gwillcox-r7
7d3653280f
Land #13848 , Add CDATA OLT telnet backdoor wordlist
2020-07-16 11:32:06 -05:00
0x44434241
703dc79710
Vim ate my trailing space for guest/[nopassword]
2020-07-16 12:50:08 +09:00
0x44434241
94b46209d9
Adding in C-Data FTTH OLT Device telnet backdoor credential pairs.
...
Further information:
- https://www.zdnet.com/article/backdoor-accounts-discovered-in-29-ftth-devices-from-chinese-vendor-c-data/
- https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html
2020-07-16 12:38:23 +09:00
gwillcox-r7
586971428a
Recompile everything so we don't have the messagebox calls
2020-06-11 00:18:45 -05:00
gwillcox-r7
93b28e662e
Change out template_dll solution files so that it generates the DLL with the correct name and in the correct location
2020-06-10 11:41:34 -05:00
gwillcox-r7
7711cecee9
Final tweaks to make this more reliable, should be good now
2020-06-10 11:02:53 -05:00
gwillcox-r7
4a9c878132
Finally fix up the hanging issue via new template DLLs and associated code
2020-06-10 11:02:53 -05:00
gwillcox-r7
cb20eaf6f9
Finally fix the issue with the cleanup of the files within the exploit
2020-06-10 11:02:51 -05:00
gwillcox-r7
401feb3e53
Change code so that we automatically exit Notepad upon DLL completing its work. Should help tidy things up more
2020-06-10 11:02:50 -05:00
gwillcox-r7
cf17b2065c
Updated module with some output corrections, recompiled DLLs
2020-06-10 11:02:50 -05:00
gwillcox-r7
ae2b40bf99
Update the output of the module to be more correct. Also upload updated DLLs
2020-06-10 11:02:49 -05:00
gwillcox-r7
1607b8c342
Add initial files for CVE-2020-0787
2020-06-10 11:02:35 -05:00
Shelby Pace
c8ab30a40a
add poc code
2020-06-02 14:29:02 -05:00
William Vu
8473662e32
Land #13463 , Oracle WebLogic CVE-2020-2555 exploit
2020-05-20 23:21:07 -05:00
Brendan Coles
8631babcbb
Update CVE-2019-13272 pre-compiled exploit
2020-05-11 13:36:41 +00:00
Brendan Coles
dbc2b8b006
Update CVE-2019-13272 exploit C code to prefer auto targeting
...
Previously, the exploit would attempt to use a hardcoded list of
known useful helpers and fall back to automatic targeting. This
logic has been reversed, preferring automatic targeting first.
2020-05-09 03:59:31 +00:00
Spencer McIntyre
9769e04b6e
Land #13322 , CVE-2020-0668 Service tracing file junction overwrite
2020-05-07 09:47:20 -04:00
gwillcox-r7
a1275845ec
Land #13200 , CVE-2019-0808 LPE for Windows 7 x86 SP0 and SP1
2020-05-06 17:23:52 -05:00
gwillcox-r7
1c79674620
Recompile DLL and alter vcxproj file to automatically place generated DLL in right folder
2020-05-06 16:33:01 -05:00
Alan Foster
cd3725cd3d
Land #13388 , Updates for SAP ICM paths
2020-05-06 14:07:22 +01:00
Shelby Pace
587fc0ff09
add PoC
2020-05-04 11:08:38 -05:00
Brent Cook
0bca86b10d
add new paths from Joris van de Vis
2020-05-04 06:27:02 -05:00
Brent Cook
0622eff907
remove duplicates
2020-05-04 06:23:55 -05:00
Brent Cook
caf863b380
sort and normalize list
2020-05-04 06:15:11 -05:00
bwatters-r7
a0213a13f0
Land #13279 , Some fix for rubocop verification
...
Merge branch 'land-13279' into upstream-master
2020-05-01 13:49:14 -05:00
bwatters-r7
686c2f09a1
Land #13290 , Cve-2014-2630 HP xglance-bin linux priv esc
...
Merge branch 'land-13290' into upstream-master
2020-05-01 10:18:21 -05:00
Tim W
b8dc843b48
add binary
2020-05-01 19:02:54 +08:00
L
645a4c6d26
Remove ysoserial JRMPClient && JRMPListener payload
2020-04-27 10:50:09 -05:00
L
7dc1b8afb4
Update data/ysoserial_payloads.json
2020-04-27 10:50:09 -05:00
Tim W
bba9b76d25
fix infinite loop in find_macho
...
fix osx loader to work within python macho
2020-04-24 15:13:57 +08:00
bwatters-r7
7213d379ec
Add Uso dll
2020-04-23 15:18:22 -05:00
bwatters-r7
0bbb822fe4
Working through mountpoint issues
2020-04-21 09:54:45 -05:00
b4rtik
9be3f1d751
Code cleanup
2020-04-21 00:12:47 +02:00
b4rtik
d1a8ac072a
Fix Amsi and Etw patching
2020-04-20 23:52:19 +02:00
h00die
e1f1ad45bc
working exploit
2020-04-19 15:19:19 -04:00
h00die
58074dc6bb
waiting on metasm question
2020-04-18 20:26:45 -04:00
bwatters-r7
b9e83bd055
Update VS build destination
2020-04-13 18:20:20 -05:00
b4rtik
e3c8c6b0cc
Enabled output from clr loading
2020-04-10 15:06:39 -05:00
b4rtik
b4d2dfe753
Added EtwEventWrite patching
2020-04-10 15:06:00 -05:00
b4rtik
8743cdfecc
Update and USETHREADTOKEN
2020-04-10 15:05:20 -05:00
b4rtik
4c26fa7a67
Fix arguments managing
2020-04-10 15:05:19 -05:00
b4rtik
1476f08dd0
Fix arguments managing
2020-04-10 15:05:18 -05:00
b4rtik
baf25fb064
Removed dependency on vc runtime
2020-04-10 15:04:51 -05:00
b4rtik
a3abfb13da
Some fix
2020-04-10 14:57:41 -05:00
b4rtik
33cd725562
Add dynamic size for assembly and args
2020-04-10 14:57:37 -05:00
bwatters-r7
182bd67287
Land #13187 , Add LPE Exploit For CVE-2020-0796 (AKA: SMBGhost)
...
Merge branch 'land-13187' into upstream-master
2020-04-03 11:19:50 -05:00
Brent Cook
8451c1345b
Land #10579 , add sharphound post module, upstream updating tool
2020-04-03 09:10:40 -05:00
Brent Cook
f848f735a6
update sharphound to latest
2020-04-02 21:32:39 -05:00
Spencer McIntyre
3392fa18d4
Add the x64 LPE exploit for CVE-2020-0796
2020-04-02 17:22:00 -04:00
William Vu
8f6331d0d5
Pretty-print JSON in data/ysoserial_payloads.json
...
jq . data/ysoserial_payloads.json
2020-03-13 14:04:32 -05:00