Commit Graph

329 Commits

Author SHA1 Message Date
Jacob Robles dfa030c2df Use System Directory 2018-09-19 08:49:12 -05:00
Jacob Robles 83af598e6a Updated VS solution and module 2018-09-17 17:38:19 -05:00
bwatters-r7 f38e6f45ce Redo dllinjection 2018-09-14 17:47:53 -05:00
asoto-r7 4cf344dd83 WIP: Initial CVE-2018-8440 / ALPC-TaskSched-LPE 2018-09-13 18:00:20 -05:00
bwatters-r7 eab62c18c6 Update mov_ss and add mov_ss_dll 2018-07-27 09:40:34 -05:00
bwatters-r7 f33d12676f Added License, make msftidy happy, and include original cve project
readme document.
2018-07-13 10:19:41 -05:00
bwatters-r7 156b822401 First stab at cve-2018-8897 2018-07-12 17:31:53 -05:00
Brent Cook 61a98b94b6 Land #9528, WebKit apple safari trident exploit (CVE-2016-4657) 2018-06-02 21:52:52 -05:00
Tim W 2ec7f11b90 add binary 2018-05-30 18:02:17 +08:00
Tim W df60c5bb6b embed mettle within PhoenixNonce 2018-05-30 17:30:03 +08:00
bwatters-r7 ce5be387c4 Land #8795, Added CVE-2016-0040 Windows Privilege Escalation
Merge branch 'land-8795' into upstream-master
2018-05-03 16:33:53 -05:00
bwatters-r7 5a787bcce5 We don't need the application.c file 2018-05-03 15:08:42 -05:00
bwatters-r7 26f2bdbfb1 Change Platform toolset from 140 (vs2015) to 120 (vs2013) 2018-05-03 14:58:30 -05:00
bwatters-r7 c08f45223d Clean up comment typos from copy/pasta 2018-05-03 14:43:31 -05:00
Tim W 7c3e5da450 add more credits/references 2018-04-03 14:59:00 +08:00
Tim W c5039251a2 add CVE-2016-4655
rebase
2018-04-03 14:58:57 +08:00
Kirk Swidowski 34f2385b8b Merge branch 'master' of https://github.com/de7ec7ed/metasploit-framework 2018-03-07 08:20:37 -08:00
Kirk Swidowski d7cfe41983 removed files. 2018-03-07 08:20:22 -08:00
bwatters-r7 5a07be9b96 Land #9041, Add LPE on Windows using CVE-2017-8464 2017-11-08 10:09:03 -06:00
Spencer McIntyre c2578c1487 Refactor GetProcessSid to remove do while FALSE 2017-11-07 19:11:24 -05:00
Spencer McIntyre 3f6f70f820 Move the cve-2017-8464 source to external/source 2017-10-08 13:58:51 -04:00
Kirk Swidowski 2ee94ca3d9 made changes based on PR feedback. 2017-09-01 16:49:17 -07:00
Kirk Swidowski b7fc990d17 moved project to the source directory. 2017-09-01 16:09:53 -07:00
L3cr0f 6a3fc618a4 Add bypassuac_injection_winsxs.rb module 2017-06-03 12:59:50 +02:00
Brent Cook 176e88f293 Land #7835, Add Windows Local Privilege Escalation exploit stub 2017-03-08 06:20:58 -05:00
wchen-r7 3d269b46ad Support OS X for Microsoft Office macro exploit 2017-02-16 12:28:11 -06:00
wchen-r7 ccaa783a31 Add Microsoft Office Word Macro exploit 2017-02-02 17:44:55 -06:00
OJ b6e882c8eb Add a Windows LPE exploit template for x64/x86 2017-01-17 11:20:14 +10:00
OJ 32173b9701 Move execute_payload to the kernel lib 2017-01-17 11:19:26 +10:00
Brent Cook 2585c8c8b5 Land #7461, convert futex_requeue (towelroot) module to use targetting and core_loadlib 2017-01-11 13:24:25 -06:00
Tim 25a8283af3 fork early and use WfsDelay 2016-12-20 00:59:27 +08:00
Tim f1efa760df more fixes 2016-12-20 00:52:11 +08:00
Tim e6d4c0001c hide debug printing 2016-12-20 00:52:11 +08:00
Tim 7ac3859393 convert futex_requeue module to use targetting and core_loadlib 2016-12-20 00:52:11 +08:00
Tim 3afa20a1af fix double \n in printf 2016-12-13 17:02:23 +08:00
Tim fe9972cc25 fork early and use WfsDelay 2016-12-13 17:02:23 +08:00
Tim 891fccb4e2 add pattern for GT-S7392 2016-12-13 17:02:23 +08:00
Tim 07ce7f3aed fix make run 2016-12-13 17:02:23 +08:00
Tim 9ece45a180 dont exit(0) when exploit fails 2016-12-13 17:02:23 +08:00
Tim ebf7ae0739 add CVE-2013-6282, put_user/get_user exploit for Android 2016-12-13 17:02:23 +08:00
h00die 0d1fe20ae5 revamped 2016-10-15 20:57:31 -04:00
h00die 12493d5c06 moved c code to external sources 2016-10-13 20:37:03 -04:00
OJ 0e82ced082 Add LPE exploit module for the capcom driver flaw
This commit includes:

* RDI binary that abuses the SMEP bypass and userland function pointer
  invocation that is provided by the driver.
* Related metasploit module.
* Associated make.build to build from command line.
* Updated command line build file.

This also includes the beginnings of a new set of functions that help
with the management/automation of kernel-related work on Windows for
local priv esc exploits.
2016-09-27 22:37:45 +10:00
William Webb 21e6211e8d add exploit for cve-2016-0189 2016-08-01 13:26:35 -05:00
William Webb b4b3a84fa5 refactor ms16-016 code 2016-07-05 20:50:43 -05:00
dmohanty-r7 eb4611642d Add Jenkins CLI Java serialization exploit module
CVE-2015-8103
2015-12-11 14:57:10 -06:00
jvazquez-r7 2c9734f178 Add exploit source 2015-09-15 14:54:05 -05:00
jvazquez-r7 6e857568e0 Delete comments 2015-09-03 13:33:40 -05:00
jvazquez-r7 b39575928e Update reflective exploit 2015-09-03 11:01:41 -05:00
jvazquez-r7 ecf3fb61d6 Replace external source 2015-08-26 15:32:50 -05:00