metasploit_payloads-mettle 1.0.9 → 1.0.10
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data.tar.gz.sig +0 -0
- data/build/i686-w64-mingw32/bin/mettle.exe +0 -0
- data/build/x86_64-apple-darwin/bin/mettle +0 -0
- data/build/x86_64-w64-mingw32/bin/mettle.exe +0 -0
- data/lib/metasploit_payloads/mettle.rb +16 -4
- data/lib/metasploit_payloads/mettle/version.rb +1 -1
- metadata +2 -2
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 95fac8c3005517c4bfa1dbbb9fe597bce6cfeb527c9c9e8bc1a3607551ed70c4
|
4
|
+
data.tar.gz: d58711dc9d1f27f4ea5c955a4723e36d9f0313d40d69ce85bcbe05c76750fdc9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: dc7b08a671f8bbe96575681eb6571c7141d123e042a07f0d27aa0875be9f562deca562c815c29c98cf3285880ae249021b77387f4ab25ab756376c09f1fb295f
|
7
|
+
data.tar.gz: 87d657130aaaa56dadac6d58d183ebcdbf7d92b0984cd72c967207fe65694a3564da33368230dcdfbc11d385f944072c0f4c56ff64a9fb16c97631cd63f30373
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
data.tar.gz.sig
CHANGED
Binary file
|
Binary file
|
Binary file
|
Binary file
|
@@ -81,12 +81,12 @@ module MetasploitPayloads
|
|
81
81
|
end
|
82
82
|
end
|
83
83
|
|
84
|
-
def self.readable_path(gem_path, msf_path)
|
84
|
+
def self.readable_path(gem_path, msf_path=nil)
|
85
85
|
# Try the MSF path first to see if the file exists, allowing the MSF data
|
86
86
|
# folder to override what is in the gem. This is very helpful for
|
87
87
|
# testing/development without having to move the binaries to the gem folder
|
88
88
|
# each time. We only do this is MSF is installed.
|
89
|
-
if ::File.readable?
|
89
|
+
if !msf_path.nil? && ::File.readable?(msf_path)
|
90
90
|
warn_local_path(msf_path) if ::File.readable? gem_path
|
91
91
|
msf_path
|
92
92
|
elsif ::File.readable? gem_path
|
@@ -125,7 +125,7 @@ module MetasploitPayloads
|
|
125
125
|
#
|
126
126
|
def self.path(*path_parts)
|
127
127
|
gem_path = expand(data_directory, ::File.join(path_parts))
|
128
|
-
msf_path =
|
128
|
+
msf_path = nil
|
129
129
|
if metasploit_installed?
|
130
130
|
msf_path = expand(Msf::Config.data_directory, ::File.join('mettle', path_parts))
|
131
131
|
end
|
@@ -176,8 +176,20 @@ module MetasploitPayloads
|
|
176
176
|
end
|
177
177
|
|
178
178
|
extensions = ::Dir.entries(dir_path)
|
179
|
+
extensions.select! { |extension| !extension.end_with?('.bin') }
|
180
|
+
# The stdapi extension is baked in
|
181
|
+
extensions << 'stdapi'
|
179
182
|
# Only return extensions!
|
180
|
-
extensions - [ '.', '..', 'mettle'
|
183
|
+
extensions - [ '.', '..', 'mettle' ]
|
184
|
+
end
|
185
|
+
|
186
|
+
#
|
187
|
+
# List platforms on which the specified extension is available for loading
|
188
|
+
#
|
189
|
+
def self.available_platforms(extension)
|
190
|
+
::Dir.entries(path).select do |platform|
|
191
|
+
!(platform_path = path(platform, 'bin')).nil? && ::File.readable?(platform_path) && available_extensions(platform).include?(extension)
|
192
|
+
end
|
181
193
|
end
|
182
194
|
|
183
195
|
#
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: metasploit_payloads-mettle
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.
|
4
|
+
version: 1.0.10
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Adam Cammack
|
@@ -94,7 +94,7 @@ cert_chain:
|
|
94
94
|
EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
|
95
95
|
9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
|
96
96
|
-----END CERTIFICATE-----
|
97
|
-
date: 2021-
|
97
|
+
date: 2021-06-09 00:00:00.000000000 Z
|
98
98
|
dependencies:
|
99
99
|
- !ruby/object:Gem::Dependency
|
100
100
|
name: bundler
|
metadata.gz.sig
CHANGED
Binary file
|