h00die
a39b1c9fe5
msftidy_docs
2022-09-26 15:56:43 -04:00
h00die
61f576d3e1
mobile mouse server exploit
2022-09-26 15:45:42 -04:00
Grant Willcox
0908006466
Land #16985 , wifi mouse rce - CVE-2022-3218
2022-09-23 14:46:49 -05:00
Grant Willcox
b62f163696
Update documentation on module and exploit a little more to make things a bit clearer
2022-09-23 14:08:18 -05:00
h00die
eb516f402e
wifi mouse doc updates
2022-09-21 16:38:50 -04:00
h00die
32402c0e6d
wifi mouse doc updates
2022-09-21 16:35:08 -04:00
Grant Willcox
605db0160d
Fix up documentation
2022-09-21 15:02:04 -05:00
h00die
271171f6d2
unified now with invisible feature
2022-09-18 19:02:59 -04:00
h00die
66bbe98f5f
wifi remote with better cmd stagers
2022-09-09 05:57:36 -04:00
h00die
ae91cfa9c5
unified_remote exploit
2022-09-08 17:09:31 -04:00
h00die
c6d453f5b9
fix docs
2022-09-05 08:23:40 -04:00
h00die
3f7e0667f6
wifi mouse rce
2022-09-05 08:16:49 -04:00
Spencer McIntyre
ae5a9bd41b
Land #16734 , Add rtf support to cve-2022-30190
...
Add rtf support to cve-2022-30190 AKA Follina
2022-08-25 17:26:46 -04:00
Spencer McIntyre
68eae1664e
Tweak the follina docs
2022-08-25 17:10:59 -04:00
Spencer McIntyre
07fdc1f1ec
Land #16907 , ms10_092_schelevator: Cleanup
2022-08-22 11:53:02 -04:00
Grant Willcox
97bce45e69
Land #16915 , Add exploit for CVE-2022-23277 (Exchange RCE)
2022-08-19 11:11:46 -05:00
bcoles
666a3efcfd
ms10_092_schelevator: Cleanup
2022-08-19 15:19:28 +10:00
Christophe De La Fuente
d49b74d164
Land #16809 , Add exploit module for Advantech iView command injection - CVE-2022-2143
2022-08-18 17:19:14 +02:00
Spencer McIntyre
7c1dd17c86
Add a missing verison, fix typos
2022-08-17 17:36:31 -04:00
bwatters
115955591b
Fix up the Unicode coversions and update docs
2022-08-17 13:21:56 -05:00
Spencer McIntyre
62ab42b797
Update vulnerable version numbers and docs
2022-08-17 08:55:46 -04:00
Spencer McIntyre
0e148d6ba4
Update and rename the module
2022-08-09 13:32:09 -04:00
Ron Bowes
be25e1fc77
Add documentation
2022-08-05 13:55:05 -05:00
space-r7
0334beada2
Land #16758 , add ManageEngine ADAudit Plus exploit
2022-08-05 12:19:42 -05:00
space-r7
4202502992
make some prints vprints, add steps
2022-08-05 11:34:46 -05:00
Ron Bowes
7c21c57564
Merge branch 'master' into manageengine-adauditplus-cve-2022-28219
2022-08-04 14:07:50 -07:00
Grant Willcox
ada3be8f7b
Update options section in documentation
2022-08-02 14:13:25 -05:00
Grant Willcox
f0e62de46a
Add CVE-2022-35405 docs and module
2022-08-02 11:57:56 -05:00
Ron Bowes
b4b5f31c3d
Add documentation
2022-07-26 10:48:18 -07:00
space-r7
e1b0e871b3
add finished module and docs
2022-07-21 18:33:56 -05:00
bwatters
e3e6afbaa3
Land #16753 , ms03_007_ntdll_webdav: Cleanup and add additional offsets
...
Merge branch 'land-16753' into upstream-master
2022-07-19 08:48:06 -05:00
Jack Heysel
2af8042bfa
Land #16761 , clean up ms01_023_printer
...
Adds additional offsets for various Windows 2000 targets.
Replaces raw socket TCP with HttpClient. This works fine in testing.
Fixes default payload, adds docs and notes.
2022-07-16 17:56:59 -04:00
bcoles
83bc954e9d
ms01_023_printer: cleanup; use HttpClient; add additional targets
2022-07-09 01:36:10 +10:00
bcoles
3f63f9fcd1
ms02_065_msadc: Cleanup and add additional offsets
2022-07-08 00:26:02 +10:00
bcoles
7d111938d5
ms03_007_ntdll_webdav: Cleanup and add additional offsets
2022-07-07 20:31:57 +10:00
bcoles
04aa05faa2
ms01_026_dbldecode: Use HttpClient; remove meterpreter code; fix stager
2022-07-03 18:22:55 +10:00
bwatters
c751ef46c9
Land #16635 , Add 0-day MSWord RCE #Follina CVE-2022-30190
...
Merge branch 'land-16635' into upstream-master
2022-06-06 14:41:31 -05:00
RAMELLA Sébastien
3ab06461af
fix. second review
2022-06-02 00:58:20 +04:00
RAMELLA Sébastien
dd1814903c
fix. SRVHOST default value
2022-06-02 00:07:15 +04:00
RAMELLA Sébastien
8c19a02835
fix. first review
2022-06-01 20:15:08 +04:00
RAMELLA Sébastien
7f89e92da3
add more informations about
2022-05-31 00:12:30 +04:00
RAMELLA Sébastien
97921b4ed9
fix chmod 644
2022-05-30 22:11:35 +04:00
RAMELLA Sébastien
dfc226cf5f
add. Supposed 0day MSWord RCE
2022-05-30 21:23:18 +04:00
Spencer McIntyre
02e7a65b93
Just move the auxiliary module into an exploit
2022-05-16 17:44:31 -04:00
adfoster-r7
9f6950c6c8
Ensure HTML is escaped in markdown codeblocks
2022-04-27 19:51:05 +01:00
Jake Baines
aba48a6905
Improve JSON cleanup, fix jjs specific wording, and moved JJS_PATH to defaultoptions
2022-04-20 06:27:43 -07:00
Jake Baines
ae54c8c3d9
Initial implementation of authenticated RCE against ManageEngine ADSelfService Plus (CVE-2022-28810)
2022-04-19 10:33:54 -07:00
Spencer McIntyre
5de966cfb1
Land #16382 , CVE-2022-26904 SuperProfile LPE
2022-04-07 12:52:39 -04:00
usiegl00
8495bff61c
Merge master and update the smb_shadow module
...
Add comments detailing the technique used to attack SMBv3. Remove some
comments that are no longer needed. Fix Gemfile.lock conflict.
2022-04-06 07:06:45 +09:00
Grant Willcox
e800dcb597
Add in documentation file
2022-04-04 12:05:28 -05:00