cgranleese-r7
|
469f102596
|
Updates docs to reflect new default prompt
|
2025-07-17 09:53:40 +01:00 |
|
Ashley Donaldson
|
2030818e90
|
Remove obsolete syscall logic; fix all warnings and lock in warnings as errors
|
2025-05-01 08:26:59 +10:00 |
|
Ashley Donaldson
|
6ec67d6a26
|
32-bit .NET working
|
2025-04-29 09:44:03 +10:00 |
|
Ashley Donaldson
|
7c7a56f9a5
|
Building 32-bit execute assembly
|
2025-04-29 09:44:03 +10:00 |
|
bwatters-r7
|
ec67435de9
|
Rebase and squash for CVE-2024-30085
|
2025-03-20 09:03:28 -05:00 |
|
Spencer McIntyre
|
994c09a43b
|
Update license years, remove redundant licenses
|
2025-03-19 11:21:31 -04:00 |
|
dledda-r7
|
cdac13550b
|
fix: sync syscall comment
|
2025-02-19 03:58:11 -05:00 |
|
dledda-r7
|
80b76e4f5f
|
docs: add reference to the pull-request inside source
|
2025-02-14 04:33:06 -05:00 |
|
dledda-r7
|
4876320814
|
fix: add sync syscall after read to prevent sigill in raspberrypi
|
2025-02-12 11:33:45 -05:00 |
|
Diego Ledda
|
289e95d530
|
Land #19367, fix ARM stager restore r0 in loop
Land #19367, fix ARM stager restore r0 in loop
|
2025-01-06 17:14:47 +01:00 |
|
Jack Heysel
|
10cd8d1020
|
Removed unnecessary code from exploit.cpp
|
2024-11-05 15:47:52 -08:00 |
|
Jack Heysel
|
7a5bc60aab
|
Windows Access Mode Mismatch LPE in ks.sys [CVE-2024-35250]
|
2024-11-05 15:31:44 -08:00 |
|
Brendan
|
dbc020a745
|
Merge pull request #19441 from Takahiro-Yoko/cve_2023_0386_priv_esc
Land #19441, Add module: Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
|
2024-09-26 14:07:17 -05:00 |
|
Takah1ro
|
755830024c
|
Update exploit binary and remove unnecessary
|
2024-09-24 08:37:20 +09:00 |
|
Takah1ro
|
75329cc7c7
|
Add ;
|
2024-09-24 08:24:24 +09:00 |
|
Takah1ro
|
a10459e772
|
Formatting exploit
|
2024-09-24 08:14:21 +09:00 |
|
Takahiro Yokoyama
|
33152bf0ac
|
Update external/source/exploits/CVE-2023-0386/cve_2023_0386.c
Add setuid(0) and setgid(0)
Co-authored-by: Brendan <bwatters@rapid7.com>
|
2024-09-24 08:03:20 +09:00 |
|
Takah1ro
|
dd932844b6
|
Remove unused variables
|
2024-09-09 08:15:08 +09:00 |
|
Takah1ro
|
212c96d195
|
Add last blank line
|
2024-09-07 12:29:32 +09:00 |
|
Takah1ro
|
8366252ba2
|
Not call payload directory
|
2024-09-07 12:28:40 +09:00 |
|
Takah1ro
|
692531bb87
|
Call payload directory
|
2024-09-07 12:16:04 +09:00 |
|
Takah1ro
|
2b63f8bb88
|
Rename exploit
|
2024-09-07 10:29:41 +09:00 |
|
Takah1ro
|
fd7321dd3f
|
Strip_comments
|
2024-09-06 22:58:31 +09:00 |
|
Takahiro Yokoyama
|
ccc4727dfd
|
Update external/source/exploits/CVE-2023-0386/exploit.c
Avoid recursively delete files indiscriminate.
Co-authored-by: bcoles <bcoles@gmail.com>
|
2024-09-06 21:48:29 +09:00 |
|
Takah1ro
|
cd97b08c62
|
Move C code to separate file
|
2024-09-06 21:09:39 +09:00 |
|
Takah1ro
|
216590f84a
|
Add last blank line
|
2024-09-05 23:00:06 +09:00 |
|
Takah1ro
|
3d20dd6ddf
|
Add module:
Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
|
2024-09-05 22:54:55 +09:00 |
|
Jack Heysel
|
7bfd814297
|
Removed memory polling
|
2024-08-30 12:52:18 -07:00 |
|
Jack Heysel
|
b011b67f80
|
Responded to comments
|
2024-08-29 22:25:20 -07:00 |
|
Jack Heysel
|
b32234382e
|
Add correct missing file
|
2024-08-29 18:53:39 -04:00 |
|
Jack Heysel
|
e40f6cb785
|
Add missing file
|
2024-08-29 08:38:08 -04:00 |
|
Jack Heysel
|
f6378913c3
|
Merge branch 'win-kernel-lpe-cve-2024-30038' of github.com:jheysel-r7/metasploit-framework into win-kernel-lpe-cve-2024-30038
|
2024-08-22 13:07:30 -07:00 |
|
Jack Heysel
|
6689614d8f
|
Responded to comments
|
2024-08-22 13:06:29 -07:00 |
|
jheysel-r7
|
bde9fca9e4
|
Apply suggestions from code review
|
2024-08-22 02:35:21 -04:00 |
|
Jack Heysel
|
31348dac33
|
Windows LPE CVE-2024-30088
|
2024-08-21 23:16:37 -07:00 |
|
Ivan Nikolskiy
|
be90a4e3fd
|
Restore r0 on each iteration
|
2024-08-06 00:01:58 +02:00 |
|
Ivan Nikolskiy
|
9436e0011f
|
Put sockfd to r0
r0 has return value instead of sockfd in second loop interation
|
2024-08-05 23:51:22 +02:00 |
|
bwatters
|
636c72965c
|
Land #19084, Add CVE-2022-1373 and CVE-2022-2334 exploit chain
Merge branch 'land-19084' into upstream-master
|
2024-07-19 12:22:25 -05:00 |
|
Imran E. Dawoodjee
|
afd4b8af2e
|
Remove x86 things, include AutoCheck
|
2024-04-19 22:49:40 +08:00 |
|
Imran E. Dawoodjee
|
6268235cd3
|
Add CVE-2022-1373 and CVE-2022-2334 exploit chain
|
2024-04-13 18:10:45 +08:00 |
|
Spencer McIntyre
|
e5635c4bfd
|
Add source code for Python deserialization gadgets
|
2024-03-29 09:33:47 -04:00 |
|
Spencer McIntyre
|
86b7ec4518
|
Address comments from the review
|
2023-10-12 09:50:19 -04:00 |
|
Spencer McIntyre
|
5a6dc7f9a6
|
Initial commit of CVE-2023-43654
|
2023-10-12 09:27:26 -04:00 |
|
Christophe De La Fuente
|
1058291af9
|
Land #18314, Windows Error Reporting RCE (CVE-2023-36874)
|
2023-09-27 15:25:06 +02:00 |
|
bwatters
|
be731f330e
|
Add error checking and randomize the report directory
|
2023-09-22 14:43:21 -05:00 |
|
bwatters
|
b4a1bb8fa2
|
Add docs and support for shell sessions; update exe to work without runtime lib.
|
2023-09-19 17:50:18 -05:00 |
|
Simon Janusz
|
8b56dc0117
|
Land #18250, CVE-2023-28252: Windows CLFS Driver Privilege Escalation
|
2023-09-14 10:18:29 +01:00 |
|
bwatters
|
91e7af4370
|
Added check, some stealth, and cleaned code
|
2023-09-05 14:29:13 -05:00 |
|
bwatters
|
c69e983b30
|
Add module to create directory structures and upload/run exploit
|
2023-08-25 15:41:25 -05:00 |
|
bwatters
|
c05582267c
|
Placeholder for VE-2023-36874
|
2023-08-23 20:13:03 -05:00 |
|