jvazquez-r7
|
8d6cbf0568
|
Make adobe_flash_uncompress_zlib_af multiplatform
|
2015-05-20 18:57:37 -05:00 |
|
benpturner
|
c0b995cc97
|
new changes
|
2015-05-19 16:18:06 +01:00 |
|
benpturner
|
b513304756
|
new changes
|
2015-05-19 15:47:30 +01:00 |
|
benpturner
|
0cda746bfb
|
Updated size
|
2015-05-19 14:08:59 +01:00 |
|
benpturner
|
811c45ab90
|
new
|
2015-05-19 14:06:41 +01:00 |
|
benpturner
|
d4798a2500
|
Fix spacinG
|
2015-05-11 09:04:03 +01:00 |
|
benpturner
|
c916021fc5
|
SSL Support for Powershell Payloads
|
2015-05-10 21:45:59 +01:00 |
|
jvazquez-r7
|
51bb4b5a9b
|
Add module for CVE-2015-0359
|
2015-05-07 17:00:00 -05:00 |
|
jvazquez-r7
|
582919acac
|
Add module for CVE-2015-0336
|
2015-05-05 17:25:19 -05:00 |
|
jvazquez-r7
|
dbba466b5b
|
Add module for CVE-2014-8440
|
2015-04-29 17:52:04 -05:00 |
|
benpturner
|
76e68fcf4c
|
session info
|
2015-04-26 20:13:18 +01:00 |
|
benpturner
|
aa4dc78cba
|
updates to author comments in powershell script
|
2015-04-25 08:47:17 +01:00 |
|
benpturner
|
19aa668f99
|
updates to include reverse and bind
|
2015-04-22 20:41:19 +01:00 |
|
Meatballs
|
b0d50dc2be
|
Create our own Rex connection to the endpoint
Ensure powershell process closes when module completes
Add a windows cmd interact payload
|
2015-04-19 23:41:28 +01:00 |
|
Meatballs
|
8bd0da580d
|
Move script out of module
|
2015-04-19 21:12:44 +01:00 |
|
jvazquez-r7
|
28fac60c81
|
Add module for CVE-2015-0556
|
2015-04-15 14:08:16 -05:00 |
|
joev
|
3313dac30f
|
Land #5119, @wvu's addition of the OSX rootpipe privesc exploit.
orts
borts
|
2015-04-10 12:38:25 -05:00 |
|
William Vu
|
c4b7b32745
|
Add Rootpipe exploit
|
2015-04-10 11:22:00 -05:00 |
|
jvazquez-r7
|
91f5d0af5a
|
Add module for CVE-2014-0569
* Adobe flash, Integer overflow on casi32
|
2015-04-09 19:37:26 -05:00 |
|
jvazquez-r7
|
11c6f3fdca
|
Do reliable resolution of kernel32
|
2015-03-29 15:52:13 -05:00 |
|
jvazquez-r7
|
f84a46df63
|
Add module for CVE-2015-0313
|
2015-03-27 18:51:13 -05:00 |
|
Spencer McIntyre
|
076f15f933
|
Land #4792 @jakxx Publish It PUI file exploit
|
2015-03-18 20:59:54 -04:00 |
|
jakxx
|
085e6cc815
|
Implemented Recommended Changes
-corrected spelling error
-set only option to required
-dumped header data to included file
-Used Rex for jmp values
|
2015-03-17 16:39:56 -04:00 |
|
jvazquez-r7
|
bb81107e51
|
Land #4927, @wchen-r7's exploit for Flash PCRE CVE-2015-0318
|
2015-03-13 23:58:05 -05:00 |
|
sinn3r
|
0ee0a0da1c
|
This seems to work
|
2015-03-13 04:43:06 -05:00 |
|
sinn3r
|
0c3329f69e
|
Back on track
|
2015-03-12 15:26:55 -05:00 |
|
sinn3r
|
215c209f88
|
Land #4901, CVE-2014-0311, Flash ByteArray Uncompress UAF
|
2015-03-11 14:04:17 -05:00 |
|
sinn3r
|
43b90610b1
|
Temp
|
2015-03-11 13:53:34 -05:00 |
|
sinn3r
|
2a9d6e64e2
|
Starting point for CVE-2015-0318
|
2015-03-11 09:58:41 -05:00 |
|
jvazquez-r7
|
cb72b26874
|
Add module for CVE-2014-0311
|
2015-03-09 16:52:23 -05:00 |
|
joev
|
d7295959ca
|
Remove open-uri usage in msf.
|
2015-03-05 23:45:28 -06:00 |
|
sinn3r
|
b90639fd66
|
Land #4726, X360 Software actvx buffer overflow
|
2015-02-17 11:41:23 -06:00 |
|
jvazquez-r7
|
1f4fdb5d18
|
Update from master
|
2015-02-10 10:47:17 -06:00 |
|
jvazquez-r7
|
511f637b31
|
Call CollectGarbage
|
2015-02-09 14:44:31 -06:00 |
|
Brent Cook
|
af405eeb7d
|
Land #4287, @timwr's exploit form CVS-2014-3153
|
2015-02-09 10:33:14 -06:00 |
|
Brent Cook
|
0e4f3b0e80
|
added built data/exploits/CVE-2014-3153.elf
|
2015-02-09 09:50:31 -06:00 |
|
jvazquez-r7
|
a46a53acaf
|
Provide more space for the payload
|
2015-02-06 14:49:49 -06:00 |
|
jvazquez-r7
|
414349972f
|
Fix comment
|
2015-02-06 11:34:20 -06:00 |
|
jvazquez-r7
|
b5e230f838
|
Add javascript exploit
|
2015-02-06 11:04:59 -06:00 |
|
jvazquez-r7
|
aa7f7d4d81
|
Add DLL source code
|
2015-02-01 19:59:10 -06:00 |
|
jvazquez-r7
|
d211488e5d
|
Add Initial version
|
2015-02-01 19:47:58 -06:00 |
|
jvazquez-r7
|
f9dccda75d
|
Delete unused files
|
2015-01-22 18:00:31 -06:00 |
|
sinn3r
|
74e8e057dd
|
Use RDL
|
2015-01-09 19:02:08 -06:00 |
|
sinn3r
|
fce564cde2
|
Meh, not the debug build. Should be the release build.
|
2015-01-08 22:06:07 -06:00 |
|
sinn3r
|
14c54cbc22
|
Update DLL
|
2015-01-08 21:36:02 -06:00 |
|
sinn3r
|
d3738f0d1a
|
Add DLL
|
2015-01-08 17:17:55 -06:00 |
|
jvazquez-r7
|
7a2c9c4c0d
|
Land #4263, @jvennix-r7's OSX Mavericks root privilege escalation
* Msf module for the Ian Beer exploit
|
2014-11-30 21:13:07 -06:00 |
|
jvazquez-r7
|
7772da5e3f
|
Change paths, add makefile and compile
|
2014-11-30 21:06:11 -06:00 |
|
Meatballs
|
f5f32fac06
|
Add token fiddling from nishang
|
2014-11-28 23:02:59 +00:00 |
|
Meatballs
|
48a5123607
|
Merge remote-tracking branch 'upstream/master' into pr4233_powerdump
|
2014-11-27 20:08:11 +00:00 |
|