cn-kali-team
94de45d856
Fix Bug
2020-02-29 23:22:56 +08:00
cn-kali-team
60f4787123
Exception handling and automatic get_domain info
2020-02-29 15:26:39 +08:00
cn-kali-team
a248983ca8
Change the get_domain function to optional
2020-02-29 15:25:41 +08:00
cn-kali-team
9fa339eca8
Add an option,Fully implemented through API
2020-02-29 00:22:58 +08:00
cn-kali-team
e9c16fb2bb
New Function and Fix data type in the NetLocalGroupAddMembers parameter
2020-02-29 00:20:09 +08:00
cn-kali-team
2ef04153b4
Add Api Constants
2020-02-29 00:18:48 +08:00
cn-kali-team
1420fa9d8b
Add Function
2020-02-29 00:14:55 +08:00
cn-kali-team
ee64f38d8c
Added post module for adding local user accounts
2020-02-25 20:03:05 +08:00
cn-kali-team
04d54bc786
Added additional netapi32.dll functions
2020-02-25 20:00:21 +08:00
cn-kali-team
87ee307183
Add New Function
2020-02-25 19:59:36 +08:00
Metasploit
011ed3602c
automatic module_metadata_base.json update
2020-02-21 19:21:50 -06:00
Tim W
7aa89c9d4e
Land #12970 , revert reverse_powershell changes
2020-02-22 09:12:51 +08:00
Brent Cook
8a5db82224
Land #12973 , update Gemfile.lock
2020-02-21 17:10:11 -06:00
William Vu
957b2f2163
Update Gemfile.lock
2020-02-21 17:05:01 -06:00
William Vu
0b133d28a2
Land #12972 , msfvenom Zsh completion fix
2020-02-21 16:45:52 -06:00
Spencer McIntyre
c23a4b195e
Remove the --help-formats option
2020-02-21 17:40:08 -05:00
Metasploit
b6bd7031f8
automatic module_metadata_base.json update
2020-02-21 16:05:25 -06:00
Jeffrey Martin
578bf9999f
Land #12955 , Update logic for ForceExploit in modules
2020-02-21 15:45:12 -06:00
dwelch-r7
eb60fa1de1
Land #12968 , Fix aux moules check command
2020-02-21 16:30:16 +00:00
Metasploit
b5be9402b1
automatic module_metadata_base.json update
2020-02-21 09:27:07 -06:00
bwatters-r7
2db93c9051
Land #12002 , Feature/reverse ssh
...
Merge branch 'land-12002' into upstream-master
2020-02-21 09:17:51 -06:00
Metasploit
5b0eab476a
automatic module_metadata_base.json update
2020-02-21 08:58:53 -06:00
Christophe De La Fuente
f9077bcd8d
Land #12704 , OpenNetAdmin 18.1.1 Remote Code Execution exploit
2020-02-21 15:49:26 +01:00
Christophe De La Fuente
5e4b83581a
Fix indentation issue
2020-02-21 15:47:32 +01:00
Metasploit
00638f2e41
automatic module_metadata_base.json update
2020-02-21 08:07:23 -06:00
h00die
fe0e955dc2
Land #12849 , oracle_login docs
2020-02-21 08:58:16 -05:00
h00die
f451041d4b
oracle_login docs
2020-02-21 08:41:42 -05:00
bwatters-r7
9ef6110b54
Revert "Land #12945 , fix the cmd/windows/reverse_powershell payload"
...
This reverts commit 564895e1a8 , reversing
changes made to c1b2762b03 .
This appears to make it worse.
2020-02-21 06:53:37 -06:00
Metasploit
ae6b3d0bf6
automatic module_metadata_base.json update
2020-02-20 21:19:10 -06:00
bwatters-r7
c9e4ca34c3
Land #12921 , Updating regex in ms16_075_reflection_juicy exploit windows version check
...
Merge branch 'land-12921' into upstream-master
2020-02-20 21:10:37 -06:00
Metasploit
57ddd4b37c
automatic module_metadata_base.json update
2020-02-20 21:01:48 -06:00
bwatters-r7
564895e1a8
Land #12945 , fix the cmd/windows/reverse_powershell payload
...
Merge branch 'land-12945' into upstream-master
2020-02-20 20:52:46 -06:00
Onur ER
e4456c9006
Update opennetadmin_ping_cmd_injection.md
2020-02-21 04:14:21 +03:00
Onur ER
f483b80849
Changed to vars_post
2020-02-21 03:48:12 +03:00
Onur ER
695f6869df
Update opennetadmin_ping_cmd_injection.rb
2020-02-21 03:13:44 +03:00
Onur ER
f90d605c21
Update modules/exploits/unix/webapp/opennetadmin_ping_cmd_injection.rb
...
Co-Authored-By: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-02-21 03:07:27 +03:00
Onur ER
1fe1506b42
Update documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
...
Co-Authored-By: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-02-21 03:06:56 +03:00
0x44434241
f6e4b52446
Removing dead code.
2020-02-21 08:33:20 +09:00
Brent Cook
c1b2762b03
Land #12966 , update DisablePayloadHandler warning msg.
2020-02-20 16:46:48 -06:00
Metasploit
c309e2325f
Bump version of framework to 5.0.77
2020-02-20 12:06:57 -06:00
William Vu
de6306fa35
Fix message, once more with feeling
2020-02-20 11:26:21 -06:00
Alan Foster
f780d94ec6
Remove dead code for aux scanner modules check
2020-02-20 16:54:25 +00:00
William Vu
9c69059a24
Fix DisablePayloadHandler warning once and for all
2020-02-20 10:35:47 -06:00
Metasploit
df277e1406
automatic module_metadata_base.json update
5.0.76
2020-02-20 03:52:12 -06:00
Christophe De La Fuente
f484e6c83c
Land #12862 , Apache James 2.3.2 arbitrary file write exploit module
2020-02-20 10:41:13 +01:00
mattaberegg
a861ad3f21
Payload handler/cleanup improvement
2020-02-19 18:57:08 -08:00
mattaberegg
739928b56a
Added line break to docs
2020-02-19 17:56:13 -08:00
Metasploit
29f5a1c425
Bump version of framework to 5.0.76
2020-02-19 13:39:25 -06:00
William Vu
de56cde848
Land #12961 , vendored Expect library
5.0.75
2020-02-19 13:10:43 -06:00
Adam Cammack
ee80e9eb34
Vendor the stdlib expect for Windows sockets
...
`expect.rb` is part of the `pty` extension to the Ruby stdlib since it
uses `select` and is meant for use with things like pipes or terminals
and Windows does not allow for selecting on those sorts of handles.
Since we only use it for sockets, we can pull it in straight to allow
for use on Windows without building the whole `pty` extension.
2020-02-19 12:56:36 -06:00