metasploit_payloads-mettle 1.0.9 → 1.0.10

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 92b49e4c7ad73c5e8fa455a769418519e32cbfc75cd81476a0e1172652edb45d
4
- data.tar.gz: b48b79f9b44d011e7c51bbf94165c0b98b32dda4df1a088c1c0d0d146e0849e4
3
+ metadata.gz: 95fac8c3005517c4bfa1dbbb9fe597bce6cfeb527c9c9e8bc1a3607551ed70c4
4
+ data.tar.gz: d58711dc9d1f27f4ea5c955a4723e36d9f0313d40d69ce85bcbe05c76750fdc9
5
5
  SHA512:
6
- metadata.gz: 16afd0ac19dcd817870d5af6fbaa1d2a22707cc4e91713e76a0451d717625504499792271b3ff05f8bab75a19905ab73032256b38f9fc6e8da53d3259ab2a7ee
7
- data.tar.gz: 9ba129969e6d4b022591c571596e107777c1a2f36e2b5a87c54ea2adb0f64b7541dea4b79efbae09e4503bac742ddfd0a5b60356b5355488f51731c7c1b931f5
6
+ metadata.gz: dc7b08a671f8bbe96575681eb6571c7141d123e042a07f0d27aa0875be9f562deca562c815c29c98cf3285880ae249021b77387f4ab25ab756376c09f1fb295f
7
+ data.tar.gz: 87d657130aaaa56dadac6d58d183ebcdbf7d92b0984cd72c967207fe65694a3564da33368230dcdfbc11d385f944072c0f4c56ff64a9fb16c97631cd63f30373
checksums.yaml.gz.sig CHANGED
Binary file
data.tar.gz.sig CHANGED
Binary file
Binary file
Binary file
@@ -81,12 +81,12 @@ module MetasploitPayloads
81
81
  end
82
82
  end
83
83
 
84
- def self.readable_path(gem_path, msf_path)
84
+ def self.readable_path(gem_path, msf_path=nil)
85
85
  # Try the MSF path first to see if the file exists, allowing the MSF data
86
86
  # folder to override what is in the gem. This is very helpful for
87
87
  # testing/development without having to move the binaries to the gem folder
88
88
  # each time. We only do this is MSF is installed.
89
- if ::File.readable? msf_path
89
+ if !msf_path.nil? && ::File.readable?(msf_path)
90
90
  warn_local_path(msf_path) if ::File.readable? gem_path
91
91
  msf_path
92
92
  elsif ::File.readable? gem_path
@@ -125,7 +125,7 @@ module MetasploitPayloads
125
125
  #
126
126
  def self.path(*path_parts)
127
127
  gem_path = expand(data_directory, ::File.join(path_parts))
128
- msf_path = 'thisisnotthefileyouarelookingfor'
128
+ msf_path = nil
129
129
  if metasploit_installed?
130
130
  msf_path = expand(Msf::Config.data_directory, ::File.join('mettle', path_parts))
131
131
  end
@@ -176,8 +176,20 @@ module MetasploitPayloads
176
176
  end
177
177
 
178
178
  extensions = ::Dir.entries(dir_path)
179
+ extensions.select! { |extension| !extension.end_with?('.bin') }
180
+ # The stdapi extension is baked in
181
+ extensions << 'stdapi'
179
182
  # Only return extensions!
180
- extensions - [ '.', '..', 'mettle', 'mettle.bin' ]
183
+ extensions - [ '.', '..', 'mettle' ]
184
+ end
185
+
186
+ #
187
+ # List platforms on which the specified extension is available for loading
188
+ #
189
+ def self.available_platforms(extension)
190
+ ::Dir.entries(path).select do |platform|
191
+ !(platform_path = path(platform, 'bin')).nil? && ::File.readable?(platform_path) && available_extensions(platform).include?(extension)
192
+ end
181
193
  end
182
194
 
183
195
  #
@@ -1,7 +1,7 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
3
  class Mettle
4
- VERSION = '1.0.9'
4
+ VERSION = '1.0.10'
5
5
 
6
6
  def self.version
7
7
  VERSION
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit_payloads-mettle
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.9
4
+ version: 1.0.10
5
5
  platform: ruby
6
6
  authors:
7
7
  - Adam Cammack
@@ -94,7 +94,7 @@ cert_chain:
94
94
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
95
95
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
96
96
  -----END CERTIFICATE-----
97
- date: 2021-04-08 00:00:00.000000000 Z
97
+ date: 2021-06-09 00:00:00.000000000 Z
98
98
  dependencies:
99
99
  - !ruby/object:Gem::Dependency
100
100
  name: bundler
metadata.gz.sig CHANGED
Binary file