1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-02-16 00:24:29 +01:00
Commit Graph

2747 Commits

Author SHA1 Message Date
OJ
8f5d4bef01
Replace OpenSSL with LibreSSL in the Python extension
This was a bit of a pain, but was well worth it. Had to add a couple of
hacks to make it all work, but this is a nicer solution than having to
depend on OpenSSL and its horrendous build experience.
2020-04-15 13:43:50 +10:00
OJ
306e2f9399
Update the bare template 2020-04-14 20:13:02 +10:00
OJ
3809651b79
Fix a slight issue with the old Mimikatz extension 2020-04-14 14:42:10 +10:00
OJ
ef721b1f3c
Update make file and dependencies 2020-04-14 14:24:30 +10:00
OJ
1aea69806a
Update sniffer SDK libs 2020-04-14 14:09:12 +10:00
OJ
078a3e960f
Finalise 'Release' build for both x86 and x64 _clean_
Still need to fix dependencies and whatnot as well.
2020-04-14 13:18:25 +10:00
OJ
1a6bb89845
Update to build against new libs, remove hacks to make things work 2020-04-14 12:40:02 +10:00
OJ
443bfca952
Update JPEG lib to build with VS2019 toolset 141_xp 2020-04-14 12:29:59 +10:00
OJ
712268fab7
Get Python extension building clean
Warnings as errors, builds clean. Had to do some horrible hacks:
1) Include custom implementation of a lib function just so we could
   link against stuff built with older VS.
2) Include legacy symbols for old io for the same reason.
2020-04-14 12:13:30 +10:00
OJ
100ffd6d5b
First round of VS2019 changes 2020-04-14 10:28:08 +10:00
Tim W
9d343c9f62 simplify ProcessChannel read 2020-04-12 14:12:12 +08:00
Tim W
d4c808d413 fix rapid7/metasploit-framework#12580 2020-04-11 14:33:52 +08:00
Metasploit
39f6fd7849 Bump metasploit-payloads to 1.3.91 2020-04-08 06:14:33 -05:00
Brent Cook
2e9943af8d
Land #385, enhance Windows extapi support for window enumeration
Merge remote-tracking branch 'upstream/pr/385' into upstream-master
2020-04-08 06:04:41 -05:00
Metasploit
2e2aac23d1 Bump metasploit-payloads to 1.3.90 2020-04-08 04:19:53 -05:00
Brent Cook
a27f7c0388
Land #382, fix wildcard handling in Java meterpreter 2020-04-08 04:10:13 -05:00
Metasploit
bde0eef1f8 Bump metasploit-payloads to 1.3.89 2020-04-07 17:26:09 -05:00
Brent Cook
49b117838a
Land #384, don't modify stageless config block in place 2020-04-07 17:15:33 -05:00
Brent Cook
bf8950ebe9 remove unneeded checks before free, one being an impossible scenario 2020-04-07 17:15:03 -05:00
Brent Cook
dbac98fed7
Land #381, check if context is null before applying wakelock 2020-04-07 17:06:19 -05:00
cn-kali-team
6d7740cc72 Process Unicode support 2020-04-05 11:53:22 +08:00
cn-kali-team
451a094269 Process Unicode support 2020-04-05 11:53:16 +08:00
cn-kali-team
25f770dcb3 Process Unicode support 2020-04-05 11:53:06 +08:00
cn-kali-team
a8df9b3604 Process Unicode support 2020-04-05 11:52:08 +08:00
Metasploit
3153421312 Bump metasploit-payloads to 1.3.88 2020-04-02 08:47:42 -05:00
bwatters
903620268f
Land #377, Reducing permissions requested for sys_steal_token
Merge branch 'land-377' into upstream-master
2020-04-02 08:37:42 -05:00
cn-kali-team
348aa69f68 Add window class name filter,Unicode Support etc. 2020-03-27 22:12:37 +08:00
cn-kali-team
443b6f2f23 add window class name filter 2020-03-27 22:12:04 +08:00
OJ
8b4d65de47
Fix stageless config block memory protection
I found an edge case where stageless payloads did not work when they
were embedded in .NET applications. The reason for this is because the
configuration block is stored alongside the code in stageless payloads
and hence is loaded into memory as part of the section when it's mapped.
This section, in native world, remains RWX, and hence we don't have a
problem reading from and writing to it. We write to it for various
reasons, such as when the session guid changes.

In .NET land, this section is mapped as RX instead of RWX. This means
that when we try to write to it, the program segfaults due to an access
violation.

This code modifies the loading of the configuration so that instead of
maintaining a pointer to the original configuration, it instead creates
a copy of it on the heap. I preferred this fix over marking the memory
as RWX, which obviously stands out a bit more.
2020-03-17 13:15:31 +10:00
Tim W
0ca5722ab1 fix wildcard usage 2020-03-10 14:59:24 +08:00
Tim W
312e019b58 revert globbing and only fix basic wildcard usage 2020-03-09 14:25:53 +08:00
Tim W
29ca118b98 implement full globbing 2020-03-09 14:21:04 +08:00
Tim W
0e8fe2b642 fix rapid7/metasploit-framework#12410 2020-03-06 11:11:23 +08:00
Metasploit
fee3d4773f Bump metasploit-payloads to 1.3.87 2020-03-04 14:43:23 -06:00
Brent Cook
fd909771d5
Land #380, add additional socket address info on network channels 2020-03-04 14:33:11 -06:00
Metasploit
e3bc390da4 Bump metasploit-payloads to 1.3.86 2020-02-28 21:56:20 -06:00
Tim W
4eff18dc4e
Land #378, fix Makefile 2020-02-29 11:45:22 +08:00
Tim W
c2140c2896 fix rapid7/metasploit-framework#12778 2020-02-28 18:03:37 +08:00
Spencer McIntyre
03ddbd773e Send addrinfo when opening a channel in Windows 2020-02-24 18:40:12 -05:00
Spencer McIntyre
c635d41b8c Send addrinfo when opening a channel in Python 2020-02-19 23:29:40 -05:00
h00die
97f1fde125 space to tab, ew 2020-02-16 13:48:38 -05:00
Justin Bui
bad3ef7df4
Update config.c
Reduced permissions from ALL_ACCESS to the minimum access needed.
2020-02-12 20:18:18 -08:00
Metasploit
d33259c5e8 Bump metasploit-payloads to 1.3.85 2020-01-22 20:54:07 -06:00
bwatters
ba93a05959
Land #374, Add support for PPID spoofing
Merge branch 'land-374' into upstream-master
2020-01-22 14:59:45 -06:00
Francesco Soncina
b35cc0ac70
add support for PPID spoofing
fix #373
2019-12-17 00:57:49 +01:00
Metasploit
e1a3d351ad Bump metasploit-payloads to 1.3.84 2019-12-06 09:45:04 -06:00
Brent Cook
363a90be11
Land #370, update kiwi to latest mimikatz release 2019-12-06 09:34:15 -06:00
Brent Cook
c3624d73b2 bump to kiwi 2.2.0-20191125 2019-12-06 09:28:19 -06:00
Metasploit
076801ce3d Bump metasploit-payloads to 1.3.83 2019-12-05 17:12:53 -06:00
Brent Cook
188fef721e
Land #366, fix unhook extension logic around clr.dll 2019-12-05 17:02:55 -06:00