bwatters-r7
|
d2c013001d
|
Update stuff
|
2018-10-17 17:17:05 -05:00 |
|
Tim W
|
981b527692
|
fix offset detection
|
2018-10-16 16:32:26 +08:00 |
|
Tim W
|
57e2dd2192
|
send payload url to loader
|
2018-10-16 14:41:34 +08:00 |
|
Tim W
|
1e066df7fd
|
fix debug printing
|
2018-10-15 17:04:31 +08:00 |
|
bwatters-r7
|
629f4c190d
|
change encoding so app source no longer appears as binary
|
2018-10-12 14:44:17 -05:00 |
|
bwatters-r7
|
d1d40115c5
|
Fix source to not look like binary
|
2018-10-12 14:39:00 -05:00 |
|
Shelby Pace
|
cdc2918c84
|
removed original binary, added source
|
2018-10-11 11:42:51 -05:00 |
|
Tim W
|
7fce2bd428
|
initial commit of 32bit trident exploit
|
2018-10-10 17:41:28 +08:00 |
|
bwatters-r7
|
28fb27187a
|
Land #10418, Add DCOM/RPC NTLM Reflection (MS16-075) Via Reflective DLL
Merge branch 'land-10418' into upstream-master
|
2018-10-04 16:54:53 -05:00 |
|
bwatters-r7
|
ce59964141
|
Recompile binaries and prep for VS2013 compiles
|
2018-10-04 16:21:23 -05:00 |
|
bwatters-r7
|
19a5c89b9d
|
Update VS toolset to match VS 2013
|
2018-10-02 17:00:43 -05:00 |
|
Jacob Robles
|
c76f095cd0
|
Inject Payload to Memory First
|
2018-09-19 21:13:49 -05:00 |
|
Jacob Robles
|
dfa030c2df
|
Use System Directory
|
2018-09-19 08:49:12 -05:00 |
|
William Vu
|
6a63feced4
|
Merge remote-tracking branch 'upstream/master' into pr/10418
|
2018-09-18 19:54:44 -05:00 |
|
7echSec
|
47afa21b5f
|
Added Unmarshal visual studio project
|
2018-09-18 19:59:30 +05:30 |
|
Jacob Robles
|
83af598e6a
|
Updated VS solution and module
|
2018-09-17 17:38:19 -05:00 |
|
bwatters-r7
|
f38e6f45ce
|
Redo dllinjection
|
2018-09-14 17:47:53 -05:00 |
|
asoto-r7
|
4cf344dd83
|
WIP: Initial CVE-2018-8440 / ALPC-TaskSched-LPE
|
2018-09-13 18:00:20 -05:00 |
|
Mumbai
|
48255d6173
|
add soluition file
|
2018-08-21 11:07:31 -04:00 |
|
Mumbai
|
4a88d643ba
|
adding reflective Potato
|
2018-08-03 02:09:24 -04:00 |
|
bwatters-r7
|
eab62c18c6
|
Update mov_ss and add mov_ss_dll
|
2018-07-27 09:40:34 -05:00 |
|
bwatters-r7
|
f33d12676f
|
Added License, make msftidy happy, and include original cve project
readme document.
|
2018-07-13 10:19:41 -05:00 |
|
bwatters-r7
|
156b822401
|
First stab at cve-2018-8897
|
2018-07-12 17:31:53 -05:00 |
|
Brent Cook
|
61a98b94b6
|
Land #9528, WebKit apple safari trident exploit (CVE-2016-4657)
|
2018-06-02 21:52:52 -05:00 |
|
Tim W
|
2ec7f11b90
|
add binary
|
2018-05-30 18:02:17 +08:00 |
|
Tim W
|
df60c5bb6b
|
embed mettle within PhoenixNonce
|
2018-05-30 17:30:03 +08:00 |
|
bwatters-r7
|
ce5be387c4
|
Land #8795, Added CVE-2016-0040 Windows Privilege Escalation
Merge branch 'land-8795' into upstream-master
|
2018-05-03 16:33:53 -05:00 |
|
bwatters-r7
|
5a787bcce5
|
We don't need the application.c file
|
2018-05-03 15:08:42 -05:00 |
|
bwatters-r7
|
26f2bdbfb1
|
Change Platform toolset from 140 (vs2015) to 120 (vs2013)
|
2018-05-03 14:58:30 -05:00 |
|
bwatters-r7
|
c08f45223d
|
Clean up comment typos from copy/pasta
|
2018-05-03 14:43:31 -05:00 |
|
Tim W
|
7c3e5da450
|
add more credits/references
|
2018-04-03 14:59:00 +08:00 |
|
Tim W
|
c5039251a2
|
add CVE-2016-4655
rebase
|
2018-04-03 14:58:57 +08:00 |
|
Kirk Swidowski
|
34f2385b8b
|
Merge branch 'master' of https://github.com/de7ec7ed/metasploit-framework
|
2018-03-07 08:20:37 -08:00 |
|
Kirk Swidowski
|
d7cfe41983
|
removed files.
|
2018-03-07 08:20:22 -08:00 |
|
bwatters-r7
|
5a07be9b96
|
Land #9041, Add LPE on Windows using CVE-2017-8464
|
2017-11-08 10:09:03 -06:00 |
|
Spencer McIntyre
|
c2578c1487
|
Refactor GetProcessSid to remove do while FALSE
|
2017-11-07 19:11:24 -05:00 |
|
Spencer McIntyre
|
3f6f70f820
|
Move the cve-2017-8464 source to external/source
|
2017-10-08 13:58:51 -04:00 |
|
Kirk Swidowski
|
2ee94ca3d9
|
made changes based on PR feedback.
|
2017-09-01 16:49:17 -07:00 |
|
Kirk Swidowski
|
b7fc990d17
|
moved project to the source directory.
|
2017-09-01 16:09:53 -07:00 |
|
L3cr0f
|
6a3fc618a4
|
Add bypassuac_injection_winsxs.rb module
|
2017-06-03 12:59:50 +02:00 |
|
Brent Cook
|
176e88f293
|
Land #7835, Add Windows Local Privilege Escalation exploit stub
|
2017-03-08 06:20:58 -05:00 |
|
wchen-r7
|
3d269b46ad
|
Support OS X for Microsoft Office macro exploit
|
2017-02-16 12:28:11 -06:00 |
|
wchen-r7
|
ccaa783a31
|
Add Microsoft Office Word Macro exploit
|
2017-02-02 17:44:55 -06:00 |
|
OJ
|
b6e882c8eb
|
Add a Windows LPE exploit template for x64/x86
|
2017-01-17 11:20:14 +10:00 |
|
OJ
|
32173b9701
|
Move execute_payload to the kernel lib
|
2017-01-17 11:19:26 +10:00 |
|
Brent Cook
|
2585c8c8b5
|
Land #7461, convert futex_requeue (towelroot) module to use targetting and core_loadlib
|
2017-01-11 13:24:25 -06:00 |
|
Tim
|
25a8283af3
|
fork early and use WfsDelay
|
2016-12-20 00:59:27 +08:00 |
|
Tim
|
f1efa760df
|
more fixes
|
2016-12-20 00:52:11 +08:00 |
|
Tim
|
e6d4c0001c
|
hide debug printing
|
2016-12-20 00:52:11 +08:00 |
|
Tim
|
7ac3859393
|
convert futex_requeue module to use targetting and core_loadlib
|
2016-12-20 00:52:11 +08:00 |
|