metasploit-payloads 2.0.75 → 2.0.76
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/meterpreter.py +18 -7
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- data.tar.gz.sig +0 -0
- metadata +2 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 7e6ea335006907066f4bffdddc7b300abeda44390b76c6229b963280e2b6b40e
|
4
|
+
data.tar.gz: dc944a58cc08b728961bf4036cf74859750ba442e89fc86edf6b5cd6247d4449
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cade4c7f2f79d7d41bbbbcf7004d6cb38232e4d7f35eda067751c2e59d247edd42459ccb91dab04e71a7eae4915571dea4e5633cee74502f43e3748c6bf52ac9
|
7
|
+
data.tar.gz: 2274c694533f7c0eb7fa2575fe1121ae5ef3267bb589832c5b81f00acf12ed3323a4bfee50e09a106a26e1318c9bfef56f0ff926555553649cf18801407a06e5
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -677,7 +677,7 @@ class MeterpreterProcess(MeterpreterChannel):
|
|
677
677
|
pass
|
678
678
|
|
679
679
|
def is_alive(self):
|
680
|
-
return self.proc_h.
|
680
|
+
return self.proc_h.is_alive()
|
681
681
|
|
682
682
|
def read(self, length):
|
683
683
|
data = bytes()
|
@@ -777,6 +777,7 @@ class STDProcessBuffer(threading.Thread):
|
|
777
777
|
self.is_alive = is_alive
|
778
778
|
self.data = bytes()
|
779
779
|
self.data_lock = threading.RLock()
|
780
|
+
self._is_reading = True
|
780
781
|
|
781
782
|
def _read1(self):
|
782
783
|
try:
|
@@ -785,12 +786,18 @@ class STDProcessBuffer(threading.Thread):
|
|
785
786
|
return bytes()
|
786
787
|
|
787
788
|
def run(self):
|
788
|
-
|
789
|
-
while len(byte):
|
790
|
-
self.data_lock.acquire()
|
791
|
-
self.data += byte
|
792
|
-
self.data_lock.release()
|
789
|
+
try:
|
793
790
|
byte = self._read1()
|
791
|
+
while len(byte) > 0:
|
792
|
+
self.data_lock.acquire()
|
793
|
+
self.data += byte
|
794
|
+
self.data_lock.release()
|
795
|
+
byte = self._read1()
|
796
|
+
finally:
|
797
|
+
self._is_reading = False
|
798
|
+
|
799
|
+
def is_reading(self):
|
800
|
+
return self._is_reading or self.is_read_ready()
|
794
801
|
|
795
802
|
def is_read_ready(self):
|
796
803
|
return len(self.data) != 0
|
@@ -821,7 +828,11 @@ class STDProcess(subprocess.Popen):
|
|
821
828
|
self.ptyfd = None
|
822
829
|
|
823
830
|
def is_alive(self):
|
824
|
-
|
831
|
+
is_proc_alive = self.poll() is None
|
832
|
+
is_stderr_reading = self.stderr_reader.is_reading()
|
833
|
+
is_stdout_reading = self.stdout_reader.is_reading()
|
834
|
+
|
835
|
+
return is_proc_alive or is_stderr_reading or is_stdout_reading
|
825
836
|
|
826
837
|
def start(self):
|
827
838
|
self.stdout_reader = STDProcessBuffer(self.stdout, self.is_alive, name='STDProcessBuffer.stdout')
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit-payloads
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.0.
|
4
|
+
version: 2.0.76
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OJ Reeves
|
@@ -96,7 +96,7 @@ cert_chain:
|
|
96
96
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
97
97
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
98
98
|
-----END CERTIFICATE-----
|
99
|
-
date: 2022-
|
99
|
+
date: 2022-03-01 00:00:00.000000000 Z
|
100
100
|
dependencies:
|
101
101
|
- !ruby/object:Gem::Dependency
|
102
102
|
name: rake
|
metadata.gz.sig
CHANGED
Binary file
|