h00die
c904b9d2f2
scenario to scenarios
2020-01-16 10:36:38 -05:00
h00die
c4d6feb0aa
Land #12721 , windows post module docs
2020-01-16 08:50:19 -05:00
h00die
9e1bc8afae
doc updates
2020-01-16 08:48:31 -05:00
Spencer McIntyre
033a0d1868
Land #12782 , add the Plantronics LPE module
2020-01-15 11:17:41 -05:00
h00die
fa73709b3e
documentation standardization
2020-01-14 21:02:53 -05:00
Shelby Pace
429329c45d
Land #12801 , add WePresent cmd injection module
2020-01-14 08:29:40 -06:00
Jacob Baines
0308f76bbd
Switched to vars_post in send_request_cgi and removed unnecessary documentation
2020-01-14 05:42:06 -05:00
William Vu
5c4189fdb4
Move unix/webapp/webmin_backdoor to linux/http
2020-01-14 00:50:04 -06:00
William Vu
4cbbe23b11
Improve wording in doc
2020-01-13 21:02:56 -06:00
William Vu
b4550933bb
Update module doc
2020-01-13 20:51:58 -06:00
William Vu
a45821b706
Rename module
2020-01-13 20:25:07 -06:00
William Vu
b4a08503f8
Merge remote-tracking branch 'upstream/master' into pr/12816
2020-01-13 20:25:00 -06:00
William Vu
99235c729f
Clean up module doc
2020-01-13 18:05:42 -06:00
William Vu
3354e69c47
Improve smb.conf check and add PATH option
2020-01-13 17:52:14 -06:00
William Vu
332afe89af
Update module doc
2020-01-13 16:45:44 -06:00
kalba-security
c30cd8e0cc
Add documentation
2020-01-14 00:31:44 +02:00
secenv
eaddce910f
Documentation for dlink_dir859_subscribe_exec
2020-01-13 13:27:42 -03:00
RAMELLA Sébastien
5d3ad626e6
add. documentation
2020-01-13 18:22:09 +04:00
Nicholas Starke
8593f68c14
Adding Cable Haunt WebSocket DoS Module
...
This module exploits a vulnerability in Sagecom
Cable Modems from a variety of manufacturers. Since
the firmware for vulnerable modems will vary based
on Make, Model, and ISP, this module can only be
used to verify the presence of the vulnerability,
and not actually return a shell. Successful
exploitation will most likely disrupt all upstream
services. Module documentation is included in this
commit.
2020-01-12 19:56:42 -06:00
bluesentinelsec
7eeb8c33eb
Added new post exploitation module: 'Install OpenSSH for Windows'
2020-01-09 19:58:31 -05:00
Jacob Baines
caa02c7d2e
Added exploit module for CVE-2019-3929
2020-01-09 08:03:52 -05:00
Nicholas Starke
ce09435d82
Fixing module documentation
2020-01-05 10:03:24 -06:00
h00die
f822a13926
update rds docs
2020-01-04 12:47:36 -05:00
Brendan Coles
b3e9d9aee9
Add Plantronics Hub SpokesUpdateService Privilege Escalation
2020-01-03 20:13:27 +00:00
Dhiraj Mishra
e23c67d129
tvt_nvms_traversal.md
2020-01-01 15:34:04 +05:30
ide0x90
44489f0326
Using heredoc, streamlined check for PowerShell, improved docs.
2019-12-29 12:00:50 +08:00
Brent Cook
e8cd136e56
Land #12712 , add OpenBSD Dynamic Loader chpass privesc
2019-12-27 03:56:02 -06:00
Brent Cook
8061cdf974
Land #12760 , improvements to linux/local/bpf_priv_esc module
2019-12-26 13:43:54 -06:00
Brent Cook
4de482f57a
Land #12433 , add Metasploit reverse_http handler DoS module
2019-12-26 13:40:14 -06:00
Brent Cook
d87f752591
add module docs
2019-12-26 13:31:38 -06:00
Brendan Coles
a7b63557db
Notify operator that cleanup of crontab is required
2019-12-26 16:21:44 +00:00
ide0x90
046d8cbedc
REALLY added documentation.
...
Made module work with base64.
Cleaned up template as per @acammack-r7 's suggestions.
2019-12-26 23:35:34 +08:00
Nicholas Starke
13cadbf3f1
Adding DLINK DWL-2600 Command Injection Module
...
This module takes advantage of a previously discovered command injection
vulnerability in DLINK DWL-2600 WiFi Access points. This vulnerability
is authenticated, and the module is responsible for retrieving a valid
authentication token.
2019-12-24 12:31:49 -06:00
h00die
4f8382fc98
Land #12744 , rds lpe updates and improvements
2019-12-22 10:21:03 -05:00
h00die
4e1e8d344f
rds reliability, stability notes
2019-12-22 10:20:00 -05:00
Brendan Coles
4c0fc3a505
Add OpenBSD Dynamic Loader chpass Privilege Escalation (CVE-2019-19726)
2019-12-22 08:46:43 +00:00
h00die
7a027216cc
Land #12701 linux priv esc on reptile_cmd rootkit
2019-12-21 15:50:07 -05:00
h00die
155a2eb74a
Land #12707 , more module docs
2019-12-21 07:15:10 -05:00
h00die
6b746e332f
module doc formatting
2019-12-21 07:14:25 -05:00
Shelby Pace
894927d960
Land #12693 , add Comahawk privilege escalation
2019-12-18 15:40:51 -06:00
Brendan Coles
fce750147c
Update documentation
2019-12-18 20:46:25 +00:00
Brendan Coles
af462ffb0d
Move documentation
2019-12-18 20:36:14 +00:00
bwatters-r7
f9fbe96145
more bcoles suggestions
2019-12-18 14:25:43 -06:00
Kenneth LaCroix
d8c93b9e18
Update enum_logged_on_users.md
2019-12-17 20:50:07 -07:00
Kenneth LaCroix
473dcd5359
Create phish_windows_credentials.md
2019-12-17 18:55:45 -07:00
Brent Cook
e1e668d7da
Land #12651 , add OpenMRS deserialization exploit
2019-12-16 11:31:24 -06:00
Christophe De La Fuente
42a60034f2
Land #12725 , Bash profile persistence module
2019-12-16 09:19:08 +01:00
Kenneth LaCroix
ba25cb3b31
Update enum_patches.md
2019-12-15 16:46:55 -07:00
Kenneth LaCroix
4b221a497e
OS
2019-12-15 16:45:57 -07:00
h00die
eb8814d5fe
Land #12697 , module docs
2019-12-15 06:25:44 -05:00