metasploit-payloads 2.0.75 → 2.0.76

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.dll +0 -0
  7. data/data/meterpreter/elevator.x86.dll +0 -0
  8. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  12. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  16. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  20. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  24. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  28. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  29. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  31. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  32. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  33. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  34. data/data/meterpreter/meterpreter.py +18 -7
  35. data/data/meterpreter/metsrv.x64.dll +0 -0
  36. data/data/meterpreter/metsrv.x86.dll +0 -0
  37. data/data/meterpreter/screenshot.x64.dll +0 -0
  38. data/data/meterpreter/screenshot.x86.dll +0 -0
  39. data/lib/metasploit-payloads/version.rb +1 -1
  40. data.tar.gz.sig +0 -0
  41. metadata +2 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9fc521c5aff17d0ac9d9feed495073c05fa79cbcafb45f86f333475a93d5cb3e
4
- data.tar.gz: dec88c7fc6526db7146d9eb07dfadd60b641fc4e10c38c35d554c9dc1d0186df
3
+ metadata.gz: 7e6ea335006907066f4bffdddc7b300abeda44390b76c6229b963280e2b6b40e
4
+ data.tar.gz: dc944a58cc08b728961bf4036cf74859750ba442e89fc86edf6b5cd6247d4449
5
5
  SHA512:
6
- metadata.gz: 3d7a0578218e7174a743561c7d6f3106d299f18ffdcb391354cb6febb5fa06cbdbac2e6d6db3ee420bf7970a5dcad8f2c2886c5d185874114560c18cd7f5f475
7
- data.tar.gz: b5cd7ce32806f0781a09c389e4f16af243ab98a44892392706333dceceb159ec6ad76c7f391f27f279c109db1cb8475e96e1e99d3c5eb87e02cb2e48d54915c9
6
+ metadata.gz: cade4c7f2f79d7d41bbbbcf7004d6cb38232e4d7f35eda067751c2e59d247edd42459ccb91dab04e71a7eae4915571dea4e5633cee74502f43e3748c6bf52ac9
7
+ data.tar.gz: 2274c694533f7c0eb7fa2575fe1121ae5ef3267bb589832c5b81f00acf12ed3323a4bfee50e09a106a26e1318c9bfef56f0ff926555553649cf18801407a06e5
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -677,7 +677,7 @@ class MeterpreterProcess(MeterpreterChannel):
677
677
  pass
678
678
 
679
679
  def is_alive(self):
680
- return self.proc_h.poll() is None
680
+ return self.proc_h.is_alive()
681
681
 
682
682
  def read(self, length):
683
683
  data = bytes()
@@ -777,6 +777,7 @@ class STDProcessBuffer(threading.Thread):
777
777
  self.is_alive = is_alive
778
778
  self.data = bytes()
779
779
  self.data_lock = threading.RLock()
780
+ self._is_reading = True
780
781
 
781
782
  def _read1(self):
782
783
  try:
@@ -785,12 +786,18 @@ class STDProcessBuffer(threading.Thread):
785
786
  return bytes()
786
787
 
787
788
  def run(self):
788
- byte = self._read1()
789
- while len(byte):
790
- self.data_lock.acquire()
791
- self.data += byte
792
- self.data_lock.release()
789
+ try:
793
790
  byte = self._read1()
791
+ while len(byte) > 0:
792
+ self.data_lock.acquire()
793
+ self.data += byte
794
+ self.data_lock.release()
795
+ byte = self._read1()
796
+ finally:
797
+ self._is_reading = False
798
+
799
+ def is_reading(self):
800
+ return self._is_reading or self.is_read_ready()
794
801
 
795
802
  def is_read_ready(self):
796
803
  return len(self.data) != 0
@@ -821,7 +828,11 @@ class STDProcess(subprocess.Popen):
821
828
  self.ptyfd = None
822
829
 
823
830
  def is_alive(self):
824
- return self.poll() is None
831
+ is_proc_alive = self.poll() is None
832
+ is_stderr_reading = self.stderr_reader.is_reading()
833
+ is_stdout_reading = self.stdout_reader.is_reading()
834
+
835
+ return is_proc_alive or is_stderr_reading or is_stdout_reading
825
836
 
826
837
  def start(self):
827
838
  self.stdout_reader = STDProcessBuffer(self.stdout, self.is_alive, name='STDProcessBuffer.stdout')
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.75'
3
+ VERSION = '2.0.76'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.75
4
+ version: 2.0.76
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2022-02-23 00:00:00.000000000 Z
99
+ date: 2022-03-01 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file