1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00
Commit Graph

1192 Commits

Author SHA1 Message Date
Brent Cook
6eda702b25
Land #6292, add reverse_tcp command shell for Z/OS (MVS) 2015-12-23 14:11:37 -06:00
Brent Cook
5a19caf10a remove temp file 2015-12-23 11:42:09 -06:00
dmohanty-r7
eb4611642d Add Jenkins CLI Java serialization exploit module
CVE-2015-8103
2015-12-11 14:57:10 -06:00
jvazquez-r7
bb3a3ae8eb
Land #6176, @ganzm's fix for 64 bits windows loadlibrary payload 2015-12-01 13:18:41 -06:00
Bigendian Smalls
09d63de502
Added revshell shellcode source
Put shell_reverse_tcp.s shellcode source for mainframe reverse shell
into external/source/shellcode/mainframe
2015-12-01 08:26:42 -06:00
Brent Cook
1b951b36fe remove -db / -pcap / -all gemspecs, merge into one 2015-11-11 15:01:50 -06:00
William Vu
e6202e3eda Revert "Land #6060, Gemfile/gemspec updates"
This reverts commit 8f4046da40, reversing
changes made to 2df149b0a5.
2015-11-08 19:32:15 -06:00
Brent Cook
7c7eb06058 remove unused kissfft library 2015-11-04 08:35:45 -06:00
Matthias Ganz
4eaf1ace81 Bugfix loading address of library path into rcx
The old code breaks if the payload is executed from a memory area where the 4 most significant bytes are non-zero.
2015-11-02 16:56:07 +01:00
William Vu
77fae28cd4 Add -q option to msfd to disable banner 2015-10-07 01:57:58 -05:00
jvazquez-r7
9444c8c410
Fix #5988, windows x64 stagers
* Also, use mov esi, esi to save an extra byte
* Also, modify the block_recv.asm code, just to have it up to date
2015-09-28 15:52:50 -05:00
jvazquez-r7
2c9734f178
Add exploit source 2015-09-15 14:54:05 -05:00
jvazquez-r7
6e857568e0
Delete comments 2015-09-03 13:33:40 -05:00
jvazquez-r7
b39575928e
Update reflective exploit 2015-09-03 11:01:41 -05:00
jvazquez-r7
ecf3fb61d6
Replace external source 2015-08-26 15:32:50 -05:00
William Vu
d54249370b Move tpwn source to external/source/exploits 2015-08-17 18:27:47 -05:00
wchen-r7
7113c801b1
Land #5732, reliability update for adobe_flash_hacking_team_uaf 2015-07-17 16:43:39 -05:00
jvazquez-r7
255d8ed096
Improve adobe_flash_opaque_background_uaf 2015-07-16 14:56:32 -05:00
jvazquez-r7
ab5c7a806e
Update flash exploiter 2015-07-15 18:32:45 -05:00
jvazquez-r7
bd5d372436
Add build comment 2015-07-15 18:30:05 -05:00
jvazquez-r7
138789b77c
Fix indentation 2015-07-15 18:29:28 -05:00
jvazquez-r7
b504f0be8e
Update adobe_flash_hacking_team_uaf 2015-07-15 18:18:04 -05:00
wchen-r7
d6565a9aee Merge branch 'bes_flash' into bapv2_flash_test 2015-07-14 00:34:54 -05:00
jvazquez-r7
b72ba7f51c
Add AS2 flash detection code 2015-07-13 18:26:02 -05:00
jvazquez-r7
8fb6bedd94
Delete as3 detecotr 2015-07-13 18:23:39 -05:00
jvazquez-r7
9116460cb0
Add prototype with AS3 2015-07-13 16:33:55 -05:00
jvazquez-r7
299978d0e2
Put again old exploiter 2015-07-11 00:36:32 -05:00
jvazquez-r7
63005a3b92
Add module for flash CVE-2015-5122
* Just a fast port for the exploit leaked
* Just tested on win7sp1 / IE11
2015-07-11 00:28:55 -05:00
Tod Beardsley
3d630de353
Replace with a real CVE number 2015-07-07 14:44:12 -05:00
jvazquez-r7
d9aacf2d41
Add module for hacking team flash exploit 2015-07-07 11:19:48 -05:00
jvazquez-r7
1de94a6865
Add module for CVE-2015-3113 2015-07-01 13:13:57 -05:00
jvazquez-r7
e49c36998c
Fix indentation 2015-06-25 14:12:23 -05:00
jvazquez-r7
a87d4e5764
Add flash_exploiter template 2015-06-25 13:52:57 -05:00
jvazquez-r7
ee0377ca16
Add module for CVE-2015-3105 2015-06-25 13:35:01 -05:00
Spencer McIntyre
2206a6af73 Support older targets x86 for MS15-051 2015-06-25 09:33:15 +10:00
OJ
3686accadd
Merge branch 'upstream/master' into cve-2015-1701 2015-06-22 07:52:17 +10:00
OJ
b78ba55c25
Merge minor CVE-2015-1701 from zeroSteiner 2015-06-22 07:50:26 +10:00
Spencer McIntyre
d73a3a4a5f Dont call ExitProcess because it might kill the shell 2015-06-21 16:16:33 -04:00
jvazquez-r7
27a583853c
Fix one more line indentation 2015-06-18 12:40:30 -05:00
jvazquez-r7
55f077fa9e
Fix indentation 2015-06-18 12:38:36 -05:00
jvazquez-r7
de1542e589
Add module for CVE-2015-3090 2015-06-18 12:36:14 -05:00
wchen-r7
17b8ddc68a
Land #5524, adobe_flash_pixel_bender_bof in flash renderer 2015-06-15 02:42:16 -05:00
jvazquez-r7
72672fc8f7
Delete debug 2015-06-11 17:39:36 -05:00
jvazquez-r7
8ed13b1d1b
Add linux support for CVE-2014-0515 2015-06-11 16:18:50 -05:00
wchen-r7
ae21b0c260
Land #5523, adobe_flash_domain_memory_uaf in the flash renderer 2015-06-10 16:59:19 -05:00
wchen-r7
4c5b1fbcef
Land #5522, adobe_flash_worker_byte_array_uaf in the flash renderer 2015-06-10 14:49:41 -05:00
jvazquez-r7
af31112646
Fix exploit indentation 2015-06-10 14:19:36 -05:00
jvazquez-r7
64562565fb
Fix method indentation 2015-06-10 14:16:47 -05:00
jvazquez-r7
2bb3a5059c
Fix else indentation 2015-06-10 14:15:58 -05:00
jvazquez-r7
1d05ce1cdc
Fix for indentation 2015-06-10 14:14:29 -05:00