Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
jenkins-metasploit committed Dec 19, 2024
1 parent c77ccb1 commit a6dc0bf
Showing 1 changed file with 0 additions and 176 deletions.
176 changes: 0 additions & 176 deletions db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -215665,50 +215665,6 @@
"stage_refname": "windows/custom",
"stager_refname": "windows/reverse_https"
},
"payload_cmd/windows/powershell/custom/reverse_https_proxy": {
"name": "Powershell Exec, Windows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy",
"fullname": "payload/cmd/windows/powershell/custom/reverse_https_proxy",
"aliases": [

],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Spencer McIntyre",
"bwatters-r7",
"hdm <x@hdm.io>",
"corelanc0d3r <peter.ve@corelan.be>",
"amaloteaux <alex_maloteaux@metasploit.com>"
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nCustom shellcode stage.\n\nTunnel communication over HTTP using SSL with custom proxy support",
"references": [

],
"platform": "Windows",
"arch": "cmd",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-05-27 16:41:25 +0000",
"path": "/modules/payloads/adapters/cmd/windows/powershell.rb",
"is_install_path": true,
"ref_name": "cmd/windows/powershell/custom/reverse_https_proxy",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 8,
"adapter_refname": "cmd/windows/powershell",
"adapted_refname": "windows/custom/reverse_https_proxy",
"staged": true,
"stage_refname": "windows/custom",
"stager_refname": "windows/reverse_https_proxy"
},
"payload_cmd/windows/powershell/custom/reverse_ipv6_tcp": {
"name": "Powershell Exec, Windows shellcode stage, Reverse TCP Stager (IPv6)",
"fullname": "payload/cmd/windows/powershell/custom/reverse_ipv6_tcp",
Expand Down Expand Up @@ -218250,53 +218206,6 @@
"stage_refname": "windows/meterpreter",
"stager_refname": "windows/reverse_https"
},
"payload_cmd/windows/powershell/meterpreter/reverse_https_proxy": {
"name": "Powershell Exec, Reverse HTTPS Stager with Support for Custom Proxy",
"fullname": "payload/cmd/windows/powershell/meterpreter/reverse_https_proxy",
"aliases": [

],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"Spencer McIntyre",
"skape <mmiller@hick.org>",
"sf <stephen_fewer@harmonysecurity.com>",
"OJ Reeves",
"hdm <x@hdm.io>",
"corelanc0d3r <peter.ve@corelan.be>",
"amaloteaux <alex_maloteaux@metasploit.com>"
],
"description": "Execute an x86 payload from a command via PowerShell.\n\nTunnel communication over HTTP using SSL with custom proxy support",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
],
"platform": "Windows",
"arch": "cmd",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2022-05-27 16:41:25 +0000",
"path": "/modules/payloads/adapters/cmd/windows/powershell.rb",
"is_install_path": true,
"ref_name": "cmd/windows/powershell/meterpreter/reverse_https_proxy",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 8,
"adapter_refname": "cmd/windows/powershell",
"adapted_refname": "windows/meterpreter/reverse_https_proxy",
"staged": true,
"stage_refname": "windows/meterpreter",
"stager_refname": "windows/reverse_https_proxy"
},
"payload_cmd/windows/powershell/meterpreter/reverse_ipv6_tcp": {
"name": "Powershell Exec, Reverse TCP Stager (IPv6)",
"fullname": "payload/cmd/windows/powershell/meterpreter/reverse_ipv6_tcp",
Expand Down Expand Up @@ -244858,47 +244767,6 @@
"stage_refname": "windows/custom",
"stager_refname": "windows/reverse_https"
},
"payload_windows/custom/reverse_https_proxy": {
"name": "Windows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy",
"fullname": "payload/windows/custom/reverse_https_proxy",
"aliases": [

],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"bwatters-r7",
"hdm <x@hdm.io>",
"corelanc0d3r <peter.ve@corelan.be>",
"amaloteaux <alex_maloteaux@metasploit.com>"
],
"description": "Custom shellcode stage.\n\nTunnel communication over HTTP using SSL with custom proxy support",
"references": [

],
"platform": "Windows",
"arch": "x86",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-12-06 09:15:36 +0000",
"path": "/modules/payloads/stagers/windows/reverse_https_proxy.rb",
"is_install_path": true,
"ref_name": "windows/custom/reverse_https_proxy",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 2,
"staged": true,
"stage_refname": "windows/custom",
"stager_refname": "windows/reverse_https_proxy"
},
"payload_windows/custom/reverse_ipv6_tcp": {
"name": "Windows shellcode stage, Reverse TCP Stager (IPv6)",
"fullname": "payload/windows/custom/reverse_ipv6_tcp",
Expand Down Expand Up @@ -247194,50 +247062,6 @@
"stage_refname": "windows/meterpreter",
"stager_refname": "windows/reverse_https"
},
"payload_windows/meterpreter/reverse_https_proxy": {
"name": "Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager with Support for Custom Proxy",
"fullname": "payload/windows/meterpreter/reverse_https_proxy",
"aliases": [

],
"rank": 300,
"disclosure_date": null,
"type": "payload",
"author": [
"skape <mmiller@hick.org>",
"sf <stephen_fewer@harmonysecurity.com>",
"OJ Reeves",
"hdm <x@hdm.io>",
"corelanc0d3r <peter.ve@corelan.be>",
"amaloteaux <alex_maloteaux@metasploit.com>"
],
"description": "Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer.\n\nTunnel communication over HTTP using SSL with custom proxy support",
"references": [
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
],
"platform": "Windows",
"arch": "x86",
"rport": null,
"autofilter_ports": null,
"autofilter_services": null,
"targets": null,
"mod_time": "2024-12-06 09:15:36 +0000",
"path": "/modules/payloads/stagers/windows/reverse_https_proxy.rb",
"is_install_path": true,
"ref_name": "windows/meterpreter/reverse_https_proxy",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
},
"session_types": false,
"needs_cleanup": false,
"payload_type": 2,
"staged": true,
"stage_refname": "windows/meterpreter",
"stager_refname": "windows/reverse_https_proxy"
},
"payload_windows/meterpreter/reverse_ipv6_tcp": {
"name": "Windows Meterpreter (Reflective Injection), Reverse TCP Stager (IPv6)",
"fullname": "payload/windows/meterpreter/reverse_ipv6_tcp",
Expand Down

0 comments on commit a6dc0bf

Please sign in to comment.