metasploit-payloads 2.0.98 → 2.0.99

Sign up to get free protection for your applications and to get access to all the features.
Files changed (76) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/data/android/meterpreter.jar +0 -0
  4. data/data/android/metstage.jar +0 -0
  5. data/data/android/shell.jar +0 -0
  6. data/data/meterpreter/elevator.x64.debug.dll +0 -0
  7. data/data/meterpreter/elevator.x64.dll +0 -0
  8. data/data/meterpreter/elevator.x86.debug.dll +0 -0
  9. data/data/meterpreter/elevator.x86.dll +0 -0
  10. data/data/meterpreter/ext_server_bofloader.x64.debug.dll +0 -0
  11. data/data/meterpreter/ext_server_bofloader.x64.dll +0 -0
  12. data/data/meterpreter/ext_server_bofloader.x86.debug.dll +0 -0
  13. data/data/meterpreter/ext_server_bofloader.x86.dll +0 -0
  14. data/data/meterpreter/ext_server_espia.x64.debug.dll +0 -0
  15. data/data/meterpreter/ext_server_espia.x64.dll +0 -0
  16. data/data/meterpreter/ext_server_espia.x86.debug.dll +0 -0
  17. data/data/meterpreter/ext_server_espia.x86.dll +0 -0
  18. data/data/meterpreter/ext_server_extapi.x64.debug.dll +0 -0
  19. data/data/meterpreter/ext_server_extapi.x64.dll +0 -0
  20. data/data/meterpreter/ext_server_extapi.x86.debug.dll +0 -0
  21. data/data/meterpreter/ext_server_extapi.x86.dll +0 -0
  22. data/data/meterpreter/ext_server_incognito.x64.debug.dll +0 -0
  23. data/data/meterpreter/ext_server_incognito.x64.dll +0 -0
  24. data/data/meterpreter/ext_server_incognito.x86.debug.dll +0 -0
  25. data/data/meterpreter/ext_server_incognito.x86.dll +0 -0
  26. data/data/meterpreter/ext_server_kiwi.x64.debug.dll +0 -0
  27. data/data/meterpreter/ext_server_kiwi.x64.dll +0 -0
  28. data/data/meterpreter/ext_server_kiwi.x86.debug.dll +0 -0
  29. data/data/meterpreter/ext_server_kiwi.x86.dll +0 -0
  30. data/data/meterpreter/ext_server_lanattacks.x64.debug.dll +0 -0
  31. data/data/meterpreter/ext_server_lanattacks.x64.dll +0 -0
  32. data/data/meterpreter/ext_server_lanattacks.x86.debug.dll +0 -0
  33. data/data/meterpreter/ext_server_lanattacks.x86.dll +0 -0
  34. data/data/meterpreter/ext_server_peinjector.x64.debug.dll +0 -0
  35. data/data/meterpreter/ext_server_peinjector.x64.dll +0 -0
  36. data/data/meterpreter/ext_server_peinjector.x86.debug.dll +0 -0
  37. data/data/meterpreter/ext_server_peinjector.x86.dll +0 -0
  38. data/data/meterpreter/ext_server_powershell.x64.debug.dll +0 -0
  39. data/data/meterpreter/ext_server_powershell.x64.dll +0 -0
  40. data/data/meterpreter/ext_server_powershell.x86.debug.dll +0 -0
  41. data/data/meterpreter/ext_server_powershell.x86.dll +0 -0
  42. data/data/meterpreter/ext_server_priv.x64.debug.dll +0 -0
  43. data/data/meterpreter/ext_server_priv.x64.dll +0 -0
  44. data/data/meterpreter/ext_server_priv.x86.debug.dll +0 -0
  45. data/data/meterpreter/ext_server_priv.x86.dll +0 -0
  46. data/data/meterpreter/ext_server_python.x64.debug.dll +0 -0
  47. data/data/meterpreter/ext_server_python.x64.dll +0 -0
  48. data/data/meterpreter/ext_server_python.x86.debug.dll +0 -0
  49. data/data/meterpreter/ext_server_python.x86.dll +0 -0
  50. data/data/meterpreter/ext_server_sniffer.x64.dll +0 -0
  51. data/data/meterpreter/ext_server_sniffer.x86.dll +0 -0
  52. data/data/meterpreter/ext_server_stdapi.py +12 -15
  53. data/data/meterpreter/ext_server_stdapi.x64.debug.dll +0 -0
  54. data/data/meterpreter/ext_server_stdapi.x64.dll +0 -0
  55. data/data/meterpreter/ext_server_stdapi.x86.debug.dll +0 -0
  56. data/data/meterpreter/ext_server_stdapi.x86.dll +0 -0
  57. data/data/meterpreter/ext_server_unhook.x64.debug.dll +0 -0
  58. data/data/meterpreter/ext_server_unhook.x64.dll +0 -0
  59. data/data/meterpreter/ext_server_unhook.x86.debug.dll +0 -0
  60. data/data/meterpreter/ext_server_unhook.x86.dll +0 -0
  61. data/data/meterpreter/ext_server_winpmem.x64.debug.dll +0 -0
  62. data/data/meterpreter/ext_server_winpmem.x64.dll +0 -0
  63. data/data/meterpreter/ext_server_winpmem.x86.debug.dll +0 -0
  64. data/data/meterpreter/ext_server_winpmem.x86.dll +0 -0
  65. data/data/meterpreter/metsrv.x64.debug.dll +0 -0
  66. data/data/meterpreter/metsrv.x64.dll +0 -0
  67. data/data/meterpreter/metsrv.x86.debug.dll +0 -0
  68. data/data/meterpreter/metsrv.x86.dll +0 -0
  69. data/data/meterpreter/screenshot.x64.debug.dll +0 -0
  70. data/data/meterpreter/screenshot.x64.dll +0 -0
  71. data/data/meterpreter/screenshot.x86.debug.dll +0 -0
  72. data/data/meterpreter/screenshot.x86.dll +0 -0
  73. data/lib/metasploit-payloads/version.rb +1 -1
  74. data.tar.gz.sig +0 -0
  75. metadata +2 -2
  76. metadata.gz.sig +2 -1
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e258521427e2bc71990e2e646fbf617fc70569fc6a1ca41d886eea9a6a5dd9c2
4
- data.tar.gz: 77d18985a73b5f3e87f77cfb6f15d346b1316e03ea05bde053e23c828aa432f4
3
+ metadata.gz: 9cfe995bf9b1af59ff233551ed954d4e53efd2e6a86943f95803512ee3024727
4
+ data.tar.gz: 15ec398c67dbf9bca1ee55b316173fc95943260ffedaa331726dba2836dcb02e
5
5
  SHA512:
6
- metadata.gz: cee1509b9a8f0780c1d5d02d87f6412a463275d6a72743767c4229115448a86a63e25cddb529cd6e2ee4ea2aa44ecfd7f3b331de74b3b085c35961b45e8fb436
7
- data.tar.gz: bc60aa01a5781c8a22d78be70fa02665456552fe4fb44c867655ed3e88834f790c3b55c4176d4c1e036bec0a0425b701842f1ab3c3753516f04e0e56aa0970c4
6
+ metadata.gz: b7b83890bdd1a025895ebb590464a0a1b8d36e29dde9547646d6bc5baa36d7baca63ada990d07e551443118759ef20fc32a4c93575de9eca3f10a9ad6b757dfb
7
+ data.tar.gz: cd99d8855d51f2d51b42d8b5d5fd2e43540b9442f1a0297251e75fad98ea21fee6312ce525ca7e359d360cbb231224c8c305cfaac748a0feecff13a205ff367d
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -21,9 +21,6 @@ except ImportError:
21
21
  has_ctypes = False
22
22
  has_windll = False
23
23
 
24
- if has_windll:
25
- from ctypes import wintypes
26
-
27
24
  try:
28
25
  import pty
29
26
  has_pty = True
@@ -362,8 +359,8 @@ if has_ctypes:
362
359
 
363
360
  class LUID(ctypes.Structure):
364
361
  _fields_ = [
365
- ('LowPart', wintypes.DWORD),
366
- ('HighPart', wintypes.LONG)
362
+ ('LowPart', ctypes.c_uint32),
363
+ ('HighPart', ctypes.c_long)
367
364
  ]
368
365
 
369
366
  def __eq__(self, __o):
@@ -375,12 +372,12 @@ if has_ctypes:
375
372
  class LUID_AND_ATTRIBUTES(ctypes.Structure):
376
373
  _fields_ = [
377
374
  ('Luid', LUID),
378
- ('Attributes', wintypes.DWORD)
375
+ ('Attributes', ctypes.c_uint32)
379
376
  ]
380
377
 
381
378
  class TOKEN_PRIVILEGES(ctypes.Structure):
382
379
  _fields_ = [
383
- ('PrivilegeCount', wintypes.DWORD),
380
+ ('PrivilegeCount', ctypes.c_uint32),
384
381
  ('Privileges', LUID_AND_ATTRIBUTES * 0),
385
382
  ]
386
383
  def get_array(self):
@@ -1037,21 +1034,21 @@ def enable_privilege(name, enable=True):
1037
1034
  SE_PRIVILEGE_ENABLED = 0x00000002
1038
1035
 
1039
1036
  GetCurrentProcess = ctypes.windll.kernel32.GetCurrentProcess
1040
- GetCurrentProcess.restype = wintypes.HANDLE
1037
+ GetCurrentProcess.restype = ctypes.c_void_p
1041
1038
 
1042
1039
  OpenProcessToken = ctypes.windll.advapi32.OpenProcessToken
1043
- OpenProcessToken.argtypes = [wintypes.HANDLE, wintypes.DWORD, ctypes.POINTER(wintypes.HANDLE)]
1044
- OpenProcessToken.restype = wintypes.BOOL
1040
+ OpenProcessToken.argtypes = [ctypes.c_void_p, ctypes.c_uint32, ctypes.POINTER(ctypes.c_void_p)]
1041
+ OpenProcessToken.restype = ctypes.c_bool
1045
1042
 
1046
1043
  LookupPrivilegeValue = ctypes.windll.advapi32.LookupPrivilegeValueW
1047
- LookupPrivilegeValue.argtypes = [wintypes.LPCWSTR, wintypes.LPCWSTR, ctypes.POINTER(LUID)]
1048
- LookupPrivilegeValue.restype = wintypes.BOOL
1044
+ LookupPrivilegeValue.argtypes = [ctypes.c_wchar_p, ctypes.c_wchar_p, ctypes.POINTER(LUID)]
1045
+ LookupPrivilegeValue.restype = ctypes.c_bool
1049
1046
 
1050
1047
  AdjustTokenPrivileges = ctypes.windll.advapi32.AdjustTokenPrivileges
1051
- AdjustTokenPrivileges.argtypes = [wintypes.HANDLE, wintypes.BOOL, PTOKEN_PRIVILEGES, wintypes.DWORD, PTOKEN_PRIVILEGES, ctypes.POINTER(wintypes.DWORD)]
1052
- AdjustTokenPrivileges.restype = wintypes.BOOL
1048
+ AdjustTokenPrivileges.argtypes = [ctypes.c_void_p, ctypes.c_bool, PTOKEN_PRIVILEGES, ctypes.c_uint32, PTOKEN_PRIVILEGES, ctypes.POINTER(ctypes.c_uint32)]
1049
+ AdjustTokenPrivileges.restype = ctypes.c_bool
1053
1050
 
1054
- token = wintypes.HANDLE()
1051
+ token = ctypes.c_void_p()
1055
1052
  success = OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, token)
1056
1053
  if not success:
1057
1054
  return False
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -1,6 +1,6 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
- VERSION = '2.0.98'
3
+ VERSION = '2.0.99'
4
4
 
5
5
  def self.version
6
6
  VERSION
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit-payloads
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.0.98
4
+ version: 2.0.99
5
5
  platform: ruby
6
6
  authors:
7
7
  - OJ Reeves
@@ -96,7 +96,7 @@ cert_chain:
96
96
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
97
97
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
98
98
  -----END CERTIFICATE-----
99
- date: 2022-11-03 00:00:00.000000000 Z
99
+ date: 2022-11-07 00:00:00.000000000 Z
100
100
  dependencies:
101
101
  - !ruby/object:Gem::Dependency
102
102
  name: rake
metadata.gz.sig CHANGED
@@ -1 +1,2 @@
1
- ��SIg}%��~҂�9[8~V�i��ى�&b��B_`Q)(W��&��Q���ը��;�0i��d䗿ΠL�Y�\����C%�J��J6<�d�'�Trh��5�)��<�L�|���
1
+ �( �!�3o��k1�I&6iorPGO��XK�Y��U9|
2
+