WESKER
WESKER
### Is there an existing issue for this? - [X] I have searched the existing issues ### I'm submitting a ... - [X] bug report - [ ] feature request...
My msf version: "metasploit v6.3.44-dev-" my OS: Linux My network rate speed: 100 GBps Target OS: Windows 10, equipped with Python3.12. The error happened on Unix VMs with various python...
Modified with DOM support via headless browser in my repo
https://github.com/lflare/cve-2024-6387-poc Affected versions of OpenSSH range from 8.5p1 to 9.8p1 Severity: critical.
I made a custom `php/meterpreter/reverse_tcp` payload but it's not clear how to use it in pre-build modules. Say I'd like to use it, by using the 'php/exec' module it doesn't...
https://github.com/kali-mx/CVE-2023-38408/blob/main/CVE-2023-38408.sh Credits to Max Ahartz (author)
The pinned build 'LTSB 14393 x64' is vulnerable to MS17-010, however the Metasploit module doesn't support it. Nor has support for x86 variants. I have old release of msf (6.3.44)...
Current msfvenom does something like this. ***shellcode* -> template.exe = shellcode+template.exe** My idea: no binary output, you rather get **raw valid assembly data** and a C loader. New command syntax...