Skip to content

Commit 60a6658

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent b4188e7 commit 60a6658

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed

db/modules_metadata_base.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -253371,6 +253371,46 @@
253371253371
"payload_type": 1,
253372253372
"staged": false
253373253373
},
253374+
"payload_windows/aarch64/exec": {
253375+
"name": "Windows AArch64 Command Execution",
253376+
"fullname": "payload/windows/aarch64/exec",
253377+
"aliases": [],
253378+
"rank": 300,
253379+
"disclosure_date": null,
253380+
"type": "payload",
253381+
"author": [
253382+
"alanfoster",
253383+
"Alexander \"xaitax\" Hagenah"
253384+
],
253385+
"description": "Executes an arbitrary command on a Windows on ARM (AArch64) target.\n This payload is a foundational example of position-independent shellcode for the AArch64 architecture.\n It dynamically resolves the address of the `WinExec` function from `kernel32.dll` by parsing the\n Process Environment Block (PEB) and the module's Export Address Table (EAT) at runtime.\n This technique avoids static imports and hardcoded function addresses, increasing resilience.",
253386+
"references": [],
253387+
"platform": "Windows",
253388+
"arch": "aarch64",
253389+
"rport": null,
253390+
"autofilter_ports": null,
253391+
"autofilter_services": null,
253392+
"targets": null,
253393+
"mod_time": "2025-06-30 14:46:51 +0000",
253394+
"path": "/modules/payloads/singles/windows/aarch64/exec.rb",
253395+
"is_install_path": true,
253396+
"ref_name": "windows/aarch64/exec",
253397+
"check": false,
253398+
"post_auth": false,
253399+
"default_credential": false,
253400+
"notes": {
253401+
"Stability": [
253402+
"crash-safe"
253403+
],
253404+
"SideEffects": [
253405+
"artifacts-on-disk",
253406+
"screen-effects"
253407+
]
253408+
},
253409+
"session_types": false,
253410+
"needs_cleanup": false,
253411+
"payload_type": 1,
253412+
"staged": false
253413+
},
253374253414
"payload_windows/adduser": {
253375253415
"name": "Windows Execute net user /ADD",
253376253416
"fullname": "payload/windows/adduser",

0 commit comments

Comments
 (0)