1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-11-20 14:39:22 +01:00
Commit Graph

3540 Commits

Author SHA1 Message Date
Ashley Donaldson
133e8f0b01 Implement new cmd_exec for Java 2024-09-25 16:28:37 +10:00
Ashley Donaldson
6631a198e7 PHP implementation of new_cmd 2024-09-25 16:28:37 +10:00
Ashley Donaldson
e68225d4b1 Python meterp to support new cmd_exec 2024-09-25 16:28:37 +10:00
Ashley Donaldson
aa04d88b87 Handle new cmd_exec TLV format 2024-09-25 16:28:37 +10:00
Metasploit
4bd40411e2 Bump metasploit-payloads to 2.0.173 2024-09-20 10:33:09 -05:00
dledda-r7
a6da6ddac6
Land #713, Removed GetThreadId and replaced with optional CLIENTID argument 2024-09-20 11:15:19 -04:00
Metasploit
435a3a2b52 Bump metasploit-payloads to 2.0.172 2024-09-19 04:46:35 -05:00
dledda-r7
3420144781
Land #712, Fix linking in MinGW for OpenThreadToken on Windows XP x86 2024-09-19 05:20:23 -04:00
cod
68bbcf2a2b Revert "Resolve GetThreadId at runtime"
This reverts commit 1ac4741094.
2024-09-17 11:47:39 +02:00
cod
a91fb72536 Revert "Update remote_thread.c"
This reverts commit aff81538ec.
2024-09-17 11:47:22 +02:00
cod
a5c18499a7 C4311: Compiler Warning treated as errors in msvc 2024-09-14 19:21:11 +02:00
Metasploit
c5bb65ad58 Bump metasploit-payloads to 2.0.171 2024-09-13 09:52:31 -05:00
dledda-r7
eaf37ada4c
Land #709, Fix memory leak in request_sys_config_sysinfo 2024-09-13 10:33:11 -04:00
Metasploit
e0499a0049 Bump metasploit-payloads to 2.0.170 2024-09-13 08:45:34 -05:00
dledda-r7
54515f877a
Land #708, Fixing typo 2024-09-13 09:25:59 -04:00
cod
26c3809d6f removed GetThreadId and replaced with optional CLIENTID argument 2024-08-27 17:35:21 +02:00
cod
aff81538ec
Update remote_thread.c
TTypo
2024-08-13 22:42:21 +03:00
cod
788d419c6e Added advapi32 in LINK_LIBS for modules which uses OpenThreadToken to fix an error in mingw-x86 toolchain 2024-08-13 17:58:44 +02:00
cod
1ac4741094 Resolve GetThreadId at runtime 2024-08-12 18:08:49 +02:00
cod
446b4d18c3 typo in context 2024-08-12 16:03:55 +02:00
cod
4428531701 memory leak in request_sys_config_sysinfo 2024-08-01 10:01:17 +02:00
cod
3332a27af8 typo 2024-08-01 09:03:54 +02:00
Spencer McIntyre
a86dc9db06
Land #705, Update android json dependencies 2024-05-28 15:30:53 -04:00
bwatters-r7
f00b2731cb
Turns out we don't need those libraries at all. 2024-05-23 15:36:20 -05:00
bwatters-r7
cf7b514300
Fix library here, too 2024-05-22 17:40:46 -05:00
bwatters-r7
4d84150ae4
Update json library to 20231013 2024-05-22 15:51:14 -05:00
Metasploit
9b0e2de545 Bump metasploit-payloads to 2.0.169 2024-05-22 06:21:33 -05:00
dwelch-r7
85ed7e1914
Land #704, Add clean step to Java documentation 2024-05-22 11:58:58 +01:00
adfoster-r7
74a770e336 Update clean step to Java documentation 2024-05-22 11:54:53 +01:00
Metasploit
962ff311a2 Bump metasploit-payloads to 2.0.168 2024-05-21 15:45:30 -05:00
adfoster-r7
49f273af49
Land #703, Fix Java Meterpreter payloads failing with OpenJDK on Alpine Linux 2024-05-21 21:30:08 +01:00
Christophe De La Fuente
cde5c5e90e
Remove early-access release suffix on version string 2024-05-14 19:05:32 +02:00
Metasploit
d08cbb07bd Bump metasploit-payloads to 2.0.167 2024-02-20 12:11:35 -06:00
Christophe De La Fuente
0ee45fa625
Land #698, Update mimikatz 2024-02-20 18:46:13 +01:00
Spencer McIntyre
52d58af59a Update mimikatz to 45c42c71 2024-01-30 16:30:26 -05:00
Metasploit
7ff8ee535f Bump metasploit-payloads to 2.0.166 2024-01-19 11:20:36 -06:00
Spencer McIntyre
1adafcd2fb
Land #694, Use direct syscalls in the RDI loader
This updates the RDI loader used by the Windows Meterpreter to use
direct system calls to prevent questionable behavior from being
identified through hooks implemented by external applications.
2024-01-19 12:05:10 -05:00
Christophe De La Fuente
c7abd47585 Update the ReflectiveDLLInjection submodule to the upstream repository 2024-01-19 17:43:25 +01:00
Christophe De La Fuente
83fa146f75
Update ReflectiveDLLInjection submodule to pull in new trampoline detection logic 2024-01-16 18:27:36 +01:00
Christophe De La Fuente
1556007bfd
Update ReflectiveDLLInjection submodule to pull in Win10/8 x86 fix 2024-01-12 19:24:01 +01:00
Christophe De La Fuente
a5e33d167d
Remove include DirectSyscall.c 2024-01-10 15:01:19 +01:00
Christophe De La Fuente
7082431dae
Pull in changes from ReflectiveDLLInjection to support direct syscalls
- Includes ColdGate.c in each project
- Change railgun macro name to stdcall_func
- Update VS configs
- Update cmake files for mingw
- Fix cmake files for kiwi builds
- Update ReflectiveDLLInjection module to verify if CI passes
- Update include file names & ReflectiveDLLInjection submodule
2024-01-08 18:53:17 +01:00
Metasploit
6143148e22 Bump metasploit-payloads to 2.0.165 2024-01-08 04:52:57 -06:00
adfoster-r7
e46cdad8e9
Land #693, Fix incorrect Memory Search variable name 2024-01-08 10:39:26 +00:00
sjanusz-r7
aeb6945bd2 Fix incorrect Memory Search variable name 2024-01-08 10:10:16 +00:00
Metasploit
d8fb9eaf95 Bump metasploit-payloads to 2.0.164 2024-01-04 11:54:24 -06:00
adfoster-r7
2430d20255
Land #686, Add Windows Memory Search support using regex 2024-01-04 17:41:39 +00:00
sjanusz-r7
4f19a1c4ae Fix Memory Search variable shadowing 2024-01-04 16:34:08 +00:00
Metasploit
1731613130 Bump metasploit-payloads to 2.0.163 2023-12-12 04:44:00 -06:00
adfoster-r7
ea4ac6b392
Land #689, Add github actions for Windows Visual Studio 2019 C Meterpreter payload 2023-12-12 10:29:33 +00:00