This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Title: UnBup Extractor Script | |
# Description: Bash unbup script for McAfee .bup files | |
# Simple usage will extract all files from a .bup to a directory with the sname (_{bupfile}.extracted) | |
# Input: Bup File | |
# Output: _{bupfile}.extracted directory with detail.txt and original binary | |
# Usage: bash unbup.sh infected.bup | |
# Requirements: | |
# * apt-get install p7zip-full | |
# * git clone https://github.com/hellman/xortool/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
class MetasploitModule < Msf::Exploit::Remote | |
Rank = GreatRanking | |
include Msf::Exploit::Remote::HttpClient |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
class MetasploitModule < Msf::Exploit::Remote | |
Rank = GreatRanking | |
include Msf::Exploit::Remote::HttpClient |