William Vu
d9cb052189
Fix improper use of the Ruby shovel operator (<<)
...
junk would be modified and returned, and we just want to return the
concatenated string. Practically doesn't matter, but it's incorrect.
This was my first public module. I've been wanting to fix this since.
I'm noticing it again now as I look for how I used Ret in a target.
2018-10-05 02:18:06 -05:00
bwatters-r7
28fb27187a
Land #10418 , Add DCOM/RPC NTLM Reflection (MS16-075) Via Reflective DLL
...
Merge branch 'land-10418' into upstream-master
2018-10-04 16:54:53 -05:00
bwatters-r7
9a45c66db4
Fixed check to you know, check.
2018-10-04 16:38:35 -05:00
William Vu
9f30512532
Land #10707 , module traits to augment module rank
2018-10-04 13:26:14 -05:00
Jacob Robles
071aa04111
Land #10738 , Add Zahir Enterprise 6 build 10b BOF
2018-10-04 11:00:12 -05:00
Jacob Robles
060c68d2e0
Aligment, minor modifications
2018-10-04 10:10:09 -05:00
Dhiraj Mishra
9f8f0b8885
Fixing carriage/spaces return at EOL
2018-10-04 15:41:46 +05:30
Dhiraj Mishra
783789d098
Updating
2018-10-04 15:01:06 +05:30
Thomas Gregory
144c76ecd4
Latest fix based on @jrobles-r7 recommendations
...
Fixing:
- MetasploitModule class changed
- Remove the word 'exploit' from name
- Remove StackAdjustment
- Remove Privileged option
- Remove make_nops(12)
- Remove extra buffer at the end of exploit
2018-10-04 16:18:02 +07:00
Thomas Gregory
991ac3c671
Fixing for msftidy
...
Fixing some format because still throw errors
2018-10-03 18:55:29 +07:00
Thomas Gregory
cb5d68b641
Fixing based on msftidy.rb
...
Makes msftidy happy
2018-10-03 17:13:24 +07:00
bwatters-r7
428d368444
shut up, rubocop
2018-10-02 14:40:55 -05:00
bwatters-r7
64d53cd882
code cleanup
2018-10-02 14:06:25 -05:00
Fabio Poloni
4927f96f61
Fixed small typo
2018-10-02 15:57:57 +02:00
modpr0be
ff560ee990
Add test for Zahir 0day exploit
...
Add test for Zahir 0day exploit, need to test more e.g. VirtualBox or Physical machines.
2018-09-29 18:59:14 +07:00
Wei Chen
9064fac1ff
Fix code based on Will's feedback
2018-09-26 21:13:37 -05:00
Wei Chen
583874d370
Update use of reliability/side-effects/stability metadata
2018-09-26 18:54:08 -05:00
Dhiraj Mishra
db15340306
Fixing
2018-09-22 15:30:51 +05:30
Dhiraj Mishra
25ed5dc3a6
Moving to exploits/windows/local
2018-09-22 15:22:30 +05:30
bwatters-r7
849547793b
Land #10643 , CVE-2018-8440 ALPC Scheduler
...
Merge branch 'land-10643' into upstream-master
2018-09-21 15:38:45 -05:00
Jacob Robles
47bf780b88
specify meterpreter, update documentation
...
Warning is after spell...
2018-09-21 12:31:56 -05:00
Jacob Robles
c9de43c8d0
Code cleanup, feedback from bcoles
2018-09-21 10:11:26 -05:00
Jacob Robles
8a0f5c12f2
Move setup info, remove accessors
2018-09-21 07:47:22 -05:00
Jacob Robles
981fb38d52
Remove additional unused code
2018-09-20 07:04:41 -05:00
Jacob Robles
ee604e1d23
Remove unused code
2018-09-20 07:01:58 -05:00
Jacob Robles
f99df75719
Remove uploading payload dll to disk
2018-09-19 21:24:22 -05:00
Jacob Robles
c76f095cd0
Inject Payload to Memory First
2018-09-19 21:13:49 -05:00
Jacob Robles
42ccc37bca
Added description to module
2018-09-19 10:22:51 -05:00
Jacob Robles
8a20e0e702
Specific target, add process option
2018-09-19 08:49:54 -05:00
Hubert Lin
22c57d1bf0
chmod 644
2018-09-19 18:19:12 +08:00
Hubert Lin
36fa8f2ffc
Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow.
2018-09-19 15:28:46 +08:00
Hubert Lin
827219aff3
Revert "Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow"
...
This reverts commit d06587caef .
2018-09-19 15:22:12 +08:00
Hubert Lin
d06587caef
Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow
2018-09-19 15:09:40 +08:00
Hubert Lin
5b6938e942
Revert "Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Buffer Overflow"
...
This reverts commit 1a9aa8ac3b .
Need to branch it.
2018-09-19 13:20:00 +08:00
William Vu
1d091408f7
Make msftidy happy
2018-09-18 20:00:08 -05:00
William Vu
6a63feced4
Merge remote-tracking branch 'upstream/master' into pr/10418
2018-09-18 19:54:44 -05:00
Hubert Lin
1a9aa8ac3b
Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Buffer Overflow
2018-09-18 16:09:05 +08:00
Brent Cook
6126a627cc
Land #10570 , AKA Metadata Refactor
2018-09-17 22:29:20 -05:00
Brent Cook
a814899dc2
Land #10660 , deregister RHOSTS as well as RHOST
2018-09-17 22:26:37 -05:00
Brent Cook
1aabf8d83f
deregister RHOSTS as well
2018-09-17 22:26:16 -05:00
Jacob Robles
83af598e6a
Updated VS solution and module
2018-09-17 17:38:19 -05:00
Erin Bleiweiss
011c25ed59
Merge changes from master (ghostscript)
2018-09-17 13:57:28 -05:00
William Vu
4c036e70c1
Fix http://seclists.org links to https://
...
I have no idea how this happened in my own code. I was seeing https://.
2018-09-15 18:54:45 -05:00
bwatters-r7
f38e6f45ce
Redo dllinjection
2018-09-14 17:47:53 -05:00
asoto-r7
4cf344dd83
WIP: Initial CVE-2018-8440 / ALPC-TaskSched-LPE
2018-09-13 18:00:20 -05:00
bwatters-r7
2fbbf88ea9
Land #10560 , ms17_010_eternalblue: use SMBDomain value when provided
...
instead of ignoring it
Merge branch 'land-10560' into upstream-master
2018-09-13 10:08:54 -05:00
Wei Chen
254e8b9fd0
Cleanup for foxit_reader_uaf
2018-09-05 21:47:57 -05:00
Shelby Pace
55bf6e5dd4
removed require in erb file
2018-09-05 18:09:29 -05:00
Shelby Pace
6a3a4de289
included path to erb, removed multiline pdf string
2018-09-05 14:09:10 -05:00
Erin Bleiweiss
5092d561f9
Update AKA values for ms17_010_psexec
2018-08-31 16:56:28 -05:00