Jack Heysel
15d267a233
Land #17826 , post module for CVE-2023-21768
...
This adds an exploit module for CVE-2023-21768 that
achieves local privilege escalation on Windows 11 2H22.
2023-03-30 12:27:28 -04:00
Christophe De La Fuente
6d4ee0c071
Add exploit for CVE-2023-21768
2023-03-27 20:08:22 +02:00
Spencer McIntyre
3ca177eb1f
Add the exploit for CVE-2022-38108
2023-03-23 17:28:58 -04:00
bwatters
01a78f972c
Land #17567 , ManageEngine Endpoint Central RCE (CVE-2022-47966)
...
Merge branch 'land-17567' into upstream-master
2023-02-08 13:06:53 -06:00
h00die-gr3y
d763faf245
sync documentation
2023-02-06 06:56:59 +00:00
cgranleese-r7
80dbbca020
Land #17371 , Lenovo Diagnostics Driver Privilege Escalation (CVE-2022-3699)
2023-02-03 13:43:04 +00:00
h00die-gr3y
a2f4a27614
updated module and added documentation
2023-01-29 10:06:14 +00:00
Grant Willcox
6043d0ffba
Update all links from Wiki site to new docs site.
2023-01-27 09:58:53 -06:00
adfoster-r7
672fb9ce9f
Land #17460 , add support for feature kerberos authentication
2023-01-26 17:47:27 +00:00
Jack Heysel
4da94325f3
Rubocop
2023-01-19 13:52:58 -05:00
Jack Heysel
63d9445911
Fix for Win Server 2022 and 2019
2023-01-19 00:52:38 -05:00
Jack Heysel
2c2bfec4a0
Tested on Windows Build 19044, 19045 and 22000
2023-01-18 01:41:30 -05:00
h00die
0ac4d3d2e6
doc how to set permissions on service
2023-01-13 17:07:17 -05:00
Spencer McIntyre
3ddcf73c2b
Remove the QUICK option altogether
...
Use blocks to check whether each service is exploitable as they are
enumerated. With this change, it is the service and path enumeration
halts once an exploitable one is found that yields a session.
Also all files are registered for cleanup.
2023-01-13 17:06:42 -05:00
h00die
90a12cf3b0
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
h00die
c52eb09cbb
unquoted service path tweaks
2023-01-13 17:06:42 -05:00
Christophe De La Fuente
868072e6c8
Land #17317 , Fix various WinRM modules
2023-01-03 19:57:07 +01:00
Jack Heysel
2fa7e7b2d5
Lenovo Diagnostics Driver Privilege Escaltion (CVE-2022-3699)
2022-12-12 21:53:53 -05:00
Christophe De La Fuente
e7e2849f6d
Land #17183 , Zimbra fixes
2022-12-06 15:38:37 +01:00
Christophe De La Fuente
d3057f15b2
Land #17275 , Add Exploit For CVE-2022-41082 (ProxyNotShell)
2022-11-30 18:16:19 +01:00
Ashley Donaldson
2d397d37db
Removed warning that I think was actually just a bug - now fixed
2022-11-30 13:14:19 +11:00
Spencer McIntyre
009c6c5350
Add the MaxBackendRetries datastore option
2022-11-28 09:45:04 -05:00
Ron Bowes
28a68ede8c
Merge branch 'master' into zimbra-fixes
2022-11-23 12:50:56 -08:00
Spencer McIntyre
3f58bfe11e
Check that the target is Exchange Server 2019
2022-11-23 10:47:10 -05:00
h00die
181b8e4eea
review comments
2022-11-21 15:53:37 -05:00
h00die
d4536b24a6
remote control collection rce
2022-11-21 15:53:37 -05:00
Spencer McIntyre
ed99f2f67f
Bypass EEMS M1
2022-11-21 11:13:16 -05:00
Spencer McIntyre
bc89721d7a
Add module docs, fix ProxyShell versions
2022-11-18 17:42:27 -05:00
Ron Bowes
3ac3fa6c32
Move the Zimbra Slapper doc to the right folder (Windows -> Linux)
2022-10-25 09:51:27 -07:00
h00die
05b80631f3
update remote mouse version checks
2022-10-17 15:30:17 -04:00
h00die
08deb21ae3
update remote mouse version checks
2022-10-17 15:29:10 -04:00
JustAnda7
412a07df54
Fixed #16674
2022-10-07 14:35:21 -04:00
space-r7
63af4e3702
Land #17067 , add remote mouse rce
2022-10-04 11:40:33 -05:00
h00die
68b2aec6fb
review comments
2022-10-03 15:25:53 -04:00
h00die
391a27b08c
remote mouse rce
2022-09-27 16:37:42 -04:00
h00die
a39b1c9fe5
msftidy_docs
2022-09-26 15:56:43 -04:00
h00die
61f576d3e1
mobile mouse server exploit
2022-09-26 15:45:42 -04:00
Grant Willcox
0908006466
Land #16985 , wifi mouse rce - CVE-2022-3218
2022-09-23 14:46:49 -05:00
Grant Willcox
b62f163696
Update documentation on module and exploit a little more to make things a bit clearer
2022-09-23 14:08:18 -05:00
h00die
eb516f402e
wifi mouse doc updates
2022-09-21 16:38:50 -04:00
h00die
32402c0e6d
wifi mouse doc updates
2022-09-21 16:35:08 -04:00
Grant Willcox
605db0160d
Fix up documentation
2022-09-21 15:02:04 -05:00
h00die
271171f6d2
unified now with invisible feature
2022-09-18 19:02:59 -04:00
h00die
66bbe98f5f
wifi remote with better cmd stagers
2022-09-09 05:57:36 -04:00
h00die
ae91cfa9c5
unified_remote exploit
2022-09-08 17:09:31 -04:00
h00die
c6d453f5b9
fix docs
2022-09-05 08:23:40 -04:00
h00die
3f7e0667f6
wifi mouse rce
2022-09-05 08:16:49 -04:00
Spencer McIntyre
ae5a9bd41b
Land #16734 , Add rtf support to cve-2022-30190
...
Add rtf support to cve-2022-30190 AKA Follina
2022-08-25 17:26:46 -04:00
Spencer McIntyre
68eae1664e
Tweak the follina docs
2022-08-25 17:10:59 -04:00
Spencer McIntyre
07fdc1f1ec
Land #16907 , ms10_092_schelevator: Cleanup
2022-08-22 11:53:02 -04:00