@@ -189454,54 +189454,6 @@
189454189454 "needs_cleanup": null,
189455189455 "actions": []
189456189456 },
189457- "exploit_windows/local/persistence_image_exec_options": {
189458- "name": "Windows Silent Process Exit Persistence",
189459- "fullname": "exploit/windows/local/persistence_image_exec_options",
189460- "aliases": [],
189461- "rank": 600,
189462- "disclosure_date": "2008-06-28",
189463- "type": "exploit",
189464- "author": [
189465- "Mithun Shanbhag",
189466- "bwatters-r7"
189467- ],
189468- "description": "Windows allows you to set up a debug process when a process exits.\n This module uploads a payload and declares that it is the debug\n process to launch when a specified process exits.",
189469- "references": [
189470- "URL-https://attack.mitre.org/techniques/T1183/",
189471- "URL-https://blogs.msdn.microsoft.com/mithuns/2010/03/24/image-file-execution-options-ifeo/"
189472- ],
189473- "platform": "Windows",
189474- "arch": "",
189475- "rport": null,
189476- "autofilter_ports": [],
189477- "autofilter_services": [],
189478- "targets": [
189479- "Automatic"
189480- ],
189481- "mod_time": "2025-06-23 12:43:46 +0000",
189482- "path": "/modules/exploits/windows/local/persistence_image_exec_options.rb",
189483- "is_install_path": true,
189484- "ref_name": "windows/local/persistence_image_exec_options",
189485- "check": false,
189486- "post_auth": false,
189487- "default_credential": false,
189488- "notes": {
189489- "Reliability": [
189490- "unknown-reliability"
189491- ],
189492- "Stability": [
189493- "unknown-stability"
189494- ],
189495- "SideEffects": [
189496- "unknown-side-effects"
189497- ]
189498- },
189499- "session_types": [
189500- "meterpreter"
189501- ],
189502- "needs_cleanup": null,
189503- "actions": []
189504- },
189505189457 "exploit_windows/local/persistence_service": {
189506189458 "name": "Windows Persistent Service Installer",
189507189459 "fullname": "exploit/windows/local/persistence_service",
@@ -198475,6 +198427,58 @@
198475198427 "session_types": false,
198476198428 "needs_cleanup": null
198477198429 },
198430+ "exploit_windows/persistence/image_exec_options": {
198431+ "name": "Windows Silent Process Exit Persistence",
198432+ "fullname": "exploit/windows/persistence/image_exec_options",
198433+ "aliases": [
198434+ "exploits/windows/local/persistence_image_exec_options"
198435+ ],
198436+ "rank": 600,
198437+ "disclosure_date": "2008-06-28",
198438+ "type": "exploit",
198439+ "author": [
198440+ "Mithun Shanbhag",
198441+ "bwatters-r7"
198442+ ],
198443+ "description": "Windows allows you to set up a debug process when a process exits.\n This module uploads a payload and declares that it is the debug\n process to launch when a specified process exits.",
198444+ "references": [
198445+ "ATT&CK-T1183",
198446+ "URL-https://blogs.msdn.microsoft.com/mithuns/2010/03/24/image-file-execution-options-ifeo/"
198447+ ],
198448+ "platform": "Windows",
198449+ "arch": "",
198450+ "rport": null,
198451+ "autofilter_ports": [],
198452+ "autofilter_services": [],
198453+ "targets": [
198454+ "Automatic"
198455+ ],
198456+ "mod_time": "2025-09-26 15:44:31 +0000",
198457+ "path": "/modules/exploits/windows/persistence/image_exec_options.rb",
198458+ "is_install_path": true,
198459+ "ref_name": "windows/persistence/image_exec_options",
198460+ "check": true,
198461+ "post_auth": false,
198462+ "default_credential": false,
198463+ "notes": {
198464+ "Stability": [
198465+ "crash-safe"
198466+ ],
198467+ "Reliability": [
198468+ "repeatable-session",
198469+ "event-dependent"
198470+ ],
198471+ "SideEffects": [
198472+ "artifacts-on-disk",
198473+ "config-changes"
198474+ ]
198475+ },
198476+ "session_types": [
198477+ "meterpreter"
198478+ ],
198479+ "needs_cleanup": null,
198480+ "actions": []
198481+ },
198478198482 "exploit_windows/pop3/seattlelab_pass": {
198479198483 "name": "Seattle Lab Mail 5.5 POP3 Buffer Overflow",
198480198484 "fullname": "exploit/windows/pop3/seattlelab_pass",
0 commit comments