forked from p34709852/monkey
parent
81bc579aa5
commit
88d4e9b11f
|
@ -19,7 +19,7 @@ Changelog](https://keepachangelog.com/en/1.0.0/).
|
|||
### Removed
|
||||
- The VSFTPD exploiter. #1533
|
||||
- Manual agent run command for CMD. #1570
|
||||
- Sambacry exploiter. #1567
|
||||
- Sambacry exploiter. #1567, #1693
|
||||
- "Kill file" option in the config. #1536
|
||||
- Netstat collector, because network connection information wasn't used anywhere. #1535
|
||||
- Checkbox to disable/enable sending log to server. #1537
|
||||
|
|
|
@ -25,7 +25,6 @@ def main():
|
|||
cipher=block_cipher
|
||||
)
|
||||
|
||||
a.binaries += get_binaries()
|
||||
a.datas = process_datas(a.datas)
|
||||
|
||||
pyz = PYZ(a.pure, a.zipped_data, cipher=block_cipher)
|
||||
|
@ -66,10 +65,6 @@ def process_datas(orig_datas):
|
|||
return datas
|
||||
|
||||
|
||||
def get_binaries():
|
||||
return get_sc_binaries()
|
||||
|
||||
|
||||
def get_hidden_imports():
|
||||
imports = ['_cffi_backend', '_mssql']
|
||||
if is_windows():
|
||||
|
@ -77,10 +72,6 @@ def get_hidden_imports():
|
|||
return imports
|
||||
|
||||
|
||||
def get_sc_binaries():
|
||||
return [(x, get_bin_file_path(x), 'BINARY') for x in ['sc_monkey_runner32.so', 'sc_monkey_runner64.so']]
|
||||
|
||||
|
||||
def get_monkey_filename():
|
||||
name = 'monkey-'
|
||||
if is_windows():
|
||||
|
|
Loading…
Reference in New Issue