metasploit-payloads 2.0.78 → 2.0.79
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/Rakefile +0 -1
- data/data/android/meterpreter.jar +0 -0
- data/data/android/metstage.jar +0 -0
- data/data/android/shell.jar +0 -0
- data/data/meterpreter/elevator.x64.dll +0 -0
- data/data/meterpreter/elevator.x86.dll +0 -0
- data/data/meterpreter/ext_server_espia.x64.dll +0 -0
- data/data/meterpreter/ext_server_espia.x86.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
- data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
- data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
- data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
- data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
- data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
- data/data/meterpreter/ext_server_priv.x64.dll +0 -0
- data/data/meterpreter/ext_server_priv.x86.dll +0 -0
- data/data/meterpreter/ext_server_python.x64.dll +0 -0
- data/data/meterpreter/ext_server_python.x86.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
- data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
- data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
- data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
- data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
- data/data/meterpreter/metsrv.x64.dll +0 -0
- data/data/meterpreter/metsrv.x86.dll +0 -0
- data/data/meterpreter/screenshot.x64.dll +0 -0
- data/data/meterpreter/screenshot.x86.dll +0 -0
- data/lib/metasploit-payloads/version.rb +1 -1
- data/lib/metasploit-payloads.rb +4 -7
- data.tar.gz.sig +0 -0
- metadata +2 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: f71e71b83e0b9d49a187a76a4da1338c59bb2fba9f9c5ea05d3673371251fbc1
|
4
|
+
data.tar.gz: 104f117fcc374d74598f8366b88719fc122b1040fbfbd539216bd648983fc84c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b785f915661023db1769c1e262c34c1371a6c992f704b0d8fcd8bcd788dcc61e59d5ab38f7fe5e491a37291dbd55b231cd881d9a5d11bb65bcc148eb878fa254
|
7
|
+
data.tar.gz: 11f09b770e85a17b11305782cf524b60c3444e6e32f917f89fa10a7a8808ebbaa4958a60ae3940eb754315879cd53e94e1d0a657f41cc11573a508c43545b0c2
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
data/Rakefile
CHANGED
Binary file
|
data/data/android/metstage.jar
CHANGED
Binary file
|
data/data/android/shell.jar
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
Binary file
|
data/lib/metasploit-payloads.rb
CHANGED
@@ -1,8 +1,6 @@
|
|
1
1
|
# -*- coding:binary -*-
|
2
2
|
|
3
|
-
unless defined? MetasploitPayloads::VERSION
|
4
|
-
require 'metasploit-payloads/version'
|
5
|
-
end
|
3
|
+
require 'metasploit-payloads/version' unless defined? MetasploitPayloads::VERSION
|
6
4
|
|
7
5
|
#
|
8
6
|
# This module dispenses Metasploit payload binary files
|
@@ -39,7 +37,8 @@ module MetasploitPayloads
|
|
39
37
|
#
|
40
38
|
# Get the path to a meterpreter binary by full name.
|
41
39
|
#
|
42
|
-
def self.meterpreter_path(name, binary_suffix)
|
40
|
+
def self.meterpreter_path(name, binary_suffix, debug: false)
|
41
|
+
binary_suffix = binary_suffix&.gsub(/dll$/, 'debug.dll') if debug
|
43
42
|
path(METERPRETER_SUBFOLDER, "#{name}.#{binary_suffix}".downcase)
|
44
43
|
end
|
45
44
|
|
@@ -176,9 +175,7 @@ module MetasploitPayloads
|
|
176
175
|
def self.warn_local_path(path)
|
177
176
|
unless @local_paths.include?(path)
|
178
177
|
STDERR.puts("WARNING: Local file #{path} is being used")
|
179
|
-
if @local_paths.empty?
|
180
|
-
STDERR.puts('WARNING: Local files may be incompatible with the Metasploit Framework')
|
181
|
-
end
|
178
|
+
STDERR.puts('WARNING: Local files may be incompatible with the Metasploit Framework') if @local_paths.empty?
|
182
179
|
@local_paths << path
|
183
180
|
end
|
184
181
|
end
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit-payloads
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 2.0.
|
4
|
+
version: 2.0.79
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OJ Reeves
|
@@ -96,7 +96,7 @@ cert_chain:
|
|
96
96
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
97
97
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
98
98
|
-----END CERTIFICATE-----
|
99
|
-
date: 2022-
|
99
|
+
date: 2022-04-01 00:00:00.000000000 Z
|
100
100
|
dependencies:
|
101
101
|
- !ruby/object:Gem::Dependency
|
102
102
|
name: rake
|
metadata.gz.sig
CHANGED
Binary file
|