cgranleese-r7
adff497bd2
Updates msf5 as well
2025-07-17 11:51:29 +01:00
cgranleese-r7
469f102596
Updates docs to reflect new default prompt
2025-07-17 09:53:40 +01:00
Brendan
5faa0a5b6b
Merge pull request #19777 from msutovsky-r7/linqpad_deserialization
...
Linqpad deserialization persistence
2025-05-13 08:03:30 -05:00
msutovsky-r7
3af76cfa00
Renames incorrect option in documentation
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2025-05-13 06:30:00 +02:00
Martin Sutovsky
d16c639278
Adds cleanup option in documentation
2025-05-06 09:07:21 +02:00
Martin Sutovsky
24a86cd74a
Refactoring based on comments
2025-05-06 08:43:57 +02:00
Jack Heysel
3ead0fdf42
Add check for is_uac_enabled?
2025-04-16 17:59:53 -07:00
Jack Heysel
9a95f60df6
Updated service_permissions with action to exploit CVE-2025-21293
2025-04-16 10:55:05 -07:00
bwatters-r7
ec67435de9
Rebase and squash for CVE-2024-30085
2025-03-20 09:03:28 -05:00
Martin Sutovsky
302052c692
LINQPad deserialization module init
2024-12-30 15:57:59 +01:00
Jack Heysel
81b83f2fd6
Updated docs and check
2024-11-06 09:13:51 -08:00
Jack Heysel
7a5bc60aab
Windows Access Mode Mismatch LPE in ks.sys [CVE-2024-35250]
2024-11-05 15:31:44 -08:00
Jack Heysel
7bfd814297
Removed memory polling
2024-08-30 12:52:18 -07:00
jheysel-r7
bde9fca9e4
Apply suggestions from code review
2024-08-22 02:35:21 -04:00
Jack Heysel
31348dac33
Windows LPE CVE-2024-30088
2024-08-21 23:16:37 -07:00
fanqiaojun
6b2bdc893b
chore: remove repetitive words
...
Signed-off-by: fanqiaojun <fanqiaojun@yeah.net >
2024-04-15 11:06:50 +08:00
h00die
557a15a115
spelling fixes on docs
2023-10-10 14:46:18 -04:00
Christophe De La Fuente
1058291af9
Land #18314 , Windows Error Reporting RCE (CVE-2023-36874)
2023-09-27 15:25:06 +02:00
Christophe De La Fuente
2c9932b242
Update documentation - Options section
2023-09-27 15:17:04 +02:00
bwatters
0b84feaf60
updates from code review
2023-09-26 14:03:31 -05:00
bwatters
b4a1bb8fa2
Add docs and support for shell sessions; update exe to work without runtime lib.
2023-09-19 17:50:18 -05:00
jheysel-r7
ef55c4f2c1
Update documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md
2023-08-30 12:11:37 -04:00
Jack Heysel
bcfc892195
General code clean up
2023-08-04 14:27:14 -04:00
Jack Heysel
29c2361a9c
Module clean up, docs, metadata, rubocop
2023-08-02 18:53:20 -04:00
Christophe De La Fuente
6d4ee0c071
Add exploit for CVE-2023-21768
2023-03-27 20:08:22 +02:00
cgranleese-r7
80dbbca020
Land #17371 , Lenovo Diagnostics Driver Privilege Escalation (CVE-2022-3699)
2023-02-03 13:43:04 +00:00
Jack Heysel
4da94325f3
Rubocop
2023-01-19 13:52:58 -05:00
Jack Heysel
63d9445911
Fix for Win Server 2022 and 2019
2023-01-19 00:52:38 -05:00
Jack Heysel
2c2bfec4a0
Tested on Windows Build 19044, 19045 and 22000
2023-01-18 01:41:30 -05:00
h00die
0ac4d3d2e6
doc how to set permissions on service
2023-01-13 17:07:17 -05:00
Spencer McIntyre
3ddcf73c2b
Remove the QUICK option altogether
...
Use blocks to check whether each service is exploitable as they are
enumerated. With this change, it is the service and path enumeration
halts once an exploitable one is found that yields a session.
Also all files are registered for cleanup.
2023-01-13 17:06:42 -05:00
h00die
90a12cf3b0
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
h00die
c52eb09cbb
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
Jack Heysel
2fa7e7b2d5
Lenovo Diagnostics Driver Privilege Escaltion (CVE-2022-3699)
2022-12-12 21:53:53 -05:00
Ron Bowes
3ac3fa6c32
Move the Zimbra Slapper doc to the right folder (Windows -> Linux)
2022-10-25 09:51:27 -07:00
bcoles
666a3efcfd
ms10_092_schelevator: Cleanup
2022-08-19 15:19:28 +10:00
Ron Bowes
be25e1fc77
Add documentation
2022-08-05 13:55:05 -05:00
Grant Willcox
51df37de87
Add in documentation and also update the module to handle NarratorQuickstart.exe which sometimes comes up and can lead to visual indicators
2022-03-28 17:53:53 -05:00
bwatters
b4de9fa92a
Land #16344 , Add module for CVE-2022-21999 and More Railgun Definitions
...
Merge branch 'land-16344' into upstream-master
2022-03-16 08:37:05 -05:00
space-r7
4a8707982a
fix module name in output
2022-03-14 09:35:56 -05:00
space-r7
c646d01671
add systems tested
2022-03-14 09:17:43 -05:00
space-r7
99664efed7
use full user name, add test output to docs
2022-03-14 09:15:36 -05:00
space-r7
07e6eef201
rename module, modify check
2022-03-10 17:02:58 -06:00
space-r7
f116f9e701
add docs
2022-03-04 15:54:58 -06:00
Spencer McIntyre
443bf1249a
Remove all the old CVE-2021-1732 data
2022-02-18 15:25:39 -05:00
Spencer McIntyre
bcd7cb1122
Writeup the module metadata and docs
2022-02-18 15:23:44 -05:00
Grant Willcox
3af93cbacc
Fix up changes from timwr's review so long
2021-11-09 10:36:50 -06:00
Grant Willcox
780a9370a2
First draft of code, documentation, and exploit DLL plus exploit code
2021-11-09 10:36:40 -06:00
Spencer McIntyre
674628e600
Land #15384 , Improve Windows RDLL injection
2021-08-26 12:11:44 -04:00
Grant Willcox
5a80e9678c
Address Spencer's comments and remove changes that don't directly use the DLL injection library API change
2021-08-24 16:34:01 -05:00