metasploit_payloads-mettle 1.0.24 → 1.0.26

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. checksums.yaml.gz.sig +0 -0
  3. data/build/aarch64-apple-darwin/bin/mettle +0 -0
  4. data/build/aarch64-iphone-darwin/bin/mettle +0 -0
  5. data/build/aarch64-iphone-darwin/bin/mettle.dylib +0 -0
  6. data/build/aarch64-iphone-darwin/bin/mettle.sha1.dylib +0 -0
  7. data/build/aarch64-linux-musl/bin/mettle +0 -0
  8. data/build/aarch64-linux-musl/bin/mettle.bin +0 -0
  9. data/build/arm-iphone-darwin/bin/mettle +0 -0
  10. data/build/arm-iphone-darwin/bin/mettle.dylib +0 -0
  11. data/build/arm-iphone-darwin/bin/mettle.sha1.dylib +0 -0
  12. data/build/armv5b-linux-musleabi/bin/mettle +0 -0
  13. data/build/armv5b-linux-musleabi/bin/mettle.bin +0 -0
  14. data/build/armv5l-linux-musleabi/bin/mettle +0 -0
  15. data/build/armv5l-linux-musleabi/bin/mettle.bin +0 -0
  16. data/build/i486-linux-musl/bin/mettle +0 -0
  17. data/build/i486-linux-musl/bin/mettle.bin +0 -0
  18. data/build/i686-w64-mingw32/bin/mettle.exe +0 -0
  19. data/build/mips-linux-muslsf/bin/mettle +0 -0
  20. data/build/mips-linux-muslsf/bin/mettle.bin +0 -0
  21. data/build/mips64-linux-muslsf/bin/mettle +0 -0
  22. data/build/mips64-linux-muslsf/bin/mettle.bin +0 -0
  23. data/build/mipsel-linux-muslsf/bin/mettle +0 -0
  24. data/build/mipsel-linux-muslsf/bin/mettle.bin +0 -0
  25. data/build/powerpc-e500v2-linux-musl/bin/mettle +0 -0
  26. data/build/powerpc-e500v2-linux-musl/bin/mettle.bin +0 -0
  27. data/build/powerpc-linux-muslsf/bin/mettle +0 -0
  28. data/build/powerpc-linux-muslsf/bin/mettle.bin +0 -0
  29. data/build/powerpc64le-linux-musl/bin/mettle +0 -0
  30. data/build/powerpc64le-linux-musl/bin/mettle.bin +0 -0
  31. data/build/s390x-linux-musl/bin/mettle +0 -0
  32. data/build/s390x-linux-musl/bin/mettle.bin +0 -0
  33. data/build/x86_64-apple-darwin/bin/mettle +0 -0
  34. data/build/x86_64-linux-musl/bin/mettle +0 -0
  35. data/build/x86_64-linux-musl/bin/mettle.bin +0 -0
  36. data/build/x86_64-w64-mingw32/bin/mettle.exe +0 -0
  37. data/lib/metasploit_payloads/mettle/error.rb +11 -0
  38. data/lib/metasploit_payloads/mettle/version.rb +1 -1
  39. data/lib/metasploit_payloads/mettle.rb +10 -6
  40. data.tar.gz.sig +0 -0
  41. metadata +3 -2
  42. metadata.gz.sig +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 884ef1471029d0bdc747e1749175291934e99bc0486f268507436958d9bbee61
4
- data.tar.gz: 80346672374227d690ecae85368b9f3456f8224c4f50b3444d92087c9ab04697
3
+ metadata.gz: ef07cdf4a810417d24d4e2742d707b0d0ddf51815c8de1cf0f00e6ccc76117a4
4
+ data.tar.gz: 282a0090e10990321001020c44208207222691a0968e0dd83d1702aa05333dee
5
5
  SHA512:
6
- metadata.gz: a3b38d4b613833aa82aead587696524732bc41ff7b456143b83d9ae8e86cb1dba661284b2feb0419454e490f3ca008691fd86ef608629b63c0ca7e772efe2f02
7
- data.tar.gz: '057066916e68606cb4eb70599a0046e6aeb0f4685613527eee5e06c0f17cfdb4045a63c0a2965790f76632ff5be9094597753fa42c1a361657e328d4010be0ca'
6
+ metadata.gz: 48444df855f91ef2776426b7bef89063a367243526f84689a6e142f31d1d1aba4d08b30baf1d3cc4c92bcae1123a24fd72c181f5ee38417c907380e11aaa40c4
7
+ data.tar.gz: 5a1b307e6efc8a478a446672c27662ef8565a495eee4c509afb06fd1b17d6f115fc208a1d342f2baebd387c328e54304d83df2361c604a62839caa005a5d5261
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
Binary file
@@ -0,0 +1,11 @@
1
+ # frozen_string_literal: true
2
+
3
+ module MetasploitPayloads
4
+ class Mettle
5
+ class Error < StandardError
6
+ end
7
+
8
+ class NotFoundError < Error
9
+ end
10
+ end
11
+ end
@@ -1,7 +1,7 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
3
  class Mettle
4
- VERSION = '1.0.24'
4
+ VERSION = '1.0.26'
5
5
 
6
6
  def self.version
7
7
  VERSION
@@ -4,6 +4,10 @@ unless defined? MetasploitPayloads::Mettle::VERSION
4
4
  require 'metasploit_payloads/mettle/version'
5
5
  end
6
6
 
7
+ unless defined? MetasploitPayloads::Mettle::Error
8
+ require 'metasploit_payloads/mettle/error'
9
+ end
10
+
7
11
  #
8
12
  # This module dispenses Mettle payload binary files
9
13
  #
@@ -46,7 +50,7 @@ module MetasploitPayloads
46
50
  cmd_line << "-#{short_opt(opt)} \"#{val}\" "
47
51
  end
48
52
  if cmd_line.length > CMDLINE_MAX
49
- fail RuntimeError, 'mettle argument list too big', caller
53
+ raise Mettle::Error, 'mettle argument list too big', caller
50
54
  end
51
55
 
52
56
  cmd_line + "\x00" * (CMDLINE_MAX - cmd_line.length)
@@ -69,7 +73,7 @@ module MetasploitPayloads
69
73
  when :session_guid
70
74
  'G'
71
75
  else
72
- fail RuntimeError, "unknown mettle option #{opt}", caller
76
+ raise Mettle::Error, "unknown mettle option #{opt}", caller
73
77
  end
74
78
  end
75
79
 
@@ -109,12 +113,12 @@ module MetasploitPayloads
109
113
  when :exec
110
114
  "#{filename}"
111
115
  else
112
- fail RuntimeError, "unknown format #{format} for #{filename}", caller
116
+ raise Mettle::NotFoundError, "unknown format #{format} for #{filename}", caller
113
117
  end
114
118
  file_path = path("#{triple}", 'bin', file)
115
119
  if file_path.nil?
116
120
  full_path = ::File.join([triple, file])
117
- fail RuntimeError, "#{full_path} not found", caller
121
+ raise Mettle::NotFoundError, "#{full_path} not found", caller
118
122
  end
119
123
 
120
124
  ::File.binread(file_path)
@@ -172,7 +176,7 @@ module MetasploitPayloads
172
176
  dir_path = path("#{platform}", 'bin')
173
177
  if dir_path.nil?
174
178
  full_path = ::File.join([platform, 'bin'])
175
- fail RuntimeError, "#{full_path} not found", caller
179
+ raise Mettle::NotFoundError, "#{full_path} not found", caller
176
180
  end
177
181
 
178
182
  extensions = ::Dir.entries(dir_path)
@@ -200,7 +204,7 @@ module MetasploitPayloads
200
204
  format = :process_image
201
205
  else
202
206
  format = :exec
203
- name = [name,suffix].join('.') unless suffix.blank?
207
+ name = [name,suffix].join('.') unless suffix&.strip&.empty?
204
208
  end
205
209
  self.read(platform, format, name)
206
210
  end
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit_payloads-mettle
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.24
4
+ version: 1.0.26
5
5
  platform: ruby
6
6
  authors:
7
7
  - Adam Cammack
@@ -94,7 +94,7 @@ cert_chain:
94
94
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
95
95
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
96
96
  -----END CERTIFICATE-----
97
- date: 2023-03-06 00:00:00.000000000 Z
97
+ date: 2023-07-27 00:00:00.000000000 Z
98
98
  dependencies:
99
99
  - !ruby/object:Gem::Dependency
100
100
  name: bundler
@@ -209,6 +209,7 @@ files:
209
209
  - build/x86_64-linux-musl/bin/sniffer.bin
210
210
  - build/x86_64-w64-mingw32/bin/mettle.exe
211
211
  - lib/metasploit_payloads/mettle.rb
212
+ - lib/metasploit_payloads/mettle/error.rb
212
213
  - lib/metasploit_payloads/mettle/version.rb
213
214
  homepage: http://www.metasploit.com
214
215
  licenses:
metadata.gz.sig CHANGED
Binary file