metasploit-payloads 2.0.60 → 2.0.61

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.dll +0 -0
  7. data/data/meterpreter/elevator.x86.dll +0 -0
  8. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  9. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  11. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  12. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  13. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  15. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  16. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  17. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  19. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  20. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  21. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  23. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  24. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  25. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  27. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  28. data/data/meterpreter/ext_server_stdapi.py +2 -1
  29. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  30. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  31. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  33. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  34. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  35. data/data/meterpreter/metsrv.x64.dll +0 -0
  36. data/data/meterpreter/metsrv.x86.dll +0 -0
  37. data/data/meterpreter/screenshot.x64.dll +0 -0
  38. data/data/meterpreter/screenshot.x86.dll +0 -0
  39. data/lib/metasploit-payloads/version.rb +1 -1
  40. data.tar.gz.sig +1 -3
  41. metadata +2 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: faaa7cd5f3fc34a0558e8e4a2d3a3891971173110871362aeec9541dc09364fb
4
- data.tar.gz: 4f590294cd1f8aa71f6e83609882711b1e9accb0cd3bb0190a0991e221435b00
3
+ metadata.gz: 4188f80b9a7c91f79f4085ca10626ec6b13ab0b3b7e65c4573791e4a66382d27
4
+ data.tar.gz: 7ad4dd897102be313e08336e50cfd74396c52f8c2e3b925ab7aa3da2b7664929
5
5
  SHA512:
6
- metadata.gz: 8c38ff1bed4972f8196fd7e3146ca59caffd7237d285c7273ab1ba045465250f0cf3dc04ccfde69257f0d2b6b40a0f723abab6323a93763153a29c725089bc6e
7
- data.tar.gz: 2d388e3525a6110d12d5bc6cb791ee6a663c018836200485824d88b5cf21f0a4f39456c1483ae32b038e283cb39cd3348d6aa9103e8422812a0942c95277e9b6
6
+ metadata.gz: a946d5504af1f234e03442151f52293cbd497788dcfbc26486c2ba2f107701cf122f80e9f075485c1426119b4f6d567de36bdf540d300f6f049bd9d27af67f4a
7
+ data.tar.gz: 41424d3e1c558e3b8c8036c226074e89185f3c45864db86dac4e98e1aa9d0bc13a0222830221823878f0759e0e7d3899f7aa11860568ae172a4da49e6378517d
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -662,6 +662,7 @@ PROCESS_EXECUTE_FLAG_CHANNELIZED = (1 << 1)
662
662
  PROCESS_EXECUTE_FLAG_SUSPENDED = (1 << 2)
663
663
  PROCESS_EXECUTE_FLAG_USE_THREAD_TOKEN = (1 << 3)
664
664
  PROCESS_EXECUTE_FLAG_SUBSHELL = (1 << 6)
665
+ PROCESS_EXECUTE_FLAG_PTY = (1 << 7)
665
666
 
666
667
  PROCESS_ARCH_UNKNOWN = 0
667
668
  PROCESS_ARCH_X86 = 1
@@ -1166,7 +1167,7 @@ def stdapi_sys_process_execute(request, response):
1166
1167
  args.extend(shlex.split(raw_args))
1167
1168
 
1168
1169
  if (flags & PROCESS_EXECUTE_FLAG_CHANNELIZED):
1169
- if has_pty:
1170
+ if has_pty and (flags & PROCESS_EXECUTE_FLAG_PTY):
1170
1171
  master, slave = pty.openpty()
1171
1172
  if has_termios:
1172
1173
  try:
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.60'
3
+ VERSION = '2.0.61'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
@@ -1,3 +1 @@
1
- Iaǵ��ְs���{s�O�:�?�2��RY_�/�1^����������E3��*�m[*I^&Ԝ�δ�Ҿ�H��i
2
- �u� ��E��͠��, ?5S��G�$�i/@i��L�~NW�LF��qi� �m&T���9�C6�1�*a�WR܍²G�A�>{�$!#�(���'���7[�X
3
- �ӌIz=�M|��O��7b<�j�Z�!��>]1�9c�%�p�I��7k�d�MD��S�۩��L�o#�9��/
1
+ &����2�kG-C�? �-6(>�]?���0t����G�{�#ZP_�޻�Į�mv ��66w�U�l����pl������eMޜ�kx���JT���p=#gk|���q����B�x~��K}�Y^�!�G�z�5(>a2L{\�5ScH��.?O>�x��!��?�e�+�pg��njV�X]�Y�f�G��� xNo��$g@�#�ɞ�5�5�S�R�gRgТP�����.�e�77 \,�M�RCG�j���z�
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.60
4
+ version: 2.0.61
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2021-10-28 00:00:00.000000000 Z
99
+ date: 2021-11-29 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
Binary file