Tim
|
358aca9435
|
apple_ios/aarch64/shell_reverse_tcp
|
2017-12-19 15:42:21 +08:00 |
|
bwatters-r7
|
5a07be9b96
|
Land #9041, Add LPE on Windows using CVE-2017-8464
|
2017-11-08 10:09:03 -06:00 |
|
Spencer McIntyre
|
c2578c1487
|
Refactor GetProcessSid to remove do while FALSE
|
2017-11-07 19:11:24 -05:00 |
|
bwatters-r7
|
7df18e378d
|
Fix conflicts in PR 8509 by mergeing to master
|
2017-10-09 10:30:21 -05:00 |
|
Spencer McIntyre
|
3f6f70f820
|
Move the cve-2017-8464 source to external/source
|
2017-10-08 13:58:51 -04:00 |
|
Tim
|
ffbf21cb1c
|
cleanup
|
2017-08-31 18:35:18 +08:00 |
|
Tim
|
7b71f60ea1
|
fix the stack
|
2017-08-31 18:35:18 +08:00 |
|
Tim
|
26f4fa3b09
|
setup stack
|
2017-08-31 18:35:17 +08:00 |
|
Tim
|
a2396991f0
|
stager not setting up stack
|
2017-08-31 18:35:17 +08:00 |
|
Tim
|
6dbe00158f
|
fix stager
|
2017-08-31 18:35:17 +08:00 |
|
David Tomaschik
|
ef6c20ce51
|
Update README
Meterpreter repo now redirects to metasploit-payloads.
|
2017-08-27 10:26:35 -07:00 |
|
Tim
|
d6d6c67f33
|
add stage_shell.s and cleanup
|
2017-08-21 14:42:30 +08:00 |
|
Tim
|
ac6495a7eb
|
formatting
|
2017-08-21 12:35:13 +08:00 |
|
Tim
|
9768a89bcd
|
aarch64 staged shell
|
2017-08-21 11:14:42 +08:00 |
|
Tim
|
8b4ccc66c7
|
add linux/aarch64/shell_reverse_tcp
|
2017-08-17 18:55:37 +08:00 |
|
Brent Cook
|
59086af261
|
Land #8771, rewrite linux x64 stagers with Metasm
|
2017-08-14 02:32:29 -04:00 |
|
tkmru
|
f961d7da13
|
update src
|
2017-07-29 21:08:52 +09:00 |
|
tkmru
|
6c5d8279ca
|
change to generate payload from metasm
|
2017-07-16 19:21:09 +09:00 |
|
tkmru
|
4e046db9b3
|
add retry to linux reverse tcp x86
|
2017-07-14 12:47:32 +09:00 |
|
tkmru
|
62533509c6
|
fit source to shellcode prev change
|
2017-07-12 16:26:00 +09:00 |
|
Tim
|
db8698e82b
|
Land #8655, add error handling to mipsle linux reverse tcp stager
|
2017-07-11 22:33:54 +08:00 |
|
Tim
|
b9f5ebcf66
|
update comment
|
2017-07-11 00:58:03 +08:00 |
|
Tim
|
75c571de83
|
Land #8653, add error handling to mipsbe linux reverse tcp stager
|
2017-07-09 19:36:15 +08:00 |
|
Tim
|
cd0c2c213f
|
pedantic tweaks
|
2017-07-09 19:36:03 +08:00 |
|
tkmru
|
a4a959266b
|
update cachedSize
|
2017-07-06 17:43:27 +09:00 |
|
tkmru
|
adeffd6600
|
add error handling to stager_sock_reverse src on mipsle
|
2017-07-06 17:07:11 +09:00 |
|
tkmru
|
2d8a71de6f
|
tab to space
|
2017-07-05 18:22:06 +09:00 |
|
tkmru
|
d02d6826a9
|
fix reverse tcp stager src
|
2017-07-05 17:56:59 +09:00 |
|
tkmru
|
d1f08a80bd
|
add error handling to reverse_tcp on mipsbe
|
2017-07-05 17:50:49 +09:00 |
|
tkmru
|
084b211e9b
|
add x64 stager_sock_reverse src
|
2017-06-25 16:31:37 +09:00 |
|
Tim
|
03116d7933
|
Land #8543, add error handling to ARM linux reverse tcp stager
|
2017-06-18 15:38:16 +08:00 |
|
Tim
|
210a4cb299
|
fix indent
|
2017-06-18 15:35:23 +08:00 |
|
tkmru
|
1773a5f188
|
fix indent
|
2017-06-16 15:57:09 +09:00 |
|
Tim
|
9cf9d22bae
|
fix mmap return cmp
|
2017-06-16 06:26:40 +08:00 |
|
RaMMicHaeL
|
f17b28930d
|
Update executex64.asm
|
2017-06-04 13:18:50 +03:00 |
|
L3cr0f
|
6a3fc618a4
|
Add bypassuac_injection_winsxs.rb module
|
2017-06-03 12:59:50 +02:00 |
|
RaMMicHaeL
|
ca5b20f4d0
|
Fixed an elusive bug on AMD CPUs
Details:
http://blog.rewolf.pl/blog/?p=1484
rwfpl/rewolf-wow64ext@8771485
|
2017-06-03 11:30:11 +03:00 |
|
zerosum0x0
|
bdf121e1c0
|
x86 kernels will safely ret instead of BSOD
|
2017-05-17 23:48:14 -06:00 |
|
zerosum0x0
|
4f3a98d434
|
add arch detection to shellcode
|
2017-05-17 23:36:17 -06:00 |
|
zerosum0x0
|
a5c391dae2
|
multi-arch ring0->ring3 shellcode .asm file (work in progress)
|
2017-05-17 23:29:05 -06:00 |
|
Brent Cook
|
176e88f293
|
Land #7835, Add Windows Local Privilege Escalation exploit stub
|
2017-03-08 06:20:58 -05:00 |
|
William Webb
|
83cc28a091
|
Land #7972, Microsoft Office Word Macro Generator OS X Edition
|
2017-02-21 13:26:42 -06:00 |
|
wchen-r7
|
3d269b46ad
|
Support OS X for Microsoft Office macro exploit
|
2017-02-16 12:28:11 -06:00 |
|
OJ
|
1c62559e55
|
Add v1 of SQL Clr stored proc payload module
|
2017-02-10 10:28:22 +10:00 |
|
wchen-r7
|
ccaa783a31
|
Add Microsoft Office Word Macro exploit
|
2017-02-02 17:44:55 -06:00 |
|
OJ
|
b6e882c8eb
|
Add a Windows LPE exploit template for x64/x86
|
2017-01-17 11:20:14 +10:00 |
|
OJ
|
32173b9701
|
Move execute_payload to the kernel lib
|
2017-01-17 11:19:26 +10:00 |
|
Brent Cook
|
2585c8c8b5
|
Land #7461, convert futex_requeue (towelroot) module to use targetting and core_loadlib
|
2017-01-11 13:24:25 -06:00 |
|
Tim
|
25a8283af3
|
fork early and use WfsDelay
|
2016-12-20 00:59:27 +08:00 |
|
Tim
|
f1efa760df
|
more fixes
|
2016-12-20 00:52:11 +08:00 |
|