Subject: CVS commit: pkgsrc/security/ruby-metasploit-payloads
From: Takahiro Kambe
Date: 2023-11-11 14:17:59
Message id: 20231111131759.DC046FA2F@cvs.NetBSD.org

Log Message:
security/ruby-metasploit-payloads: update to 2.0.159

2.0.151 (2023-09-22)

* Initial work to replace URL hack - manually parse a JAR file
* Support resource files in in-memory jar file
* Bridge the classloaders using self-reference
* Compatibilise with older Javas

2.0.152 (2023-09-28)

* Land #675, Add Rake task to generate manifest

2.0.153 (2023-09-29)

* Land #676, Fix Android compilation issues - Add Java parent to
  AndroidPayload

2.0.154 (2023-09-29)

* Land #677, Ensure manifest files are available in gem

2.0.155 (2023-10-04)

* Land #673, Add RSpec and raising errors when files are inaccessible

2.0.156 (2023-10-11)

* PD-41096 Auto-add cortex.yaml

2.0.157 (2023-10-13)

* Land #672, OpenJDK reflection fix

2.0.158 (2023-10-16)

* Land #679, Add at rest encryption to Meterpreter payloads

2.0.159 (2023-10-24)

* Land #680, Correctly encrypt Java & Android files in Rake task

Files:
RevisionActionfile
1.42modifypkgsrc/security/ruby-metasploit-payloads/Makefile
1.8modifypkgsrc/security/ruby-metasploit-payloads/PLIST
1.40modifypkgsrc/security/ruby-metasploit-payloads/distinfo