Skip to content

Commit

Permalink
Auto commit changes
Browse files Browse the repository at this point in the history
  • Loading branch information
rcvalle committed Jan 24, 2025
1 parent 32b6804 commit 106d397
Show file tree
Hide file tree
Showing 10 changed files with 18 additions and 18 deletions.
18 changes: 9 additions & 9 deletions _data/modules.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,32 +29,32 @@
- description: Connect back to attacker and spawn a command shell
name: payload/linux/ppc64/shell_reverse_tcp
published: 2008-11-13 01:57:53.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2025-01-14 14:31:03.000000000 Z
vulnerabilities: []
- description: Spawn a shell on an established connection
name: payload/linux/ppc64/shell_find_port
published: 2008-11-13 01:57:53.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2025-01-14 14:31:03.000000000 Z
vulnerabilities: []
- description: Listen for a connection and spawn a command shell
name: payload/linux/ppc64/shell_bind_tcp
published: 2008-11-13 01:57:53.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2025-01-14 14:31:03.000000000 Z
vulnerabilities: []
- description: Connect back to attacker and spawn a command shell
name: payload/linux/ppc/shell_reverse_tcp
published: 2008-11-13 01:57:53.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2024-12-19 17:13:55.000000000 Z
vulnerabilities: []
- description: Spawn a shell on an established connection
name: payload/linux/ppc/shell_find_port
published: 2008-11-13 01:57:53.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2024-12-19 17:13:55.000000000 Z
vulnerabilities: []
- description: Listen for a connection and spawn a command shell
name: payload/linux/ppc/shell_bind_tcp
published: 2008-11-13 01:57:53.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2024-12-19 17:13:55.000000000 Z
vulnerabilities: []
- description: This module triggers a heap overflow in the LSA RPC service of the
Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon
Expand All @@ -69,12 +69,12 @@
- description: Connect back to attacker and spawn a command shell
name: payload/linux/x86/shell_reverse_tcp
published: 2008-10-19 21:03:39.000000000 Z
updated: 2022-11-04 00:33:03.000000000 Z
updated: 2025-01-14 14:31:03.000000000 Z
vulnerabilities: []
- description: Spawn a shell on an established connection
name: payload/linux/x86/shell_find_port
published: 2008-10-19 21:03:39.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2025-01-14 14:31:03.000000000 Z
vulnerabilities: []
- description: This module exploits a buffer overflow vulnerability in adm_build_path()
function of sadmind daemon. The distributed system administration daemon (sadmind)
Expand Down Expand Up @@ -170,7 +170,7 @@
- description: Listen for a connection and spawn a command shell
name: payload/linux/x86/shell_bind_tcp
published: 2007-07-31 02:10:49.000000000 Z
updated: 2021-01-05 14:59:46.000000000 Z
updated: 2025-01-14 14:31:03.000000000 Z
vulnerabilities: []
- description: Connect back to attacker and spawn a command shell
name: payload/bsd/x86/shell_reverse_tcp
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/ppc/shell_bind_tcp.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 223

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::Ppc::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/ppc/shell_find_port.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 171

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::Ppc::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/ppc/shell_reverse_tcp.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 183

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::Ppc::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/ppc64/shell_bind_tcp.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 223

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::Ppc::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/ppc64/shell_find_port.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 171

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::Ppc::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/ppc64/shell_reverse_tcp.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 183

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::Ppc::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/x86/shell_bind_tcp.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 78

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::X86::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/x86/shell_find_port.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 62

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::X86::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/singles/linux/x86/shell_reverse_tcp.rb
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ module MetasploitModule
CachedSize = 68

include Msf::Payload::Single
include Msf::Payload::Linux
include Msf::Payload::Linux::X86::Prepends
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
Expand Down

0 comments on commit 106d397

Please sign in to comment.