1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-01-02 11:36:22 +01:00
Commit Graph

3566 Commits

Author SHA1 Message Date
dledda-r7
00d1a7218a
fix(injection): review changes 2024-10-30 12:15:09 -04:00
dledda-r7
1ebf2acbc2
fix(injection): review changes 2024-10-30 12:15:08 -04:00
dledda-r7
ae96c17e3d
fix(injection): review changes 2024-10-30 12:15:08 -04:00
dledda-r7
3fff5a09ff
docs(shellcode): add reference to poolparty stub 2024-10-30 12:15:08 -04:00
dledda-r7
37c61a2cb5
fix(injection): fix mingw compilation error 2024-10-30 12:15:07 -04:00
dledda-r7
cc408de7a6
feat(injection): improved system check to ensure poolparty is supported, removed unused variants, better code to execute variants 2024-10-30 12:15:07 -04:00
dledda-r7
86b7920c77
fix(shellcode): removed unused shellcodes, updated poolparty_stub_x64 2024-10-30 12:15:06 -04:00
dledda-r7
b18df9c9fe
fix: handling WoW64 injection destinationArch 2024-10-30 12:15:06 -04:00
dledda-r7
a97444d79c
feat: attempt to have x64->wow64 injection with tp_direct_insertion 2024-10-30 12:15:06 -04:00
dledda-r7
ebe086f5ea
feat: draft of worker_factory_routine_overwrite technique 2024-10-30 12:15:05 -04:00
dledda-r7
7eab552207
feat: improving remote handles fetching, tp_direct_insertion support wow64->x64 injection 2024-10-30 12:15:05 -04:00
dledda-r7
2a45039182
debug(injection): inject_via_poolparty using remote_tp_direct_insertion 2024-10-30 12:15:05 -04:00
dledda-r7
cba588451d
debug(injection): inject_via_poolparty using remote_tp_wait_insertion 2024-10-30 12:15:04 -04:00
dledda-r7
2af3fe5c67
feat(injection): improving logging and error handling 2024-10-30 12:15:04 -04:00
dledda-r7
9e9bb677fa
feat(injection): improving error handling 2024-10-30 12:15:04 -04:00
dledda-r7
dc30ecc054
feat(injection): updating x86 shellcode 2024-10-30 12:15:03 -04:00
dledda-r7
f1492da090
feat(injection): adjusting SetLastError when injection fails 2024-10-30 12:15:03 -04:00
dledda-r7
b27aed9051
debug(injection): update migration to force pool-party injection with remote_tp_direct_insertion 2024-10-30 12:15:03 -04:00
dledda-r7
c40d08ad33
feat(injection): improving ntdll functions fetch, adding remote_tp_direct_insert variant 2024-10-30 12:15:02 -04:00
dledda-r7
cef2e6cd5e
feat(injection): commenting unused ntdll functions 2024-10-30 12:15:02 -04:00
dledda-r7
af77eda913
feat(injection): adding hTriggerEvent to POOLPARTYCONTEXT 2024-10-30 12:15:02 -04:00
dledda-r7
c6d066fa86
feat(injection): improving x64 shellcode, adding draft x86 shellcode 2024-10-30 12:15:01 -04:00
dledda-r7
6984d02128
chore(gitignore): adding .vscode in gitignore 2024-10-30 12:15:01 -04:00
dledda-r7
51a086bc0b
chore(metsrv): including poolparty sources and headers to Visual Studio project 2024-10-30 12:15:00 -04:00
dledda-r7
25ee5deddf
feat(injection): update base_dispatch to use inject_via_poolparty when possible 2024-10-30 12:15:00 -04:00
dledda-r7
7f66532422
feat(injection): update base_inject to support inject_via_poolparty, added custom stub for x64 2024-10-30 12:15:00 -04:00
dledda-r7
ce387785c8
feat(injection): adding pool-party injection 2024-10-30 12:14:59 -04:00
Metasploit
53833daced Bump metasploit-payloads to 2.0.187 2024-10-29 15:11:27 -05:00
Spencer McIntyre
7bd3b648ab
Merge pull request #721 from smashery/fix-symlink-windows
Fix symlink and junction detection on Python windows
2024-10-28 13:05:51 -04:00
Metasploit
a47c18ea27 Bump metasploit-payloads to 2.0.186 2024-10-24 06:09:13 -05:00
adfoster-r7
ef0ce7e4f5
Merge pull request #729 from cgranleese-r7/fixes-workflow-variable
Fixes an incorrectly named workflow variable
2024-10-24 11:48:57 +01:00
cgranleese-r7
e4e7be20ac Fixes an incorrectly named workflow variable 2024-10-21 10:22:06 +01:00
Metasploit
4e974889da Bump metasploit-payloads to 2.0.185 2024-10-18 08:40:26 -05:00
adfoster-r7
2bc9f23af8
Merge pull request #728 from cgranleese-r7/adds-acceptance-testing-reusable-pipeline
Adds a reusable pipeline for acceptance testing
2024-10-18 14:25:32 +01:00
cgranleese-r7
a2c6d43069 Adds a reusable pipeline for acceptance testing 2024-10-18 14:05:27 +01:00
Metasploit
d412a044dc Bump metasploit-payloads to 2.0.184 2024-10-16 08:44:14 -05:00
adfoster-r7
1f62608648
Merge pull request #727 from adfoster-r7/update-security-readme
Update security readme
2024-10-16 14:16:27 +01:00
adfoster-r7
6cf64cd624 Update security readme 2024-10-16 14:14:49 +01:00
Metasploit
69a58eabeb Bump metasploit-payloads to 2.0.183 2024-10-16 05:04:39 -05:00
adfoster-r7
af3e145c55
Merge pull request #726 from smashery/new_cmd_exec_v3
Handle discrepancy of process launching on Windows between different versions of Java
2024-10-16 11:04:12 +01:00
Ashley Donaldson
f1fcfd6176 Handle discrepance of process launching on Windows between different versions of Java 2024-10-16 17:29:41 +11:00
Metasploit
dc3021e1c0 Bump metasploit-payloads to 2.0.182 2024-10-15 09:55:29 -05:00
adfoster-r7
c970ca1381
Merge pull request #725 from cgranleese-r7/fixes-acceptance-tests-report-generation
Fixes acceptance tests report generation
2024-10-15 15:55:01 +01:00
cgranleese-r7
99f37569c4 Fixes acceptance tests report generation 2024-10-15 15:11:27 +01:00
Metasploit
c3cd77460c Bump metasploit-payloads to 2.0.181 2024-10-15 07:04:03 -05:00
adfoster-r7
b697cc5e90
Merge pull request #724 from smashery/new_cmd_exec_v2
Handle Windows oddity in java's process launch library
2024-10-15 12:49:29 +01:00
Ashley Donaldson
26d0aa3e8d Changes from code review 2024-10-15 22:11:02 +11:00
Ashley Donaldson
26eddbb7a3 Handle Windows oddity in java's process launch library 2024-10-15 21:24:37 +11:00
Metasploit
8b9fdd5e38 Bump metasploit-payloads to 2.0.180 2024-10-14 19:04:16 -05:00
adfoster-r7
6619c41de6
Merge pull request #723 from cgranleese-r7/add-metasloit-framework-acceptance-tests
Adds metasploit-frameworks acceptance tests
2024-10-15 00:44:56 +01:00