Commit Graph

20 Commits

Author SHA1 Message Date
bmantra
3accb24b2b Does not work in Opera due to cross domain issues. And cannot work in IE due to lack of sendAsBinary-functionality in xmlhttprequest. So removed the Base64-library and used atob instead. 2012-06-13 10:00:45 +02:00
bcoles
6f3298235f Added IE to not_working for glassfish_war_upload_xsrf module 2012-06-07 13:29:59 +09:30
bcoles
6396f7aa5a Fixes issue #688
Added spaces to comma delemetered data in config.yaml files

This should fix an issue reported to affect Ruby 1.9.2
2012-06-05 23:27:21 +09:30
root
8e7e546ef9 fixes #661 2012-06-03 19:53:33 +02:00
bcoles
981b13ce7b Added huawei_smartax_mt880 CSRF module 2012-05-22 17:52:36 +09:30
bcoles
6739094f57 Added dlink_dcs_series_csrf module 2012-05-22 17:22:20 +09:30
bcoles
f8eba21cb4 Moved a few more modules and updated some module descriptions 2012-05-20 18:50:10 +09:30
bcoles
460b619cc1 Moved Router and Switch categories under Exploits category
Added Social Engineering category
2012-05-20 18:32:44 +09:30
bcoles
05deaaa8b5 Added Module: ActiveX Command Execution 2012-04-27 14:15:52 +09:30
bcoles
c1975691f4 Added a couple of 0day CSRF exploits for Zenoss Core <= 3.2.1 2012-03-07 15:02:12 +10:30
bcoles
591cef0732 Removed "notes:" node from three module config.yaml files 2012-02-09 23:01:14 +10:30
bcoles
bfd6f764aa Added module Mozilla nsIProcess XPCOM Interface
This module is a port of the same module from BeEF-0.4.0.0

It has not been tested. It is currently disabled.

Part of issue 506
2012-01-10 17:29:07 +10:30
Wade Alcorn
06899ca267 Year updated from 2011 to 2012 2011-12-31 22:24:36 +10:00
antisnatchor
894e03da9c Fixes issue 555: fixed using the attachApplet JS api in the malicious Java applet module.
git-svn-id: https://beef.googlecode.com/svn/trunk@1417 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-11-07 18:36:19 +00:00
wade@bindshell.net
1f6a13cd9a Launch App module description updated
git-svn-id: https://beef.googlecode.com/svn/trunk@1410 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-11-06 22:46:41 +00:00
bcoles@gmail.com
16c29cdf53 Updated Malicious Java Payload description.
Changed default connect-back host address to the BeEF host address.



git-svn-id: https://beef.googlecode.com/svn/trunk@1409 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-11-06 17:11:15 +00:00
antisnatchor
c4d5b30b60 (Fixes issue 434) First works with the malicious Java applet. Tons of work to come in the next releases (OMG) :-)
git-svn-id: https://beef.googlecode.com/svn/trunk@1387 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-11-01 12:06:58 +00:00
antisnatchor
b6a8205b27 (Fixes issue 547) added module for Safari exploit (CVE-2011-3230)
git-svn-id: https://beef.googlecode.com/svn/trunk@1373 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-10-19 18:47:55 +00:00
bcoles@gmail.com
bd26b9bea4 Fixed typo
git-svn-id: https://beef.googlecode.com/svn/trunk@1335 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-10-01 08:28:04 +00:00
wade@bindshell.net
e97104f696 command modules re-organised and re-named
git-svn-id: https://beef.googlecode.com/svn/trunk@1292 b87d56ec-f9c0-11de-8c8a-61c5e9addfc9
2011-09-16 12:28:14 +00:00