Skip to content

Commit a6dc0bf

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent c77ccb1 commit a6dc0bf

File tree

1 file changed

+0
-176
lines changed

1 file changed

+0
-176
lines changed

db/modules_metadata_base.json

Lines changed: 0 additions & 176 deletions
Original file line numberDiff line numberDiff line change
@@ -215665,50 +215665,6 @@
215665215665
"stage_refname": "windows/custom",
215666215666
"stager_refname": "windows/reverse_https"
215667215667
},
215668-
"payload_cmd/windows/powershell/custom/reverse_https_proxy": {
215669-
"name": "Powershell Exec, Windows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy",
215670-
"fullname": "payload/cmd/windows/powershell/custom/reverse_https_proxy",
215671-
"aliases": [
215672-
215673-
],
215674-
"rank": 300,
215675-
"disclosure_date": null,
215676-
"type": "payload",
215677-
"author": [
215678-
"Spencer McIntyre",
215679-
"bwatters-r7",
215680-
"hdm <x@hdm.io>",
215681-
"corelanc0d3r <peter.ve@corelan.be>",
215682-
"amaloteaux <alex_maloteaux@metasploit.com>"
215683-
],
215684-
"description": "Execute an x86 payload from a command via PowerShell.\n\nCustom shellcode stage.\n\nTunnel communication over HTTP using SSL with custom proxy support",
215685-
"references": [
215686-
215687-
],
215688-
"platform": "Windows",
215689-
"arch": "cmd",
215690-
"rport": null,
215691-
"autofilter_ports": null,
215692-
"autofilter_services": null,
215693-
"targets": null,
215694-
"mod_time": "2022-05-27 16:41:25 +0000",
215695-
"path": "/modules/payloads/adapters/cmd/windows/powershell.rb",
215696-
"is_install_path": true,
215697-
"ref_name": "cmd/windows/powershell/custom/reverse_https_proxy",
215698-
"check": false,
215699-
"post_auth": false,
215700-
"default_credential": false,
215701-
"notes": {
215702-
},
215703-
"session_types": false,
215704-
"needs_cleanup": false,
215705-
"payload_type": 8,
215706-
"adapter_refname": "cmd/windows/powershell",
215707-
"adapted_refname": "windows/custom/reverse_https_proxy",
215708-
"staged": true,
215709-
"stage_refname": "windows/custom",
215710-
"stager_refname": "windows/reverse_https_proxy"
215711-
},
215712215668
"payload_cmd/windows/powershell/custom/reverse_ipv6_tcp": {
215713215669
"name": "Powershell Exec, Windows shellcode stage, Reverse TCP Stager (IPv6)",
215714215670
"fullname": "payload/cmd/windows/powershell/custom/reverse_ipv6_tcp",
@@ -218250,53 +218206,6 @@
218250218206
"stage_refname": "windows/meterpreter",
218251218207
"stager_refname": "windows/reverse_https"
218252218208
},
218253-
"payload_cmd/windows/powershell/meterpreter/reverse_https_proxy": {
218254-
"name": "Powershell Exec, Reverse HTTPS Stager with Support for Custom Proxy",
218255-
"fullname": "payload/cmd/windows/powershell/meterpreter/reverse_https_proxy",
218256-
"aliases": [
218257-
218258-
],
218259-
"rank": 300,
218260-
"disclosure_date": null,
218261-
"type": "payload",
218262-
"author": [
218263-
"Spencer McIntyre",
218264-
"skape <mmiller@hick.org>",
218265-
"sf <stephen_fewer@harmonysecurity.com>",
218266-
"OJ Reeves",
218267-
"hdm <x@hdm.io>",
218268-
"corelanc0d3r <peter.ve@corelan.be>",
218269-
"amaloteaux <alex_maloteaux@metasploit.com>"
218270-
],
218271-
"description": "Execute an x86 payload from a command via PowerShell.\n\nTunnel communication over HTTP using SSL with custom proxy support",
218272-
"references": [
218273-
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
218274-
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
218275-
],
218276-
"platform": "Windows",
218277-
"arch": "cmd",
218278-
"rport": null,
218279-
"autofilter_ports": null,
218280-
"autofilter_services": null,
218281-
"targets": null,
218282-
"mod_time": "2022-05-27 16:41:25 +0000",
218283-
"path": "/modules/payloads/adapters/cmd/windows/powershell.rb",
218284-
"is_install_path": true,
218285-
"ref_name": "cmd/windows/powershell/meterpreter/reverse_https_proxy",
218286-
"check": false,
218287-
"post_auth": false,
218288-
"default_credential": false,
218289-
"notes": {
218290-
},
218291-
"session_types": false,
218292-
"needs_cleanup": false,
218293-
"payload_type": 8,
218294-
"adapter_refname": "cmd/windows/powershell",
218295-
"adapted_refname": "windows/meterpreter/reverse_https_proxy",
218296-
"staged": true,
218297-
"stage_refname": "windows/meterpreter",
218298-
"stager_refname": "windows/reverse_https_proxy"
218299-
},
218300218209
"payload_cmd/windows/powershell/meterpreter/reverse_ipv6_tcp": {
218301218210
"name": "Powershell Exec, Reverse TCP Stager (IPv6)",
218302218211
"fullname": "payload/cmd/windows/powershell/meterpreter/reverse_ipv6_tcp",
@@ -244858,47 +244767,6 @@
244858244767
"stage_refname": "windows/custom",
244859244768
"stager_refname": "windows/reverse_https"
244860244769
},
244861-
"payload_windows/custom/reverse_https_proxy": {
244862-
"name": "Windows shellcode stage, Reverse HTTPS Stager with Support for Custom Proxy",
244863-
"fullname": "payload/windows/custom/reverse_https_proxy",
244864-
"aliases": [
244865-
244866-
],
244867-
"rank": 300,
244868-
"disclosure_date": null,
244869-
"type": "payload",
244870-
"author": [
244871-
"bwatters-r7",
244872-
"hdm <x@hdm.io>",
244873-
"corelanc0d3r <peter.ve@corelan.be>",
244874-
"amaloteaux <alex_maloteaux@metasploit.com>"
244875-
],
244876-
"description": "Custom shellcode stage.\n\nTunnel communication over HTTP using SSL with custom proxy support",
244877-
"references": [
244878-
244879-
],
244880-
"platform": "Windows",
244881-
"arch": "x86",
244882-
"rport": null,
244883-
"autofilter_ports": null,
244884-
"autofilter_services": null,
244885-
"targets": null,
244886-
"mod_time": "2024-12-06 09:15:36 +0000",
244887-
"path": "/modules/payloads/stagers/windows/reverse_https_proxy.rb",
244888-
"is_install_path": true,
244889-
"ref_name": "windows/custom/reverse_https_proxy",
244890-
"check": false,
244891-
"post_auth": false,
244892-
"default_credential": false,
244893-
"notes": {
244894-
},
244895-
"session_types": false,
244896-
"needs_cleanup": false,
244897-
"payload_type": 2,
244898-
"staged": true,
244899-
"stage_refname": "windows/custom",
244900-
"stager_refname": "windows/reverse_https_proxy"
244901-
},
244902244770
"payload_windows/custom/reverse_ipv6_tcp": {
244903244771
"name": "Windows shellcode stage, Reverse TCP Stager (IPv6)",
244904244772
"fullname": "payload/windows/custom/reverse_ipv6_tcp",
@@ -247194,50 +247062,6 @@
247194247062
"stage_refname": "windows/meterpreter",
247195247063
"stager_refname": "windows/reverse_https"
247196247064
},
247197-
"payload_windows/meterpreter/reverse_https_proxy": {
247198-
"name": "Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager with Support for Custom Proxy",
247199-
"fullname": "payload/windows/meterpreter/reverse_https_proxy",
247200-
"aliases": [
247201-
247202-
],
247203-
"rank": 300,
247204-
"disclosure_date": null,
247205-
"type": "payload",
247206-
"author": [
247207-
"skape <mmiller@hick.org>",
247208-
"sf <stephen_fewer@harmonysecurity.com>",
247209-
"OJ Reeves",
247210-
"hdm <x@hdm.io>",
247211-
"corelanc0d3r <peter.ve@corelan.be>",
247212-
"amaloteaux <alex_maloteaux@metasploit.com>"
247213-
],
247214-
"description": "Inject the Meterpreter server DLL via the Reflective Dll Injection payload (staged). Requires Windows XP SP2 or newer.\n\nTunnel communication over HTTP using SSL with custom proxy support",
247215-
"references": [
247216-
"URL-https://github.com/stephenfewer/ReflectiveDLLInjection",
247217-
"URL-https://github.com/rapid7/ReflectiveDLLInjection"
247218-
],
247219-
"platform": "Windows",
247220-
"arch": "x86",
247221-
"rport": null,
247222-
"autofilter_ports": null,
247223-
"autofilter_services": null,
247224-
"targets": null,
247225-
"mod_time": "2024-12-06 09:15:36 +0000",
247226-
"path": "/modules/payloads/stagers/windows/reverse_https_proxy.rb",
247227-
"is_install_path": true,
247228-
"ref_name": "windows/meterpreter/reverse_https_proxy",
247229-
"check": false,
247230-
"post_auth": false,
247231-
"default_credential": false,
247232-
"notes": {
247233-
},
247234-
"session_types": false,
247235-
"needs_cleanup": false,
247236-
"payload_type": 2,
247237-
"staged": true,
247238-
"stage_refname": "windows/meterpreter",
247239-
"stager_refname": "windows/reverse_https_proxy"
247240-
},
247241247065
"payload_windows/meterpreter/reverse_ipv6_tcp": {
247242247066
"name": "Windows Meterpreter (Reflective Injection), Reverse TCP Stager (IPv6)",
247243247067
"fullname": "payload/windows/meterpreter/reverse_ipv6_tcp",

0 commit comments

Comments
 (0)