Path to this page:
Subject: CVS commit: pkgsrc/security/ruby-metasploit-payloads
From: Takahiro Kambe
Date: 2023-11-11 14:17:59
Message id: 20231111131759.DC046FA2F@cvs.NetBSD.org
Log Message:
security/ruby-metasploit-payloads: update to 2.0.159
2.0.151 (2023-09-22)
* Initial work to replace URL hack - manually parse a JAR file
* Support resource files in in-memory jar file
* Bridge the classloaders using self-reference
* Compatibilise with older Javas
2.0.152 (2023-09-28)
* Land #675, Add Rake task to generate manifest
2.0.153 (2023-09-29)
* Land #676, Fix Android compilation issues - Add Java parent to
AndroidPayload
2.0.154 (2023-09-29)
* Land #677, Ensure manifest files are available in gem
2.0.155 (2023-10-04)
* Land #673, Add RSpec and raising errors when files are inaccessible
2.0.156 (2023-10-11)
* PD-41096 Auto-add cortex.yaml
2.0.157 (2023-10-13)
* Land #672, OpenJDK reflection fix
2.0.158 (2023-10-16)
* Land #679, Add at rest encryption to Meterpreter payloads
2.0.159 (2023-10-24)
* Land #680, Correctly encrypt Java & Android files in Rake task
Files: