This website requires JavaScript.
Explore
Help
Sign In
adam
/
metasploit-gs
Watch
1
Star
0
Fork
0
You've already forked metasploit-gs
Code
Issues
Pull Requests
Actions
Packages
Projects
Releases
Wiki
Activity
Files
b86d5c5dd1c428bbb19058a9fdca480fbdfd0814
metasploit-gs
/
documentation
/
modules
T
History
Grant Willcox
44f040ad78
Land
#16056
, Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722)
2022-01-24 21:03:46 -06:00
..
auxiliary
Land
#15656
, Allow authenticated user creation in vmware_vcenter_vmdir_auth_bypass
2022-01-13 17:04:12 +01:00
evasion
/windows
Replace XOR with CHACHA and remove unnecassary code
2021-09-06 12:23:46 +03:00
exploit
Land
#16056
, Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722)
2022-01-24 21:03:46 -06:00
payload
update documentation
2021-11-30 06:30:59 +00:00
post
Pulled offsets out of dll into module. Auto-find lsass.exe when pid is 0
2021-12-18 10:56:46 -08:00
module_doc_template.md
Add checks to msftidy_docs and update the template for them
2020-07-23 20:37:39 -04:00