msutovsky-r7
|
f4622d802e
|
Land #20406, adds malicious Windows Script Host VBScript fileformat module
Add Malicious Windows Script Host VBScript (.vbs) File module
|
2025-07-28 13:58:07 +02:00 |
|
msutovsky-r7
|
12340ef6b5
|
Land #20398, adds malicious Windows Script Host JScript fileformat module
Add Malicious Windows Script Host JScript (.js) File module
|
2025-07-28 13:51:26 +02:00 |
|
bcoles
|
cbc03eaeeb
|
Add Malicious Windows Script Host VBScript (.vbs) File module
|
2025-07-25 18:46:47 +10:00 |
|
bcoles
|
44c61a7e4d
|
Add Malicious Windows Script Host JScript (.js) File module
|
2025-07-25 18:43:33 +10:00 |
|
msutovsky-r7
|
afeded56aa
|
Land #20384, adds module for malicious Windows Registration Entries files
Add Malicious Windows Registration Entries (.reg) File module
|
2025-07-24 12:29:34 +02:00 |
|
cgranleese-r7
|
adff497bd2
|
Updates msf5 as well
|
2025-07-17 11:51:29 +01:00 |
|
cgranleese-r7
|
469f102596
|
Updates docs to reflect new default prompt
|
2025-07-17 09:53:40 +01:00 |
|
bcoles
|
c5ec45452a
|
Add Malicious Windows Registration Entries (.reg) File module
|
2025-07-13 23:41:59 +10:00 |
|
msutovsky-r7
|
fde78bf73f
|
Land #20324, adds exploit for UNC path in .url files (CVE-2025-33053)
Adds exploit module for Internet Shortcut UNC path vulnerability (CVE-2025-33053)
|
2025-06-25 11:23:23 +02:00 |
|
Martin Sutovsky
|
13cd2d2e51
|
Minor code changes, updates documentation
|
2025-06-24 16:22:42 +02:00 |
|
bcoles
|
c0baf1888b
|
exploit/windows/fileformat/ms_visual_basic_vbp: Add offsets, cleanup, document
|
2025-06-23 00:11:54 +10:00 |
|
DevBuiHieu
|
ec5ba0bd0d
|
Final code for CVE-2025-33053 exploit module
|
2025-06-17 23:03:36 -04:00 |
|
DevBuiHieu
|
20b8a9fcd3
|
Add some features and fix bugs for CVE-2025-33053 exploit module
|
2025-06-17 22:59:34 -04:00 |
|
DevBuiHieu
|
20629fe6b8
|
Add some features and fix all errors for CVE-2025-33053 exploit module
|
2025-06-17 02:49:10 -04:00 |
|
DevBuiHieu
|
f81ddf82f1
|
Add some features for CVE-2025-33053 exploit module
|
2025-06-17 01:00:35 -04:00 |
|
fanqiaojun
|
6b2bdc893b
|
chore: remove repetitive words
Signed-off-by: fanqiaojun <fanqiaojun@yeah.net>
|
2024-04-15 11:06:50 +08:00 |
|
bwatters
|
ce43db0904
|
Fix TBDs and give better documentation.
|
2023-12-21 16:18:36 -06:00 |
|
bwatters
|
78bac2636b
|
Add documentation
|
2023-12-20 18:44:05 -06:00 |
|
h00die
|
557a15a115
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
|
xaitax
|
d5f355d8de
|
WinRAR 6.22 (CVE-2023-38831)
|
2023-09-04 18:56:22 +02:00 |
|
bwatters
|
e8456a6625
|
Add documentation and fix null filename catch
|
2023-08-03 18:30:20 -05:00 |
|
Spencer McIntyre
|
68eae1664e
|
Tweak the follina docs
|
2022-08-25 17:10:59 -04:00 |
|
bwatters
|
115955591b
|
Fix up the Unicode coversions and update docs
|
2022-08-17 13:21:56 -05:00 |
|
bwatters
|
c751ef46c9
|
Land #16635, Add 0-day MSWord RCE #Follina CVE-2022-30190
Merge branch 'land-16635' into upstream-master
|
2022-06-06 14:41:31 -05:00 |
|
RAMELLA Sébastien
|
3ab06461af
|
fix. second review
|
2022-06-02 00:58:20 +04:00 |
|
RAMELLA Sébastien
|
dd1814903c
|
fix. SRVHOST default value
|
2022-06-02 00:07:15 +04:00 |
|
RAMELLA Sébastien
|
8c19a02835
|
fix. first review
|
2022-06-01 20:15:08 +04:00 |
|
RAMELLA Sébastien
|
7f89e92da3
|
add more informations about
|
2022-05-31 00:12:30 +04:00 |
|
RAMELLA Sébastien
|
97921b4ed9
|
fix chmod 644
|
2022-05-30 22:11:35 +04:00 |
|
RAMELLA Sébastien
|
dfc226cf5f
|
add. Supposed 0day MSWord RCE
|
2022-05-30 21:23:18 +04:00 |
|
Spencer McIntyre
|
2f6710e02e
|
Remove the Not_Hosted target
It's not currently working and Metasploit should just handle everything
|
2021-12-08 17:22:44 -05:00 |
|
Spencer McIntyre
|
75deb69eab
|
Reformat the CVE-2021-40444 module docs
|
2021-12-08 16:45:22 -05:00 |
|
bwatters
|
852230c739
|
Fix bug brought in by importing Msf::Post::File
Split out javascript to a file and deobfuscate it
Update documentation for new targets
Fix other small suggestions
|
2021-12-08 10:36:27 -06:00 |
|
bwatters
|
14064ff3f9
|
Update module description and remove extra module.
|
2021-11-29 15:23:02 -06:00 |
|
RAMELLA Sébastien
|
38973510f7
|
update modules (auxiliary and exploit)
|
2021-11-09 15:18:58 +04:00 |
|
Alan Foster
|
9a92ac87a1
|
Ensure documentation files have md extension
|
2021-03-15 10:24:50 +00:00 |
|
gwillcox-r7
|
2d5fa912c3
|
Apply fixes to documentation to fix some errors and make it msftidy_docs.rb compliant. Also apply RuboCop updates to the module
|
2020-07-31 17:36:51 -05:00 |
|
metacom
|
1a3ca6ee79
|
documalis_pdf_editor_and_scanner.md initial comit
|
2020-06-19 21:39:40 -05:00 |
|
h00die
|
e7da6e77a5
|
remove and check for instruction text
|
2020-03-24 09:15:04 -04:00 |
|
h00die
|
bd48588fd5
|
catch false positive spaces at eol from code indent
|
2020-01-28 14:28:18 -05:00 |
|
h00die
|
ca59b06fd3
|
module doc standardizations
|
2020-01-20 21:26:59 -05:00 |
|
h00die
|
dc01f2e99b
|
remove s from application
|
2020-01-16 11:45:10 -05:00 |
|
h00die
|
5fc561e916
|
Land #12661, more docs
|
2019-12-13 17:42:36 -05:00 |
|
h00die
|
a945095ddf
|
doc touchup
|
2019-12-12 16:58:14 -05:00 |
|
Kenneth LaCroix
|
f0ac300338
|
h00die review
Thanks h00die for the in depth review, as always.
|
2019-12-10 13:37:13 -07:00 |
|
Kenneth LaCroix
|
5e3974992c
|
Create adobe_embedded_pdf.md and adobe_utilprintf.md. Update adobe_geticon.md and adobe_reader_u3d.md.
|
2019-12-09 21:29:06 -07:00 |
|
Kenneth LaCroix
|
3e049a279e
|
create adobe_geticon.md and update adobe_reader_u3d.md
|
2019-12-06 21:56:48 -07:00 |
|
Kenneth LaCroix
|
d4ef06dfcc
|
Create adobe_reader_u3d.md
|
2019-12-06 01:19:12 -07:00 |
|
Kenneth LaCroix
|
31abd7d676
|
Update ms15_100_mcl_exe.md
|
2019-12-04 01:13:18 -07:00 |
|
Kenneth LaCroix
|
5e2c0604ab
|
Create ms15_100_mcl_exe.md and Create ms10_092_schelevator.md
|
2019-11-27 18:12:57 -07:00 |
|