Alan Foster
5b438fd933
Preference target values when registering options
2020-11-05 23:16:37 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
mattaberegg
a861ad3f21
Payload handler/cleanup improvement
2020-02-19 18:57:08 -08:00
mattaberegg
a0b6584d19
Added password randomization
2020-02-07 19:14:56 -08:00
mattaberegg
e2f2d55ecc
Updated check message
2020-02-07 18:34:27 -08:00
mattaberegg
cb372a54f4
Added info to cleanup message
2020-02-07 16:41:27 -08:00
mattaberegg
a05611d756
Improve cleanup functionality
2020-02-07 16:13:25 -08:00
mattaberegg
edb3aa30f8
Minor style and performance edits
2020-02-05 15:19:06 -08:00
mattaberegg
6f453a0f83
Module rewrite to include Cron exploitation
2020-02-02 17:29:39 -08:00
mattaberegg
c1b66aac77
Updated check function and description
2020-01-20 17:16:45 -08:00
mattaberegg
4af14109f5
Grammar change in exploit name
2020-01-19 14:15:11 -08:00
mattaberegg
d91a166034
Made changes from comments on PR #12858
2020-01-19 13:46:47 -08:00
mattaberegg
fc1b337c58
Add Apache James 2.3.2 Insecure User Creation Command Injection exploit module.
2020-01-18 19:05:27 -08:00
Brent Cook
ce991071e4
Land #12524 , update most python code with python 3 compatibility
2019-12-23 14:49:08 -06:00
h00die
8cb58be4c0
style
2019-12-11 06:44:35 -05:00
h00die
3b2a54a599
add aka to some modules
2019-12-10 09:53:13 -05:00
Cristina
c9948c037d
Apply suggestions from code review
...
- Change executable in shebang from python3 to python
- Revert changes to files that will only run as python2
Co-Authored-By: acammack-r7 <adam_cammack@rapid7.com >
2019-11-01 19:20:22 -07:00
Cristina Muñoz
10b5df1c4f
Change all python2.7 shebangs to python3.
...
Remove utf-8 encoding declarations, as this is the default for python3.
2019-10-31 15:10:58 -07:00
Cristina Muñoz
8563a29003
Convert all python code to python3. Fixes #12506 .
2019-10-31 14:16:14 -07:00
Auxilus
6c9fafb9d5
Delete unused variable
...
I suppose the variable 'f' was for Name in https://github.com/rapid7/metasploit-framework/blob/06720ee18b2d661aa5ea695ed80e4daa88fbf20c/modules/exploits/linux/smtp/haraka.py#L70
I'm not sure, should it be 'f' at https://github.com/rapid7/metasploit-framework/blob/06720ee18b2d661aa5ea695ed80e4daa88fbf20c/modules/exploits/linux/smtp/haraka.py#L70 or just the way it is atm?
2018-12-14 22:27:11 +05:30
Erin Bleiweiss
69a785ff46
Update json for python modules
2018-08-31 16:56:22 -05:00
Brent Cook
b90583d07c
don't throw an exception in haraka checks if we cannot connect
2018-07-18 17:17:45 -05:00
Adam Cammack
1fddbdb8ef
Specify the command option external modules
2018-07-10 10:24:07 -05:00
William Vu
0820268d8a
Improve rank handling with shim logic
2018-06-19 16:46:20 -05:00
William Vu
9913606ed9
Correct rank and formatting in Haraka
2018-06-19 11:44:02 -05:00
Adam Cammack
b0e712e992
Add banner check exploit/linux/smtp/haraka
2018-05-11 12:45:32 -05:00
Adam Cammack
90f2fe545c
Add PEP8 whitespace to exploit/linux/smtp/haraka
2018-05-11 12:43:30 -05:00
Adam Cammack
dd57138423
Make external module read loop more robust
...
Changes from a "hope we get at most one message at a time" model to
something beginning to resemble a state machine. Also logs error output
and fails the MSF module when the external module fails.
2017-11-20 16:52:05 -06:00
h00die
a40429158f
40% done
2017-08-28 20:17:58 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
524373bb48
OCD - Removed un-needed full stop
2017-07-21 07:41:51 -07:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
Brent Cook
f4820d24fb
add a few more AKA references
2017-07-06 22:43:46 -05:00
Brent Cook
fede672a81
further revise templates
2017-05-08 14:26:24 -05:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
Brent Cook
037fdf854e
move common json-rpc bits to a library
2017-04-26 18:08:08 -05:00
Nate Caroe
92e7183a74
Small typo fix
...
Running msfconsole would generate an Ubuntu crash report (?). This seems to be the culprit.
2017-04-17 11:14:51 -06:00
Adam Cammack
6910cb04dd
Add first exploit written in Python
2017-03-31 17:07:55 -05:00
OJ
1d617ae389
Implement first pass of architecture/platform refactor
2016-10-28 07:16:05 +10:00
Thao Doan
7c396dbf59
Use URIHOST
2016-09-16 12:48:54 -07:00
aushack
11342356f8
Support LHOST for metasploit behind NAT
2016-09-13 11:23:49 +10:00
Brent Cook
b08d1ad8d8
Revert "Land #6812 , remove broken OSVDB references"
...
This reverts commit 2b016e0216 , reversing
changes made to 7b1d9596c7 .
2016-07-15 12:00:31 -05:00
wchen-r7
816bc91e45
Resolve #6807 , remove all OSVDB references.
...
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.
Resolve #6807
2016-04-23 12:32:34 -05:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
f703fa21d6
Revert "change Metasploit3 class names"
...
This reverts commit 666ae14259 .
2016-03-07 13:19:55 -06:00
Brent Cook
44990e9721
Revert "change Metasploit4 class names"
...
This reverts commit 3da9535e22 .
2016-03-07 13:19:48 -06:00
Christian Mehlmauer
3da9535e22
change Metasploit4 class names
2016-03-07 09:57:22 +01:00
Christian Mehlmauer
666ae14259
change Metasploit3 class names
2016-03-07 09:56:58 +01:00
James Lee
12256a6423
Remove now-redundant peer
...
These all include either Msf::Exploit::Remote:Tcp or Msf::Exploit::Remote:HttpClient
2016-02-01 15:12:03 -06:00
jvazquez-r7
4224008709
Delete print_debug/vprint_debug
2015-04-21 11:14:03 -05:00