@@ -125263,6 +125263,60 @@
125263125263 "session_types": false,
125264125264 "needs_cleanup": null
125265125265 },
125266+ "exploit_multi/persistence/at": {
125267+ "name": "at(1) Persistence",
125268+ "fullname": "exploit/multi/persistence/at",
125269+ "aliases": [
125270+ "exploits/unix/local/at_persistence"
125271+ ],
125272+ "rank": 600,
125273+ "disclosure_date": "1997-01-01",
125274+ "type": "exploit",
125275+ "author": [
125276+ 125277+ ],
125278+ "description": "This module executes a metasploit payload utilizing at(1) to execute jobs at a specific time. It should work out of the box\n with any UNIX-like operating system with atd running.\n Verified on Kali linux and OSX 13.7.4",
125279+ "references": [
125280+ "URL-https://linux.die.net/man/1/at",
125281+ "URL-https://www.geeksforgeeks.org/at-command-in-linux-with-examples/",
125282+ "ATT&CK-T1053.002",
125283+ "ATT&CK-T1053.001"
125284+ ],
125285+ "platform": "Linux,OSX,Unix",
125286+ "arch": "cmd, x86, x64, armle, aarch64, ppc, mipsle, mipsbe",
125287+ "rport": null,
125288+ "autofilter_ports": [],
125289+ "autofilter_services": [],
125290+ "targets": [
125291+ "Automatic"
125292+ ],
125293+ "mod_time": "2025-09-06 15:12:16 +0000",
125294+ "path": "/modules/exploits/multi/persistence/at.rb",
125295+ "is_install_path": true,
125296+ "ref_name": "multi/persistence/at",
125297+ "check": true,
125298+ "post_auth": false,
125299+ "default_credential": false,
125300+ "notes": {
125301+ "Reliability": [
125302+ "repeatable-session",
125303+ "event-dependent"
125304+ ],
125305+ "Stability": [
125306+ "crash-safe"
125307+ ],
125308+ "SideEffects": [
125309+ "artifacts-on-disk",
125310+ "config-changes"
125311+ ]
125312+ },
125313+ "session_types": [
125314+ "meterpreter",
125315+ "shell"
125316+ ],
125317+ "needs_cleanup": true,
125318+ "actions": []
125319+ },
125266125320 "exploit_multi/php/ignition_laravel_debug_rce": {
125267125321 "name": "Unauthenticated remote code execution in Ignition",
125268125322 "fullname": "exploit/multi/php/ignition_laravel_debug_rce",
@@ -131841,49 +131895,6 @@
131841131895 "session_types": false,
131842131896 "needs_cleanup": null
131843131897 },
131844- "exploit_unix/local/at_persistence": {
131845- "name": "at(1) Persistence",
131846- "fullname": "exploit/unix/local/at_persistence",
131847- "aliases": [],
131848- "rank": 600,
131849- "disclosure_date": "1997-01-01",
131850- "type": "exploit",
131851- "author": [
131852- 131853- ],
131854- "description": "This module achieves persistence by executing payloads via at(1).",
131855- "references": [],
131856- "platform": "Unix",
131857- "arch": "cmd",
131858- "rport": null,
131859- "autofilter_ports": [],
131860- "autofilter_services": [],
131861- "targets": [
131862- "Automatic"
131863- ],
131864- "mod_time": "2023-02-05 15:45:30 +0000",
131865- "path": "/modules/exploits/unix/local/at_persistence.rb",
131866- "is_install_path": true,
131867- "ref_name": "unix/local/at_persistence",
131868- "check": true,
131869- "post_auth": false,
131870- "default_credential": false,
131871- "notes": {
131872- "Reliability": [
131873- "repeatable-session"
131874- ],
131875- "Stability": [
131876- "crash-safe"
131877- ],
131878- "SideEffects": [
131879- "artifacts-on-disk",
131880- "config-changes"
131881- ]
131882- },
131883- "session_types": [],
131884- "needs_cleanup": true,
131885- "actions": []
131886- },
131887131898 "exploit_unix/local/chkrootkit": {
131888131899 "name": "Chkrootkit Local Privilege Escalation",
131889131900 "fullname": "exploit/unix/local/chkrootkit",
0 commit comments