bmantra
|
3accb24b2b
|
Does not work in Opera due to cross domain issues. And cannot work in IE due to lack of sendAsBinary-functionality in xmlhttprequest. So removed the Base64-library and used atob instead.
|
2012-06-13 10:00:45 +02:00 |
|
bcoles
|
6f3298235f
|
Added IE to not_working for glassfish_war_upload_xsrf module
|
2012-06-07 13:29:59 +09:30 |
|
bcoles
|
6396f7aa5a
|
Fixes issue #688
Added spaces to comma delemetered data in config.yaml files
This should fix an issue reported to affect Ruby 1.9.2
|
2012-06-05 23:27:21 +09:30 |
|
root
|
8e7e546ef9
|
fixes #661
|
2012-06-03 19:53:33 +02:00 |
|
bcoles
|
981b13ce7b
|
Added huawei_smartax_mt880 CSRF module
|
2012-05-22 17:52:36 +09:30 |
|
bcoles
|
6739094f57
|
Added dlink_dcs_series_csrf module
|
2012-05-22 17:22:20 +09:30 |
|
bcoles
|
f8eba21cb4
|
Moved a few more modules and updated some module descriptions
|
2012-05-20 18:50:10 +09:30 |
|
bcoles
|
460b619cc1
|
Moved Router and Switch categories under Exploits category
Added Social Engineering category
|
2012-05-20 18:32:44 +09:30 |
|
bcoles
|
05deaaa8b5
|
Added Module: ActiveX Command Execution
|
2012-04-27 14:15:52 +09:30 |
|
bcoles
|
c1975691f4
|
Added a couple of 0day CSRF exploits for Zenoss Core <= 3.2.1
|
2012-03-07 15:02:12 +10:30 |
|
bcoles
|
591cef0732
|
Removed "notes:" node from three module config.yaml files
|
2012-02-09 23:01:14 +10:30 |
|
bcoles
|
bfd6f764aa
|
Added module Mozilla nsIProcess XPCOM Interface
This module is a port of the same module from BeEF-0.4.0.0
It has not been tested. It is currently disabled.
Part of issue 506
|
2012-01-10 17:29:07 +10:30 |
|
Wade Alcorn
|
06899ca267
|
Year updated from 2011 to 2012
|
2011-12-31 22:24:36 +10:00 |
|
antisnatchor
|
894e03da9c
|
Fixes issue 555: fixed using the attachApplet JS api in the malicious Java applet module.
git-svn-id: https://beef.googlecode.com/svn/trunk@1417 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
|
2011-11-07 18:36:19 +00:00 |
|
wade@bindshell.net
|
1f6a13cd9a
|
Launch App module description updated
git-svn-id: https://beef.googlecode.com/svn/trunk@1410 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
|
2011-11-06 22:46:41 +00:00 |
|
bcoles@gmail.com
|
16c29cdf53
|
Updated Malicious Java Payload description.
Changed default connect-back host address to the BeEF host address.
git-svn-id: https://beef.googlecode.com/svn/trunk@1409 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
|
2011-11-06 17:11:15 +00:00 |
|
antisnatchor
|
c4d5b30b60
|
(Fixes issue 434) First works with the malicious Java applet. Tons of work to come in the next releases (OMG) :-)
git-svn-id: https://beef.googlecode.com/svn/trunk@1387 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
|
2011-11-01 12:06:58 +00:00 |
|
antisnatchor
|
b6a8205b27
|
(Fixes issue 547) added module for Safari exploit (CVE-2011-3230)
git-svn-id: https://beef.googlecode.com/svn/trunk@1373 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
|
2011-10-19 18:47:55 +00:00 |
|
bcoles@gmail.com
|
bd26b9bea4
|
Fixed typo
git-svn-id: https://beef.googlecode.com/svn/trunk@1335 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
|
2011-10-01 08:28:04 +00:00 |
|
wade@bindshell.net
|
e97104f696
|
command modules re-organised and re-named
git-svn-id: https://beef.googlecode.com/svn/trunk@1292 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
|
2011-09-16 12:28:14 +00:00 |
|