sfewer-r7
|
25ef7d1272
|
add the RCE exploit
|
2023-11-06 17:12:40 +00:00 |
|
h00die
|
557a15a115
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
|
sfewer-r7
|
27f5a789c9
|
rework the exploit to use the new MIPS64 fetch payload adapters. Removed the seperate command and dropper targets in favor of a single default target which can do both thanks to fetch payloads. Removed the redundant IO select() call which was bad copy pasta on my part.
|
2023-06-09 09:47:57 +01:00 |
|
sfewer-r7
|
6b101b5a4d
|
make rubocop happy
|
2023-05-22 18:03:58 +01:00 |
|
Ron Bowes
|
6119330e29
|
Update documentation to match current version of modules
|
2023-04-11 09:48:53 -07:00 |
|
Ron Bowes
|
c22c2904c2
|
Fix msftidy_docs stuff
|
2023-04-05 10:53:58 -07:00 |
|
Ron Bowes
|
41fe44ef1a
|
Merge branch 'master' into unirpc-auth-bypass
|
2023-03-29 08:03:05 -07:00 |
|
Ron Bowes
|
6897be4b01
|
Add two Metasploit modules for UniData vulnerabilities
|
2023-03-29 08:01:50 -07:00 |
|
Jack Heysel
|
1f2a889d0c
|
Land #17388, Zyxel router RCE
This module adds a new exploit module for a buffer
overflow in roughly 45 different Zyxel router and VPN models.
|
2023-03-21 15:07:04 -04:00 |
|
Jack Heysel
|
31a32ccd9b
|
linting and srvhost check fix
|
2023-03-17 14:39:02 -04:00 |
|
jheysel-r7
|
764abaf087
|
Update documentation/modules/exploit/linux/misc/zyxel_multiple_devices_zhttp_lan_rce.md
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2023-03-17 12:59:48 -04:00 |
|
Grant Willcox
|
6043d0ffba
|
Update all links from Wiki site to new docs site.
|
2023-01-27 09:58:53 -06:00 |
|
Steffen Robertz
|
cc5c405941
|
Unauthenticated RCE for multiple Zyxel Router changes
|
2022-12-15 21:44:57 +01:00 |
|
Steffen Robertz
|
1b690283db
|
Unauthenticated RCE for multiple Zyxel Router
|
2022-12-15 11:50:48 +01:00 |
|
Grant Willcox
|
68fdb103fe
|
Add in final touch ups to documentation to fix a typo or two for formatting. Also update exploit ranking since this exploit doesn't retrieve version information before exploiting and is not 100% reliable so Excellent ranking isn't appropriate
|
2022-05-11 09:39:47 -05:00 |
|
Pedro Ribeiro
|
e0c8108942
|
add docs for sslvpn module
|
2022-03-06 23:15:53 +00:00 |
|
Grant Willcox
|
725c5f8d8c
|
Add in another scenario into documentation and add additional detail to one setup step
|
2021-11-18 17:01:25 -06:00 |
|
Grant Willcox
|
a915c3ce5c
|
Add fixes for some of the issues raised during the review process on both the documentation and module side of things
|
2021-11-17 17:25:50 -06:00 |
|
Spencer McIntyre
|
0b3f95abca
|
Writeup the module docs and move the protocol code
|
2021-11-12 15:15:51 -05:00 |
|
Spencer McIntyre
|
21c45b3733
|
Update module metadata
|
2021-10-27 11:58:53 -04:00 |
|
Spencer McIntyre
|
60b17b5c6f
|
Add the module docs for OMIGOD
|
2021-10-26 12:08:48 -04:00 |
|
Shelby Pace
|
a59eebc937
|
remove systemd limit modification info
|
2021-04-30 15:44:22 -05:00 |
|
Shelby Pace
|
de22236902
|
add AutoCheck and update docs output
|
2021-04-30 15:38:57 -05:00 |
|
Rob V
|
7854981730
|
breaking up lines in documentation
|
2021-03-25 16:40:16 -04:00 |
|
Rob V
|
748ff19ef4
|
attempt to please linting
|
2021-03-25 16:11:43 -04:00 |
|
Rob V
|
3d32b48148
|
adding documentation
|
2021-03-25 14:39:00 -04:00 |
|
Brendan Coles
|
6cdb484d7c
|
Add Aerospike Database UDF Lua Code Execution exploit
|
2020-12-05 14:15:22 +00:00 |
|
Pedro Ribeiro
|
a99ce581dd
|
Update TP-Link AC1750 Pwn2Own 2019 module
|
2020-11-26 12:56:02 +00:00 |
|
Spencer McIntyre
|
a27bf9df38
|
Fix some grammatical mistakes and set a default target for anydesk
|
2020-07-01 15:27:33 -04:00 |
|
Spencer McIntyre
|
f1c4cecf6d
|
Add module docs for CVE-2020-13160
|
2020-06-17 11:30:41 -04:00 |
|
William Vu
|
f60e569c1b
|
Add Cisco CML and VIRL-PE advisory to Salt modules
Hat tip @brudis-r7!
|
2020-05-29 15:24:00 -05:00 |
|
William Vu
|
06f9099d7f
|
Add BASE_DN and ROOT_KEY to vmdir and Salt modules
|
2020-05-22 11:16:58 -05:00 |
|
William Vu
|
d431cd9a6b
|
Actually write the setup guide in the module docs
Oops. This should have been filled out.
|
2020-05-12 12:27:19 -05:00 |
|
William Vu
|
f85a8c2e79
|
Add module docs
|
2020-05-11 12:05:38 -05:00 |
|
Radek Domanski
|
5f8d1ef4fd
|
Adding documentation for tplink_archer_a7_c7_lan
|
2020-04-07 19:58:22 +02:00 |
|
h00die
|
9f29f5f419
|
fix spelling received
|
2019-10-05 14:40:27 -04:00 |
|
Matthew Kienow
|
ecc6c473d8
|
Add note about unauthenticated telnetd service
|
2018-08-23 15:50:41 -04:00 |
|
Matthew Kienow
|
ee6bf7a77c
|
Fix documentation markdown table format
|
2018-08-23 15:23:41 -04:00 |
|
Matthew Kienow
|
18712c25cd
|
Add uname to module documentation scenario
|
2018-08-23 15:23:41 -04:00 |
|
Matthew Kienow
|
77b77287cc
|
Add module and payload documentation
|
2018-08-23 15:23:40 -04:00 |
|
Brendan Coles
|
2c0c99e980
|
Add documentation
|
2018-06-03 05:41:53 +00:00 |
|
William Vu
|
436e414b93
|
Land #7815, CVE-2016-9299 exploit
|
2018-05-16 05:29:41 -05:00 |
|
Brendan Coles
|
8168e881b3
|
Add documentation
|
2018-02-07 07:49:21 +00:00 |
|
caleBot
|
e8de6a46d5
|
Update ueb9_bpserverd.md
|
2017-10-20 12:21:17 -06:00 |
|
caleBot
|
36610b185b
|
initial commit for UEB9 exploits - CVE-2017-12477, CVE-2017-12478
|
2017-10-06 09:38:33 -06:00 |
|
Brendan Coles
|
60f7534969
|
Add documentation
|
2017-08-15 03:43:22 +00:00 |
|
notivan
|
cc3e2082a2
|
Module documentation for jenkins_ldap_deserialize
|
2017-01-18 23:44:32 +00:00 |
|
wchen-r7
|
89417304b0
|
Fix format for netcore_udp_53413_backdoor.md
|
2016-08-08 15:42:46 -05:00 |
|
Vex Woo
|
be65f2c4d3
|
add module doc
|
2016-07-26 20:26:22 -05:00 |
|