Shelby Pace
fe1b802cf9
check for dependency in stager/stage
2019-10-10 12:16:09 -05:00
Shelby Pace
7130e8dc98
use binread instead of File.open/read
2019-10-10 12:16:09 -05:00
Shelby Pace
f39fc3a82d
remove extraneous data from shellcode
2019-10-10 12:16:09 -05:00
Shelby Pace
db0abdbec8
use correct method
2019-10-10 12:16:09 -05:00
Shelby Pace
64145cdbf2
add header files
2019-10-10 12:16:09 -05:00
Shelby Pace
7342a4579a
add dependency check code
2019-10-10 12:16:09 -05:00
Shelby Pace
23028a1094
add code to read exe/strip null bytes
2019-10-10 12:16:09 -05:00
Shelby Pace
b9794d76ac
add GlobalFree
2019-10-10 12:16:09 -05:00
Shelby Pace
7dca0ae8e9
remove comments, add option
2019-10-10 12:16:09 -05:00
Shelby Pace
197d4be632
add compiler module
2019-10-10 12:16:09 -05:00
Shelby Pace
506ca5976d
change function names, modify opt
2019-10-10 12:16:09 -05:00
Shelby Pace
f73b7826a8
separate options from payload
2019-10-10 12:16:09 -05:00
Shelby Pace
f32c33ce13
fix careless mistakes
2019-10-10 12:16:09 -05:00
Shelby Pace
71eff44404
format datastore options, concat c src
2019-10-10 12:16:09 -05:00
Shelby Pace
be208106c8
replace hard-coded hashes with block_api call
2019-10-10 12:16:09 -05:00
Shelby Pace
31aa2b7452
add comment, remove puts
2019-10-10 12:16:09 -05:00
Shelby Pace
3e2c8f7779
add Dependency metadata for payloads
2019-10-10 12:16:09 -05:00
Shelby Pace
b1cae12315
fix 'final' error, chacha20 in session
2019-10-10 12:14:27 -05:00
Shelby Pace
2c3c448abc
add ruby chacha encryption and session type
2019-10-10 12:14:27 -05:00
Metasploit
6c44605799
Bump version of framework to 5.0.54
2019-10-10 12:05:04 -05:00
weh
fa292d3184
Change vhost option
2019-10-10 18:36:26 +02:00
weh
98a7649528
Fix plugin version number
2019-10-10 18:34:53 +02:00
Patrik Wehrli
73be8cf7c2
Update vhost option in verification steps
2019-10-10 17:05:11 +02:00
Patrik Wehrli
67a363cce9
Replace domain with hostname
2019-10-10 17:01:08 +02:00
Patrik Wehrli
a450c64f12
Change vhost option to domain
2019-10-10 16:57:20 +02:00
Francesco Soncina
74ae445128
Add AUTOUNHOOK support for shellcode_inject post module
...
The module will now first inject the unhook dll and then the provided shellcode.
2019-10-10 16:35:57 +02:00
weh
6cb27a22db
Remove trailing spaces
2019-10-10 12:45:45 +02:00
weh
bed0369af7
Apply Pullrequest Feedback
2019-10-10 12:44:19 +02:00
weh
00a7bb90a1
Apply Pullrequest Feedback
2019-10-10 12:41:20 +02:00
weh
1ba3b1326f
Apply Pullrequest Feedback
2019-10-10 08:55:05 +02:00
Tim W
8f01ea3c49
update docs description
2019-10-10 13:38:37 +08:00
Tim W
4d4754a389
feedback from bcoles
2019-10-10 13:30:31 +08:00
Tim
620609c955
Update lib/msf/core/post/linux/compile.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-10-10 13:13:40 +08:00
Jeffrey Martin
a931cd58a2
Land #12401 , Get rid of RSpec implicit block expectation syntax
5.0.53
2019-10-09 16:40:51 -05:00
p0
8576a7876a
changed disclosure date to ISO 8601 format
2019-10-09 21:53:47 +02:00
weh
d73503d506
Add docuentation for wp_dukapress_file_read scanner
2019-10-09 21:05:39 +02:00
weh
138b5284d2
Add docuentation for auxiliary/scanner/http/wordpress_scanner
2019-10-09 19:54:57 +02:00
weh
deaa7be8ce
Add documentation for wordpress_xmlrpc_login aux scanner
2019-10-09 18:54:16 +02:00
William Vu
a6ec5131ad
Land #12432 , length check for rdp_recv result
2019-10-09 11:39:48 -05:00
Brent Cook
2d43b88b48
Land #12434 , fix doc dash
2019-10-09 11:36:41 -05:00
William Vu
6fac30aec8
Change vprint_status to vprint_error
2019-10-09 11:36:39 -05:00
William Vu
ad98c2e81c
Fix misnamed BlueKeep exploit documentation
...
Should be an underscore, not a hyphen.
2019-10-09 11:27:50 -05:00
Jose Garduno
d65775e5bf
added metasploit http DoS module
2019-10-09 16:54:43 +02:00
Brent Cook
62412c8d00
log a bit more about what happened
2019-10-09 08:39:03 -05:00
Brent Cook
c4365cfe08
handle extra data on rdp_recv with length check
...
We should really be doing something like strictly parsing PDU headers in rdp_recv and then parseling out PDUs instead of recv_and_pray, but this should get us past the initial issue where sometimes there is an extra PDU right after
2019-10-09 08:22:02 -05:00
dwelch-r7
0e2923e9df
Land #12431 , link COPYING in readme
2019-10-09 13:26:45 +01:00
h00die
3ca4fa1edf
add moved_from statements
2019-10-08 20:31:23 -04:00
William Vu
1a831573bc
Land #12430 , there's a goose in my MSF
2019-10-08 16:38:47 -05:00
Adam Cammack
f9c5939a29
Teach more things about the new check codes
2019-10-08 16:21:40 -05:00
0xGilda
0b95acf0b3
Update honk.txt to MSF substitution sequences
...
as per: https://github.com/rapid7/metasploit-framework/pull/12430#issuecomment-539669624
2019-10-08 20:53:59 +01:00