1
mirror of https://github.com/rapid7/metasploit-payloads synced 2024-11-26 17:41:08 +01:00
Commit Graph

2772 Commits

Author SHA1 Message Date
bwatters
903620268f
Land #377, Reducing permissions requested for sys_steal_token
Merge branch 'land-377' into upstream-master
2020-04-02 08:37:42 -05:00
cn-kali-team
348aa69f68 Add window class name filter,Unicode Support etc. 2020-03-27 22:12:37 +08:00
cn-kali-team
443b6f2f23 add window class name filter 2020-03-27 22:12:04 +08:00
OJ
8b4d65de47
Fix stageless config block memory protection
I found an edge case where stageless payloads did not work when they
were embedded in .NET applications. The reason for this is because the
configuration block is stored alongside the code in stageless payloads
and hence is loaded into memory as part of the section when it's mapped.
This section, in native world, remains RWX, and hence we don't have a
problem reading from and writing to it. We write to it for various
reasons, such as when the session guid changes.

In .NET land, this section is mapped as RX instead of RWX. This means
that when we try to write to it, the program segfaults due to an access
violation.

This code modifies the loading of the configuration so that instead of
maintaining a pointer to the original configuration, it instead creates
a copy of it on the heap. I preferred this fix over marking the memory
as RWX, which obviously stands out a bit more.
2020-03-17 13:15:31 +10:00
Tim W
0ca5722ab1 fix wildcard usage 2020-03-10 14:59:24 +08:00
Tim W
312e019b58 revert globbing and only fix basic wildcard usage 2020-03-09 14:25:53 +08:00
Tim W
29ca118b98 implement full globbing 2020-03-09 14:21:04 +08:00
Tim W
0e8fe2b642 fix rapid7/metasploit-framework#12410 2020-03-06 11:11:23 +08:00
Metasploit
fee3d4773f Bump metasploit-payloads to 1.3.87 2020-03-04 14:43:23 -06:00
Brent Cook
fd909771d5
Land #380, add additional socket address info on network channels 2020-03-04 14:33:11 -06:00
Metasploit
e3bc390da4 Bump metasploit-payloads to 1.3.86 2020-02-28 21:56:20 -06:00
Tim W
4eff18dc4e
Land #378, fix Makefile 2020-02-29 11:45:22 +08:00
Tim W
c2140c2896 fix rapid7/metasploit-framework#12778 2020-02-28 18:03:37 +08:00
Spencer McIntyre
03ddbd773e Send addrinfo when opening a channel in Windows 2020-02-24 18:40:12 -05:00
Spencer McIntyre
c635d41b8c Send addrinfo when opening a channel in Python 2020-02-19 23:29:40 -05:00
h00die
97f1fde125 space to tab, ew 2020-02-16 13:48:38 -05:00
Justin Bui
bad3ef7df4
Update config.c
Reduced permissions from ALL_ACCESS to the minimum access needed.
2020-02-12 20:18:18 -08:00
Metasploit
d33259c5e8 Bump metasploit-payloads to 1.3.85 2020-01-22 20:54:07 -06:00
bwatters
ba93a05959
Land #374, Add support for PPID spoofing
Merge branch 'land-374' into upstream-master
2020-01-22 14:59:45 -06:00
Francesco Soncina
b35cc0ac70
add support for PPID spoofing
fix #373
2019-12-17 00:57:49 +01:00
Metasploit
e1a3d351ad Bump metasploit-payloads to 1.3.84 2019-12-06 09:45:04 -06:00
Brent Cook
363a90be11
Land #370, update kiwi to latest mimikatz release 2019-12-06 09:34:15 -06:00
Brent Cook
c3624d73b2 bump to kiwi 2.2.0-20191125 2019-12-06 09:28:19 -06:00
Metasploit
076801ce3d Bump metasploit-payloads to 1.3.83 2019-12-05 17:12:53 -06:00
Brent Cook
188fef721e
Land #366, fix unhook extension logic around clr.dll 2019-12-05 17:02:55 -06:00
Metasploit
6be81dbb71 Bump metasploit-payloads to 1.3.82 2019-12-05 17:00:13 -06:00
Brent Cook
a59dc53fad
Land #364, add android install to makefile 2019-12-05 16:54:43 -06:00
Brent Cook
03491bfa9b
Land #361, add hidpi and multi-desktop support to espia screengrab extension 2019-12-05 16:51:39 -06:00
Brent Cook
81a4d8ad96
Land #360, fix crypt key memory leak 2019-12-05 16:50:29 -06:00
Metasploit
25e91f8799 Bump metasploit-payloads to 1.3.81 2019-12-04 17:36:39 -06:00
Brent Cook
0212c99c04
Land #359, don't truncate addresses 2019-12-04 17:22:19 -06:00
OJ
d2f7bfd420
Update to kiwi 2.2.0-20190813 2019-11-17 13:14:07 +10:00
Francesco Soncina
b527e76abd
fix: syntax error 2019-11-07 17:19:16 +01:00
Francesco Soncina
e386835042
fix: exclude clr.dll from being unhooked
see https://github.com/rapid7/metasploit-framework/issues/12549
2019-11-07 17:11:02 +01:00
Metasploit
162e769464 Bump metasploit-payloads to 1.3.80 2019-11-06 19:20:24 -06:00
h00die
bcf6560a02 add android build to makefile 2019-11-06 17:35:56 -05:00
h00die
291d7104e1
land #356 android payload start without context 2019-11-06 17:28:35 -05:00
Tim W
a74dedca56 fix espia screenshot 2019-10-22 23:51:21 +08:00
Metasploit
6ff2e2eea6 Bump metasploit-payloads to 1.3.79 2019-10-03 17:00:31 -05:00
bwatters
bf6fd52c25
Land #350, Add keyboard and mouse input for the java meterpreter
Merge branch 'land-350' into upstream-master
2019-10-03 16:51:00 -05:00
max3raza
71762fe778 fix for memory leak 2019-09-09 22:20:17 +03:00
plowsec
389e71df32 Fix address truncation occurring in x64 Windows processes. 2019-09-06 14:50:13 +02:00
Metasploit
e8461c1a83 Bump metasploit-payloads to 1.3.78 2019-09-03 17:43:03 -05:00
bwatters
f6808dde30
Land #352, add windows keyevent api
Merge branch 'land-352' into upstream-master
2019-09-03 16:39:51 -05:00
Metasploit
fe355a4121 Bump to 1.3.77 2019-08-27 20:22:27 -07:00
Tim W
444419c122
Land #358, fix ls on relative paths 2019-08-28 11:09:57 +08:00
Clément Notin
2f39a17604
Java meterpreter: Allow to list ("ls") relative paths 2019-08-27 21:03:43 +02:00
Tim W
f34962f69d start without context 2019-08-24 13:42:53 +08:00
Metasploit
10e527ef01 Bump to 1.3.76 2019-08-05 10:22:49 -07:00
sinn3r
80e85d4fca
Land #355, Update OS names to be more generic in kernel versions 10.0.x
Update OS names to be more generic in kernel versions 10.0.x
2019-08-05 12:12:05 -05:00