Tod Beardsley
|
a4f681ae35
|
Add quoted hex encoding
|
2016-12-06 09:05:35 -06:00 |
|
Tod Beardsley
|
d549c2793f
|
Fix module filename to be TR-064
|
2016-12-02 08:49:21 -06:00 |
|
Tod Beardsley
|
9e4e9ae614
|
Add a reference to the TR-064 spec
|
2016-12-02 08:48:09 -06:00 |
|
Tod Beardsley
|
ddac5600e3
|
Reference TR-064, not TR-069
|
2016-12-02 08:45:15 -06:00 |
|
William Vu
|
1d6ee7192a
|
Land #7427, new options for nagios_xi_chained_rce
|
2016-11-30 17:11:02 -06:00 |
|
William Vu
|
3e8cdd1f36
|
Polish up USER_ID and API_TOKEN options
|
2016-11-30 17:10:52 -06:00 |
|
Tod Beardsley
|
43cd788350
|
Switch back to echo as cmdstager flavor
|
2016-11-30 10:18:09 -06:00 |
|
Tod Beardsley
|
b75fbd454a
|
Add missing peer in vprint_error
|
2016-11-30 07:59:41 -06:00 |
|
Tod Beardsley
|
657d52951b
|
Linemax 63, switch to printf
|
2016-11-30 07:51:36 -06:00 |
|
Tod Beardsley
|
08b9684c1a
|
Add a FORCE_EXPLOIT option for @FireFart
|
2016-11-29 16:37:13 -06:00 |
|
Tod Beardsley
|
57d156a5e2
|
Revert "XML encode the command passed"
This reverts commit 9952c0ac6f.
|
2016-11-29 16:24:26 -06:00 |
|
Tod Beardsley
|
b7904fe0cc
|
Oh silly delimiters and lack thereof
|
2016-11-29 15:53:05 -06:00 |
|
Tod Beardsley
|
9952c0ac6f
|
XML encode the command passed
|
2016-11-29 15:49:55 -06:00 |
|
Tod Beardsley
|
851aae3f15
|
Oops, wrong module
This reverts commit d55d2099c5.
|
2016-11-29 15:15:18 -06:00 |
|
Tod Beardsley
|
d55d2099c5
|
Just one platform thanks
|
2016-11-29 15:08:45 -06:00 |
|
Tod Beardsley
|
4d6b2dfb46
|
Use CmdStager instead
Oh, and this is totally untested as of this commit.
|
2016-11-29 15:03:38 -06:00 |
|
Tod Beardsley
|
8de17981c3
|
Get rid of the WiFi key stealer
|
2016-11-29 14:48:04 -06:00 |
|
Tod Beardsley
|
75bcf82a09
|
Never set DefaultPaylod, reverse target options
|
2016-11-29 14:43:10 -06:00 |
|
Tod Beardsley
|
f55f578f8c
|
Title, desc, authors, refs
|
2016-11-29 14:39:38 -06:00 |
|
Tod Beardsley
|
d691b86443
|
First commit of Kenzo's original exploit
This is a work in progress, and is merely the copy-paste
of the original PoC exploit from:
https://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/
|
2016-11-29 09:13:52 -06:00 |
|
William Webb
|
6c6221445c
|
Land #7543, Create exploit for CVE-2016-6563 / Dlink DIR HNAP Login
|
2016-11-21 09:59:50 -06:00 |
|
Brent Cook
|
005d34991b
|
update architecture
|
2016-11-20 19:09:33 -06:00 |
|
Brent Cook
|
f313389be4
|
Merge remote-tracking branch 'upstream/master' into land-7507-uuid-arch
|
2016-11-20 19:08:56 -06:00 |
|
wchen-r7
|
4596785217
|
Land #7450, PowerShellEmpire Arbitrary File Upload
|
2016-11-17 17:47:15 -06:00 |
|
Jeffrey Martin
|
c458d662ed
|
report correct credential status as successful
|
2016-11-14 12:27:22 -06:00 |
|
Jeffrey Martin
|
4ae90cbbef
|
Land #7191, Add exploit for CVE-2016-6267 - Trend Micro Smart Protection Server authenticated RCE.
|
2016-11-14 12:06:02 -06:00 |
|
Pedro Ribeiro
|
908713ce68
|
remove whitespace at end of module name
|
2016-11-14 08:35:34 +00:00 |
|
Pedro Ribeiro
|
50f578ba79
|
Add full disclosure link
|
2016-11-08 22:15:19 +00:00 |
|
Pedro Ribeiro
|
95bd950133
|
Point to proper link on github
|
2016-11-07 17:59:29 +00:00 |
|
Pedro Ribeiro
|
f268c28415
|
Create dlink_hnap_login_bof.rb
|
2016-11-07 17:45:37 +00:00 |
|
Alex Flores
|
45d6012f2d
|
fix check method
|
2016-10-30 14:57:42 -04:00 |
|
OJ
|
57eabda5dc
|
Merge upstream/master
|
2016-10-29 13:54:31 +10:00 |
|
Quentin Kaiser
|
c7b775ac1c
|
Fix detection following @bwatters-r7 recommendations. Remove safesync exploit that shouldn't be here.
|
2016-10-28 18:03:56 +00:00 |
|
OJ
|
1d617ae389
|
Implement first pass of architecture/platform refactor
|
2016-10-28 07:16:05 +10:00 |
|
wolfthefallen
|
684feb6b50
|
moved STAGE0 and STAGE1 into datastore
|
2016-10-18 11:47:38 -04:00 |
|
wolfthefallen
|
e806466fe3
|
correct carriage return and link issue
|
2016-10-17 10:31:39 -04:00 |
|
wolfthefallen
|
7e68f7d2a4
|
EmpirePowerShell Arbitrary File Upload (Skywalker)
|
2016-10-17 10:03:07 -04:00 |
|
Brent Cook
|
cfddc734a8
|
Land #7286, WiFi pineapple preconfig command injection module
|
2016-10-14 12:57:42 -05:00 |
|
Brent Cook
|
e05a325786
|
Land #7285, WiFi pineapple command injection via authentication bypass
|
2016-10-14 12:57:05 -05:00 |
|
h00die
|
9d2355d128
|
removed debug line
|
2016-10-10 10:23:51 -04:00 |
|
h00die
|
2ad82ff8e3
|
more nagios versatility
|
2016-10-10 10:21:49 -04:00 |
|
Brendan
|
04f8f7a0ea
|
Land #7266, Add Kaltura Remote PHP Code Execution
|
2016-09-21 17:14:49 -05:00 |
|
Mehmet Ince
|
2d3c167b78
|
Grammar changes again.
|
2016-09-20 23:51:12 +03:00 |
|
Mehmet Ince
|
0f16393220
|
Yet another grammar changes
|
2016-09-20 19:48:40 +03:00 |
|
Mehmet Ince
|
fb00d1c556
|
Another minor grammer changes
|
2016-09-20 19:23:28 +03:00 |
|
Brendan
|
251421e4a7
|
Minor grammar changes
|
2016-09-20 10:37:39 -05:00 |
|
Mehmet Ince
|
385428684f
|
Move module and docs under the exploit/linux/http folder
|
2016-09-20 12:45:23 +03:00 |
|
catatonic
|
c06ee991ed
|
Adding WiFi pineapple command injection via authenticaiton bypass.
|
2016-09-06 17:22:25 -07:00 |
|
catatonic
|
8d40dddc17
|
Adding WiFi pineapple preconfig command injection module.
|
2016-09-06 17:18:36 -07:00 |
|
Quentin Kaiser
|
e4d118108a
|
Trend Micro SafeSync exploit.
|
2016-09-06 19:33:23 +00:00 |
|