adfoster-r7
a81a71c5df
Run rubocop on post modules
2023-02-08 13:47:34 +00:00
Jeffrey Martin
21a6a18d92
trade URI.encode & URI.escape for Ruby 3
...
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.
Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1 ) this should equal.
2021-11-22 14:11:03 -06:00
dwelch-r7
1617b3ec9b
Use zeitwerk for lib/msf/core folder
2020-12-07 10:31:45 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
cn-kali-team
1b796aa50b
OptString to OptPort
2020-05-30 10:27:48 +08:00
dwelch-r7
fe2b3f8f29
Remove targets from post modules
2019-09-23 17:26:36 +01:00
William Vu
1b8b3bbb95
Update nc -j check in cups_root_file_read
2018-12-18 17:38:33 -06:00
h00die
a676f600d6
fixes to more modules
2017-09-30 15:45:52 -04:00
h00die
c90f885938
Finished spelling issues
2017-09-17 16:00:04 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
4720d1a31e
OCD fixes - Spaces
2017-07-14 08:46:59 +01:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
Javier Godinez
0d41160b03
Sanity checks, errors out with nil ptr if API call fails
2016-12-08 16:14:10 -08:00
Javier Godinez
a17d1a7e19
Added options for setting the PASSWORD and GROUPNAME
2016-12-08 16:13:31 -08:00
Jon Hart
aa29fcad80
Update docs and pretty print the loot
2016-12-08 14:25:07 -08:00
Jon Hart
70668c289f
Use better loot args
2016-12-08 13:14:36 -08:00
Jon Hart
162204b338
Support creating a password for the user, etc
2016-12-08 12:56:00 -08:00
Javier Godinez
a9cb08a352
Token should be passed as nil if not set
2016-12-07 10:16:41 -08:00
Jon Hart
1c3f0437ed
Move some options back to non-advanced
2016-12-06 17:39:37 -08:00
Jon Hart
a13382c80b
Address most of rubocop's nits
2016-12-06 17:10:34 -08:00
Jon Hart
8f21a1f68c
move most options to advance, since they never change
...
Also, doc empty username
2016-12-06 16:29:00 -08:00
Javier Godinez
497e02955b
Fixed checking for access keys being retrieved
2016-11-29 11:08:55 -08:00
Javier Godinez
cb0313642b
Fixed setting IAM_USERNAME
2016-11-29 00:54:49 +00:00
Javier Godinez
46ce1dfaab
Now using random string as IAM_USERNAME unless specified
2016-11-28 16:32:53 -08:00
Javier Godinez
f8789fef38
Moved METADATA_IP to advanced options
2016-11-28 16:32:26 -08:00
Javier Godinez
b4add59a3d
Moved metadata_creds() so Client can be included in Aux/Post modules
2016-11-24 21:03:38 -08:00
Javier Godinez
c48587066d
Added reference and minor fixes
2016-11-23 10:58:37 -08:00
Javier Godinez
43e1b5bdd1
Adds module to create an AWS IAM user from a pwned AWS host
2016-11-22 14:55:03 -08:00
Brent Cook
b77a910205
Land #7355 , allwinner post to local exploit conversion
2016-10-08 21:38:54 -05:00
jvoisin
2272e15ca2
Remove some anti-patterns, in the same spirit than #7372
2016-09-29 00:15:01 +02:00
h00die
cba297644e
post to local conversion
2016-09-22 22:08:24 -04:00
Brent Cook
b08d1ad8d8
Revert "Land #6812 , remove broken OSVDB references"
...
This reverts commit 2b016e0216 , reversing
changes made to 7b1d9596c7 .
2016-07-15 12:00:31 -05:00
Brent Cook
2b016e0216
Land #6812 , remove broken OSVDB references
2016-07-11 22:59:11 -05:00
William Vu
ca76e8f290
Update allwinner_backdoor report_vuln hash
2016-05-24 00:57:37 -05:00
Brent Cook
2f8562fba4
added documentation and minor style tweaks
2016-05-23 21:59:44 -05:00
h00die
4242bbdf55
change report_note to report_vuln per note
2016-05-23 17:36:50 -04:00
h00die
c621f689b2
more descriptive note per @sempervictus
2016-05-18 19:08:01 -04:00
h00die
815a2600a8
additional description
2016-05-17 22:07:33 -04:00
h00die
640e0b9ff7
working ready for pr
2016-05-17 21:58:32 -04:00
h00die
314d73546c
additional details, not working on tablet via malicious apk meterpreter
2016-05-13 23:12:44 -04:00
wchen-r7
816bc91e45
Resolve #6807 , remove all OSVDB references.
...
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.
Resolve #6807
2016-04-23 12:32:34 -05:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
f703fa21d6
Revert "change Metasploit3 class names"
...
This reverts commit 666ae14259 .
2016-03-07 13:19:55 -06:00
Christian Mehlmauer
666ae14259
change Metasploit3 class names
2016-03-07 09:56:58 +01:00
Christian Mehlmauer
de88908493
code style
2014-12-11 23:30:20 +01:00
URI Assassin
35d3bbf74d
Fix up comment splats with the correct URI
...
See the complaint on #4039 . This doesn't fix that particular
issue (it's somewhat unrelated), but does solve around
a file parsing problem reported by @void-in
2014-10-17 11:47:33 -05:00
James Lee
faf6be4529
Missed an errant require
...
Wasn't even using it anyway
2013-11-05 14:00:55 -06:00
James Lee
9e30c58495
Blow away remnants of Local::Unix
2013-11-05 13:51:45 -06:00
Tod Beardsley
23d058067a
Redo the boilerplate / splat
...
[SeeRM #8496 ]
2013-10-15 13:51:57 -05:00
Tod Beardsley
4266b88a20
Move author name to just 'joev'
...
[See #2476 ]
2013-10-07 12:50:04 -05:00