This website requires JavaScript.
Explore
Help
Sign In
adam
/
metasploit-gs
Watch
1
Star
0
Fork
0
You've already forked metasploit-gs
Code
Issues
Pull Requests
Actions
Packages
Projects
Releases
Wiki
Activity
Files
32f272d96a7fd8bf4b03e48cfe5a0f962e932f3e
metasploit-gs
/
modules
T
History
Tim W
32f272d96a
fix the windows/x64/powershell_reverse_tcp handler
2021-11-30 06:30:58 +00:00
..
auxiliary
Land
#15898
, trade URI.encode & URI.escape for Ruby 3
2021-11-23 12:07:48 -06:00
encoders
RuboCop unicode_upper.rb and unicode_mixed.rb
2020-05-02 21:51:05 -05:00
evasion
/windows
Land
#15506
, Add evasion module syscall_inject
2021-09-22 10:17:13 -04:00
exploits
ms05_039_pnp: Rename 'Windows 2000 SP4 English/French/German/Dutch' target to 'Windows 2000 SP4 Universal'
2021-11-28 13:39:05 +00:00
nops
…
payloads
fix the windows/x64/powershell_reverse_tcp handler
2021-11-30 06:30:58 +00:00
post
Land
#15864
,
fix
#15856
, fix shell_to_meterpreter to detect x64 windows and return an x64 meterpreter session
2021-11-24 17:41:31 -06:00