lazypariah 1.6.0 → 1.6.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. checksums.yaml +4 -4
  2. data/bin/lazypariah +11 -13
  3. metadata +14 -12
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0e2c6b1e497a8a6f2dc4ffd408a94528e7b72e221fb757faab10ae4f5139e849
4
- data.tar.gz: a50c50b1387630ca64302780e448387fcc6c3424d29f01484bd9deea5ee23699
3
+ metadata.gz: d03d8b6806e87096297c0e2d9b452753825e413c779fd2c9a83fa73ea0cfa0e0
4
+ data.tar.gz: c04aabd541195d370feb7f8ce4d6a3eeef88533e8a39f26928b6169c86b2bcc5
5
5
  SHA512:
6
- metadata.gz: 45ca04176c895ef5686b1287036c3ce8b9299a92b3b7e622165246b686847e7c6a25523e893b140d5a7d6a3ebd22af1865a2ba107d21bea2641b8fa68f56d4cd
7
- data.tar.gz: 3b25a2dc14255ffed550d2e89dddcb759c98031d300a75a0f0425faf94c04fbf03b79b6c8f5c2820aa4860ae771e7ba4f7fe991233b65c959e9054848110084e
6
+ metadata.gz: b72c3e1bfb710afbdc12426c40060d4adfa71fd00647b15e8c72aa00e53a0b7f86afdcab87278e705518532041f00a377be1f68be7afbbe2b630f016a50484e9
7
+ data.tar.gz: cf0410c790694a5c49505b78043aa7226893402d215d372c06bb861115c2a36fb233d75eb655a03b5edae02ce99717e8f87d3101acd00a9e4517d3ccb816655b
data/bin/lazypariah CHANGED
@@ -1,13 +1,13 @@
1
1
  #!/usr/bin/env ruby
2
2
  #
3
3
  # Title: LAZYPARIAH
4
- # Version: 1.6.0
4
+ # Version: 1.6.2
5
5
  # Description:
6
- # LAZYPARIAH is a simple tool for generating various reverse shell payloads
7
- # on the fly. It is intended to be used only in authorised circumstances by
6
+ # LAZYPARIAH is a simple penetration testing tool for generating various reverse shell
7
+ # payloads on the fly. It is intended to be used only in authorised circumstances by
8
8
  # qualified penetration testers, security researchers and red team professionals.
9
9
  #
10
- # Copyright (C) 2020-2022 Peter Bruce Funnell
10
+ # Copyright (C) 2020-2022, 2026 Peter Bruce Funnell
11
11
  #
12
12
  # This program is free software: you can redistribute it and/or modify it under the terms of the GNU
13
13
  # General Public License as published by the Free Software Foundation, either version 3 of the License,
@@ -29,7 +29,7 @@ require "stringio"
29
29
 
30
30
  # Define constants.
31
31
  PROGRAM_NAME = "LAZYPARIAH".freeze()
32
- PROGRAM_VERSION = "1.6.0".freeze()
32
+ PROGRAM_VERSION = "1.6.2".freeze()
33
33
  EXECUTABLE_NAME = "lazypariah".freeze()
34
34
 
35
35
  # Define payload list.
@@ -110,12 +110,9 @@ PAYLOAD_BC_DICT = {
110
110
  }
111
111
 
112
112
  # Define function for displaying program information.
113
- def prog_info(donation_info=true)
113
+ def prog_info()
114
114
  puts("#{PROGRAM_NAME} #{PROGRAM_VERSION}")
115
- puts("Copyright (C) 2020-2022 Peter Bruce Funnell")
116
- if donation_info
117
- puts("\nBTC Donation Address (Author): 3EdoXV1w8H7y7M9ZdpjRC7GPnX4aouy18g")
118
- end
115
+ puts("Copyright (C) 2020-2022, 2026 Peter Bruce Funnell")
119
116
  end
120
117
 
121
118
  # Initialise command line argument parser.
@@ -123,7 +120,7 @@ option_parser = OptionParser.new do |options|
123
120
  options.banner = "\nUsage:\t#{EXECUTABLE_NAME} [OPTIONS] <PAYLOAD TYPE> <ATTACKER HOST> <ATTACKER PORT>\n"
124
121
  options.banner << "Note:\t<ATTACKER HOST> may be an IPv4 address, IPv6 address or hostname.\n\n"
125
122
  options.banner << "Example:\tlazypariah -u python_b64 10.10.14.4 1555\n"
126
- options.banner << "Example:\tlazypariah python_c malicious.local 1337\n\n"
123
+ options.banner << "Example:\tlazypariah python_c attacker.local 1337\n\n"
127
124
  options.banner << "Valid Payloads:\n"
128
125
  PAYLOAD_LIST.each do |p|
129
126
  options.banner << "#{" "*4}#{p}\n"
@@ -168,7 +165,7 @@ begin
168
165
  option_parser.parse!(into: arguments)
169
166
 
170
167
  if arguments[:version]
171
- prog_info(donation_info=false)
168
+ prog_info()
172
169
  exit()
173
170
  else
174
171
  if arguments.length < 1 and ARGV.length < 1
@@ -178,10 +175,11 @@ begin
178
175
  exit()
179
176
  elsif arguments[:help]
180
177
  prog_info()
178
+ puts("\nLAZYPARIAH is a simple penetration testing tool for generating a range of reverse shell payloads on the fly. It is intended to be used only in authorised circumstances by qualified penetration testers, security researchers and red team professionals. Before downloading, installing or using this tool, ensure that you understand the relevant laws in your jurisdiction. The author of this tool does not endorse the usage of this tool for illegal or unauthorised purposes.\n\nPlease note that LAZYPARIAH is no longer in active development and is no longer maintained.")
181
179
  puts(option_parser)
182
180
  exit()
183
181
  elsif arguments[:license]
184
- prog_info(donation_info=false)
182
+ prog_info()
185
183
  puts("\nThis program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>.")
186
184
  elsif ARGV.length < 3
187
185
  prog_info()
metadata CHANGED
@@ -1,29 +1,30 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: lazypariah
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.6.0
4
+ version: 1.6.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Peter Funnell
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-01-11 00:00:00.000000000 Z
11
+ date: 2026-01-29 00:00:00.000000000 Z
12
12
  dependencies: []
13
- description: LAZYPARIAH is a simple tool for generating a range of reverse shell payloads
14
- on the fly. It is intended to be used only in authorised circumstances by qualified
15
- penetration testers, security researchers and red team professionals. Before downloading,
16
- installing or using this tool, ensure that you understand the relevant laws in your
17
- jurisdiction. The author of this tool does not endorse the usage of this tool for
18
- illegal or unauthorised purposes.
19
- email: hello@octetsplicer.com
13
+ description: "[This project is no longer in active development.] LAZYPARIAH is a simple
14
+ penetration testing tool for generating a range of reverse shell payloads on the
15
+ fly. It is intended to be used only in authorised circumstances by qualified penetration
16
+ testers, security researchers and red team professionals. Before downloading, installing
17
+ or using this tool, ensure that you understand the relevant laws in your jurisdiction.
18
+ The author of this tool does not endorse the usage of this tool for illegal or unauthorised
19
+ purposes."
20
+ email:
20
21
  executables:
21
22
  - lazypariah
22
23
  extensions: []
23
24
  extra_rdoc_files: []
24
25
  files:
25
26
  - bin/lazypariah
26
- homepage: https://github.com/octetsplicer/LAZYPARIAH
27
+ homepage:
27
28
  licenses:
28
29
  - GPL-3.0+
29
30
  metadata: {}
@@ -44,8 +45,9 @@ required_rubygems_version: !ruby/object:Gem::Requirement
44
45
  requirements:
45
46
  - A GNU/Linux or BSD operating system. Optional requirements are GCC (for C payloads),
46
47
  OpenJDK (for Java payloads) and Rust (for Rust payloads).
47
- rubygems_version: 3.2.5
48
+ rubygems_version: 3.3.15
48
49
  signing_key:
49
50
  specification_version: 4
50
- summary: A tool for generating reverse shell payloads on the fly.
51
+ summary: "[This project is no longer in active development.] A penetration testing
52
+ tool for generating reverse shell payloads on the fly."
51
53
  test_files: []