Skip to content

Commit

Permalink
fix URLs.
Browse files Browse the repository at this point in the history
  • Loading branch information
rsmudge committed Oct 31, 2019
1 parent 437aa6e commit 81c7258
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
6 changes: 3 additions & 3 deletions README.txt
Original file line number Diff line number Diff line change
Expand Up @@ -66,13 +66,13 @@ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/wind
License: BSD 3-Clause

ms16-032: Secondary Logon Handle Privilege Escalation (CVE-2016-099)
https://github.com/adaptivethreat/Empire/blob/master/data/module_source/privesc/Invoke-MS16032.ps1
https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-MS16032.ps1

Author: Ruben Boonen (@FuzzySec)
License: BSD 3-Clause

uac-eventvwr: Bypass UAC with eventvwr.exe
https://github.com/adaptivethreat/Empire/blob/master/data/module_source/privesc/Invoke-EventVwrBypass.ps1
https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-EventVwrBypass.ps1

Author: Matt Nelson (@enigma0x3)
License: BSD 3-Clause
Expand All @@ -84,7 +84,7 @@ https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/I
License: BSD 3-Clause

uac-wscript: Bypass UAC with wscript.exe
https://github.com/adaptivethreat/Empire/blob/master/data/module_source/privesc/Invoke-WScriptBypassUAC.ps1
https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-WScriptBypassUAC.ps1

Author: @enigma0x3, @harmj0y, Vozzie
License: BSD 3-Clause
6 changes: 3 additions & 3 deletions elevate.cna
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ sub schtasks_exploit {
beacon_exploit_register("uac-schtasks", "Bypass UAC with schtasks.exe (via SilentCleanup)", &schtasks_exploit);

# Integrate Matt Nelson's file-less eventvwr.exe Bypass UAC attack
# Sourced from Empire: https://github.com/adaptivethreat/Empire/tree/master/data/module_source/privesc
# Sourced from Empire: https://github.com/EmpireProject/Empire/tree/master/data/module_source/privesc
sub eventvwr_elevator {
local('$handle $script $oneliner');

Expand All @@ -82,7 +82,7 @@ sub eventvwr_elevator {
beacon_elevator_register("uac-eventvwr", "Bypass UAC with eventvwr.exe", &eventvwr_elevator);

# Integrate wscript.exe Bypass UAC attack
# Sourced from Empire: https://github.com/adaptivethreat/Empire/tree/master/data/module_source/privesc
# Sourced from Empire: https://github.com/EmpireProject/Empire/tree/master/data/module_source/privesc
sub wscript_elevator {
local('$handle $script $oneliner');

Expand Down Expand Up @@ -190,7 +190,7 @@ sub ms16_016_exploit {
beacon_exploit_register("ms16-016", "mrxdav.sys WebDav Local Privilege Escalation (CVE 2016-0051)", &ms16_016_exploit);

# Integrate ms16-032
# Sourced from Empire: https://github.com/adaptivethreat/Empire/tree/master/data/module_source/privesc
# Sourced from Empire: https://github.com/EmpireProject/Empire/tree/master/data/module_source/privesc
sub ms16_032_elevator {
local('$handle $script $oneliner');

Expand Down

0 comments on commit 81c7258

Please sign in to comment.