-
Module: metasploit-framework/modules/exploits/multi/http/jboss_maindeployer.rb
I've noticed in my testing that if authentication can be bypassed for an older JBoss target server (as reported by metas…
-
#TODO
def backdoor():
global device
if device != 'none':
if shutil.which("msfvenom") is not None:
try:
d = adbutils.adb.device(device)
…
-
```
1. If I had a million dollars to pay you (that's what it'd cost if you
weren't so nice), I'd like you to add...
Bruteforce option when right-clicking a host
2. Because this feature doesn't exist…
-
```
1. If I had a million dollars to pay you (that's what it'd cost if you
weren't so nice), I'd like you to add...
Bruteforce option when right-clicking a host
2. Because this feature doesn't exist…
-
```
1. If I had a million dollars to pay you (that's what it'd cost if you
weren't so nice), I'd like you to add...
Bruteforce option when right-clicking a host
2. Because this feature doesn't exist…
-
Guys I want to make payload.
But it shows this to me
In termux
-
/data/data/com.termux/files/usr/opt/metasploit-framework/config/application.rb:1: warning: /data/data/com.termux/files/usr/lib/ruby/3.3.0/fiddle.rb was loaded from the standard library, but will no …
-
## Input file
I expected that the `Style/StringConcatenation` auto-correct wouldn't change any characters with the following input:
```ruby
$ cat example.rb
query
-
## Problem
Various mixins define a `connect` method which can interfere with each other when multiple mixins are used. For instance with a nodule that requires both an http client and psexec mixins…
-
## Steps to reproduce
How'd you do it?
1. use msfvenom -c to add additional shellcode to a jar file
## Expected behavior
Execute the shellcode.
## Current behavior
Shellcode execute…