cn-kali-team
94de45d856
Fix Bug
2020-02-29 23:22:56 +08:00
cn-kali-team
60f4787123
Exception handling and automatic get_domain info
2020-02-29 15:26:39 +08:00
cn-kali-team
9fa339eca8
Add an option,Fully implemented through API
2020-02-29 00:22:58 +08:00
cn-kali-team
ee64f38d8c
Added post module for adding local user accounts
2020-02-25 20:03:05 +08:00
bwatters-r7
2db93c9051
Land #12002 , Feature/reverse ssh
...
Merge branch 'land-12002' into upstream-master
2020-02-21 09:17:51 -06:00
dwelch-r7
31a6e0e396
Add post module for ssh persistence in windows
2020-02-05 16:21:38 +00:00
dwelch-r7
97f5f37344
Land #12807 , Install OpenSSH for Windows
2020-02-03 14:50:30 +00:00
bluesentinelsec
5d7c50e3ed
updated to use Msf::Post::Windows::Powershell mixin
2020-01-19 19:51:44 -05:00
bluesentinelsec
7eeb8c33eb
Added new post exploitation module: 'Install OpenSSH for Windows'
2020-01-09 19:58:31 -05:00
Francesco Soncina
988971bd94
Update shellcode_inject.rb
2019-12-18 16:05:37 +01:00
Francesco Soncina
f22c6f2f63
add support for PPID spoofing to migrate
2019-12-17 16:39:18 +01:00
Francesco Soncina
f9d2f9fa2e
Update shellcode_inject.rb
2019-12-17 01:42:52 +01:00
Francesco Soncina
cbd225dfed
Update shellcode_inject.rb
2019-12-17 01:34:12 +01:00
Francesco Soncina
5c7c071094
add support for PPID spoofing to shellcode_inject
2019-12-17 01:31:40 +01:00
bwatters-r7
6be4729a02
Land #12391 , Add shellcode_inject post module
...
Merge branch 'land-12391' into upstream-master
2019-12-12 15:20:51 -06:00
bwatters-r7
fb5c896d40
Streamline Checks and error for channelized comms before injection
2019-12-12 15:19:17 -06:00
bwatters-r7
cc25a30d1a
Move dpendency to mixin and adjust print statements
2019-12-04 09:00:03 -06:00
bwatters-r7
2a14332f20
First try at adding error handling and offloading methods to the
...
Post::Windows::Process mixin for resusability and deduplication
2019-12-03 14:11:50 -06:00
Francesco Soncina
2549de809d
fix bug in PID check
2019-11-07 12:57:05 +01:00
Francesco Soncina
e992480b5c
Update shellcode_inject.rb
2019-10-17 16:02:59 +02:00
Francesco Soncina
74ae445128
Add AUTOUNHOOK support for shellcode_inject post module
...
The module will now first inject the unhook dll and then the provided shellcode.
2019-10-10 16:35:57 +02:00
bwatters-r7
47dd96df68
Remove duplicate module in the wrong place
2019-10-08 08:48:11 -05:00
Francesco Soncina
dd9fb2d9d6
Add shellcode_inject post module
...
This module injects an arbitrary shellcode into a target process.
2019-10-03 16:47:10 +02:00
dwelch-r7
fe2b3f8f29
Remove targets from post modules
2019-09-23 17:26:36 +01:00
Francesco Soncina
b6b3a54b79
fix typo in payload_inject
...
:)
2019-07-27 19:02:33 +02:00
RageLtMan
f874f50748
Update Author fields for several modules
...
Add hirura to authors list for the Ruby reverse_ssh payloads.
Update all modules with author-per-line name references to be
consistent (useful given the difference in names between commiter
in git log and GitHub account).
Next steps:
See if HrrRbSsh client-side implementation can be fleshed out
enough to create alternative payload outputs for both of the Ruby
modules (using TARGET/ACTION to select between net/ or hrr_).
2019-06-25 20:49:26 -04:00
Brent Cook
53557cc92e
replace trivial usage of expand_path with getenv
...
expand_path is not implemented consistently across platforms and
sessions, which leads to confusing behavior. In places where we have trivial
single variable expansions, this changes modules and library code to just use
getenv.
We'll look at the rest individually to see if they can also be reimplemented in
terms of getenv.
2019-05-31 17:44:35 -05:00
bwatters-r7
df9c3da47e
Land #10842 , Add Windows Post Module to roll back Windows Defender signatures
...
Merge branch 'land-10842' into upstream-master
2018-12-03 10:57:38 -06:00
bwatters-r7
a801d741c9
Remove old module
2018-11-30 17:28:54 -06:00
bwatters-r7
70031b6721
Shut up msftidy and document updates
2018-11-30 16:41:40 -06:00
bwatters-r7
3c992b7af1
Updated documentation and added options in the module to update or roll back
...
definitions
2018-11-30 16:25:33 -06:00
bwatters-r7
a41b9a77d8
Change the module name, fix cleanup, add documentation
2018-11-30 15:20:34 -06:00
bwatters-r7
1304f93f1f
Add more checks and a cleanup function
2018-11-29 10:39:46 -06:00
Luisco100
7f26364d5b
Changes suggested by OJ
2018-10-29 22:01:47 -05:00
Luisco100
74683ce951
Add Windows Post Module to disable Windows Defender signatures
2018-10-21 12:07:54 -05:00
bwatters-r7
20daba6e2d
fix line endings
2018-08-28 11:33:17 -05:00
alpiste
f1e4079641
move add_thread code to lib/rex/post/meterpreter/extensions/peinjector/peinjector.rb
2018-08-28 09:02:21 -05:00
alpiste
015abca8af
MSFTidy module
2018-08-28 09:02:21 -05:00
alpiste
bb151bb727
MSFTidy module
2018-08-28 09:02:21 -05:00
alpiste
2251c4a712
Add peinjector post module
2018-08-28 09:02:21 -05:00
William Vu
14da99bb3d
Fix missing RequestError in a few post modules
...
Should be Rex::Post::Meterpreter::RequestError.
2018-06-12 17:11:29 -05:00
Aaron Soto
be18930f12
Cleaned up output, only querying for %WINDIR% if necessary
2018-04-09 15:27:50 -05:00
Auxilus
c07f2f1a09
Update run_as.rb
2018-04-09 21:24:16 +05:30
Auxilus
c34b796f13
Remove temp file from dist after cmd execution
...
https://github.com/rapid7/metasploit-framework/issues/9830
2018-04-09 20:14:01 +05:30
bwatters-r7
e17be05e6a
Land #9595 , Add post module RID Hijacking on Windows
2018-04-03 14:12:34 -05:00
r4wd3r
d6dc0a2d4f
Adjust rid_hijack.rb code style with rubocop recommendations.
2018-04-03 04:57:41 +02:00
Jacob Robles
57b048fbf7
Remove requires, changed in-place modification
2018-03-26 17:46:18 -05:00
Green-m
18a1593de7
Clean up registry and fix bug when cleaning the windows local file
2018-03-02 02:31:09 -05:00
Green-m
d1e91dfdfd
Fix bug
2018-03-01 22:19:03 -05:00
Green-m
2bb8fc7325
Fix bug
2018-03-01 22:16:59 -05:00