h00die
|
d8c73f6684
|
replace bold options with h3
|
2025-11-07 15:42:23 -05:00 |
|
cgranleese-r7
|
adff497bd2
|
Updates msf5 as well
|
2025-07-17 11:51:29 +01:00 |
|
cgranleese-r7
|
469f102596
|
Updates docs to reflect new default prompt
|
2025-07-17 09:53:40 +01:00 |
|
sfewer-r7
|
efb0d5da4c
|
fix typo, C1000v should be CSR1000v. Be consistant with IOS XE and not IOS-XE.
|
2025-03-04 09:09:32 +00:00 |
|
sfewer-r7
|
edd36a8182
|
update the docs for exploit/linux/misc/cisco_ios_xe_rce after retesting the changes
|
2025-03-03 20:39:53 +00:00 |
|
sfewer-r7
|
e71a851e3f
|
mention that the C8000v series appliance version 17.6.5 was observed to not be vulnerable to CVE-2023-20273. Inspecting the Lua code shows this appliance has additional command injection filtering in place (see pexec_setsid in /usr/binos/openresty/nginx/conf/pexec.lua) which prevents the injection from working
|
2025-03-03 20:22:46 +00:00 |
|
jheysel-r7
|
2d1af7d809
|
Land #19648 Add exploit module for FortiManager (CVE-2024-47575)
|
2024-12-02 18:31:25 -08:00 |
|
h00die
|
d13bccca05
|
peer review
|
2024-11-28 20:24:25 -05:00 |
|
sfewer-r7
|
000ffb2406
|
make the check routine return a message for Detected.
|
2024-11-22 12:37:50 +00:00 |
|
sfewer-r7
|
c58dbbfb61
|
add in documentation
|
2024-11-15 17:42:57 +00:00 |
|
h00die
|
4ebc6f1ff1
|
peer review
|
2024-11-11 17:37:33 -05:00 |
|
h00die
|
0de93eedb7
|
asterisk ami auth rce
|
2024-11-04 16:27:58 -05:00 |
|
h00die
|
9cba5dad59
|
WIP for asterisk rce
|
2024-11-01 16:28:45 -04:00 |
|
sfewer-r7
|
25ef7d1272
|
add the RCE exploit
|
2023-11-06 17:12:40 +00:00 |
|
h00die
|
557a15a115
|
spelling fixes on docs
|
2023-10-10 14:46:18 -04:00 |
|
sfewer-r7
|
27f5a789c9
|
rework the exploit to use the new MIPS64 fetch payload adapters. Removed the seperate command and dropper targets in favor of a single default target which can do both thanks to fetch payloads. Removed the redundant IO select() call which was bad copy pasta on my part.
|
2023-06-09 09:47:57 +01:00 |
|
sfewer-r7
|
6b101b5a4d
|
make rubocop happy
|
2023-05-22 18:03:58 +01:00 |
|
Ron Bowes
|
6119330e29
|
Update documentation to match current version of modules
|
2023-04-11 09:48:53 -07:00 |
|
Ron Bowes
|
c22c2904c2
|
Fix msftidy_docs stuff
|
2023-04-05 10:53:58 -07:00 |
|
Ron Bowes
|
41fe44ef1a
|
Merge branch 'master' into unirpc-auth-bypass
|
2023-03-29 08:03:05 -07:00 |
|
Ron Bowes
|
6897be4b01
|
Add two Metasploit modules for UniData vulnerabilities
|
2023-03-29 08:01:50 -07:00 |
|
Jack Heysel
|
1f2a889d0c
|
Land #17388, Zyxel router RCE
This module adds a new exploit module for a buffer
overflow in roughly 45 different Zyxel router and VPN models.
|
2023-03-21 15:07:04 -04:00 |
|
Jack Heysel
|
31a32ccd9b
|
linting and srvhost check fix
|
2023-03-17 14:39:02 -04:00 |
|
jheysel-r7
|
764abaf087
|
Update documentation/modules/exploit/linux/misc/zyxel_multiple_devices_zhttp_lan_rce.md
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
|
2023-03-17 12:59:48 -04:00 |
|
Grant Willcox
|
6043d0ffba
|
Update all links from Wiki site to new docs site.
|
2023-01-27 09:58:53 -06:00 |
|
Steffen Robertz
|
cc5c405941
|
Unauthenticated RCE for multiple Zyxel Router changes
|
2022-12-15 21:44:57 +01:00 |
|
Steffen Robertz
|
1b690283db
|
Unauthenticated RCE for multiple Zyxel Router
|
2022-12-15 11:50:48 +01:00 |
|
Grant Willcox
|
68fdb103fe
|
Add in final touch ups to documentation to fix a typo or two for formatting. Also update exploit ranking since this exploit doesn't retrieve version information before exploiting and is not 100% reliable so Excellent ranking isn't appropriate
|
2022-05-11 09:39:47 -05:00 |
|
Pedro Ribeiro
|
e0c8108942
|
add docs for sslvpn module
|
2022-03-06 23:15:53 +00:00 |
|
Grant Willcox
|
725c5f8d8c
|
Add in another scenario into documentation and add additional detail to one setup step
|
2021-11-18 17:01:25 -06:00 |
|
Grant Willcox
|
a915c3ce5c
|
Add fixes for some of the issues raised during the review process on both the documentation and module side of things
|
2021-11-17 17:25:50 -06:00 |
|
Spencer McIntyre
|
0b3f95abca
|
Writeup the module docs and move the protocol code
|
2021-11-12 15:15:51 -05:00 |
|
Spencer McIntyre
|
21c45b3733
|
Update module metadata
|
2021-10-27 11:58:53 -04:00 |
|
Spencer McIntyre
|
60b17b5c6f
|
Add the module docs for OMIGOD
|
2021-10-26 12:08:48 -04:00 |
|
Shelby Pace
|
a59eebc937
|
remove systemd limit modification info
|
2021-04-30 15:44:22 -05:00 |
|
Shelby Pace
|
de22236902
|
add AutoCheck and update docs output
|
2021-04-30 15:38:57 -05:00 |
|
Rob V
|
7854981730
|
breaking up lines in documentation
|
2021-03-25 16:40:16 -04:00 |
|
Rob V
|
748ff19ef4
|
attempt to please linting
|
2021-03-25 16:11:43 -04:00 |
|
Rob V
|
3d32b48148
|
adding documentation
|
2021-03-25 14:39:00 -04:00 |
|
Brendan Coles
|
6cdb484d7c
|
Add Aerospike Database UDF Lua Code Execution exploit
|
2020-12-05 14:15:22 +00:00 |
|
Pedro Ribeiro
|
a99ce581dd
|
Update TP-Link AC1750 Pwn2Own 2019 module
|
2020-11-26 12:56:02 +00:00 |
|
Spencer McIntyre
|
a27bf9df38
|
Fix some grammatical mistakes and set a default target for anydesk
|
2020-07-01 15:27:33 -04:00 |
|
Spencer McIntyre
|
f1c4cecf6d
|
Add module docs for CVE-2020-13160
|
2020-06-17 11:30:41 -04:00 |
|
William Vu
|
f60e569c1b
|
Add Cisco CML and VIRL-PE advisory to Salt modules
Hat tip @brudis-r7!
|
2020-05-29 15:24:00 -05:00 |
|
William Vu
|
06f9099d7f
|
Add BASE_DN and ROOT_KEY to vmdir and Salt modules
|
2020-05-22 11:16:58 -05:00 |
|
William Vu
|
d431cd9a6b
|
Actually write the setup guide in the module docs
Oops. This should have been filled out.
|
2020-05-12 12:27:19 -05:00 |
|
William Vu
|
f85a8c2e79
|
Add module docs
|
2020-05-11 12:05:38 -05:00 |
|
Radek Domanski
|
5f8d1ef4fd
|
Adding documentation for tplink_archer_a7_c7_lan
|
2020-04-07 19:58:22 +02:00 |
|
h00die
|
9f29f5f419
|
fix spelling received
|
2019-10-05 14:40:27 -04:00 |
|
Matthew Kienow
|
ecc6c473d8
|
Add note about unauthenticated telnetd service
|
2018-08-23 15:50:41 -04:00 |
|