1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-11-20 14:39:22 +01:00
Commit Graph

3578 Commits

Author SHA1 Message Date
Metasploit
1e4276b8ae Bump metasploit-payloads to 2.0.189 2024-10-31 10:12:12 -05:00
adfoster-r7
687b101205
Merge pull request #730 from cgranleese-r7/remove-paths-from-acceptance-tests
Removes paths from metasploit-framework acceptance tests
2024-10-31 14:55:58 +00:00
cgranleese-r7
c2890d0033 Removes paths from metasploit-framework acceptance tests 2024-10-31 14:04:21 +00:00
Metasploit
c025ce8be1 Bump metasploit-payloads to 2.0.188 2024-10-30 15:42:45 -05:00
Brendan
08d2d1cfb6
Land #710, Injection using PoolParty
Injection using PoolParty
2024-10-30 15:28:23 -05:00
dledda-r7
b85ceb0c36 fix(injection): fix arch support logic 2024-10-30 13:28:10 -05:00
dledda-r7
7d4349047f
fix(injection): fix arch support logic 2024-10-30 12:15:11 -04:00
dledda-r7
f34bb48b29
fix(injection): fix arch support logic 2024-10-30 12:15:10 -04:00
dledda-r7
8e533ec9fa
fix(injection): fix msvc compilation error 2024-10-30 12:15:10 -04:00
dledda-r7
a7485082ca
fix(injection): review changes 2024-10-30 12:15:10 -04:00
dledda-r7
ff182d10c4
fix(injection): review changes 2024-10-30 12:15:09 -04:00
dledda-r7
1b65a58ee7
fix(injection): review changes 2024-10-30 12:15:09 -04:00
dledda-r7
00d1a7218a
fix(injection): review changes 2024-10-30 12:15:09 -04:00
dledda-r7
1ebf2acbc2
fix(injection): review changes 2024-10-30 12:15:08 -04:00
dledda-r7
ae96c17e3d
fix(injection): review changes 2024-10-30 12:15:08 -04:00
dledda-r7
3fff5a09ff
docs(shellcode): add reference to poolparty stub 2024-10-30 12:15:08 -04:00
dledda-r7
37c61a2cb5
fix(injection): fix mingw compilation error 2024-10-30 12:15:07 -04:00
dledda-r7
cc408de7a6
feat(injection): improved system check to ensure poolparty is supported, removed unused variants, better code to execute variants 2024-10-30 12:15:07 -04:00
dledda-r7
86b7920c77
fix(shellcode): removed unused shellcodes, updated poolparty_stub_x64 2024-10-30 12:15:06 -04:00
dledda-r7
b18df9c9fe
fix: handling WoW64 injection destinationArch 2024-10-30 12:15:06 -04:00
dledda-r7
a97444d79c
feat: attempt to have x64->wow64 injection with tp_direct_insertion 2024-10-30 12:15:06 -04:00
dledda-r7
ebe086f5ea
feat: draft of worker_factory_routine_overwrite technique 2024-10-30 12:15:05 -04:00
dledda-r7
7eab552207
feat: improving remote handles fetching, tp_direct_insertion support wow64->x64 injection 2024-10-30 12:15:05 -04:00
dledda-r7
2a45039182
debug(injection): inject_via_poolparty using remote_tp_direct_insertion 2024-10-30 12:15:05 -04:00
dledda-r7
cba588451d
debug(injection): inject_via_poolparty using remote_tp_wait_insertion 2024-10-30 12:15:04 -04:00
dledda-r7
2af3fe5c67
feat(injection): improving logging and error handling 2024-10-30 12:15:04 -04:00
dledda-r7
9e9bb677fa
feat(injection): improving error handling 2024-10-30 12:15:04 -04:00
dledda-r7
dc30ecc054
feat(injection): updating x86 shellcode 2024-10-30 12:15:03 -04:00
dledda-r7
f1492da090
feat(injection): adjusting SetLastError when injection fails 2024-10-30 12:15:03 -04:00
dledda-r7
b27aed9051
debug(injection): update migration to force pool-party injection with remote_tp_direct_insertion 2024-10-30 12:15:03 -04:00
dledda-r7
c40d08ad33
feat(injection): improving ntdll functions fetch, adding remote_tp_direct_insert variant 2024-10-30 12:15:02 -04:00
dledda-r7
cef2e6cd5e
feat(injection): commenting unused ntdll functions 2024-10-30 12:15:02 -04:00
dledda-r7
af77eda913
feat(injection): adding hTriggerEvent to POOLPARTYCONTEXT 2024-10-30 12:15:02 -04:00
dledda-r7
c6d066fa86
feat(injection): improving x64 shellcode, adding draft x86 shellcode 2024-10-30 12:15:01 -04:00
dledda-r7
6984d02128
chore(gitignore): adding .vscode in gitignore 2024-10-30 12:15:01 -04:00
dledda-r7
51a086bc0b
chore(metsrv): including poolparty sources and headers to Visual Studio project 2024-10-30 12:15:00 -04:00
dledda-r7
25ee5deddf
feat(injection): update base_dispatch to use inject_via_poolparty when possible 2024-10-30 12:15:00 -04:00
dledda-r7
7f66532422
feat(injection): update base_inject to support inject_via_poolparty, added custom stub for x64 2024-10-30 12:15:00 -04:00
dledda-r7
ce387785c8
feat(injection): adding pool-party injection 2024-10-30 12:14:59 -04:00
Metasploit
53833daced Bump metasploit-payloads to 2.0.187 2024-10-29 15:11:27 -05:00
Spencer McIntyre
7bd3b648ab
Merge pull request #721 from smashery/fix-symlink-windows
Fix symlink and junction detection on Python windows
2024-10-28 13:05:51 -04:00
Metasploit
a47c18ea27 Bump metasploit-payloads to 2.0.186 2024-10-24 06:09:13 -05:00
adfoster-r7
ef0ce7e4f5
Merge pull request #729 from cgranleese-r7/fixes-workflow-variable
Fixes an incorrectly named workflow variable
2024-10-24 11:48:57 +01:00
cgranleese-r7
e4e7be20ac Fixes an incorrectly named workflow variable 2024-10-21 10:22:06 +01:00
Metasploit
4e974889da Bump metasploit-payloads to 2.0.185 2024-10-18 08:40:26 -05:00
adfoster-r7
2bc9f23af8
Merge pull request #728 from cgranleese-r7/adds-acceptance-testing-reusable-pipeline
Adds a reusable pipeline for acceptance testing
2024-10-18 14:25:32 +01:00
cgranleese-r7
a2c6d43069 Adds a reusable pipeline for acceptance testing 2024-10-18 14:05:27 +01:00
Metasploit
d412a044dc Bump metasploit-payloads to 2.0.184 2024-10-16 08:44:14 -05:00
adfoster-r7
1f62608648
Merge pull request #727 from adfoster-r7/update-security-readme
Update security readme
2024-10-16 14:16:27 +01:00
adfoster-r7
6cf64cd624 Update security readme 2024-10-16 14:14:49 +01:00