metasploit_payloads-mettle 1.0.25 → 1.0.27

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 550acced8eab6d285882692ccbd72db2742362c38b7da163750074f6c060d935
4
- data.tar.gz: e3d3725e3a65ecd1abbad5664fccceb0a5a5e66f92274419aace7fde95607997
3
+ metadata.gz: 6641808a947540b134590ec257c801a1d11673dbb90a94664ccae3e26a93cf75
4
+ data.tar.gz: 9793e9967d5ab6de020a55a6ab7014e4420ae6aca6eb1e0e941dc87e699dfb9a
5
5
  SHA512:
6
- metadata.gz: 7f679b6f47c6ce92d1857d48aba53a3818423f3dfe91dfcc8b733f473a75767a5f8dcf430f28a28737d851cd40152efdfd55c20de7bfc215209d8f2fc0fe7398
7
- data.tar.gz: a7d32b2d3bf404e1814aa36ab1140f1255f746f885a752a032bb4badd6f1e069d2e5f42875db0b467b188001e0e6964764ecded35babf28ff3f76b74a87c9c90
6
+ metadata.gz: 784daea8d6a47794b77bd643257c2688d4b5442aff4dee9493f154f3a0e23df6aeb52b9f0d453226f6260d4172d37aea9c6f239f4b4573cf6f77e2084180d85d
7
+ data.tar.gz: f5880aab986a799d0d11d38afcdfe8b754ba13d348c3b4a3f0924fe1f79270697bbfa3a3643f6eefb32ca52c526f52106d9c61c289e23e77ee2dbba78e5b6c51
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
@@ -0,0 +1,11 @@
1
+ # frozen_string_literal: true
2
+
3
+ module MetasploitPayloads
4
+ class Mettle
5
+ class Error < StandardError
6
+ end
7
+
8
+ class NotFoundError < Error
9
+ end
10
+ end
11
+ end
@@ -1,7 +1,7 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
3
  class Mettle
4
- VERSION = '1.0.25'
4
+ VERSION = '1.0.27'
5
5
 
6
6
  def self.version
7
7
  VERSION
@@ -4,6 +4,10 @@ unless defined? MetasploitPayloads::Mettle::VERSION
4
4
  require 'metasploit_payloads/mettle/version'
5
5
  end
6
6
 
7
+ unless defined? MetasploitPayloads::Mettle::Error
8
+ require 'metasploit_payloads/mettle/error'
9
+ end
10
+
7
11
  #
8
12
  # This module dispenses Mettle payload binary files
9
13
  #
@@ -46,7 +50,7 @@ module MetasploitPayloads
46
50
  cmd_line << "-#{short_opt(opt)} \"#{val}\" "
47
51
  end
48
52
  if cmd_line.length > CMDLINE_MAX
49
- fail RuntimeError, 'mettle argument list too big', caller
53
+ raise Mettle::Error, 'mettle argument list too big', caller
50
54
  end
51
55
 
52
56
  cmd_line + "\x00" * (CMDLINE_MAX - cmd_line.length)
@@ -69,7 +73,7 @@ module MetasploitPayloads
69
73
  when :session_guid
70
74
  'G'
71
75
  else
72
- fail RuntimeError, "unknown mettle option #{opt}", caller
76
+ raise Mettle::Error, "unknown mettle option #{opt}", caller
73
77
  end
74
78
  end
75
79
 
@@ -109,12 +113,12 @@ module MetasploitPayloads
109
113
  when :exec
110
114
  "#{filename}"
111
115
  else
112
- fail RuntimeError, "unknown format #{format} for #{filename}", caller
116
+ raise Mettle::NotFoundError, "unknown format #{format} for #{filename}", caller
113
117
  end
114
118
  file_path = path("#{triple}", 'bin', file)
115
119
  if file_path.nil?
116
120
  full_path = ::File.join([triple, file])
117
- fail RuntimeError, "#{full_path} not found", caller
121
+ raise Mettle::NotFoundError, "#{full_path} not found", caller
118
122
  end
119
123
 
120
124
  ::File.binread(file_path)
@@ -172,7 +176,7 @@ module MetasploitPayloads
172
176
  dir_path = path("#{platform}", 'bin')
173
177
  if dir_path.nil?
174
178
  full_path = ::File.join([platform, 'bin'])
175
- fail RuntimeError, "#{full_path} not found", caller
179
+ raise Mettle::NotFoundError, "#{full_path} not found", caller
176
180
  end
177
181
 
178
182
  extensions = ::Dir.entries(dir_path)
@@ -200,7 +204,7 @@ module MetasploitPayloads
200
204
  format = :process_image
201
205
  else
202
206
  format = :exec
203
- name = [name,suffix].join('.') unless suffix.blank?
207
+ name = [name,suffix].join('.') unless suffix&.strip&.empty?
204
208
  end
205
209
  self.read(platform, format, name)
206
210
  end
data.tar.gz.sig CHANGED
@@ -1,2 +1,3 @@
1
- �8�������?$-5[���m�<N�(�n�O|W�b\���~g���[kb�@jm��v1�X���a��_i���
2
- *E<�4�j�I��A_�����Bdl[бPѶ��/L���>��JopG�;"�V�C ]'��#dF���M0���xF�&�6XPB���ke��^w@w��ycy՚�\�׻JV �P["J�`��â�%Gi�ܣ-t���i�S��
1
+ S������J_t
2
+ �<�}|�xj�KoR?L���d��Ӭy��m�\m���Pu&z!�� Đ��z��-=Wd�%bФ0h*���j�r�c�AL��C���|���B��T��B�h 7�0����mL�Q_LL�g�Ҫ��I89�P" Di&,�3}Zr���zfL'a�SoS^�k�$s��$en��j����1.);��z
3
+ ��[�3"���I>)��#�!��l�\���/���2
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit_payloads-mettle
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.25
4
+ version: 1.0.27
5
5
  platform: ruby
6
6
  authors:
7
7
  - Adam Cammack
@@ -94,7 +94,7 @@ cert_chain:
94
94
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
95
95
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
96
96
  -----END CERTIFICATE-----
97
- date: 2023-03-08 00:00:00.000000000 Z
97
+ date: 2023-10-04 00:00:00.000000000 Z
98
98
  dependencies:
99
99
  - !ruby/object:Gem::Dependency
100
100
  name: bundler
@@ -209,6 +209,7 @@ files:
209
209
  - build/x86_64-linux-musl/bin/sniffer.bin
210
210
  - build/x86_64-w64-mingw32/bin/mettle.exe
211
211
  - lib/metasploit_payloads/mettle.rb
212
+ - lib/metasploit_payloads/mettle/error.rb
212
213
  - lib/metasploit_payloads/mettle/version.rb
213
214
  homepage: http://www.metasploit.com
214
215
  licenses:
metadata.gz.sig CHANGED
Binary file