cgranleese-r7
|
469f102596
|
Updates docs to reflect new default prompt
|
2025-07-17 09:53:40 +01:00 |
|
Stephen Fewer
|
65bb3cc990
|
typo 2
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
2024-12-17 17:26:20 +00:00 |
|
Stephen Fewer
|
3ed2b5916a
|
fix typo
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
2024-12-17 17:26:00 +00:00 |
|
sfewer-r7
|
41bcf4629f
|
The payload we essentially being encoded twice (thanks for calling this out Brendan), we now supply a suitable BadChars and let the framewrk encode the framework paylaod. We rename the variable payload to bootstrap_payload as this was colliding with the frameworks payload variable which was not the intent.
|
2024-11-21 17:37:34 +00:00 |
|
sfewer-r7
|
d2f6e0e10f
|
As the payload option FETCH_WRITABLE_DIR may not be available if a non fetch based payload is used, we add a new option WRITABLE_DIR to account for this. Update the documentation to reflect the change.
|
2024-11-21 16:38:09 +00:00 |
|
sfewer-r7
|
f9b099a46d
|
remove the DefaultOption PAYLOAD value, and let the framework pick one for us. Mention I tested the exploit with cmd/linux/http/x64/meterpreter_reverse_tcp
|
2024-11-21 16:22:02 +00:00 |
|
sfewer-r7
|
2469d4ea23
|
add in exploit module for the recent PAN-OS RCE, CVE-2024-0012 + CVE-2024-9474
|
2024-11-19 16:15:06 +00:00 |
|