lazypariah 1.6.0 → 1.6.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/bin/lazypariah +11 -13
- metadata +14 -12
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: d03d8b6806e87096297c0e2d9b452753825e413c779fd2c9a83fa73ea0cfa0e0
|
|
4
|
+
data.tar.gz: c04aabd541195d370feb7f8ce4d6a3eeef88533e8a39f26928b6169c86b2bcc5
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: b72c3e1bfb710afbdc12426c40060d4adfa71fd00647b15e8c72aa00e53a0b7f86afdcab87278e705518532041f00a377be1f68be7afbbe2b630f016a50484e9
|
|
7
|
+
data.tar.gz: cf0410c790694a5c49505b78043aa7226893402d215d372c06bb861115c2a36fb233d75eb655a03b5edae02ce99717e8f87d3101acd00a9e4517d3ccb816655b
|
data/bin/lazypariah
CHANGED
|
@@ -1,13 +1,13 @@
|
|
|
1
1
|
#!/usr/bin/env ruby
|
|
2
2
|
#
|
|
3
3
|
# Title: LAZYPARIAH
|
|
4
|
-
# Version: 1.6.
|
|
4
|
+
# Version: 1.6.2
|
|
5
5
|
# Description:
|
|
6
|
-
# LAZYPARIAH is a simple tool for generating various reverse shell
|
|
7
|
-
# on the fly. It is intended to be used only in authorised circumstances by
|
|
6
|
+
# LAZYPARIAH is a simple penetration testing tool for generating various reverse shell
|
|
7
|
+
# payloads on the fly. It is intended to be used only in authorised circumstances by
|
|
8
8
|
# qualified penetration testers, security researchers and red team professionals.
|
|
9
9
|
#
|
|
10
|
-
# Copyright (C) 2020-2022 Peter Bruce Funnell
|
|
10
|
+
# Copyright (C) 2020-2022, 2026 Peter Bruce Funnell
|
|
11
11
|
#
|
|
12
12
|
# This program is free software: you can redistribute it and/or modify it under the terms of the GNU
|
|
13
13
|
# General Public License as published by the Free Software Foundation, either version 3 of the License,
|
|
@@ -29,7 +29,7 @@ require "stringio"
|
|
|
29
29
|
|
|
30
30
|
# Define constants.
|
|
31
31
|
PROGRAM_NAME = "LAZYPARIAH".freeze()
|
|
32
|
-
PROGRAM_VERSION = "1.6.
|
|
32
|
+
PROGRAM_VERSION = "1.6.2".freeze()
|
|
33
33
|
EXECUTABLE_NAME = "lazypariah".freeze()
|
|
34
34
|
|
|
35
35
|
# Define payload list.
|
|
@@ -110,12 +110,9 @@ PAYLOAD_BC_DICT = {
|
|
|
110
110
|
}
|
|
111
111
|
|
|
112
112
|
# Define function for displaying program information.
|
|
113
|
-
def prog_info(
|
|
113
|
+
def prog_info()
|
|
114
114
|
puts("#{PROGRAM_NAME} #{PROGRAM_VERSION}")
|
|
115
|
-
puts("Copyright (C) 2020-2022 Peter Bruce Funnell")
|
|
116
|
-
if donation_info
|
|
117
|
-
puts("\nBTC Donation Address (Author): 3EdoXV1w8H7y7M9ZdpjRC7GPnX4aouy18g")
|
|
118
|
-
end
|
|
115
|
+
puts("Copyright (C) 2020-2022, 2026 Peter Bruce Funnell")
|
|
119
116
|
end
|
|
120
117
|
|
|
121
118
|
# Initialise command line argument parser.
|
|
@@ -123,7 +120,7 @@ option_parser = OptionParser.new do |options|
|
|
|
123
120
|
options.banner = "\nUsage:\t#{EXECUTABLE_NAME} [OPTIONS] <PAYLOAD TYPE> <ATTACKER HOST> <ATTACKER PORT>\n"
|
|
124
121
|
options.banner << "Note:\t<ATTACKER HOST> may be an IPv4 address, IPv6 address or hostname.\n\n"
|
|
125
122
|
options.banner << "Example:\tlazypariah -u python_b64 10.10.14.4 1555\n"
|
|
126
|
-
options.banner << "Example:\tlazypariah python_c
|
|
123
|
+
options.banner << "Example:\tlazypariah python_c attacker.local 1337\n\n"
|
|
127
124
|
options.banner << "Valid Payloads:\n"
|
|
128
125
|
PAYLOAD_LIST.each do |p|
|
|
129
126
|
options.banner << "#{" "*4}#{p}\n"
|
|
@@ -168,7 +165,7 @@ begin
|
|
|
168
165
|
option_parser.parse!(into: arguments)
|
|
169
166
|
|
|
170
167
|
if arguments[:version]
|
|
171
|
-
prog_info(
|
|
168
|
+
prog_info()
|
|
172
169
|
exit()
|
|
173
170
|
else
|
|
174
171
|
if arguments.length < 1 and ARGV.length < 1
|
|
@@ -178,10 +175,11 @@ begin
|
|
|
178
175
|
exit()
|
|
179
176
|
elsif arguments[:help]
|
|
180
177
|
prog_info()
|
|
178
|
+
puts("\nLAZYPARIAH is a simple penetration testing tool for generating a range of reverse shell payloads on the fly. It is intended to be used only in authorised circumstances by qualified penetration testers, security researchers and red team professionals. Before downloading, installing or using this tool, ensure that you understand the relevant laws in your jurisdiction. The author of this tool does not endorse the usage of this tool for illegal or unauthorised purposes.\n\nPlease note that LAZYPARIAH is no longer in active development and is no longer maintained.")
|
|
181
179
|
puts(option_parser)
|
|
182
180
|
exit()
|
|
183
181
|
elsif arguments[:license]
|
|
184
|
-
prog_info(
|
|
182
|
+
prog_info()
|
|
185
183
|
puts("\nThis program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>.")
|
|
186
184
|
elsif ARGV.length < 3
|
|
187
185
|
prog_info()
|
metadata
CHANGED
|
@@ -1,29 +1,30 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: lazypariah
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.6.
|
|
4
|
+
version: 1.6.2
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Peter Funnell
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date:
|
|
11
|
+
date: 2026-01-29 00:00:00.000000000 Z
|
|
12
12
|
dependencies: []
|
|
13
|
-
description:
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
illegal or unauthorised
|
|
19
|
-
|
|
13
|
+
description: "[This project is no longer in active development.] LAZYPARIAH is a simple
|
|
14
|
+
penetration testing tool for generating a range of reverse shell payloads on the
|
|
15
|
+
fly. It is intended to be used only in authorised circumstances by qualified penetration
|
|
16
|
+
testers, security researchers and red team professionals. Before downloading, installing
|
|
17
|
+
or using this tool, ensure that you understand the relevant laws in your jurisdiction.
|
|
18
|
+
The author of this tool does not endorse the usage of this tool for illegal or unauthorised
|
|
19
|
+
purposes."
|
|
20
|
+
email:
|
|
20
21
|
executables:
|
|
21
22
|
- lazypariah
|
|
22
23
|
extensions: []
|
|
23
24
|
extra_rdoc_files: []
|
|
24
25
|
files:
|
|
25
26
|
- bin/lazypariah
|
|
26
|
-
homepage:
|
|
27
|
+
homepage:
|
|
27
28
|
licenses:
|
|
28
29
|
- GPL-3.0+
|
|
29
30
|
metadata: {}
|
|
@@ -44,8 +45,9 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
|
44
45
|
requirements:
|
|
45
46
|
- A GNU/Linux or BSD operating system. Optional requirements are GCC (for C payloads),
|
|
46
47
|
OpenJDK (for Java payloads) and Rust (for Rust payloads).
|
|
47
|
-
rubygems_version: 3.
|
|
48
|
+
rubygems_version: 3.3.15
|
|
48
49
|
signing_key:
|
|
49
50
|
specification_version: 4
|
|
50
|
-
summary:
|
|
51
|
+
summary: "[This project is no longer in active development.] A penetration testing
|
|
52
|
+
tool for generating reverse shell payloads on the fly."
|
|
51
53
|
test_files: []
|