Commit Graph

514 Commits

Author SHA1 Message Date
Adam Cammack c740f4369c Land #9197, Cleanup Mako Server exploit 2017-11-15 15:01:31 -06:00
William Vu f3e2f4d500 Land #9167, D-Link DIR-850L exploit 2017-11-10 18:15:39 -06:00
William Vu 3936d3baa1 Clean up module 2017-11-10 18:15:22 -06:00
Steven Patterson df2b62dc27 Add Mako Server CMD injection Linux support, update docs, move to multi 2017-11-10 16:28:39 -05:00
h00die 52888871e3 Land #8747 RCE for Geutebrueck GCore on Windows 2017-11-08 20:22:54 -05:00
h00die 7ad151e68b gcore formatting update 2017-11-08 20:21:40 -05:00
Adam Cammack 39916ef61a Land #9133, Command injection in Mako Server examples 2017-11-08 15:11:01 -06:00
bwatters-r7 5a07be9b96 Land #9041, Add LPE on Windows using CVE-2017-8464 2017-11-08 10:09:03 -06:00
bwatters-r7 19e3e181c1 Fix compiling instructions 2017-11-08 09:36:32 -06:00
Spencer McIntyre fa8d017579 Change documentation from a first person context 2017-11-08 09:29:46 -05:00
bwatters-r7 11093b8393 Added documentation 2017-11-08 08:07:06 -06:00
Austin 646c7f7c0a update doc 2017-11-04 11:40:32 -04:00
Austin 40bcb3f0c8 update documentation 2017-11-03 09:09:51 -04:00
Austin caad1bbf27 Create dlink_dir850l_unauth_exec.md 2017-11-02 15:54:45 -04:00
William Vu e3ac6b8dc2 Land #9109, wp-mobile-detector upload and execute 2017-11-01 13:25:16 -05:00
Steven Patterson 8613852ee8 Add Mako Server v2.5 command injection module/docs 2017-10-26 23:29:11 -04:00
h00die 210f6f80b7 netgear1000dng cleanup 2017-10-22 22:17:40 -04:00
Austin e9fdb5bd94 Create netgear_dgn1000_unauth_setup_exec.md 2017-10-22 16:54:06 -04:00
h00die cfd7761818 wp_mobile_detector rce 2017-10-20 23:19:58 -04:00
h00die f250e15b6e Land #9105 rename psh to polycom for name collision 2017-10-20 20:10:57 -04:00
h00die fd028338e1 move psh to polycom so no more powershell name collision 2017-10-20 20:08:11 -04:00
h00die 5a6da487ab Land #9043 two exploit modules for unitrends backup 2017-10-20 20:00:35 -04:00
caleBot e8de6a46d5 Update ueb9_bpserverd.md 2017-10-20 12:21:17 -06:00
Wei Chen c67a5872cd Land #9055, Add exploit for Sync Breeze HTTP Server
Land #9055
2017-10-13 17:34:03 -05:00
bwatters-r7 294230c455 Land #8509, add Winsxs bypass for UAC 2017-10-11 16:24:52 -05:00
Jeffrey Martin 1786634906 Land #9059, Tomcat JSP Upload via PUT Bypass 2017-10-11 15:05:00 -05:00
root 03e7797d6c fixed msftidy errors and added documentation 2017-10-11 07:57:01 -04:00
Ernesto Fernandez ffa29de6c9 Update bypassuac_injection_winsxs.md 2017-10-11 11:43:28 +02:00
h00die e976a91b15 land #9053 RCE for rend micro imsva 2017-10-10 19:27:06 -04:00
bwatters-r7 59d03ec4db Added markdown doc for documentation. 2017-10-10 13:05:29 -05:00
jakxx fd0ce33341 Updated Module Documentation 2017-10-10 12:36:32 -04:00
h00die b796c0be16 fixing docs 2017-10-09 20:31:23 -04:00
Mehmet Ince a2d32b460c Fixing grammer issue 2017-10-09 22:31:13 +03:00
Mehmet Ince c14c93d450 Integrate OfficeScan 11 exploitation and fix grammer issues 2017-10-09 22:11:42 +03:00
Mehmet Ince 395c82050b Adding Trend Micro IMSVA Widget RCE 2017-10-08 18:15:32 +03:00
Mehmet Ince 79c9123261 Adding Trend Micro OfficeScan widget rce module 2017-10-08 17:54:18 +03:00
h00die 7a87e11767 land #8781 Utilize Rancher Server to exploit hosts 2017-10-07 13:04:34 -04:00
h00die 7535fe255f land #8736 RCE for orientdb 2017-10-06 14:35:42 -04:00
h00die e7aa06c1c4 fix documentation 2017-10-06 14:29:39 -04:00
caleBot 36610b185b initial commit for UEB9 exploits - CVE-2017-12477, CVE-2017-12478 2017-10-06 09:38:33 -06:00
M4P0 7fe750422e Update geutebrueck_gcore_x64_rce_bo.md 2017-10-06 15:41:12 +02:00
Maurice Popp 770547269b added documentation, and fixed 4 to 2 indentation 2017-10-06 15:39:25 +02:00
Martin Pizala 701d628a1b Features for selecting the target 2017-10-01 02:04:10 +02:00
bigendiansmalls 9ae8bdda1c Added Bind Shell JCL Payload for mainframe
The bind shell is the companion payload to the reverse_shell_jcl
payload for the mainframe platform.
2017-09-29 16:52:36 -05:00
William Vu 9b75ef7c36 Land #8343, qmail Shellshock module 2017-09-29 00:28:30 -05:00
Martin Pizala f973ff13b6 Add some lines to Exploit Detection and Mitigation 2017-09-29 00:55:53 +02:00
Martin Pizala 40c58e3017 Function for selecting the target host 2017-09-28 23:43:59 +02:00
Martin Pizala cc98e80002 Change arch to ARCH_X64 2017-09-28 20:50:18 +02:00
William Vu 98ae054b06 Land #8931, Node.js debugger exploit 2017-09-25 14:00:13 -05:00
h00die 4d1e51a0ff Land #8906 RCE for supervisor 2017-09-24 08:03:30 -04:00