Metasploit
435a3a2b52
Bump metasploit-payloads to 2.0.172
2024-09-19 04:46:35 -05:00
dledda-r7
3420144781
Land #712 , Fix linking in MinGW for OpenThreadToken on Windows XP x86
2024-09-19 05:20:23 -04:00
cod
68bbcf2a2b
Revert "Resolve GetThreadId at runtime"
...
This reverts commit 1ac4741094
.
2024-09-17 11:47:39 +02:00
cod
a91fb72536
Revert "Update remote_thread.c"
...
This reverts commit aff81538ec
.
2024-09-17 11:47:22 +02:00
Metasploit
c5bb65ad58
Bump metasploit-payloads to 2.0.171
2024-09-13 09:52:31 -05:00
dledda-r7
eaf37ada4c
Land #709 , Fix memory leak in request_sys_config_sysinfo
2024-09-13 10:33:11 -04:00
Metasploit
e0499a0049
Bump metasploit-payloads to 2.0.170
2024-09-13 08:45:34 -05:00
dledda-r7
54515f877a
Land #708 , Fixing typo
2024-09-13 09:25:59 -04:00
cod
aff81538ec
Update remote_thread.c
...
TTypo
2024-08-13 22:42:21 +03:00
cod
788d419c6e
Added advapi32 in LINK_LIBS for modules which uses OpenThreadToken to fix an error in mingw-x86 toolchain
2024-08-13 17:58:44 +02:00
cod
1ac4741094
Resolve GetThreadId at runtime
2024-08-12 18:08:49 +02:00
cod
446b4d18c3
typo in context
2024-08-12 16:03:55 +02:00
cod
4428531701
memory leak in request_sys_config_sysinfo
2024-08-01 10:01:17 +02:00
cod
3332a27af8
typo
2024-08-01 09:03:54 +02:00
Spencer McIntyre
a86dc9db06
Land #705 , Update android json dependencies
2024-05-28 15:30:53 -04:00
bwatters-r7
f00b2731cb
Turns out we don't need those libraries at all.
2024-05-23 15:36:20 -05:00
bwatters-r7
cf7b514300
Fix library here, too
2024-05-22 17:40:46 -05:00
bwatters-r7
4d84150ae4
Update json library to 20231013
2024-05-22 15:51:14 -05:00
Metasploit
9b0e2de545
Bump metasploit-payloads to 2.0.169
2024-05-22 06:21:33 -05:00
dwelch-r7
85ed7e1914
Land #704 , Add clean step to Java documentation
2024-05-22 11:58:58 +01:00
adfoster-r7
74a770e336
Update clean step to Java documentation
2024-05-22 11:54:53 +01:00
Metasploit
962ff311a2
Bump metasploit-payloads to 2.0.168
2024-05-21 15:45:30 -05:00
adfoster-r7
49f273af49
Land #703 , Fix Java Meterpreter payloads failing with OpenJDK on Alpine Linux
2024-05-21 21:30:08 +01:00
Christophe De La Fuente
cde5c5e90e
Remove early-access release suffix on version string
2024-05-14 19:05:32 +02:00
Metasploit
d08cbb07bd
Bump metasploit-payloads to 2.0.167
2024-02-20 12:11:35 -06:00
Christophe De La Fuente
0ee45fa625
Land #698 , Update mimikatz
2024-02-20 18:46:13 +01:00
Spencer McIntyre
52d58af59a
Update mimikatz to 45c42c71
2024-01-30 16:30:26 -05:00
Metasploit
7ff8ee535f
Bump metasploit-payloads to 2.0.166
2024-01-19 11:20:36 -06:00
Spencer McIntyre
1adafcd2fb
Land #694 , Use direct syscalls in the RDI loader
...
This updates the RDI loader used by the Windows Meterpreter to use
direct system calls to prevent questionable behavior from being
identified through hooks implemented by external applications.
2024-01-19 12:05:10 -05:00
Christophe De La Fuente
c7abd47585
Update the ReflectiveDLLInjection submodule to the upstream repository
2024-01-19 17:43:25 +01:00
Christophe De La Fuente
83fa146f75
Update ReflectiveDLLInjection submodule to pull in new trampoline detection logic
2024-01-16 18:27:36 +01:00
Christophe De La Fuente
1556007bfd
Update ReflectiveDLLInjection submodule to pull in Win10/8 x86 fix
2024-01-12 19:24:01 +01:00
Christophe De La Fuente
a5e33d167d
Remove include DirectSyscall.c
2024-01-10 15:01:19 +01:00
Christophe De La Fuente
7082431dae
Pull in changes from ReflectiveDLLInjection to support direct syscalls
...
- Includes ColdGate.c in each project
- Change railgun macro name to stdcall_func
- Update VS configs
- Update cmake files for mingw
- Fix cmake files for kiwi builds
- Update ReflectiveDLLInjection module to verify if CI passes
- Update include file names & ReflectiveDLLInjection submodule
2024-01-08 18:53:17 +01:00
Metasploit
6143148e22
Bump metasploit-payloads to 2.0.165
2024-01-08 04:52:57 -06:00
adfoster-r7
e46cdad8e9
Land #693 , Fix incorrect Memory Search variable name
2024-01-08 10:39:26 +00:00
sjanusz-r7
aeb6945bd2
Fix incorrect Memory Search variable name
2024-01-08 10:10:16 +00:00
Metasploit
d8fb9eaf95
Bump metasploit-payloads to 2.0.164
2024-01-04 11:54:24 -06:00
adfoster-r7
2430d20255
Land #686 , Add Windows Memory Search support using regex
2024-01-04 17:41:39 +00:00
sjanusz-r7
4f19a1c4ae
Fix Memory Search variable shadowing
2024-01-04 16:34:08 +00:00
Metasploit
1731613130
Bump metasploit-payloads to 2.0.163
2023-12-12 04:44:00 -06:00
adfoster-r7
ea4ac6b392
Land #689 , Add github actions for Windows Visual Studio 2019 C Meterpreter payload
2023-12-12 10:29:33 +00:00
sjanusz-r7
92d04de09c
Add maximum match length limit to regex matcher
2023-12-11 14:06:32 +00:00
sjanusz-r7
8f51ee7e6d
Move defs to top of file, remove pointer-to-pointer, make RegexNeedle contain static-size arrays
2023-12-11 14:06:32 +00:00
sjanusz-r7
72b39289d0
Compile regex in-place, rename CHAR to CHAR_RE due to Windows typedef'ing CHAR, correctly free compiled needle and associated buffer
2023-12-11 14:06:32 +00:00
sjanusz-r7
6e2889d64c
Add Windows Memory Search support using regex
2023-12-11 14:06:30 +00:00
adfoster-r7
851e23e07b
Add github actions for Windows C Meterpreter payload
2023-12-08 03:01:37 +00:00
Metasploit
6858efcdb8
Bump metasploit-payloads to 2.0.162
2023-12-05 09:42:39 -06:00
bwatters-r7
4810c5cc6a
Land #687 , Add version detection for newer Windows
...
Merge branch 'land-687' into upstream-master
2023-12-05 09:28:06 -06:00
Spencer McIntyre
4e789ee80f
Identify Windows Server 2003 as well
2023-11-29 15:56:38 -05:00