Ashley Donaldson
133e8f0b01
Implement new cmd_exec for Java
2024-09-25 16:28:37 +10:00
Ashley Donaldson
6631a198e7
PHP implementation of new_cmd
2024-09-25 16:28:37 +10:00
Ashley Donaldson
e68225d4b1
Python meterp to support new cmd_exec
2024-09-25 16:28:37 +10:00
Ashley Donaldson
aa04d88b87
Handle new cmd_exec TLV format
2024-09-25 16:28:37 +10:00
Metasploit
4bd40411e2
Bump metasploit-payloads to 2.0.173
2024-09-20 10:33:09 -05:00
dledda-r7
a6da6ddac6
Land #713 , Removed GetThreadId and replaced with optional CLIENTID argument
2024-09-20 11:15:19 -04:00
Metasploit
435a3a2b52
Bump metasploit-payloads to 2.0.172
2024-09-19 04:46:35 -05:00
dledda-r7
3420144781
Land #712 , Fix linking in MinGW for OpenThreadToken on Windows XP x86
2024-09-19 05:20:23 -04:00
cod
68bbcf2a2b
Revert "Resolve GetThreadId at runtime"
...
This reverts commit 1ac4741094
.
2024-09-17 11:47:39 +02:00
cod
a91fb72536
Revert "Update remote_thread.c"
...
This reverts commit aff81538ec
.
2024-09-17 11:47:22 +02:00
cod
a5c18499a7
C4311: Compiler Warning treated as errors in msvc
2024-09-14 19:21:11 +02:00
Metasploit
c5bb65ad58
Bump metasploit-payloads to 2.0.171
2024-09-13 09:52:31 -05:00
dledda-r7
eaf37ada4c
Land #709 , Fix memory leak in request_sys_config_sysinfo
2024-09-13 10:33:11 -04:00
Metasploit
e0499a0049
Bump metasploit-payloads to 2.0.170
2024-09-13 08:45:34 -05:00
dledda-r7
54515f877a
Land #708 , Fixing typo
2024-09-13 09:25:59 -04:00
cod
26c3809d6f
removed GetThreadId and replaced with optional CLIENTID argument
2024-08-27 17:35:21 +02:00
cod
aff81538ec
Update remote_thread.c
...
TTypo
2024-08-13 22:42:21 +03:00
cod
788d419c6e
Added advapi32 in LINK_LIBS for modules which uses OpenThreadToken to fix an error in mingw-x86 toolchain
2024-08-13 17:58:44 +02:00
cod
1ac4741094
Resolve GetThreadId at runtime
2024-08-12 18:08:49 +02:00
cod
446b4d18c3
typo in context
2024-08-12 16:03:55 +02:00
cod
4428531701
memory leak in request_sys_config_sysinfo
2024-08-01 10:01:17 +02:00
cod
3332a27af8
typo
2024-08-01 09:03:54 +02:00
Spencer McIntyre
a86dc9db06
Land #705 , Update android json dependencies
2024-05-28 15:30:53 -04:00
bwatters-r7
f00b2731cb
Turns out we don't need those libraries at all.
2024-05-23 15:36:20 -05:00
bwatters-r7
cf7b514300
Fix library here, too
2024-05-22 17:40:46 -05:00
bwatters-r7
4d84150ae4
Update json library to 20231013
2024-05-22 15:51:14 -05:00
Metasploit
9b0e2de545
Bump metasploit-payloads to 2.0.169
2024-05-22 06:21:33 -05:00
dwelch-r7
85ed7e1914
Land #704 , Add clean step to Java documentation
2024-05-22 11:58:58 +01:00
adfoster-r7
74a770e336
Update clean step to Java documentation
2024-05-22 11:54:53 +01:00
Metasploit
962ff311a2
Bump metasploit-payloads to 2.0.168
2024-05-21 15:45:30 -05:00
adfoster-r7
49f273af49
Land #703 , Fix Java Meterpreter payloads failing with OpenJDK on Alpine Linux
2024-05-21 21:30:08 +01:00
Christophe De La Fuente
cde5c5e90e
Remove early-access release suffix on version string
2024-05-14 19:05:32 +02:00
Metasploit
d08cbb07bd
Bump metasploit-payloads to 2.0.167
2024-02-20 12:11:35 -06:00
Christophe De La Fuente
0ee45fa625
Land #698 , Update mimikatz
2024-02-20 18:46:13 +01:00
Spencer McIntyre
52d58af59a
Update mimikatz to 45c42c71
2024-01-30 16:30:26 -05:00
Metasploit
7ff8ee535f
Bump metasploit-payloads to 2.0.166
2024-01-19 11:20:36 -06:00
Spencer McIntyre
1adafcd2fb
Land #694 , Use direct syscalls in the RDI loader
...
This updates the RDI loader used by the Windows Meterpreter to use
direct system calls to prevent questionable behavior from being
identified through hooks implemented by external applications.
2024-01-19 12:05:10 -05:00
Christophe De La Fuente
c7abd47585
Update the ReflectiveDLLInjection submodule to the upstream repository
2024-01-19 17:43:25 +01:00
Christophe De La Fuente
83fa146f75
Update ReflectiveDLLInjection submodule to pull in new trampoline detection logic
2024-01-16 18:27:36 +01:00
Christophe De La Fuente
1556007bfd
Update ReflectiveDLLInjection submodule to pull in Win10/8 x86 fix
2024-01-12 19:24:01 +01:00
Christophe De La Fuente
a5e33d167d
Remove include DirectSyscall.c
2024-01-10 15:01:19 +01:00
Christophe De La Fuente
7082431dae
Pull in changes from ReflectiveDLLInjection to support direct syscalls
...
- Includes ColdGate.c in each project
- Change railgun macro name to stdcall_func
- Update VS configs
- Update cmake files for mingw
- Fix cmake files for kiwi builds
- Update ReflectiveDLLInjection module to verify if CI passes
- Update include file names & ReflectiveDLLInjection submodule
2024-01-08 18:53:17 +01:00
Metasploit
6143148e22
Bump metasploit-payloads to 2.0.165
2024-01-08 04:52:57 -06:00
adfoster-r7
e46cdad8e9
Land #693 , Fix incorrect Memory Search variable name
2024-01-08 10:39:26 +00:00
sjanusz-r7
aeb6945bd2
Fix incorrect Memory Search variable name
2024-01-08 10:10:16 +00:00
Metasploit
d8fb9eaf95
Bump metasploit-payloads to 2.0.164
2024-01-04 11:54:24 -06:00
adfoster-r7
2430d20255
Land #686 , Add Windows Memory Search support using regex
2024-01-04 17:41:39 +00:00
sjanusz-r7
4f19a1c4ae
Fix Memory Search variable shadowing
2024-01-04 16:34:08 +00:00
Metasploit
1731613130
Bump metasploit-payloads to 2.0.163
2023-12-12 04:44:00 -06:00
adfoster-r7
ea4ac6b392
Land #689 , Add github actions for Windows Visual Studio 2019 C Meterpreter payload
2023-12-12 10:29:33 +00:00