Commit Graph

2441 Commits

Author SHA1 Message Date
Load dc07b78dcd @LoadLow Marks the generated ODT file readonly 2019-08-18 18:36:31 +02:00
Load 9b1a3b4033 Marks the generated ODT file readonly
Prevents autosave and further modifications after opening the document on the target system.
2019-08-18 17:59:25 +02:00
Load e6b72b5b43 Cleanup odt metadata
Metadata part is not mandatory on ODT files
2019-08-18 17:51:36 +02:00
Shelby Pace 409b3c9c4b using python payload for platform independence 2019-08-16 15:36:42 -05:00
LoadLow 5f478b7fd6 Adds exploit module for CVE-2019-9848
uses on dom-loaded event (triggered just after opening the document) and still working on 6.2.5
2019-07-30 23:07:20 +02:00
Brent Cook 5b8a75f544 Land #12119, Add OS X post module to manage Sonic Pi 2019-07-28 23:12:26 -05:00
Wei Chen 2f720a1f26 Land #12137, Update setting new .exe of Sophos AV 2019-07-28 21:49:31 -05:00
Wei Chen c47caec03f Land #12107, Add module Redis Unauthenticated Code Execution 2019-07-28 21:40:03 -05:00
GabrielMioranza 4d6f16eac1 Update setting new .exe of Sophos AV
Add .exe used by Sophos AV Endpoint
2019-07-27 16:47:05 -03:00
William Vu e6e3ec493b Rename play_pattern_timed durations to beats
This is so I don't forget they're beats, not seconds. Also, "times"
already has special meaning in Ruby, so let's not confuse ourselves
further.
2019-07-26 17:41:24 -05:00
William Vu 42c2d78731 Remove fluff for better effect 2019-07-26 17:18:39 -05:00
William Vu 61e9f2b5bf Fix rhythm of melody section
Thanks for your ears, @busterb!
2019-07-26 14:09:57 -05:00
William Vu a952fc303b Fix play_pattern_timed 2019-07-22 23:53:24 -05:00
William Vu 3bc65b0e9e Play it like a real band 2019-07-22 22:23:44 -05:00
William Vu 283f9d2e08 Add OS X Manage Sonic Pi post module 2019-07-22 18:46:02 -05:00
Green-m 07f3c074d4 Add doc and enhance the module. 2019-07-20 00:17:57 +08:00
Green-m b6697f5016 Add redis rce module and data stuff.
To do:
1. Check env of system and compiler.
2. Add a compiled so file to be compatible with windows and mac.
3. Add doc.
2019-07-17 15:33:02 +08:00
Wei Chen 27bb166938 Land #12011, Add module for cve-2018-8453 2019-07-15 11:31:07 -05:00
Jacob Robles 5c0bbbbaa0 Land #12070, Add module for CVE-2019-0841 2019-07-15 09:32:47 -05:00
Shelby Pace f7c252eef3 move source to external/source directory 2019-07-09 09:08:28 -05:00
Jacob Robles a55aea33a9 Add cve-2018-8453 exploit module 2019-07-09 07:15:13 -05:00
Shelby Pace c69799262d fixed issue with hard link exe 2019-07-03 15:44:00 -05:00
Shelby Pace a83812ad55 add source code, compiled exe for diaghub loading 2019-07-03 14:32:22 -05:00
Brent Cook e50ab5cd13 Land #11726, add exploit for CVE-2019-8513, macOS TimeMachine cmd injection 2019-06-29 05:36:12 -05:00
William Vu f3b509a1bc Implement on_request_uri 2019-06-25 23:47:19 -05:00
Shelby Pace d3cd1a3fa0 added VS2013 compiled executables 2019-06-19 15:19:00 -05:00
Shelby Pace 5b188a02ba add code that makes hard links 2019-06-06 15:59:53 -05:00
Wei Chen b8abb550e6 Land #11924, Update adobe_flash_opaque_background_uaf for Win 10 2019-06-04 00:51:34 -05:00
sinn3r 22e8d3488d Land #11862, wordlists for wordpress plugin/theme directories
Add wordlists for enumerating WordPress plugin/theme directories
2019-06-03 00:54:43 -05:00
Tim W 6921ca74d8 add exploit binary 2019-06-02 10:19:24 +08:00
Tim W 32af9cb897 Initial commit of CVE-2018-4233 for iOS 10 2019-06-02 10:19:24 +08:00
suzu991154 0a6f1d5538 Add support for Windows 10(10240) to CVE-2015-5122 2019-06-01 14:44:30 +09:00
NoodleOfDeath 2a5233156f Updated wordlists to match generated script provided on https://github.com/rapid7/metasploit-framework/pull/11862 2019-05-28 12:02:03 -04:00
NoodleOfDeath 7bd9608d5e Removed extraneous newline ending in wp-plugins.txt 2019-05-24 17:50:33 -04:00
NoodleOfDeath d4e79cffe7 added wp-themes wordlist to reflect https://themes.svn.wordpress.org/ 2019-05-24 17:40:37 -04:00
NoodleOfDeath 9f3e4e0b65 modified wordlist to reflect https://plugins.svn.wordpress.org/ 2019-05-24 17:37:02 -04:00
NoodleOfDeath 5f889919b4 Added a wordlist of 1491 WordPress plugins that can be enumerated in the wp/wp-content/plugins directory 2019-05-20 14:30:02 -04:00
Tim W be1d185a04 Add CVE-2019-8565 OSX Feedback Assistant local root exploit 2019-05-07 04:30:47 +08:00
Tim W fbbcc2b607 add exploit binary 2019-04-21 16:02:10 +08:00
Shelby Pace 54edf3c008 reduced file size 2019-04-16 09:06:44 -05:00
Tim W 0472f96209 add the exploit binary 2019-04-16 13:09:41 +08:00
Tim W c428684732 eject only the malformed images 2019-04-16 13:09:13 +08:00
Shelby Pace 391e7cf8ef adjusted font size and color 2019-04-12 14:01:29 -05:00
Shelby Pace 700562594c getting session on windows 2019-04-12 14:01:29 -05:00
Shelby Pace 4873b7c3e6 using a path for both Windows and Linux 2019-04-12 14:01:29 -05:00
Shelby Pace 9d0c045b0d added erb file and base for module 2019-04-12 14:01:29 -05:00
William Vu 5867158238 Land #11595, can_flood post module 2019-04-01 12:38:46 -05:00
William Vu f5f4c4bec2 Clean up module 2019-04-01 12:24:35 -05:00
Justin Bollinger c98ed4b494 Updated ipmi_users.txt
Added username 'Admin'
2019-03-22 11:40:24 -04:00
PietroBiondi ce218fc86a Add can_flood post exploitation for CAN and added example list of frames 2019-03-20 13:17:41 +01:00