metasploit-payloads 2.0.122 → 2.0.123

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +34 -0
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +2 -2
  76. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 29a86c970178d3a25651d21595909fd3e9e91d40e6fb3072dc708b763956fd36
4
- data.tar.gz: fcb43bce16204da255a3bcf269b8cb5374cb7d0de75d4cf6a6a5f328fda02e51
3
+ metadata.gz: 6289f8b22e34bc1e8eab59e414fc72a547b7f27de9e7bbe4febf92dcfda7536c
4
+ data.tar.gz: 1a63550eb48291b0677ddd85e3762052fd2053e1d9123aedfab07f64fdc65fbb
5
5
  SHA512:
6
- metadata.gz: e0b3d83ca845df9808fcc5c548a36965ee18629952762a1aee710428cf098027b3468fa4200ae8370f854ed11463853f546496e7272874472f2b7b9d0ec300d1
7
- data.tar.gz: bbdb7d7178017a4e4209b2fe214893f1f8a2f491a738b346d328278629f1006c4d0d544e655813862c764cb593de72efcebf16208e14559dbe7e124a96c59e60
6
+ metadata.gz: c48a56cf6335d8033ae752d0c8661973610831241e6c01661cca3cdfed825af0f5bca93633a384283ad3eabf016f29cde9cd0f636a034d028a59c2257272f4b5
7
+ data.tar.gz: 024b37c1632b2f9b1ecb9f79d08cb4f25ab9d9efc787c7ecf814d6633145cdc8aef79ab093bc639f41b12e146dae55f0256ebcb492c745bcbd8555e9d8bf54e1
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1618,6 +1618,40 @@ def stdapi_sys_process_get_processes(request, response):
1618
1618
  else:
1619
1619
  return stdapi_sys_process_get_processes_via_ps(request, response)
1620
1620
 
1621
+ @register_function_if(has_windll)
1622
+ def stdapi_sys_process_memory_allocate(request, response):
1623
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value', 0)
1624
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value', 0)
1625
+ size = packet_get_tlv(request, TLV_TYPE_LENGTH).get('value', 0)
1626
+ alloc = packet_get_tlv(request, TLV_TYPE_ALLOCATION_TYPE).get('value', 0)
1627
+ prot = packet_get_tlv(request, TLV_TYPE_PROTECTION).get('value', 0)
1628
+
1629
+ VirtualAllocEx = ctypes.windll.kernel32.VirtualAllocEx
1630
+ VirtualAllocEx.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_size_t, ctypes.c_ulong, ctypes.c_ulong]
1631
+ VirtualAllocEx.restype = ctypes.c_void_p
1632
+
1633
+ result = VirtualAllocEx(handle, base, size, alloc, prot)
1634
+ if not result:
1635
+ return error_result_windows(), response
1636
+
1637
+ response += tlv_pack(TLV_TYPE_BASE_ADDRESS, result)
1638
+ return ERROR_SUCCESS, response
1639
+
1640
+ @register_function_if(has_windll)
1641
+ def stdapi_sys_process_memory_free(request, response):
1642
+ handle = packet_get_tlv(request, TLV_TYPE_HANDLE).get('value', 0)
1643
+ base = packet_get_tlv(request, TLV_TYPE_BASE_ADDRESS).get('value', 0)
1644
+ size = packet_get_tlv(request, TLV_TYPE_LENGTH).get('value', 0)
1645
+
1646
+ VirtualFreeEx = ctypes.windll.kernel32.VirtualFreeEx
1647
+ VirtualFreeEx.argtypes = [ctypes.c_void_p, ctypes.c_void_p, ctypes.c_size_t, ctypes.c_ulong]
1648
+ VirtualFreeEx.restype = ctypes.c_long
1649
+
1650
+ MEM_RELEASE = 0x00008000
1651
+ if not VirtualFreeEx(handle, base, size, MEM_RELEASE):
1652
+ return error_result_windows(), response
1653
+ return ERROR_SUCCESS, response
1654
+
1621
1655
  @register_function_if(has_windll)
1622
1656
  def stdapi_sys_power_exitwindows(request, response):
1623
1657
  SE_SHUTDOWN_NAME = "SeShutdownPrivilege"
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.122'
3
+ VERSION = '2.0.123'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.122
4
+ version: 2.0.123
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2023-03-09 00:00:00.000000000 Z
99
+ date: 2023-04-07 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file