Commit Graph

1265 Commits

Author SHA1 Message Date
Brendan b4188e70be Merge pull request #20357 from xaitax/add-windows-aarch64-winexec-payload
Revive and Finalize windows/aarch64/exec Payload
2025-07-11 10:18:17 -05:00
msutovsky-r7 bc705b8c5a Land #20334, adds payload linux/x64/set_hostname
Add payload/linux/x64/set_hostname module.
2025-07-06 18:56:43 +02:00
Martin Sutovsky 1ee9d61de1 Running Rubocop 2025-07-05 15:57:38 +02:00
Umut f0a64b92a7 Update CachedSize 2025-07-04 18:22:52 +03:00
Umut 4cb523a20c Add exit(0) syscall 2025-07-04 18:21:20 +03:00
Martin Sutovsky b1de0c6313 Removes null-bytes 2025-07-04 12:30:01 +02:00
Martin Sutovsky dbe422698f Updates cached_size 2025-07-04 12:16:16 +02:00
Martin Sutovsky d0df343f74 Rewriting shellcode, making it smaller 2025-07-04 12:12:00 +02:00
Alex 91a3cc27cd Update modules/payloads/singles/windows/aarch64/exec.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-06-30 14:46:51 +02:00
Alex 3069d6a3b8 Readability 2025-06-28 23:25:23 +02:00
Alex 1dadec8369 Revive windows/aarch64/exec Payload 2025-06-27 23:57:12 +02:00
Diego Ledda fda250d604 Merge pull request #19910 from msutovsky-r7/fix/add-PPC64-template
Fixing PPC64 template and payloads
2025-06-25 12:33:39 +02:00
adfoster-r7 0972888802 Update Mettle 1.0.42 2025-06-23 11:58:29 +01:00
Muzaffer Umut ŞAHİN 539514b3b6 Add payload/linux/x64/set_hostname module.
This payload sets the hostname of a Linux x64 machine by using the sethostname syscall.
2025-06-21 04:41:30 -04:00
Martin Sutovsky be394b7062 Adding PPC64 template, fixing PPC64 single payloads 2025-06-19 17:23:15 +02:00
Martin Sutovsky 00852f4682 Adding PPC64 template, fixing PPC64 single payloads 2025-06-19 17:17:19 +02:00
Spencer McIntyre f3b650a409 Major refactoring of PHP payloads and related exploits 2025-05-30 09:06:38 -04:00
Spencer McIntyre dcaeb5266c Define the system_block module function 2025-05-30 09:06:38 -04:00
bcoles 03f4c46010 modules/payloads/singles: Resolve RuboCop violations 2025-04-20 02:57:34 +10:00
adfoster-r7 6fb76f9b51 Merge pull request #20064 from bcoles/payloads-php-reverse_php_ssl
payloads: cmd/unix/reverse_php_ssl: Resolve RuboCop violations
2025-04-19 17:53:49 +01:00
bcoles 6f160d28b4 payloads: cmd/unix/reverse_php_ssl: Resolve RuboCop violations 2025-04-19 20:39:52 +10:00
bcoles 5f5e2782e5 payloads: Ruby pingback: Resolve RuboCop violations 2025-04-19 19:02:28 +10:00
bwatters-r7 87ec9ee137 Remove CBEA64 arch values so PPC64 arches have only 1 arch value
Multiple arches broke payload adaptyers and we do not use them, anyway
2025-02-19 17:57:39 -06:00
dledda-r7 4565a04510 fix(payloads): updating prepend mixin in payloads 2025-01-14 09:31:03 -05:00
dledda-r7 a27024eb1f fix: updating aarch64/shell to use the new prepends mixin 2024-12-20 10:18:25 -05:00
dledda-r7 753447c7f7 fix: updating ppc/shell to use the new mixin structure 2024-12-19 12:13:55 -05:00
Spencer McIntyre 1d3d3419f6 Clarify documentation in dns_txt_query_exec 2024-12-06 14:26:44 -05:00
dledda-r7 4d19535ca0 fix(payloads): removing hardcoded block-api asm and hashes from x86 messagebox module 2024-11-28 06:41:32 -05:00
dledda-r7 acb022c18f fix(payloads): update cachedsize for x64 messagebox module 2024-11-27 08:15:57 -05:00
dledda-r7 46292b8b9a fix(payloads): removing hardcoded block-api asm and hashes from x64 messagebox module 2024-11-27 08:08:31 -05:00
dledda-r7 eb58072034 fix(payloads): update cachedsize 2024-11-26 12:07:32 -05:00
dledda-r7 9bfb67444d fix(payloads): fixing typo on block-api hashing function 2024-11-26 12:07:31 -05:00
dledda-r7 e7c23e4a65 fix(payloads): removing hardcoded block-api hashes 2024-11-26 12:07:30 -05:00
dledda-r7 3fe1ffb6f3 fix(payloads): removing hardcoded block-api hashes 2024-11-26 12:07:29 -05:00
dwelch-r7 1bfa0755a8 Land #19518, Add support for RISC-V 32-bit / 64-bit Little Endian payloads 2024-11-01 11:18:30 +00:00
Brendan ff521464f3 Land #19528, Add Python exec payload
Add a python/exec payload to execute OS commands
2024-10-31 15:23:25 -05:00
bwatters-r7 a2e97b3e38 Update payload cache sizes for... some reason. 2024-10-30 16:19:59 -05:00
bcoles 27ebde9ad5 Add Linux Execute Command 32-bit/64-bit RISC-V LE payloads 2024-10-15 22:51:36 +11:00
bcoles 92cf931d6e Add Linux Reboot 32-bit/64-bit RISC-V LE payloads 2024-10-15 22:51:36 +11:00
Ashley Donaldson 9b4cd2241d Update payload sizes 2024-10-14 15:43:40 +11:00
Ashley Donaldson 1b169efe3d Update payload dependencies 2024-10-14 15:27:15 +11:00
Ashley Donaldson b4da4e74af Use specific subclass of Command Shell for reverse bash 2024-10-12 14:36:09 +11:00
Spencer McIntyre f2a723541d Add a test for the python/exec payload 2024-10-04 11:10:50 -04:00
Spencer McIntyre c051ea5a7f Add a python/exec payload to execute OS commands 2024-10-04 10:03:08 -04:00
jvoisin b7fff5926b Use php_preamble/php_system_block instead of system in payloads/singles/php/
The `php_preamble`/`php_system_block` combo has builtin low-hanging evasion for
PHP's `disabled_functions` configuration (eg. `system` might not be available
but `shell_exec` is), so use it instead of hardcoding `system`.

This commit also brings modules/payloads/singles/php/reverse_perl.rb's style
more in line with the other uses of `php_preamble`/`php_system_block`.

Oh, and it makes lib/msf/core/payload/php.rb work on older Ruby version as
well.

Co-authored-by: Valentin Lobstein <88535377+Chocapikk@users.noreply.github.com>
2024-09-18 12:40:55 +02:00
adfoster-r7 62a3f73e70 Update rubocop target ruby version 2024-07-24 16:47:17 +01:00
dledda-r7 2dfe97673a Bump metasploit_payloads-mettle to 1.0.31 2024-07-16 11:47:14 -04:00
dledda-r7 5d1ee84cb0 Bump metasploit_payloads-mettle to 1.0.30 2024-07-12 05:17:19 -04:00
dledda-r7 09debbb93f fix: fixed rubocop issue 2024-06-24 05:33:30 -04:00
dledda-r7 2de112891c fix: fixed payload cached size 2024-06-24 05:21:07 -04:00