metasploit-payloads 2.0.131 → 2.0.133
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/dump_sam.x64.debug.dll +0 -0
- data/data/meterpreter/dump_sam.x64.dll +0 -0
- data/data/meterpreter/dump_sam.x86.debug.dll +0 -0
- data/data/meterpreter/dump_sam.x86.dll +0 -0
- data/data/meterpreter/elevator.x64.debug.dll +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.debug.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.py +38 -0
- data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/metsrv.x64.debug.dll +0 -0
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.debug.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.debug.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.debug.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- data.tar.gz.sig +0 -0
- metadata +2 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ee40d97b7e999180028da36ad8294f14f5574b93cd33ac5effa3888ef27ec0fb
|
4
|
+
data.tar.gz: 8593cbe877b56280e8e204933779072054bed32c653d7ed3066f0782892c18e5
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: aa7d84f87710d144873fcc793e1a0ccb5c2d1164bcc484f349ee40a1cb67d567fe11612956e09883f9c9edb1e8f781945984b68b17d6b5a87d1d52f8254de747
|
7
|
+
data.tar.gz: 11d019ba5d70372a7aff70726a82ac9770b3e372394d6c241219b46c238f68f876d8bd00700eb323f53e546ce6468facbb975f332945ac672a9c2d5d54272f7a
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -399,6 +399,18 @@ if has_ctypes:
|
|
399
399
|
('dwType', ctypes.c_uint32)
|
400
400
|
]
|
401
401
|
|
402
|
+
class MEMORY_BASIC_INFORMATION(ctypes.Structure):
|
403
|
+
_fields_ = [
|
404
|
+
('BaseAddress', ctypes.c_void_p),
|
405
|
+
('AllocationBase', ctypes.c_void_p),
|
406
|
+
('AllocationProtect', ctypes.c_ulong),
|
407
|
+
('PartitionId', ctypes.c_ushort),
|
408
|
+
('RegionSize', ctypes.c_size_t),
|
409
|
+
('State', ctypes.c_ulong),
|
410
|
+
('Protect', ctypes.c_ulong),
|
411
|
+
('Type', ctypes.c_ulong)
|
412
|
+
]
|
413
|
+
|
402
414
|
|
403
415
|
#
|
404
416
|
# Linux Structures
|
@@ -1727,6 +1739,32 @@ def stdapi_sys_process_memory_protect(request, response):
|
|
1727
1739
|
response += tlv_pack(TLV_TYPE_PROTECTION, old_prot.value)
|
1728
1740
|
return ERROR_SUCCESS, response
|
1729
1741
|
|
1742
|
+
@register_function_if(has_windll)
|
1743
|
+
def stdapi_sys_process_memory_query(request, response):
|
1744
|
+
handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value')
|
1745
|
+
base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value')
|
1746
|
+
|
1747
|
+
if not handle:
|
1748
|
+
return ERROR_INVALID_PARAMETER, response
|
1749
|
+
|
1750
|
+
VirtualQueryEx = ctypes.windll.kernel32.VirtualQueryEx
|
1751
|
+
VirtualQueryEx.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.POINTER(MEMORY_BASIC_INFORMATION), ctypes.c_size_t]
|
1752
|
+
VirtualQueryEx.restype = ctypes.c_size_t
|
1753
|
+
|
1754
|
+
info = MEMORY_BASIC_INFORMATION()
|
1755
|
+
size = VirtualQueryEx(handle, base, ctypes.byref(info), ctypes.sizeof(info))
|
1756
|
+
if size == 0:
|
1757
|
+
return error_result_windows(), response
|
1758
|
+
|
1759
|
+
response += tlv_pack(TLV_TYPE_BASE_ADDRESS, info.BaseAddress or 0)
|
1760
|
+
response += tlv_pack(TLV_TYPE_ALLOC_BASE_ADDRESS, info.AllocationBase or 0)
|
1761
|
+
response += tlv_pack(TLV_TYPE_ALLOC_PROTECTION, info.AllocationProtect)
|
1762
|
+
response += tlv_pack(TLV_TYPE_LENGTH, info.RegionSize)
|
1763
|
+
response += tlv_pack(TLV_TYPE_MEMORY_STATE, info.State)
|
1764
|
+
response += tlv_pack(TLV_TYPE_PROTECTION, info.Protect)
|
1765
|
+
response += tlv_pack(TLV_TYPE_MEMORY_TYPE, info.Type)
|
1766
|
+
return ERROR_SUCCESS, response
|
1767
|
+
|
1730
1768
|
@register_function_if(has_windll)
|
1731
1769
|
def stdapi_sys_process_memory_free(request, response):
|
1732
1770
|
handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value', 0)
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit-payloads
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.0.
|
4
|
+
version: 2.0.133
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OJ Reeves
|
@@ -96,7 +96,7 @@ cert_chain:
|
|
96
96
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
97
97
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
98
98
|
-----END CERTIFICATE-----
|
99
|
-
date: 2023-05-
|
99
|
+
date: 2023-05-23 00:00:00.000000000 Z
|
100
100
|
dependencies:
|
101
101
|
- !ruby/object:Gem::Dependency
|
102
102
|
name: rake
|
metadata.gz.sig
CHANGED
Binary file
|