Skip to content

Commit

Permalink
feat(feat): automsf \n\n Version: release/0.1.55 \n\n new command doc…
Browse files Browse the repository at this point in the history
…umented at COMMAND.md AUTOMSF using a payload run an automated attack \n\n Modified file(s):\n- COMMANDS.md

- README.md
- docs/COMMANDS.html
- docs/README.html
- docs/index.html
- docs/index.html.bak
- lazyown
- payload.json\n  LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n  LazyOwn/   https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Sun Oct 6 03:25:28 2024 -0300 \n\n Hora: 1728195928
  • Loading branch information
grisuno committed Oct 7, 2024
1 parent e6850d4 commit 63d7ed0
Show file tree
Hide file tree
Showing 12 changed files with 2,629 additions and 2,351 deletions.
7 changes: 7 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,13 @@
# Changelog


### Nuevas características

### Otros

* * feat(feat): automsf \n\n Version: release/0.1.55 \n\n new command documented at COMMAND.md AUTOMSF using a payload run an automated attack \n\n Modified file(s):\n- COMMANDS.md - README.md - docs/COMMANDS.html - docs/README.html - docs/index.html - docs/index.html.bak - lazyown - payload.json\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Sun Oct 6 03:25:28 2024 -0300 \n\n Hora: 1728195928


### Pruebas

### Otros
Expand Down
12 changes: 12 additions & 0 deletions COMMANDS.md
Original file line number Diff line number Diff line change
Expand Up @@ -5646,6 +5646,18 @@ SMB CVE-2008-4250. Vulnerable using the module ms08_067_netapi of metasploit
:type line: str
:returns: None

## automsf
Try to check if Vulnerable using the module passed by argument of lazyown example automsf exploit/windows/iis/iis_webdav_upload_asp to use in metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None

## iis_webdav_upload_asp
(CVE-2017-7269). Vulnerable using the module iis_webdav_upload_asp of metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None

## nano
Opens or creates the file using line in the sessions directory for editing using nano.

Expand Down
19 changes: 19 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6941,6 +6941,18 @@ SMB CVE-2008-4250. Vulnerable using the module ms08_067_netapi of metasploit
:type line: str
:returns: None
## automsf
Try to check if Vulnerable using the module passed by argument of lazyown example automsf exploit/windows/iis/iis_webdav_upload_asp to use in metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None
## iis_webdav_upload_asp
(CVE-2017-7269). Vulnerable using the module iis_webdav_upload_asp of metasploit
:param line: Command line input that provides the LHOST and RHOST.
:type line: str
:returns: None
## nano
Opens or creates the file using line in the sessions directory for editing using nano.
Expand Down Expand Up @@ -7191,6 +7203,13 @@ Helper function to alternate the case of characters in a string.
# Changelog
### Pruebas
### Otros
* * test(new machine return): is a nice machine :P \n\n Version: release/0.1.54 \n\n to go sleep nice :P \n\n Modified file(s):\n- COMMANDS.md - README.md - docs/COMMANDS.html - docs/README.html - docs/index.html - docs/index.html.bak - lazyown - payload.json\n LazyOwn on HackTheBox: https://app.hackthebox.com/teams/overview/6429 \n\n LazyOwn/ https://grisuno.github.io/LazyOwn/ \n\n \n\n Fecha: Sun Oct 6 02:19:22 2024 -0300 \n\n Hora: 1728191962
### Pruebas
### Otros
Expand Down
Loading

0 comments on commit 63d7ed0

Please sign in to comment.