00:00 |
|
Zedeldi
|
ce926fd3d1
|
Update vulnerable IGEL OS version to < 11.09.310
|
2025-11-24 11:57:18 +00:00 |
|
Zedeldi
|
933fb7bdf1
|
Add clean-up information
|
2025-11-24 11:43:46 +00:00 |
|
Zedeldi
|
002795c5be
|
Update module information in documentation
|
2025-11-24 11:24:23 +00:00 |
|
Valentin Lobstein
|
080230edd0
|
Add WordPress AI Engine MCP RCE exploit (CVE-2025-11749)
|
2025-11-23 03:56:11 +01:00 |
|
Brendan
|
21777b8969
|
Merge pull request #20685 from msutovsky-r7/persistence/windows/notepad++_persistence
Adds notepad++ persistence module for Windows
|
2025-11-21 14:28:28 -06:00 |
|
msutovsky-r7
|
8f2525aba7
|
Land #20705, adds modules for Flowise RCEs (CVE-2025-59528, CVE-2025-8943)
Add Flowise RCE exploits (CVE-2025-59528, CVE-2025-8943)
|
2025-11-21 21:20:22 +01:00 |
|
Valentin Lobstein
|
8cffe50470
|
Add Monsta FTP downloadFile RCE (CVE-2025-34299)
|
2025-11-21 20:43:37 +01:00 |
|
Zedeldi
|
b13137886a
|
Add IGEL OS and vulnerability summary to documentation
|
2025-11-21 13:09:28 +00:00 |
|
sfewer-r7
|
aff76622fa
|
add in the unauth RCE exploit module for CVE-2025-64446 + CVE-2025-58034
|
2025-11-21 12:22:25 +00:00 |
|
msutovsky-r7
|
e2097ee1bc
|
Land #20701, adds windows WSL registry persistence module
Windows WSL registry persistence
|
2025-11-20 15:15:22 +01:00 |
|
Valentin Lobstein
|
6ab2452153
|
Fix documentation inconsistency: update ports for Flowise 3.0.1 (3005) and add Basic Auth service example
|
2025-11-19 22:58:27 +01:00 |
|
Valentin Lobstein
|
8fbbc3e043
|
Update flowise_custommcp_rce documentation: add Basic Auth testing scenario
|
2025-11-19 22:24:28 +01:00 |
|
Valentin Lobstein
|
44cf2e309f
|
Add Flowise RCE exploits (CVE-2025-59528, CVE-2025-8943) with shared mixin, documentation, and Docker Compose setup
|
2025-11-19 22:12:49 +01:00 |
|
Valentin Lobstein
|
df1c157471
|
Improve Flowise CustomMCP RCE exploit stability with Basic Auth support and HTTP response validation
|
2025-11-19 20:12:31 +01:00 |
|
Valentin Lobstein
|
b26c4f5c7b
|
Add Flowise Custom MCP RCE exploit (CVE-2025-8943)
|
2025-11-18 22:25:39 +01:00 |
|
Valentin Lobstein
|
88aadcc856
|
Add Flowise Custom MCP RCE exploit (CVE-2025-8943)
|
2025-11-18 22:03:59 +01:00 |
|
h00die
|
a0222d0783
|
rework windows service persistence
|
2025-11-17 19:02:53 -05:00 |
|
h00die
|
92e1720ad5
|
fix docs
|
2025-11-17 19:02:53 -05:00 |
|
h00die
|
450e1df340
|
windows service now with persistence mixin
|
2025-11-17 19:02:50 -05:00 |
|
Zedeldi
|
c6db0d4285
|
Move IGEL OS persistence module to linux/persistence
|
2025-11-17 18:42:28 +00:00 |
|
Zedeldi
|
c37f7872a3
|
Add documentation for IGEL OS modules
|
2025-11-17 16:33:15 +00:00 |
|
h00die
|
e3560e43cf
|
windows wsl registry persistence
|
2025-11-16 08:35:44 -05:00 |
|
Martin Sutovsky
|
58eec7d319
|
Adds docs
|
2025-11-12 16:28:54 +01:00 |
|
Diego Ledda
|
c007d3a89f
|
Merge pull request #20674 from msutovsky-r7/exploit/win/cve-2025-59287
Adds module for unauthenticated deserialization in WSUS (CVE-2025-59287)
|
2025-11-12 12:40:32 +01:00 |
|
Diego Ledda
|
29088b4712
|
Merge pull request #20576 from msutovsky-r7/modules/persistence/linqpad_deserialization
Moves LINQPad module into persistence category
|
2025-11-11 16:41:12 +01:00 |
|
Martin Sutovsky
|
6aeb81a499
|
Adds MITRE reference, updates docs
|
2025-11-10 18:32:13 +01:00 |
|
Martin Sutovsky
|
2cbf32ce40
|
Adds documentation base
|
2025-11-10 12:27:13 +01:00 |
|
h00die
|
b646e0e044
|
docs editing for consistency
|
2025-11-07 15:42:27 -05:00 |
|