metasploit-payloads 2.0.55 → 2.0.56

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.dll +0 -0
  7. data/data/meterpreter/elevator.x86.dll +0 -0
  8. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  12. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  16. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  20. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  24. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  28. data/data/meterpreter/ext_server_stdapi.php +2 -2
  29. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  30. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  31. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  33. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  34. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  35. data/data/meterpreter/metsrv.x64.dll +0 -0
  36. data/data/meterpreter/metsrv.x86.dll +0 -0
  37. data/data/meterpreter/screenshot.x64.dll +0 -0
  38. data/data/meterpreter/screenshot.x86.dll +0 -0
  39. data/lib/metasploit-payloads/version.rb +1 -1
  40. data.tar.gz.sig +2 -1
  41. metadata +2 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0fbcfbe46a267ae62eb3d0311ad2b8f74c67b554af643e831d572e5f5884f632
4
- data.tar.gz: 7aa3192b0be1dd60541b609fdd0d5888b3a4d59c19756322b9c899417916d54c
3
+ metadata.gz: 2cfea8412e9fdb3611bf7b796eacac9ebbccc4e38ad767c21d9855b0c4cfa6c9
4
+ data.tar.gz: 6b05e8a8b0043d1b8baa1da53914aaac81f3f0a53a0206b2469401c5b9522f32
5
5
  SHA512:
6
- metadata.gz: 19dce631c6385cf74d2238790f9b249dd888df53ef92cc29a7f0e126b55e25bb699021cd4fe7ae44b76aa52f80c8fdd4e42949f80dd7b9c60cbb806993ad219a
7
- data.tar.gz: bc994d5b3681824e3f22713abdf19bdc7f23d3c96922601288135701b9ab0d68cace7bbf171d4b2eeffadf78b5a3c044de05c9ad5e4a704f2f10d22998e1e6c0
6
+ metadata.gz: d6c7541e9de5fc8173c099ba83c14ff6e189f8e18028569129421b61992351413fbe210ac57149ac8ad1195f332e13f788a0e1726097c27ba3264a66e9bbb7ab
7
+ data.tar.gz: af365d33032004e39ce3e3dd92e51ef166bb1a5b632d0a5687434dd68551f63123913fb868967c850db2976d236ffd76a22d197d481a8582c193022a51fcfb17
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -756,12 +756,12 @@ function stdapi_sys_config_getuid($req, &$pkt) {
756
756
  if (is_callable('posix_getuid')) {
757
757
  $uid = posix_getuid();
758
758
  $pwinfo = posix_getpwuid($uid);
759
- $user = $pwinfo['name'] . " ($uid)";
759
+ $user = $pwinfo['name'];
760
760
  } else {
761
761
  # The posix functions aren't available, this is probably windows. Use
762
762
  # the functions for getting user name and uid based on file ownership
763
763
  # instead.
764
- $user = get_current_user() . " (" . getmyuid() . ")";
764
+ $user = get_current_user();
765
765
  }
766
766
  my_print("getuid - returning: " . $user);
767
767
  packet_add_tlv($pkt, create_tlv(TLV_TYPE_USER_NAME, $user));
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.55'
3
+ VERSION = '2.0.56'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
@@ -1 +1,2 @@
1
- ���~��`�ʟs g^������➥ݪ?�(W����j^dC,K�T��]𷣚�ب�D���?�BBuڬ{�WcX��mཔ�x�Uy��3���9ڛ��r3��Z�[?bOE� =Sd�V+x6�l���������⢍=TI��6Lw���%4(!��H�x;"�B�����;�+>X����
1
+ I�r���Go���kk+��y������aZ2����s_-_jGBI,��������~����S^���^lij���S@_CY�X���Ɋn-�Wև��Dk��l���D[�#��&&y���X|�E�lL��^�տ�l���;��M)�$$Ǹ%�0
2
+ T�u �Ro�M� �*q��v ��j���6�rKb��y�F0wS��4���=PT�Nc(Ru�bR� hl�":u
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.55
4
+ version: 2.0.56
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-09-14 00:00:00.000000000 Z
99
+ date: 2021-09-23 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file