1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-03-24 18:16:24 +01:00

3559 Commits

Author SHA1 Message Date
dledda-r7
b18df9c9fe
fix: handling WoW64 injection destinationArch 2024-10-30 12:15:06 -04:00
dledda-r7
a97444d79c
feat: attempt to have x64->wow64 injection with tp_direct_insertion 2024-10-30 12:15:06 -04:00
dledda-r7
ebe086f5ea
feat: draft of worker_factory_routine_overwrite technique 2024-10-30 12:15:05 -04:00
dledda-r7
7eab552207
feat: improving remote handles fetching, tp_direct_insertion support wow64->x64 injection 2024-10-30 12:15:05 -04:00
dledda-r7
2a45039182
debug(injection): inject_via_poolparty using remote_tp_direct_insertion 2024-10-30 12:15:05 -04:00
dledda-r7
cba588451d
debug(injection): inject_via_poolparty using remote_tp_wait_insertion 2024-10-30 12:15:04 -04:00
dledda-r7
2af3fe5c67
feat(injection): improving logging and error handling 2024-10-30 12:15:04 -04:00
dledda-r7
9e9bb677fa
feat(injection): improving error handling 2024-10-30 12:15:04 -04:00
dledda-r7
dc30ecc054
feat(injection): updating x86 shellcode 2024-10-30 12:15:03 -04:00
dledda-r7
f1492da090
feat(injection): adjusting SetLastError when injection fails 2024-10-30 12:15:03 -04:00
dledda-r7
b27aed9051
debug(injection): update migration to force pool-party injection with remote_tp_direct_insertion 2024-10-30 12:15:03 -04:00
dledda-r7
c40d08ad33
feat(injection): improving ntdll functions fetch, adding remote_tp_direct_insert variant 2024-10-30 12:15:02 -04:00
dledda-r7
cef2e6cd5e
feat(injection): commenting unused ntdll functions 2024-10-30 12:15:02 -04:00
dledda-r7
af77eda913
feat(injection): adding hTriggerEvent to POOLPARTYCONTEXT 2024-10-30 12:15:02 -04:00
dledda-r7
c6d066fa86
feat(injection): improving x64 shellcode, adding draft x86 shellcode 2024-10-30 12:15:01 -04:00
dledda-r7
6984d02128
chore(gitignore): adding .vscode in gitignore 2024-10-30 12:15:01 -04:00
dledda-r7
51a086bc0b
chore(metsrv): including poolparty sources and headers to Visual Studio project 2024-10-30 12:15:00 -04:00
dledda-r7
25ee5deddf
feat(injection): update base_dispatch to use inject_via_poolparty when possible 2024-10-30 12:15:00 -04:00
dledda-r7
7f66532422
feat(injection): update base_inject to support inject_via_poolparty, added custom stub for x64 2024-10-30 12:15:00 -04:00
dledda-r7
ce387785c8
feat(injection): adding pool-party injection 2024-10-30 12:14:59 -04:00
Metasploit
53833daced Bump metasploit-payloads to 2.0.187 2024-10-29 15:11:27 -05:00
Spencer McIntyre
7bd3b648ab
Merge pull request from smashery/fix-symlink-windows
Fix symlink and junction detection on Python windows
v2.0.186
2024-10-28 13:05:51 -04:00
Metasploit
a47c18ea27 Bump metasploit-payloads to 2.0.186 2024-10-24 06:09:13 -05:00
adfoster-r7
ef0ce7e4f5
Merge pull request from cgranleese-r7/fixes-workflow-variable
Fixes an incorrectly named workflow variable
v2.0.185
2024-10-24 11:48:57 +01:00
cgranleese-r7
e4e7be20ac Fixes an incorrectly named workflow variable 2024-10-21 10:22:06 +01:00
Metasploit
4e974889da Bump metasploit-payloads to 2.0.185 2024-10-18 08:40:26 -05:00
adfoster-r7
2bc9f23af8
Merge pull request from cgranleese-r7/adds-acceptance-testing-reusable-pipeline
Adds a reusable pipeline for acceptance testing
v2.0.184
2024-10-18 14:25:32 +01:00
cgranleese-r7
a2c6d43069 Adds a reusable pipeline for acceptance testing 2024-10-18 14:05:27 +01:00
Metasploit
d412a044dc Bump metasploit-payloads to 2.0.184 2024-10-16 08:44:14 -05:00
adfoster-r7
1f62608648
Merge pull request from adfoster-r7/update-security-readme
Update security readme
v2.0.183
2024-10-16 14:16:27 +01:00
adfoster-r7
6cf64cd624 Update security readme 2024-10-16 14:14:49 +01:00
Metasploit
69a58eabeb Bump metasploit-payloads to 2.0.183 2024-10-16 05:04:39 -05:00
adfoster-r7
af3e145c55
Merge pull request from smashery/new_cmd_exec_v3
Handle discrepancy of process launching on Windows between different versions of Java
v2.0.182
2024-10-16 11:04:12 +01:00
Ashley Donaldson
f1fcfd6176 Handle discrepance of process launching on Windows between different versions of Java 2024-10-16 17:29:41 +11:00
Metasploit
dc3021e1c0 Bump metasploit-payloads to 2.0.182 2024-10-15 09:55:29 -05:00
adfoster-r7
c970ca1381
Merge pull request from cgranleese-r7/fixes-acceptance-tests-report-generation
Fixes acceptance tests report generation
v2.0.181
2024-10-15 15:55:01 +01:00
cgranleese-r7
99f37569c4 Fixes acceptance tests report generation 2024-10-15 15:11:27 +01:00
Metasploit
c3cd77460c Bump metasploit-payloads to 2.0.181 2024-10-15 07:04:03 -05:00
adfoster-r7
b697cc5e90
Merge pull request from smashery/new_cmd_exec_v2
Handle Windows oddity in java's process launch library
v2.0.180
2024-10-15 12:49:29 +01:00
Ashley Donaldson
26d0aa3e8d Changes from code review 2024-10-15 22:11:02 +11:00
Ashley Donaldson
26eddbb7a3 Handle Windows oddity in java's process launch library 2024-10-15 21:24:37 +11:00
Metasploit
8b9fdd5e38 Bump metasploit-payloads to 2.0.180 2024-10-14 19:04:16 -05:00
adfoster-r7
6619c41de6
Merge pull request from cgranleese-r7/add-metasloit-framework-acceptance-tests
Adds metasploit-frameworks acceptance tests
v2.0.179
2024-10-15 00:44:56 +01:00
cgranleese-r7
a1921e3444 Adds metasploit-frameworks acceptance tests 2024-10-14 15:19:12 +01:00
Metasploit
c0be2b0068 Bump metasploit-payloads to 2.0.179 2024-10-11 07:18:14 -05:00
adfoster-r7
7df3146306
Merge pull request from adfoster-r7/update-python-tests-to-run-on-source-changes
Update python tests to run on source changes
v2.0.178
2024-10-11 12:54:41 +01:00
adfoster-r7
a0b0165963 Update python tests to run on source changes 2024-10-11 12:49:38 +01:00
Ashley Donaldson
38e11ae3aa Fix symlink and junction detection on Python windows 2024-10-11 21:20:31 +11:00
Metasploit
80f92edc26 Bump metasploit-payloads to 2.0.178 2024-10-10 18:37:40 -05:00
adfoster-r7
80d73d4d34
Merge pull request from smashery/new_cmd_exec
New process launch API
v2.0.177
2024-10-11 00:23:00 +01:00