wchen-r7
|
d6565a9aee
|
Merge branch 'bes_flash' into bapv2_flash_test
|
2015-07-14 00:34:54 -05:00 |
|
jvazquez-r7
|
b72ba7f51c
|
Add AS2 flash detection code
|
2015-07-13 18:26:02 -05:00 |
|
jvazquez-r7
|
8fb6bedd94
|
Delete as3 detecotr
|
2015-07-13 18:23:39 -05:00 |
|
jvazquez-r7
|
9116460cb0
|
Add prototype with AS3
|
2015-07-13 16:33:55 -05:00 |
|
jvazquez-r7
|
299978d0e2
|
Put again old exploiter
|
2015-07-11 00:36:32 -05:00 |
|
jvazquez-r7
|
63005a3b92
|
Add module for flash CVE-2015-5122
* Just a fast port for the exploit leaked
* Just tested on win7sp1 / IE11
|
2015-07-11 00:28:55 -05:00 |
|
Tod Beardsley
|
3d630de353
|
Replace with a real CVE number
|
2015-07-07 14:44:12 -05:00 |
|
wchen-r7
|
2cdaace42f
|
Land #5678, Land adobe_flash_hacking_team_uaf.r
|
2015-07-07 12:34:59 -05:00 |
|
jvazquez-r7
|
d9aacf2d41
|
Add module for hacking team flash exploit
|
2015-07-07 11:19:48 -05:00 |
|
Mo Sadek
|
9e2e64bba1
|
Land #5644, Windows 10 Detection for os.js
|
2015-07-06 16:19:06 -05:00 |
|
wchen-r7
|
482247771d
|
Add a fingerprint for Windows 10 + IE11
|
2015-07-01 18:06:25 -05:00 |
|
wchen-r7
|
cd688437ac
|
Add support for Windows 10 for os.js
Resolves #4248
|
2015-07-01 15:02:22 -05:00 |
|
jvazquez-r7
|
1de94a6865
|
Add module for CVE-2015-3113
|
2015-07-01 13:13:57 -05:00 |
|
jvazquez-r7
|
ee0377ca16
|
Add module for CVE-2015-3105
|
2015-06-25 13:35:01 -05:00 |
|
OJ
|
ae41f2bfa0
|
Update exploit binaries for ms15-051
|
2015-06-25 09:33:15 +10:00 |
|
Brent Cook
|
e75287875b
|
hack android-specific commands back to life
|
2015-06-22 20:41:58 -05:00 |
|
OJ
|
3686accadd
|
Merge branch 'upstream/master' into cve-2015-1701
|
2015-06-22 07:52:17 +10:00 |
|
jvazquez-r7
|
04901baab8
|
Land #5572 @todb-r7's adds snowden's password to unix_passwords.txt
|
2015-06-19 17:01:22 -05:00 |
|
Tod Beardsley
|
b580f93c22
|
New password from Snowden
|
2015-06-19 15:37:48 -05:00 |
|
jvazquez-r7
|
d116f1efd5
|
Land #5566, @wchen-r7 fixes #5565 modifying os.js
|
2015-06-19 11:07:00 -05:00 |
|
wchen-r7
|
308cad8c40
|
Fix #5565, Fix os.js service pack detection
Fix #5565
|
2015-06-18 18:51:16 -05:00 |
|
jvazquez-r7
|
de1542e589
|
Add module for CVE-2015-3090
|
2015-06-18 12:36:14 -05:00 |
|
wchen-r7
|
17b8ddc68a
|
Land #5524, adobe_flash_pixel_bender_bof in flash renderer
|
2015-06-15 02:42:16 -05:00 |
|
jvazquez-r7
|
72672fc8f7
|
Delete debug
|
2015-06-11 17:39:36 -05:00 |
|
jvazquez-r7
|
8ed13b1d1b
|
Add linux support for CVE-2014-0515
|
2015-06-11 16:18:50 -05:00 |
|
wchen-r7
|
ae21b0c260
|
Land #5523, adobe_flash_domain_memory_uaf in the flash renderer
|
2015-06-10 16:59:19 -05:00 |
|
wchen-r7
|
4c5b1fbcef
|
Land #5522, adobe_flash_worker_byte_array_uaf in the flash renderer
|
2015-06-10 14:49:41 -05:00 |
|
jvazquez-r7
|
7527aa4f34
|
Disable debug
|
2015-06-10 14:07:18 -05:00 |
|
jvazquez-r7
|
6c7ee10520
|
Update to use the new flash Exploiter
|
2015-06-10 13:52:43 -05:00 |
|
jvazquez-r7
|
7fba64ed14
|
Allow more search space
|
2015-06-10 12:26:53 -05:00 |
|
jvazquez-r7
|
ecbddc6ef8
|
Play with memory al little bit better
|
2015-06-10 11:54:57 -05:00 |
|
wchen-r7
|
d622c782ef
|
Land #5519, adobe_flash_uncompress_zlib_uninitialized in the flash renderer
|
2015-06-10 11:52:47 -05:00 |
|
jvazquez-r7
|
2b4fe96cfd
|
Tweak Heap Spray
|
2015-06-10 10:56:24 -05:00 |
|
jvazquez-r7
|
a6fe383852
|
Use AS Exploiter
|
2015-06-10 09:32:52 -05:00 |
|
jvazquez-r7
|
e5d6c9a3cb
|
Make last code cleanup
|
2015-06-09 16:01:57 -05:00 |
|
jvazquez-r7
|
cf8c6b510b
|
Debug version working
|
2015-06-09 15:46:21 -05:00 |
|
jvazquez-r7
|
39851d277d
|
Unset debug flag
|
2015-06-09 11:36:09 -05:00 |
|
jvazquez-r7
|
b7f0fad72f
|
Modify CVE-2014-0569 to use the flash exploitation code
|
2015-06-09 11:31:39 -05:00 |
|
Tod Beardsley
|
f29b38b602
|
Add the top 20 keyboard patterns as passwords
See https://wpengine.com/unmasked/ for lots more, but this
covers the gif at
https://wpengine.com/unmasked/assets/images/commonkeyboardpatterns.gif
|
2015-06-05 16:46:08 -05:00 |
|
OJ
|
b291d41b76
|
Quick hack to remove hard-coded offsets
|
2015-06-05 13:19:41 +10:00 |
|
jvazquez-r7
|
02181addc5
|
Update CVE-2014-0556
|
2015-06-04 18:23:50 -05:00 |
|
wchen-r7
|
23df66bf3a
|
Land #5481, no powershell. exec shellcode from the renderer process.
|
2015-06-04 15:45:09 -05:00 |
|
jvazquez-r7
|
ab68d8429b
|
Add more targets
|
2015-06-04 12:11:53 -05:00 |
|
jvazquez-r7
|
80cb70cacf
|
Add support for Windows 8.1/Firefox
|
2015-06-03 22:46:04 -05:00 |
|
jvazquez-r7
|
74117a7a52
|
Allow to execute payload from the flash renderer
|
2015-06-03 16:33:41 -05:00 |
|
OJ
|
455a3b6b9d
|
Add butchered version of CVE-2015-1701
|
2015-06-03 21:48:23 +10:00 |
|
Brent Cook
|
64e86165ef
|
remove android meterpreter bins, update to payloads 1.0.2
This switches us to using the Android payload files from the
metasploit-payloads gem
|
2015-06-01 09:14:31 -05:00 |
|
Brent Cook
|
7d5af66fa0
|
Merge branch 'master' into land-5367-uuid-stagers
|
2015-05-29 13:00:35 -05:00 |
|
wchen-r7
|
737559bcbb
|
Land #5180, VBA Powershell for Office Macro
|
2015-05-28 19:55:27 -05:00 |
|
jvazquez-r7
|
e9714bfc82
|
Solve conflics
|
2015-05-27 23:22:00 -05:00 |
|