Commit Graph

422 Commits

Author SHA1 Message Date
jvazquez-r7 b7f0fad72f Modify CVE-2014-0569 to use the flash exploitation code 2015-06-09 11:31:39 -05:00
OJ b291d41b76 Quick hack to remove hard-coded offsets 2015-06-05 13:19:41 +10:00
jvazquez-r7 02181addc5 Update CVE-2014-0556 2015-06-04 18:23:50 -05:00
wchen-r7 23df66bf3a Land #5481, no powershell. exec shellcode from the renderer process. 2015-06-04 15:45:09 -05:00
jvazquez-r7 ab68d8429b Add more targets 2015-06-04 12:11:53 -05:00
jvazquez-r7 80cb70cacf Add support for Windows 8.1/Firefox 2015-06-03 22:46:04 -05:00
jvazquez-r7 74117a7a52 Allow to execute payload from the flash renderer 2015-06-03 16:33:41 -05:00
OJ 455a3b6b9d Add butchered version of CVE-2015-1701 2015-06-03 21:48:23 +10:00
jvazquez-r7 e9714bfc82 Solve conflics 2015-05-27 23:22:00 -05:00
wchen-r7 e749733eb6 Land #5419, Fix Base64 decoding on ActionScript 2015-05-27 23:13:51 -05:00
jvazquez-r7 e5d42850c1 Add support for Linux to CVE-2015-0336 2015-05-27 17:05:10 -05:00
jvazquez-r7 801deeaddf Fix CVE-2015-0336 2015-05-27 15:42:06 -05:00
jvazquez-r7 bd1bdf22b5 Fix CVE-2015-0359 2015-05-26 17:27:20 -05:00
jvazquez-r7 19c7445d9d Fix CVE-2015-0336 2015-05-26 17:20:49 -05:00
jvazquez-r7 23d244b1fa Fix CVE-2015-0313 2015-05-26 16:11:44 -05:00
jvazquez-r7 5c8c5aef37 Fix CVE-2014-8440 2015-05-26 16:05:08 -05:00
jvazquez-r7 d78d04e070 Fix CVE-2014-0569 2015-05-26 15:49:22 -05:00
jvazquez-r7 e0a1fa4ef6 Fix indentation 2015-05-26 15:38:56 -05:00
jvazquez-r7 1742876757 Fix CVE-2014-0556 2015-05-26 15:30:39 -05:00
jvazquez-r7 3e122fe87c Fix b64 decoding 2015-05-26 15:15:33 -05:00
jvazquez-r7 29ccc8367b Add More messages 2015-05-26 14:47:47 -05:00
jvazquez-r7 1bf1c37cfa Add exception handling 2015-05-26 14:31:07 -05:00
jvazquez-r7 fb8a927941 Hardcode params 2015-05-26 14:20:43 -05:00
jvazquez-r7 f119da94ca Add one more message 2015-05-26 14:14:38 -05:00
jvazquez-r7 15533fabe6 Log messages 2015-05-26 14:08:24 -05:00
jvazquez-r7 91357ee45b Improve reliability 2015-05-26 13:47:33 -05:00
jvazquez-r7 f35d7a85d3 Adjust numbers 2015-05-21 15:56:11 -05:00
jvazquez-r7 80d4f3cfb0 Update swf 2015-05-21 14:55:00 -05:00
jvazquez-r7 8d6cbf0568 Make adobe_flash_uncompress_zlib_af multiplatform 2015-05-20 18:57:37 -05:00
benpturner c0b995cc97 new changes 2015-05-19 16:18:06 +01:00
benpturner b513304756 new changes 2015-05-19 15:47:30 +01:00
benpturner 0cda746bfb Updated size 2015-05-19 14:08:59 +01:00
benpturner 811c45ab90 new 2015-05-19 14:06:41 +01:00
benpturner d4798a2500 Fix spacinG 2015-05-11 09:04:03 +01:00
benpturner c916021fc5 SSL Support for Powershell Payloads 2015-05-10 21:45:59 +01:00
jvazquez-r7 51bb4b5a9b Add module for CVE-2015-0359 2015-05-07 17:00:00 -05:00
jvazquez-r7 582919acac Add module for CVE-2015-0336 2015-05-05 17:25:19 -05:00
jvazquez-r7 dbba466b5b Add module for CVE-2014-8440 2015-04-29 17:52:04 -05:00
benpturner 76e68fcf4c session info 2015-04-26 20:13:18 +01:00
benpturner aa4dc78cba updates to author comments in powershell script 2015-04-25 08:47:17 +01:00
benpturner 19aa668f99 updates to include reverse and bind 2015-04-22 20:41:19 +01:00
Meatballs b0d50dc2be Create our own Rex connection to the endpoint
Ensure powershell process closes when module completes
Add a windows cmd interact payload
2015-04-19 23:41:28 +01:00
Meatballs 8bd0da580d Move script out of module 2015-04-19 21:12:44 +01:00
jvazquez-r7 28fac60c81 Add module for CVE-2015-0556 2015-04-15 14:08:16 -05:00
joev 3313dac30f Land #5119, @wvu's addition of the OSX rootpipe privesc exploit.
orts
borts
2015-04-10 12:38:25 -05:00
William Vu c4b7b32745 Add Rootpipe exploit 2015-04-10 11:22:00 -05:00
jvazquez-r7 91f5d0af5a Add module for CVE-2014-0569
* Adobe flash, Integer overflow on casi32
2015-04-09 19:37:26 -05:00
jvazquez-r7 11c6f3fdca Do reliable resolution of kernel32 2015-03-29 15:52:13 -05:00
jvazquez-r7 f84a46df63 Add module for CVE-2015-0313 2015-03-27 18:51:13 -05:00
Spencer McIntyre 076f15f933 Land #4792 @jakxx Publish It PUI file exploit 2015-03-18 20:59:54 -04:00