From 58c490ccb9810f2124c063e368aa2181d37fa3f8 Mon Sep 17 00:00:00 2001 From: Divyaranjan Sahoo Date: Thu, 2 Oct 2025 19:59:34 +0530 Subject: [PATCH] Move LINQPad module into windows/persistence category --- .../linqpad_deserialization_persistence.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename modules/exploits/windows/{local => persistence}/linqpad_deserialization_persistence.rb (98%) diff --git a/modules/exploits/windows/local/linqpad_deserialization_persistence.rb b/modules/exploits/windows/persistence/linqpad_deserialization_persistence.rb similarity index 98% rename from modules/exploits/windows/local/linqpad_deserialization_persistence.rb rename to modules/exploits/windows/persistence/linqpad_deserialization_persistence.rb index 586a8a8607766..15a471a38df91 100644 --- a/modules/exploits/windows/local/linqpad_deserialization_persistence.rb +++ b/modules/exploits/windows/persistence/linqpad_deserialization_persistence.rb @@ -16,7 +16,7 @@ def initialize(info = {}) super( update_info( info, - 'Name' => 'LINQPad Deserialization Exploit', + 'Name' => 'LINQPad Deserialization Persistence', 'Description' => %q{ This module exploits a bug in LIQPad up to version 5.48.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts. },