metasploit_payloads-mettle 1.0.25 → 1.0.26

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 550acced8eab6d285882692ccbd72db2742362c38b7da163750074f6c060d935
4
- data.tar.gz: e3d3725e3a65ecd1abbad5664fccceb0a5a5e66f92274419aace7fde95607997
3
+ metadata.gz: ef07cdf4a810417d24d4e2742d707b0d0ddf51815c8de1cf0f00e6ccc76117a4
4
+ data.tar.gz: 282a0090e10990321001020c44208207222691a0968e0dd83d1702aa05333dee
5
5
  SHA512:
6
- metadata.gz: 7f679b6f47c6ce92d1857d48aba53a3818423f3dfe91dfcc8b733f473a75767a5f8dcf430f28a28737d851cd40152efdfd55c20de7bfc215209d8f2fc0fe7398
7
- data.tar.gz: a7d32b2d3bf404e1814aa36ab1140f1255f746f885a752a032bb4badd6f1e069d2e5f42875db0b467b188001e0e6964764ecded35babf28ff3f76b74a87c9c90
6
+ metadata.gz: 48444df855f91ef2776426b7bef89063a367243526f84689a6e142f31d1d1aba4d08b30baf1d3cc4c92bcae1123a24fd72c181f5ee38417c907380e11aaa40c4
7
+ data.tar.gz: 5a1b307e6efc8a478a446672c27662ef8565a495eee4c509afb06fd1b17d6f115fc208a1d342f2baebd387c328e54304d83df2361c604a62839caa005a5d5261
checksums.yaml.gz.sig CHANGED
Binary file
Binary file
@@ -0,0 +1,11 @@
1
+ # frozen_string_literal: true
2
+
3
+ module MetasploitPayloads
4
+ class Mettle
5
+ class Error < StandardError
6
+ end
7
+
8
+ class NotFoundError < Error
9
+ end
10
+ end
11
+ end
@@ -1,7 +1,7 @@
1
1
  # -*- coding:binary -*-
2
2
  module MetasploitPayloads
3
3
  class Mettle
4
- VERSION = '1.0.25'
4
+ VERSION = '1.0.26'
5
5
 
6
6
  def self.version
7
7
  VERSION
@@ -4,6 +4,10 @@ unless defined? MetasploitPayloads::Mettle::VERSION
4
4
  require 'metasploit_payloads/mettle/version'
5
5
  end
6
6
 
7
+ unless defined? MetasploitPayloads::Mettle::Error
8
+ require 'metasploit_payloads/mettle/error'
9
+ end
10
+
7
11
  #
8
12
  # This module dispenses Mettle payload binary files
9
13
  #
@@ -46,7 +50,7 @@ module MetasploitPayloads
46
50
  cmd_line << "-#{short_opt(opt)} \"#{val}\" "
47
51
  end
48
52
  if cmd_line.length > CMDLINE_MAX
49
- fail RuntimeError, 'mettle argument list too big', caller
53
+ raise Mettle::Error, 'mettle argument list too big', caller
50
54
  end
51
55
 
52
56
  cmd_line + "\x00" * (CMDLINE_MAX - cmd_line.length)
@@ -69,7 +73,7 @@ module MetasploitPayloads
69
73
  when :session_guid
70
74
  'G'
71
75
  else
72
- fail RuntimeError, "unknown mettle option #{opt}", caller
76
+ raise Mettle::Error, "unknown mettle option #{opt}", caller
73
77
  end
74
78
  end
75
79
 
@@ -109,12 +113,12 @@ module MetasploitPayloads
109
113
  when :exec
110
114
  "#{filename}"
111
115
  else
112
- fail RuntimeError, "unknown format #{format} for #{filename}", caller
116
+ raise Mettle::NotFoundError, "unknown format #{format} for #{filename}", caller
113
117
  end
114
118
  file_path = path("#{triple}", 'bin', file)
115
119
  if file_path.nil?
116
120
  full_path = ::File.join([triple, file])
117
- fail RuntimeError, "#{full_path} not found", caller
121
+ raise Mettle::NotFoundError, "#{full_path} not found", caller
118
122
  end
119
123
 
120
124
  ::File.binread(file_path)
@@ -172,7 +176,7 @@ module MetasploitPayloads
172
176
  dir_path = path("#{platform}", 'bin')
173
177
  if dir_path.nil?
174
178
  full_path = ::File.join([platform, 'bin'])
175
- fail RuntimeError, "#{full_path} not found", caller
179
+ raise Mettle::NotFoundError, "#{full_path} not found", caller
176
180
  end
177
181
 
178
182
  extensions = ::Dir.entries(dir_path)
@@ -200,7 +204,7 @@ module MetasploitPayloads
200
204
  format = :process_image
201
205
  else
202
206
  format = :exec
203
- name = [name,suffix].join('.') unless suffix.blank?
207
+ name = [name,suffix].join('.') unless suffix&.strip&.empty?
204
208
  end
205
209
  self.read(platform, format, name)
206
210
  end
data.tar.gz.sig CHANGED
@@ -1,2 +1,2 @@
1
- �8�������?$-5[���m�<N�(�n�O|W�b\���~g���[kb�@jm��v1X���a��_i���
2
- *E<�4jI��A_�����Bdl[бPѶ��/L���>��JopG�;"�V�C ]'��#dF���M0���xF�&�6XP�B���ke��^w@w��ycy՚�\�׻JV �P["J�`��â�%Gi�ܣ-t���i�S��
1
+ ��:L3dqE��N�{ M�\S��UP�@o�#�'��ϟ�k=�K
2
+ ��vgJ����������;��Jმr��bY8�W�=;�U�[����!������,˶hـ���"`��5zX��x^��K���Kym&�'�� g>���iM���}Gt0}��=�g耋5"Tv��K��K�3�t��Z�A�.*� h�i�}^��J��hY���z����#3�O��@]o��+�<Cx�֬h
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: metasploit_payloads-mettle
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.25
4
+ version: 1.0.26
5
5
  platform: ruby
6
6
  authors:
7
7
  - Adam Cammack
@@ -94,7 +94,7 @@ cert_chain:
94
94
  EknWpNgVhohbot1lfVAMmIhdtOVaRVcQQixWPwprDj/ydB8ryDMDosIMcw+fkoXU
95
95
  9GJsSaSRRYQ9UUkVL27b64okU8D48m8=
96
96
  -----END CERTIFICATE-----
97
- date: 2023-03-08 00:00:00.000000000 Z
97
+ date: 2023-07-27 00:00:00.000000000 Z
98
98
  dependencies:
99
99
  - !ruby/object:Gem::Dependency
100
100
  name: bundler
@@ -209,6 +209,7 @@ files:
209
209
  - build/x86_64-linux-musl/bin/sniffer.bin
210
210
  - build/x86_64-w64-mingw32/bin/mettle.exe
211
211
  - lib/metasploit_payloads/mettle.rb
212
+ - lib/metasploit_payloads/mettle/error.rb
212
213
  - lib/metasploit_payloads/mettle/version.rb
213
214
  homepage: http://www.metasploit.com
214
215
  licenses:
metadata.gz.sig CHANGED
Binary file