metasploit-payloads 1.0.9 → 1.0.10

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: bc00300d0edd9c5d0cd8ef193ec05728d9747bd5
4
- data.tar.gz: 3c7385fe77add29dfee3b0aaf4a52feb793b6ad6
3
+ metadata.gz: 19846b7a45c2ea44de6493feb1951bf3d52bc438
4
+ data.tar.gz: 48eb89aa786d7669abbd58048866fea96b2fc7b1
5
5
  SHA512:
6
- metadata.gz: 1e3627cdd22f89886f8d90165f1ac1c4243ab71a70257f59d4c1b9530acb08f4d470314f36fe0f1f7b74653db1941911105e858df4d27d113eb597771c4116fb
7
- data.tar.gz: 98db866108a50877d46c65b6ad73157cb03d1d3eb20ce71c27f36c5f5b222cd1a8f80f135def97c111a638744d8710f68e8a64e64b81e730926eb50ba5faedc6
6
+ metadata.gz: 0c7a25e017416a70fcf995f5a15d304dc314e9c3e1db1fdcd557305b07f75a2cce547aa9f25a5e52876819af5d62c7fcf5e83a7402548488985bdb22f2131dfd
7
+ data.tar.gz: c2e26e67f66aea015d969ae7a2d6f4ae7eba89f9652d03a16a094f0d94464a7c71d0452dc97d58023ebfdf45f37901a57d054f6a5b73c8949f4fc4dac84e7f7b
checksums.yaml.gz.sig CHANGED
Binary file
data.tar.gz.sig CHANGED
@@ -1,2 +1,2 @@
1
- # +�p z+�{W Vy�����K����j���\y2"(�ү˼�i���=D��`�BSKmji�+K��l^��MovrW\=�� �~�Ϭ�:�y�����
2
- )\R�y �!���}��9"J : z7m�W2�&��հhN�P��#t*����VyS��Doͬ�����4�%�{�NI����fټ����v�Jk]��(�
1
+ 1�an\k[�ѷ�o�����a4��*�Ք�Nރ#�ot'��0�V�}b>��Y�?NI}�A�^�*Y�/�[D����UF{x%�`��g9��XYQ���:ձ�H��:�4AdQ|�ٸ>���P�Wܖ�e���X�h�&�P�V
2
+ xA���F���y�-�a5��rS2%�RQ~LvA��B�v��z���hi}'�ڇ��_#I(���4Z��X�7:���:Y�
Binary file
Binary file
Binary file
Binary file
@@ -743,7 +743,8 @@ def stdapi_sys_process_close(request, response):
743
743
  if not proc_h_id:
744
744
  return ERROR_SUCCESS, response
745
745
  proc_h_id = proc_h_id['value']
746
- del meterpreter.processes[proc_h_id]
746
+ if meterpreter.processes.has_key(proc_h_id):
747
+ del meterpreter.processes[proc_h_id]
747
748
  return ERROR_SUCCESS, response
748
749
 
749
750
  @meterpreter.register_function
Binary file
@@ -146,7 +146,6 @@ module MetasploitPayloads
146
146
  @local_paths = []
147
147
 
148
148
  def self.warn_local_path(path)
149
- return if path.include?('.py') || path.include?('.php')
150
149
  unless @local_paths.include?(path)
151
150
  STDERR.puts("WARNING: Local file #{path} is being used")
152
151
  if @local_paths.empty?
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '1.0.9'
3
+ VERSION = '1.0.10'
4
4
 
5
5
  def self.version
6
6
  VERSION
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.9
4
+ version: 1.0.10
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -88,7 +88,7 @@ cert_chain:
88
88
  2SpuQH+SWteq3NXkAmFEEqvLJQ4sbptZt8OP8ghL3pVAvZNFmww/YVszSkShSzcg
89
89
  QdihYCSEL2drS2cFd50jBeq71sxUtxbv82DUa2b+
90
90
  -----END CERTIFICATE-----
91
- date: 2015-08-25 00:00:00.000000000 Z
91
+ date: 2015-08-27 00:00:00.000000000 Z
92
92
  dependencies:
93
93
  - !ruby/object:Gem::Dependency
94
94
  name: bundler
@@ -152,12 +152,6 @@ files:
152
152
  - data/android/apk/AndroidManifest.xml
153
153
  - data/android/apk/classes.dex
154
154
  - data/android/apk/resources.arsc
155
- - data/android/libs/armeabi/libndkstager.so
156
- - data/android/libs/mips/libndkstager.so
157
- - data/android/libs/x86/libndkstager.so
158
- - data/android/meterpreter.jar
159
- - data/android/metstage.jar
160
- - data/android/shell.jar
161
155
  - data/java/com/metasploit/meterpreter/MemoryBufferURLConnection.class
162
156
  - data/java/com/metasploit/meterpreter/MemoryBufferURLStreamHandler.class
163
157
  - data/java/javapayload/stage/Meterpreter.class
metadata.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file