diff --git a/documentation/modules/exploit/linux/http/github_enterprise_secret.md b/documentation/modules/exploit/linux/http/github_enterprise_secret.md index 96ec537bcde7..997c5260a5be 100644 --- a/documentation/modules/exploit/linux/http/github_enterprise_secret.md +++ b/documentation/modules/exploit/linux/http/github_enterprise_secret.md @@ -19,6 +19,7 @@ For testing purposes, you can download a Github Enterprise image from the follow This module was specifically tested against version 2.8.0, which can be downloaded here: +Download links are provided for reference only and are not maintained by the project. Utilize at your own risk! [https://github-enterprise.s3.amazonaws.com/esx/releases/github-enterprise-2.8.0.ova](https://github-enterprise.s3.amazonaws.com/esx/releases/github-enterprise-2.8.0.ova) Before you install the image, you must have a valid key. Start from here: diff --git a/documentation/modules/exploit/linux/http/logsign_exec.md b/documentation/modules/exploit/linux/http/logsign_exec.md index 177a36b5bbac..5f9a63c3f95a 100644 --- a/documentation/modules/exploit/linux/http/logsign_exec.md +++ b/documentation/modules/exploit/linux/http/logsign_exec.md @@ -2,8 +2,9 @@ Download the vulnerable version of OVA or ISO file from following URL. I strongly suggest you to choose OVA. -[http://s3-eu-west-1.amazonaws.com/innotim/Logsign.ova](http://s3-eu-west-1.amazonaws.com/innotim/Logsign.ova) -[http://s3-eu-west-1.amazonaws.com/innotim/forest-4.4.1-12.04.iso](http://s3-eu-west-1.amazonaws.com/innotim/forest-4.4.1-12.04.iso) +Download links are provided for reference only and are not maintained by the project. Utilize at your own risk! +http://s3-eu-west-1.amazonaws.com/innotim/Logsign.ova +http://s3-eu-west-1.amazonaws.com/innotim/forest-4.4.1-12.04.iso ### Creating A Testing Environment @@ -76,4 +77,4 @@ dns-nameservers 8.8.8.8 meterpreter > getuid Server username: root meterpreter > -``` \ No newline at end of file +``` diff --git a/documentation/modules/exploit/linux/http/unraid_auth_bypass_exec.md b/documentation/modules/exploit/linux/http/unraid_auth_bypass_exec.md index 999b67cbc3cf..6993e9a4aea4 100644 --- a/documentation/modules/exploit/linux/http/unraid_auth_bypass_exec.md +++ b/documentation/modules/exploit/linux/http/unraid_auth_bypass_exec.md @@ -9,6 +9,7 @@ performs remote code execution as root by abusing the *extract* function used in ### Testing Environment +Download links are provided for reference only and are not maintained by the project. Utilize at your own risk! Setup [Unraid 6.8.0](https://s3.amazonaws.com/dnld.lime-technology.com/stable/unRAIDServer-6.8.0-x86_64.zip) according to the [UnRAID Getting Started](https://wiki.unraid.net/UnRAID_6/Getting_Started) guide. diff --git a/documentation/modules/post/windows/gather/credentials/purevpn_cred_collector.md b/documentation/modules/post/windows/gather/credentials/purevpn_cred_collector.md index ddd41820c986..98ab1e49ecca 100644 --- a/documentation/modules/post/windows/gather/credentials/purevpn_cred_collector.md +++ b/documentation/modules/post/windows/gather/credentials/purevpn_cred_collector.md @@ -6,6 +6,7 @@ This module allows you to collect login information for PureVPN client, specific Versions before 6.0 should be vulnerable. For testing purposes, you may find the vulnerable version here: +Download links are provided for reference only and are not maintained by the project. Utilize at your own risk! * [https://jumpshare.com/v/LZcpUqJcThY1v7WlH95m](https://jumpshare.com/v/LZcpUqJcThY1v7WlH95m) * [https://s3.amazonaws.com/purevpn-dialer-assets/windows/app/purevpn_setup.exe](https://s3.amazonaws.com/purevpn-dialer-assets/windows/app/purevpn_setup.exe)