modules/evasion/windows/syscall_inject.rb
File syscall_inject.rb
has 511 lines of code (exceeds 250 allowed). Consider refactoring. Open
Open
require 'metasploit/framework/compiler/mingw'
require 'metasploit/framework/compiler/windows'
class MetasploitModule < Msf::Evasion
RC4 = File.join(Msf::Config.data_directory, 'headers', 'windows', 'rc4.h')
BASE64 = File.join(Msf::Config.data_directory, 'headers', 'windows', 'base64.h')
Method defines
has 104 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def defines
%^
#define _SEED 0x#{@hash.to_s(16)}
#define _ROR8(v) (v >> 8 | v << 24)
#define MAX_SYSCALLS 500
Method syscall_parser
has 93 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def syscall_parser
%@
SYSCALL_LIST _SyscallList;
DWORD HashSyscall(PCSTR FunctionName)
Method inject
has 42 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def inject
s = "int i; for(i=0;i<10;i++){Sleep(#{datastore['SLEEP']} / 10);}"
@inject = %@
void inject()
Method initialize
has 33 lines of code (exceeds 25 allowed). Consider refactoring. Open
Open
def initialize(info = {})
super(
merge_info(
info,
'Name' => 'Direct windows syscall evasion technique',