OJ
712268fab7
Get Python extension building clean
...
Warnings as errors, builds clean. Had to do some horrible hacks:
1) Include custom implementation of a lib function just so we could
link against stuff built with older VS.
2) Include legacy symbols for old io for the same reason.
2020-04-14 12:13:30 +10:00
OJ
100ffd6d5b
First round of VS2019 changes
2020-04-14 10:28:08 +10:00
Metasploit
39f6fd7849
Bump metasploit-payloads to 1.3.91
2020-04-08 06:14:33 -05:00
Brent Cook
2e9943af8d
Land #385 , enhance Windows extapi support for window enumeration
...
Merge remote-tracking branch 'upstream/pr/385' into upstream-master
v1.3.90
2020-04-08 06:04:41 -05:00
Metasploit
2e2aac23d1
Bump metasploit-payloads to 1.3.90
2020-04-08 04:19:53 -05:00
Brent Cook
a27f7c0388
Land #382 , fix wildcard handling in Java meterpreter
v1.3.89
2020-04-08 04:10:13 -05:00
Metasploit
bde0eef1f8
Bump metasploit-payloads to 1.3.89
2020-04-07 17:26:09 -05:00
Brent Cook
49b117838a
Land #384 , don't modify stageless config block in place
v1.3.88
2020-04-07 17:15:33 -05:00
Brent Cook
bf8950ebe9
remove unneeded checks before free, one being an impossible scenario
2020-04-07 17:15:03 -05:00
Brent Cook
dbac98fed7
Land #381 , check if context is null before applying wakelock
2020-04-07 17:06:19 -05:00
cn-kali-team
6d7740cc72
Process Unicode support
2020-04-05 11:53:22 +08:00
cn-kali-team
451a094269
Process Unicode support
2020-04-05 11:53:16 +08:00
cn-kali-team
25f770dcb3
Process Unicode support
2020-04-05 11:53:06 +08:00
cn-kali-team
a8df9b3604
Process Unicode support
2020-04-05 11:52:08 +08:00
Metasploit
3153421312
Bump metasploit-payloads to 1.3.88
2020-04-02 08:47:42 -05:00
bwatters
903620268f
Land #377 , Reducing permissions requested for sys_steal_token
...
Merge branch 'land-377' into upstream-master
v1.3.87
2020-04-02 08:37:42 -05:00
cn-kali-team
348aa69f68
Add window class name filter,Unicode Support etc.
2020-03-27 22:12:37 +08:00
cn-kali-team
443b6f2f23
add window class name filter
2020-03-27 22:12:04 +08:00
OJ
8b4d65de47
Fix stageless config block memory protection
...
I found an edge case where stageless payloads did not work when they
were embedded in .NET applications. The reason for this is because the
configuration block is stored alongside the code in stageless payloads
and hence is loaded into memory as part of the section when it's mapped.
This section, in native world, remains RWX, and hence we don't have a
problem reading from and writing to it. We write to it for various
reasons, such as when the session guid changes.
In .NET land, this section is mapped as RX instead of RWX. This means
that when we try to write to it, the program segfaults due to an access
violation.
This code modifies the loading of the configuration so that instead of
maintaining a pointer to the original configuration, it instead creates
a copy of it on the heap. I preferred this fix over marking the memory
as RWX, which obviously stands out a bit more.
2020-03-17 13:15:31 +10:00
Tim W
0ca5722ab1
fix wildcard usage
2020-03-10 14:59:24 +08:00
Tim W
312e019b58
revert globbing and only fix basic wildcard usage
2020-03-09 14:25:53 +08:00
Tim W
29ca118b98
implement full globbing
2020-03-09 14:21:04 +08:00
Tim W
0e8fe2b642
fix rapid7/metasploit-framework#12410
2020-03-06 11:11:23 +08:00
Metasploit
fee3d4773f
Bump metasploit-payloads to 1.3.87
2020-03-04 14:43:23 -06:00
Brent Cook
fd909771d5
Land #380 , add additional socket address info on network channels
v1.3.86
2020-03-04 14:33:11 -06:00
Metasploit
e3bc390da4
Bump metasploit-payloads to 1.3.86
2020-02-28 21:56:20 -06:00
Tim W
4eff18dc4e
Land #378 , fix Makefile
v1.3.85
2020-02-29 11:45:22 +08:00
Tim W
c2140c2896
fix rapid7/metasploit-framework#12778
2020-02-28 18:03:37 +08:00
Spencer McIntyre
03ddbd773e
Send addrinfo when opening a channel in Windows
2020-02-24 18:40:12 -05:00
Spencer McIntyre
c635d41b8c
Send addrinfo when opening a channel in Python
2020-02-19 23:29:40 -05:00
h00die
97f1fde125
space to tab, ew
2020-02-16 13:48:38 -05:00
Justin Bui
bad3ef7df4
Update config.c
...
Reduced permissions from ALL_ACCESS to the minimum access needed.
2020-02-12 20:18:18 -08:00
Metasploit
d33259c5e8
Bump metasploit-payloads to 1.3.85
2020-01-22 20:54:07 -06:00
bwatters
ba93a05959
Land #374 , Add support for PPID spoofing
...
Merge branch 'land-374' into upstream-master
v1.3.84
2020-01-22 14:59:45 -06:00
Francesco Soncina
b35cc0ac70
add support for PPID spoofing
...
fix #373
2019-12-17 00:57:49 +01:00
Metasploit
e1a3d351ad
Bump metasploit-payloads to 1.3.84
2019-12-06 09:45:04 -06:00
Brent Cook
363a90be11
Land #370 , update kiwi to latest mimikatz release
v1.3.83
2019-12-06 09:34:15 -06:00
Brent Cook
c3624d73b2
bump to kiwi 2.2.0-20191125
2019-12-06 09:28:19 -06:00
Metasploit
076801ce3d
Bump metasploit-payloads to 1.3.83
2019-12-05 17:12:53 -06:00
Brent Cook
188fef721e
Land #366 , fix unhook extension logic around clr.dll
v1.3.82
2019-12-05 17:02:55 -06:00
Metasploit
6be81dbb71
Bump metasploit-payloads to 1.3.82
2019-12-05 17:00:13 -06:00
Brent Cook
a59dc53fad
Land #364 , add android install to makefile
v1.3.81
2019-12-05 16:54:43 -06:00
Brent Cook
03491bfa9b
Land #361 , add hidpi and multi-desktop support to espia screengrab extension
2019-12-05 16:51:39 -06:00
Brent Cook
81a4d8ad96
Land #360 , fix crypt key memory leak
2019-12-05 16:50:29 -06:00
Metasploit
25e91f8799
Bump metasploit-payloads to 1.3.81
2019-12-04 17:36:39 -06:00
Brent Cook
0212c99c04
Land #359 , don't truncate addresses
v1.3.80
2019-12-04 17:22:19 -06:00
OJ
d2f7bfd420
Update to kiwi 2.2.0-20190813
2019-11-17 13:14:07 +10:00
Francesco Soncina
b527e76abd
fix: syntax error
2019-11-07 17:19:16 +01:00
Francesco Soncina
e386835042
fix: exclude clr.dll from being unhooked
...
see https://github.com/rapid7/metasploit-framework/issues/12549
2019-11-07 17:11:02 +01:00
Metasploit
162e769464
Bump metasploit-payloads to 1.3.80
2019-11-06 19:20:24 -06:00