Skip to content

Commit bd870b4

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 385c4f9 commit bd870b4

File tree

1 file changed

+308
-0
lines changed

1 file changed

+308
-0
lines changed

db/modules_metadata_base.json

Lines changed: 308 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -210865,6 +210865,46 @@
210865210865
"adapted_refname": "linux/riscv32le/reboot",
210866210866
"staged": false
210867210867
},
210868+
"payload_cmd/linux/http/riscv32le/shell_bind_tcp": {
210869+
"name": "HTTP Fetch, Linux Command Shell, Bind TCP Inline",
210870+
"fullname": "payload/cmd/linux/http/riscv32le/shell_bind_tcp",
210871+
"aliases": [],
210872+
"rank": 300,
210873+
"disclosure_date": null,
210874+
"type": "payload",
210875+
"author": [
210876+
"Brendan Watters",
210877+
"Spencer McIntyre",
210878+
"bcoles <bcoles@gmail.com>",
210879+
"modexp"
210880+
],
210881+
"description": "Fetch and execute an RISC-V 32-bit payload from an HTTP server.\nListen for a connection and spawn a command shell",
210882+
"references": [
210883+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
210884+
"URL-https://github.com/bcoles/shellcode/blob/main/riscv32/bindshell/bind.s",
210885+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
210886+
],
210887+
"platform": "Linux",
210888+
"arch": "cmd",
210889+
"rport": null,
210890+
"autofilter_ports": null,
210891+
"autofilter_services": null,
210892+
"targets": null,
210893+
"mod_time": "2025-11-27 20:46:30 +0000",
210894+
"path": "/modules/payloads/adapters/cmd/linux/http/riscv32le.rb",
210895+
"is_install_path": true,
210896+
"ref_name": "cmd/linux/http/riscv32le/shell_bind_tcp",
210897+
"check": false,
210898+
"post_auth": false,
210899+
"default_credential": false,
210900+
"notes": {},
210901+
"session_types": false,
210902+
"needs_cleanup": false,
210903+
"payload_type": 8,
210904+
"adapter_refname": "cmd/linux/http/riscv32le",
210905+
"adapted_refname": "linux/riscv32le/shell_bind_tcp",
210906+
"staged": false
210907+
},
210868210908
"payload_cmd/linux/http/riscv32le/shell_reverse_tcp": {
210869210909
"name": "HTTP Fetch, Linux Command Shell, Reverse TCP Inline",
210870210910
"fullname": "payload/cmd/linux/http/riscv32le/shell_reverse_tcp",
@@ -211019,6 +211059,45 @@
211019211059
"adapted_refname": "linux/riscv64le/reboot",
211020211060
"staged": false
211021211061
},
211062+
"payload_cmd/linux/http/riscv64le/shell_bind_tcp": {
211063+
"name": "HTTP Fetch, Linux Command Shell, Bind TCP Inline",
211064+
"fullname": "payload/cmd/linux/http/riscv64le/shell_bind_tcp",
211065+
"aliases": [],
211066+
"rank": 300,
211067+
"disclosure_date": null,
211068+
"type": "payload",
211069+
"author": [
211070+
"Brendan Watters",
211071+
"Spencer McIntyre",
211072+
"bcoles <bcoles@gmail.com>",
211073+
"modexp"
211074+
],
211075+
"description": "Fetch and execute an RISC-V 64-bit payload from an HTTP server.\nListen for a connection and spawn a command shell",
211076+
"references": [
211077+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
211078+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
211079+
],
211080+
"platform": "Linux",
211081+
"arch": "cmd",
211082+
"rport": null,
211083+
"autofilter_ports": null,
211084+
"autofilter_services": null,
211085+
"targets": null,
211086+
"mod_time": "2025-11-27 20:46:30 +0000",
211087+
"path": "/modules/payloads/adapters/cmd/linux/http/riscv64le.rb",
211088+
"is_install_path": true,
211089+
"ref_name": "cmd/linux/http/riscv64le/shell_bind_tcp",
211090+
"check": false,
211091+
"post_auth": false,
211092+
"default_credential": false,
211093+
"notes": {},
211094+
"session_types": false,
211095+
"needs_cleanup": false,
211096+
"payload_type": 8,
211097+
"adapter_refname": "cmd/linux/http/riscv64le",
211098+
"adapted_refname": "linux/riscv64le/shell_bind_tcp",
211099+
"staged": false
211100+
},
211022211101
"payload_cmd/linux/http/riscv64le/shell_reverse_tcp": {
211023211102
"name": "HTTP Fetch, Linux Command Shell, Reverse TCP Inline",
211024211103
"fullname": "payload/cmd/linux/http/riscv64le/shell_reverse_tcp",
@@ -215037,6 +215116,46 @@
215037215116
"adapted_refname": "linux/riscv32le/reboot",
215038215117
"staged": false
215039215118
},
215119+
"payload_cmd/linux/https/riscv32le/shell_bind_tcp": {
215120+
"name": "HTTPS Fetch, Linux Command Shell, Bind TCP Inline",
215121+
"fullname": "payload/cmd/linux/https/riscv32le/shell_bind_tcp",
215122+
"aliases": [],
215123+
"rank": 300,
215124+
"disclosure_date": null,
215125+
"type": "payload",
215126+
"author": [
215127+
"Brendan Watters",
215128+
"Spencer McIntyre",
215129+
"bcoles <bcoles@gmail.com>",
215130+
"modexp"
215131+
],
215132+
"description": "Fetch and execute an RISC-V 32-bit payload from an HTTPS server.\nListen for a connection and spawn a command shell",
215133+
"references": [
215134+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
215135+
"URL-https://github.com/bcoles/shellcode/blob/main/riscv32/bindshell/bind.s",
215136+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
215137+
],
215138+
"platform": "Linux",
215139+
"arch": "cmd",
215140+
"rport": null,
215141+
"autofilter_ports": null,
215142+
"autofilter_services": null,
215143+
"targets": null,
215144+
"mod_time": "2025-11-27 20:46:30 +0000",
215145+
"path": "/modules/payloads/adapters/cmd/linux/https/riscv32le.rb",
215146+
"is_install_path": true,
215147+
"ref_name": "cmd/linux/https/riscv32le/shell_bind_tcp",
215148+
"check": false,
215149+
"post_auth": false,
215150+
"default_credential": false,
215151+
"notes": {},
215152+
"session_types": false,
215153+
"needs_cleanup": false,
215154+
"payload_type": 8,
215155+
"adapter_refname": "cmd/linux/https/riscv32le",
215156+
"adapted_refname": "linux/riscv32le/shell_bind_tcp",
215157+
"staged": false
215158+
},
215040215159
"payload_cmd/linux/https/riscv32le/shell_reverse_tcp": {
215041215160
"name": "HTTPS Fetch, Linux Command Shell, Reverse TCP Inline",
215042215161
"fullname": "payload/cmd/linux/https/riscv32le/shell_reverse_tcp",
@@ -215191,6 +215310,45 @@
215191215310
"adapted_refname": "linux/riscv64le/reboot",
215192215311
"staged": false
215193215312
},
215313+
"payload_cmd/linux/https/riscv64le/shell_bind_tcp": {
215314+
"name": "HTTPS Fetch, Linux Command Shell, Bind TCP Inline",
215315+
"fullname": "payload/cmd/linux/https/riscv64le/shell_bind_tcp",
215316+
"aliases": [],
215317+
"rank": 300,
215318+
"disclosure_date": null,
215319+
"type": "payload",
215320+
"author": [
215321+
"Brendan Watters",
215322+
"Spencer McIntyre",
215323+
"bcoles <bcoles@gmail.com>",
215324+
"modexp"
215325+
],
215326+
"description": "Fetch and execute an RISC-V 64-bit payload from an HTTPS server.\nListen for a connection and spawn a command shell",
215327+
"references": [
215328+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
215329+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
215330+
],
215331+
"platform": "Linux",
215332+
"arch": "cmd",
215333+
"rport": null,
215334+
"autofilter_ports": null,
215335+
"autofilter_services": null,
215336+
"targets": null,
215337+
"mod_time": "2025-11-27 20:46:30 +0000",
215338+
"path": "/modules/payloads/adapters/cmd/linux/https/riscv64le.rb",
215339+
"is_install_path": true,
215340+
"ref_name": "cmd/linux/https/riscv64le/shell_bind_tcp",
215341+
"check": false,
215342+
"post_auth": false,
215343+
"default_credential": false,
215344+
"notes": {},
215345+
"session_types": false,
215346+
"needs_cleanup": false,
215347+
"payload_type": 8,
215348+
"adapter_refname": "cmd/linux/https/riscv64le",
215349+
"adapted_refname": "linux/riscv64le/shell_bind_tcp",
215350+
"staged": false
215351+
},
215194215352
"payload_cmd/linux/https/riscv64le/shell_reverse_tcp": {
215195215353
"name": "HTTPS Fetch, Linux Command Shell, Reverse TCP Inline",
215196215354
"fullname": "payload/cmd/linux/https/riscv64le/shell_reverse_tcp",
@@ -219209,6 +219367,46 @@
219209219367
"adapted_refname": "linux/riscv32le/reboot",
219210219368
"staged": false
219211219369
},
219370+
"payload_cmd/linux/tftp/riscv32le/shell_bind_tcp": {
219371+
"name": "TFTP Fetch, Linux Command Shell, Bind TCP Inline",
219372+
"fullname": "payload/cmd/linux/tftp/riscv32le/shell_bind_tcp",
219373+
"aliases": [],
219374+
"rank": 300,
219375+
"disclosure_date": null,
219376+
"type": "payload",
219377+
"author": [
219378+
"Brendan Watters",
219379+
"Spencer McIntyre",
219380+
"bcoles <bcoles@gmail.com>",
219381+
"modexp"
219382+
],
219383+
"description": "Fetch and execute an RISC-V 32-bit payload from a TFTP server.\nListen for a connection and spawn a command shell",
219384+
"references": [
219385+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
219386+
"URL-https://github.com/bcoles/shellcode/blob/main/riscv32/bindshell/bind.s",
219387+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
219388+
],
219389+
"platform": "Linux",
219390+
"arch": "cmd",
219391+
"rport": null,
219392+
"autofilter_ports": null,
219393+
"autofilter_services": null,
219394+
"targets": null,
219395+
"mod_time": "2025-11-27 20:46:30 +0000",
219396+
"path": "/modules/payloads/adapters/cmd/linux/tftp/riscv32le.rb",
219397+
"is_install_path": true,
219398+
"ref_name": "cmd/linux/tftp/riscv32le/shell_bind_tcp",
219399+
"check": false,
219400+
"post_auth": false,
219401+
"default_credential": false,
219402+
"notes": {},
219403+
"session_types": false,
219404+
"needs_cleanup": false,
219405+
"payload_type": 8,
219406+
"adapter_refname": "cmd/linux/tftp/riscv32le",
219407+
"adapted_refname": "linux/riscv32le/shell_bind_tcp",
219408+
"staged": false
219409+
},
219212219410
"payload_cmd/linux/tftp/riscv32le/shell_reverse_tcp": {
219213219411
"name": "TFTP Fetch, Linux Command Shell, Reverse TCP Inline",
219214219412
"fullname": "payload/cmd/linux/tftp/riscv32le/shell_reverse_tcp",
@@ -219363,6 +219561,45 @@
219363219561
"adapted_refname": "linux/riscv64le/reboot",
219364219562
"staged": false
219365219563
},
219564+
"payload_cmd/linux/tftp/riscv64le/shell_bind_tcp": {
219565+
"name": "TFTP Fetch, Linux Command Shell, Bind TCP Inline",
219566+
"fullname": "payload/cmd/linux/tftp/riscv64le/shell_bind_tcp",
219567+
"aliases": [],
219568+
"rank": 300,
219569+
"disclosure_date": null,
219570+
"type": "payload",
219571+
"author": [
219572+
"Brendan Watters",
219573+
"Spencer McIntyre",
219574+
"bcoles <bcoles@gmail.com>",
219575+
"modexp"
219576+
],
219577+
"description": "Fetch and execute an RISC-V 64-bit payload from a TFTP server.\nListen for a connection and spawn a command shell",
219578+
"references": [
219579+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
219580+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
219581+
],
219582+
"platform": "Linux",
219583+
"arch": "cmd",
219584+
"rport": null,
219585+
"autofilter_ports": null,
219586+
"autofilter_services": null,
219587+
"targets": null,
219588+
"mod_time": "2025-11-27 20:46:30 +0000",
219589+
"path": "/modules/payloads/adapters/cmd/linux/tftp/riscv64le.rb",
219590+
"is_install_path": true,
219591+
"ref_name": "cmd/linux/tftp/riscv64le/shell_bind_tcp",
219592+
"check": false,
219593+
"post_auth": false,
219594+
"default_credential": false,
219595+
"notes": {},
219596+
"session_types": false,
219597+
"needs_cleanup": false,
219598+
"payload_type": 8,
219599+
"adapter_refname": "cmd/linux/tftp/riscv64le",
219600+
"adapted_refname": "linux/riscv64le/shell_bind_tcp",
219601+
"staged": false
219602+
},
219366219603
"payload_cmd/linux/tftp/riscv64le/shell_reverse_tcp": {
219367219604
"name": "TFTP Fetch, Linux Command Shell, Reverse TCP Inline",
219368219605
"fullname": "payload/cmd/linux/tftp/riscv64le/shell_reverse_tcp",
@@ -251373,6 +251610,42 @@
251373251610
"payload_type": 1,
251374251611
"staged": false
251375251612
},
251613+
"payload_linux/riscv32le/shell_bind_tcp": {
251614+
"name": "Linux Command Shell, Bind TCP Inline",
251615+
"fullname": "payload/linux/riscv32le/shell_bind_tcp",
251616+
"aliases": [],
251617+
"rank": 300,
251618+
"disclosure_date": null,
251619+
"type": "payload",
251620+
"author": [
251621+
"modexp",
251622+
"bcoles <bcoles@gmail.com>"
251623+
],
251624+
"description": "Listen for a connection and spawn a command shell",
251625+
"references": [
251626+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
251627+
"URL-https://github.com/bcoles/shellcode/blob/main/riscv32/bindshell/bind.s",
251628+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
251629+
],
251630+
"platform": "Linux",
251631+
"arch": "riscv32le",
251632+
"rport": null,
251633+
"autofilter_ports": null,
251634+
"autofilter_services": null,
251635+
"targets": null,
251636+
"mod_time": "2025-12-01 23:16:19 +0000",
251637+
"path": "/modules/payloads/singles/linux/riscv32le/shell_bind_tcp.rb",
251638+
"is_install_path": true,
251639+
"ref_name": "linux/riscv32le/shell_bind_tcp",
251640+
"check": false,
251641+
"post_auth": false,
251642+
"default_credential": false,
251643+
"notes": {},
251644+
"session_types": false,
251645+
"needs_cleanup": false,
251646+
"payload_type": 1,
251647+
"staged": false
251648+
},
251376251649
"payload_linux/riscv32le/shell_reverse_tcp": {
251377251650
"name": "Linux Command Shell, Reverse TCP Inline",
251378251651
"fullname": "payload/linux/riscv32le/shell_reverse_tcp",
@@ -251511,6 +251784,41 @@
251511251784
"payload_type": 1,
251512251785
"staged": false
251513251786
},
251787+
"payload_linux/riscv64le/shell_bind_tcp": {
251788+
"name": "Linux Command Shell, Bind TCP Inline",
251789+
"fullname": "payload/linux/riscv64le/shell_bind_tcp",
251790+
"aliases": [],
251791+
"rank": 300,
251792+
"disclosure_date": null,
251793+
"type": "payload",
251794+
"author": [
251795+
"modexp",
251796+
"bcoles <bcoles@gmail.com>"
251797+
],
251798+
"description": "Listen for a connection and spawn a command shell",
251799+
"references": [
251800+
"URL-https://modexp.wordpress.com/2022/05/02/shellcode-risc-v-linux/",
251801+
"URL-https://web.archive.org/web/20230326161514/https://github.com/odzhan/shellcode/commit/d3ee25a6ebcdd21a21d0e6eccc979e45c24a9a1d"
251802+
],
251803+
"platform": "Linux",
251804+
"arch": "riscv64le",
251805+
"rport": null,
251806+
"autofilter_ports": null,
251807+
"autofilter_services": null,
251808+
"targets": null,
251809+
"mod_time": "2025-12-01 23:16:19 +0000",
251810+
"path": "/modules/payloads/singles/linux/riscv64le/shell_bind_tcp.rb",
251811+
"is_install_path": true,
251812+
"ref_name": "linux/riscv64le/shell_bind_tcp",
251813+
"check": false,
251814+
"post_auth": false,
251815+
"default_credential": false,
251816+
"notes": {},
251817+
"session_types": false,
251818+
"needs_cleanup": false,
251819+
"payload_type": 1,
251820+
"staged": false
251821+
},
251514251822
"payload_linux/riscv64le/shell_reverse_tcp": {
251515251823
"name": "Linux Command Shell, Reverse TCP Inline",
251516251824
"fullname": "payload/linux/riscv64le/shell_reverse_tcp",

0 commit comments

Comments
 (0)