Alex
8d0aaac0db
Update data/templates/src/pe/exe/template_aarch64_windows.asm
...
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com >
2025-07-10 14:37:23 +02:00
dledda-r7
ea68ee5dc7
chore: update template_aarch64_windows.exe
2025-07-09 08:54:54 -04:00
Alex
7b76a832ac
Add ASM template
2025-06-28 10:15:28 +02:00
Alex
1dadec8369
Revive windows/aarch64/exec Payload
2025-06-27 23:57:12 +02:00
Martin Sutovsky
00852f4682
Adding PPC64 template, fixing PPC64 single payloads
2025-06-19 17:17:19 +02:00
bcoles
3975d09726
Add elf_x64_template.s template source
2025-04-15 21:08:36 +10:00
bwatters-r7
d031df5b6b
Change the aarch64 elf version in template file and reassemble
2025-02-11 08:47:14 -06:00
bcoles
1c748d376a
Add RISC-V 32-bit/64-bit ELF templates
2024-10-15 22:51:32 +11:00
adfoster-r7
4e106c2a73
Fix aarch64 elf shared object bus error
2023-12-13 00:26:53 +00:00
adfoster-r7
89cd524acb
Update osx templates makefile and compile binaries
2023-08-02 01:26:18 +01:00
usiegl00
658c87996d
Hotwire MachO Signing
...
This commit hotwires in executable signing to some of the aarch64 osx
payloads in order to ensure that they are fully functional.
2023-06-19 10:57:37 +02:00
usiegl00
5f8767f4cf
M1ssion Dyld Mettle: Aarch64 Payloads
...
This builds on Back from the dyld by adding the required aarch64
assembly code to enable the OSX loader to run on the m1. This enables
the use of native payloads on M1 or M2 devices that do not have Rosetta
installed.
2023-06-19 10:57:37 +02:00
Spencer McIntyre
025ba6775d
Add a README file with some basic information
2023-02-09 15:09:50 -05:00
Spencer McIntyre
126e3a9c9a
Add larger 256KiB DLL templates
2023-02-09 15:09:50 -05:00
Spencer McIntyre
2608852d8c
Consolidate gdiplus build code
...
This references the main dll/template.c code as the mixed-mode variant
already does. This will make future changes easier as we won't need to
copy them from the main to this one.
See https://github.com/rapid7/metasploit-framework/pull/8509 for the
origin of these files.
2023-02-09 15:09:50 -05:00
h00die
b866917ee1
review
2022-11-22 16:57:01 -05:00
h00die
637ad5f809
make ducky more psh friendly
2022-11-21 17:55:48 -05:00
h00die
29b7fa5336
ducky_script format for msfvenom
2022-11-18 17:02:52 -05:00
ssst0n3
246a3604b8
set the org to be 0x400000
2022-05-13 10:50:19 +08:00
Grant Willcox
d29f5690a1
Add in backup code to DLL template to fall back to old way of executing things in case the BREAKAWAY_FROM_JOB flag cannot be used
2022-03-31 14:28:29 -05:00
Grant Willcox
743138abed
Add in initial fixes from review and remove extra BREAKAWAY_FROM_JOB code changes not directly related to this PR as we'll raise a separate PR for those
2022-03-31 12:13:29 -05:00
Grant Willcox
e5c0259723
Add CREATE_BREAKAWAY_FROM_JOB flag to source files related to DLL generation, update the exploit source to denote how to clean up in case the payload can't clean up
2022-03-23 19:38:32 -05:00
Grant Willcox
a25b3a70ad
Update permissions on template DLLs
2022-03-23 17:49:03 -05:00
Grant Willcox
b1ce05f97c
Add in updated Ruby code and also update the DLLs and prepend_migrate.rb to use the CREATE_BREAKAWAY_FROM_JOB flag with CreateProcess to break away from the job if the job has the JOB_OBJECT_LIMIT_BREAKAWAY_OK limit set to allow breakaway jobs
2022-03-23 17:47:25 -05:00
bwatters
9635fde12d
Add support and templates for aarch64 targets
2022-02-10 10:49:02 -06:00
Spencer McIntyre
efa125bb23
Document the synchronization procedure
2020-11-16 16:13:35 -05:00
Spencer McIntyre
3586644b62
Increase the payload space to 4096 within the DLL template
2020-11-16 15:58:59 -05:00
Spencer McIntyre
2d367b867d
Add a synchronization primitive to the DLL template
2020-11-16 15:57:27 -05:00
Spencer McIntyre
c6304704f4
Cleanup inconsistent whitespace in the DLL template
2020-11-16 11:26:15 -05:00
Spencer McIntyre
d6e1eee635
Add a new Mixed Mode Assembly DLL payload template
2020-10-05 15:19:40 -04:00
bwatters-r7
c63d5fb4fb
Recompiled binaries
2017-10-09 12:44:58 -05:00
bwatters-r7
0bf948e906
Removed binary files before recompiling
2017-10-09 11:35:41 -05:00
bwatters-r7
7df18e378d
Fix conflicts in PR 8509 by mergeing to master
2017-10-09 10:30:21 -05:00
Brent Cook
605330faf6
Land #8842 , add linux/aarch64/shell_reverse_tcp
2017-08-21 15:44:28 -05:00
Brent Cook
e734a7923a
Land #8267 , Handle multiple entries in PSModulePath
2017-08-20 17:44:30 -05:00
Brent Cook
d5a5321a8c
Merge remote-tracking branch 'upstream/pr/8299' into land-8267-
2017-08-20 17:43:56 -05:00
Tim
8b4ccc66c7
add linux/aarch64/shell_reverse_tcp
2017-08-17 18:55:37 +08:00
L3cr0f
6a3fc618a4
Add bypassuac_injection_winsxs.rb module
2017-06-03 12:59:50 +02:00
HD Moore
0520d7cf76
First crack at Samba CVE-2017-7494
2017-05-24 19:42:04 -05:00
anhilo
f3d6a8c456
split PSModulePath in multi strings with ';'
...
1、allows the HTA window to be invisible
2017-04-26 11:01:59 +08:00
Brandon Knight
c724f0e05d
Handle multiple entries in PSModulePath
...
This commit handles the case where more than one entry exists in
the PSModulePath environment variable. The updated code will loop
through each entry in the PSModulePath checking for the presence of
powershell.exe. When one is encountered it will execute the payload
and exit the for loop.
2017-04-19 11:22:38 -04:00
nixawk
637098466c
Hidden black flash windows / Close HTA windows
2017-04-16 22:53:17 -05:00
David Maloney
af4f3e7a0d
use templates from the gem for psh
...
use the templates now contained within the magical
gem of rex-powershell
7309
MS-2106
2016-10-04 14:14:25 -05:00
mach-0
dcc77fda5b
Add back accidentally-deleted nasm comment.
2016-10-03 23:47:13 -05:00
mach-0
eff85e4118
Just remove DT_HASH.
2016-10-03 23:43:19 -05:00
mach-0
8828060886
Fix linux x64 elf-so template.
...
Previously the elf-so would crash when loaded with LD_PRELOAD,
due to not enough room for the symbol table.
2016-10-03 23:24:31 -05:00
Christian Mehlmauer
c6012e7947
add jsp payload generator
2016-09-06 22:17:21 +02:00
f7b053223a9e
629bc00696
Use MSXML decoder instead
2016-03-25 22:52:16 +09:00
f7b053223a9e
19bd7b98f4
Fix minor indenting issue
2016-03-01 11:50:56 +09:00
f7b053223a9e
c8c5549b19
Send base64ed shellcode and decode with certutil
2016-03-01 10:48:25 +09:00