Agent: Remove sambacry binaries from monkey spec

PR #1698
This commit is contained in:
Ilija Lazoroski 2022-02-04 14:06:48 +01:00 committed by Mike Salvatore
parent f0602edffb
commit fb8847b5c5
2 changed files with 1 additions and 10 deletions

View File

@ -21,7 +21,7 @@ Changelog](https://keepachangelog.com/en/1.0.0/).
### Removed
- VSFTPD exploiter. #1533
- Manual agent run command for CMD. #1570
- Sambacry exploiter. #1567
- Sambacry exploiter. #1567, #1693
- "Kill file" option in the config. #1536
- Netstat collector, because network connection information wasn't used anywhere. #1535
- Checkbox to disable/enable sending log to server. #1537

View File

@ -22,7 +22,6 @@ def main():
cipher=block_cipher
)
a.binaries += get_binaries()
a.datas = process_datas(a.datas)
pyz = PYZ(a.pure, a.zipped_data, cipher=block_cipher)
@ -63,10 +62,6 @@ def process_datas(orig_datas):
return datas
def get_binaries():
return get_sc_binaries()
def get_hidden_imports():
imports = ['_cffi_backend', '_mssql']
if is_windows():
@ -75,10 +70,6 @@ def get_hidden_imports():
return imports
def get_sc_binaries():
return [(x, get_bin_file_path(x), 'BINARY') for x in ['sc_monkey_runner32.so', 'sc_monkey_runner64.so']]
def get_monkey_filename():
name = 'monkey-'
if is_windows():