Land #14696, Further Zeitwerk lands to improve boot speed

Zeitwerk rex folder
This commit is contained in:
agalway-r7
2021-02-19 10:33:37 +00:00
committed by GitHub
538 changed files with 418 additions and 1347 deletions
@@ -1,6 +1,4 @@
require 'open3'
require 'rex/ui'
require 'rex/logging'
require 'metasploit/framework/data_service/proxy/data_proxy_auto_loader'
#
@@ -1,5 +1,4 @@
require 'metasploit/framework/tcp/client'
require 'rex/proto/acpp'
require 'metasploit/framework/login_scanner/base'
require 'metasploit/framework/login_scanner/rex_socket'
@@ -1,4 +1,4 @@
require 'rex/proto/http'
require 'metasploit/framework/login_scanner/base'
require 'metasploit/framework/login_scanner/rex_socket'
@@ -1,5 +1,4 @@
require 'metasploit/framework/tcp/client'
require 'rex/proto/mqtt'
require 'metasploit/framework/login_scanner/base'
require 'metasploit/framework/login_scanner/rex_socket'
@@ -1,5 +1,4 @@
require 'metasploit/framework/tcp/client'
require 'rex/proto/rfb'
require 'metasploit/framework/login_scanner/base'
require 'metasploit/framework/login_scanner/rex_socket'
+10 -7
View File
@@ -1,12 +1,8 @@
require 'rex/proto/ntlm'
require 'rex/arch'
include Rex::Arch
require 'rex/logging'
NTLM_CONST ||= ::Rex::Proto::NTLM::Constants
NTLM_CRYPT ||= ::Rex::Proto::NTLM::Crypt
NTLM_UTILS ||= ::Rex::Proto::NTLM::Utils
NTLM_BASE ||= ::Rex::Proto::NTLM::Base
NTLM_MESSAGE ||= ::Rex::Proto::NTLM::Message
include Rex::Arch
include Rex::Logging
module Msf
@@ -14,4 +10,11 @@ module Msf
end
require 'msf/core/exception' # TODO: temporary require until we can split up the exceptions file and namespace properly
require 'msf/core/constants'
require 'msf_autoload'
NTLM_CONST ||= ::Rex::Proto::NTLM::Constants
NTLM_CRYPT ||= ::Rex::Proto::NTLM::Crypt
NTLM_UTILS ||= ::Rex::Proto::NTLM::Utils
NTLM_BASE ||= ::Rex::Proto::NTLM::Base
NTLM_MESSAGE ||= ::Rex::Proto::NTLM::Message
-1
View File
@@ -2,7 +2,6 @@
require 'shellwords'
require 'rex/text/table'
require "base64"
require 'rex/parser/arguments'
module Msf
module Sessions
+2 -2
View File
@@ -1,6 +1,6 @@
# -*- coding: binary -*-
require 'rex/post/meterpreter'
require 'rex/post/meterpreter/client'
require 'rex/post/meterpreter/ui/console'
module Msf
module Sessions
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/services/local_relay'
module Msf
module Sessions
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/iax2/client'
module Msf
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/proto/kademlia'
module Msf
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/proto/mqtt'
module Msf
module Auxiliary::MQTT
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/natpmp'
module Msf
-2
View File
@@ -1,6 +1,4 @@
# -*- coding: binary -*-
require 'rex/parser/nmap_nokogiri'
require 'rex/parser/nmap_xml'
require 'open3'
module Msf
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/ntp'
module Msf
###
@@ -1,7 +1,6 @@
# -*- coding: binary -*-
require 'open3'
require 'fileutils'
require 'rex/proto/ntlm/crypt'
require 'metasploit/framework/password_crackers/cracker'
require 'metasploit/framework/password_crackers/wordlist'
require 'metasploit/framework/password_crackers/jtr/formatter'
+3
View File
@@ -1,4 +1,7 @@
# -*- coding: binary -*-
require 'metasploit/framework/require'
module Msf
###
@@ -1,4 +1,3 @@
require 'rex/parser/acunetix_nokogiri'
module Msf::DBManager::Import::Acunetix
def import_acunetix_noko_stream(args={},&block)
@@ -1,4 +1,3 @@
require 'rex/parser/appscan_nokogiri'
module Msf::DBManager::Import::Appscan
def import_appscan_noko_stream(args={},&block)
@@ -1,4 +1,3 @@
require 'rex/parser/burp_issue_nokogiri'
module Msf::DBManager::Import::BurpIssue
def import_burp_issue_xml(args={}, &block)
@@ -1,4 +1,3 @@
require 'rex/parser/burp_session_nokogiri'
module Msf::DBManager::Import::BurpSession
def import_burp_session_noko_stream(args={},&block)
@@ -15,7 +14,6 @@ module Msf::DBManager::Import::BurpSession
bl = validate_ips(args[:blacklist]) ? args[:blacklist].split : []
wspace = Msf::Util::DBManager.process_opts_workspace(args, framework).name
if Rex::Parser.nokogiri_loaded
# Rex::Parser.reload("burp_session_nokogiri.rb")
parser = "Nokogiri v#{::Nokogiri::VERSION}"
noko_args = args.dup
noko_args[:blacklist] = bl
-1
View File
@@ -1,4 +1,3 @@
require 'rex/parser/ci_nokogiri'
module Msf::DBManager::Import::CI
def import_ci_noko_stream(args, &block)
@@ -1,4 +1,3 @@
require 'rex/parser/foundstone_nokogiri'
module Msf::DBManager::Import::Foundstone
def import_foundstone_noko_stream(args={},&block)
@@ -1,4 +1,3 @@
require 'rex/parser/fusionvm_nokogiri'
module Msf::DBManager::Import::FusionVM
def import_fusionvm_xml(args={})
-1
View File
@@ -1,4 +1,3 @@
require 'rex/parser/group_policy_preferences'
module Msf::DBManager::Import::GPP
def import_gpp_xml(args = {}, &block)
+1 -2
View File
@@ -1,4 +1,3 @@
require 'rex/parser/ip360_aspl_xml'
module Msf::DBManager::Import::IP360
autoload :ASPL, 'msf/core/db_manager/import/ip360/aspl'
@@ -6,4 +5,4 @@ module Msf::DBManager::Import::IP360
include Msf::DBManager::Import::IP360::ASPL
include Msf::DBManager::Import::IP360::V3
end
end
@@ -1,4 +1,3 @@
require 'rex/parser/ip360_aspl_xml'
module Msf::DBManager::Import::IP360::ASPL
#
@@ -1,4 +1,3 @@
require 'rex/parser/ip360_xml'
module Msf::DBManager::Import::IP360::V3
#
-1
View File
@@ -1,4 +1,3 @@
require 'rex/parser/mbsa_nokogiri'
module Msf::DBManager::Import::MBSA
def import_mbsa_noko_stream(args={},&block)
@@ -1,4 +1,3 @@
require 'rex/parser/nessus_xml'
module Msf::DBManager::Import::Nessus::XML::V2
def import_nessus_xml_v2(args={}, &block)
@@ -1,4 +1,3 @@
require 'rex/parser/netsparker_xml'
module Msf::DBManager::Import::Netsparker
# Process NetSparker XML
@@ -1,5 +1,3 @@
require 'rex/parser/nexpose_raw_nokogiri'
require 'rex/parser/nexpose_xml'
module Msf::DBManager::Import::Nexpose::Raw
def import_nexpose_raw_noko_stream(args, &block)
@@ -1,4 +1,3 @@
require 'rex/parser/nexpose_simple_nokogiri'
module Msf::DBManager::Import::Nexpose::Simple
def import_nexpose_noko_stream(args, &block)
-2
View File
@@ -1,5 +1,3 @@
require 'rex/parser/nmap_nokogiri'
require 'rex/parser/nmap_xml'
module Msf::DBManager::Import::Nmap
def import_nmap_noko_stream(args, &block)
@@ -1,4 +1,3 @@
require 'rex/parser/openvas_nokogiri'
module Msf::DBManager::Import::OpenVAS
def import_openvas_noko_stream(args={}, &block)
@@ -1,4 +1,3 @@
require 'rex/parser/outpost24_nokogiri'
module Msf::DBManager::Import::Outpost24
def import_outpost24_noko_stream(args={},&block)
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/parser/retina_xml'
module Msf::DBManager::Import::Retina
# Process Retina XML
-1
View File
@@ -1,4 +1,3 @@
require 'rex/parser/wapiti_nokogiri'
module Msf::DBManager::Import::Wapiti
def import_wapiti_xml(args={}, &block)
+1
View File
@@ -1,5 +1,6 @@
# -*- coding: binary -*-
require 'rex/exploitation'
require 'rex/exploitation/cmdstager'
module Msf
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/proto/dhcp'
module Msf
-1
View File
@@ -1,7 +1,6 @@
# -*- coding: binary -*-
module Msf
require 'rex/payloads/win32/kernel'
module Exploit::KernelMode
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/dcerpc'
require 'rex/encoder/ndr'
module Msf
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/dns'
module Msf
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/dns'
module Msf
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/dns'
module Msf
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/dns'
module Msf
@@ -7,6 +7,8 @@
#
###
require 'rex/zip'
module Msf
module Exploit::Remote::FirefoxAddonGenerator
include Msf::Exploit::Remote::FirefoxPrivilegeEscalation
@@ -1,4 +1,5 @@
# -*- coding: binary -*-
require 'rex/mime/message'
module Msf::Exploit::Remote::HTTP::Wordpress::Admin
# Uploads a plugin using a valid admin session.
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/service_manager'
require 'rex/exploitation/obfuscatejs'
require 'rex/exploitation/encryptjs'
require 'rex/exploitation/heaplib'
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/rmi'
require 'rex/java/serialization'
require 'stringio'
module Msf
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/kerberos'
module Msf
class Exploit
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/kerberos'
module Msf
class Exploit
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/kerberos'
module Msf
class Exploit
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/kerberos'
module Msf
class Exploit
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/kerberos'
module Msf
class Exploit
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/kerberos'
module Msf
class Exploit
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/kerberos'
module Msf
class Exploit
-1
View File
@@ -1,4 +1,3 @@
require 'rex/proto/nuuo'
###
#
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/proto/sip/response'
module Msf
# SIP protocol support
@@ -1,7 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/smb'
require 'rex/proto/ntlm'
require 'rex/proto/dcerpc'
require 'rex/encoder/ndr'
require 'recog'
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/dcerpc/svcctl'
require 'windows_error'
require 'windows_error/win32'
include WindowsError::Win32
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/dcerpc/svcctl'
require 'windows_error'
require 'windows_error/win32'
include WindowsError::Win32
@@ -1,12 +1,7 @@
# -*- coding: binary -*-
require 'rex/socket'
require 'rex/proto/smb'
require 'rex/text'
require 'rex/logging'
require 'rex/struct2'
require 'rex/proto/smb/constants'
require 'rex/proto/smb/utils'
require 'rex/proto/dcerpc'
module Msf
module Exploit::Remote::SMB::Server
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/sunrpc'
module Msf
-4
View File
@@ -1,10 +1,6 @@
# -*- coding: binary -*-
require 'uri'
require 'digest'
require 'rex/proto/ntlm/crypt'
require 'rex/proto/ntlm/constants'
require 'rex/proto/ntlm/utils'
require 'rex/proto/ntlm/exceptions'
module Msf
module Exploit::Remote::WinRM
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/proto/tftp'
module Msf
-3
View File
@@ -13,8 +13,6 @@ require 'monitor'
require 'metasploit/framework/version'
require 'rex/socket/ssl'
require 'metasploit/framework/thread_factory_provider'
require 'rex/job_container'
require 'rex/thread_factory'
module Msf
###
@@ -52,7 +50,6 @@ class Framework
end
require 'metasploit/framework/data_service/proxy/core'
require 'rex/json_hash_file'
#
# Creates an instance of the framework context.
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'thread'
require 'rex/proto/smb/simpleclient'
#
# KNOWN ISSUES
+1 -4
View File
@@ -1,13 +1,10 @@
# -*- coding: binary -*-
require 'rex/io/stream_abstraction'
require 'rex/sync/ref'
require 'rex/payloads/meterpreter/uri_checksum'
require 'rex/post/meterpreter'
require 'rex/post/meterpreter/core_ids'
require 'rex/socket/x509_certificate'
require 'rex/user_agent'
require 'uri'
require 'rex/service_manager'
module Msf
module Handler
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/proto/ssh'
module Msf
module Handler
-1
View File
@@ -1,4 +1,3 @@
require 'rex/ui/subscriber'
module Msf::Module::UI
autoload :Line, 'msf/core/module/ui/line'
+3 -1
View File
@@ -1,3 +1,5 @@
require 'rex/text'
module Msf::Module::UUID
#
# Attributes
@@ -24,4 +26,4 @@ module Msf::Module::UUID
def generate_uuid
self.uuid = Rex::Text.rand_text_alphanumeric(8).downcase
end
end
end
+1
View File
@@ -1,4 +1,5 @@
# -*- coding: binary -*-
require 'rex/file'
# Concerns loading Ruby modules from a directory
class Msf::Modules::Loader::Directory < Msf::Modules::Loader::Base
-1
View File
@@ -1,5 +1,4 @@
require 'singleton'
require 'rex/ui/text/output/stdio'
#
# Core service class that provides storage of module metadata as well as operations on the metadata.
# Note that operations on this metadata are included as separate modules.
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/payloads/meterpreter/config'
module Msf
#
# Builtin framework options with shortcut methods
-1
View File
@@ -12,7 +12,6 @@ module Msf
###
class Payload < Msf::Module
require 'rex/payloads/win32'
# Platform specific includes
require 'metasploit/framework/compiler/mingw'
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/payloads/meterpreter/config'
module Msf::Payload::Android
-1
View File
@@ -1,6 +1,5 @@
# -*- coding => binary -*-
require 'rex/payloads/meterpreter/uri_checksum'
#
# This module provides datastore option definitions and helper methods for payload modules that support UUIDs
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/payloads/shuffle'
module Msf
@@ -2,7 +2,6 @@
require 'rex/peparsey'
require 'metasploit/framework/compiler/mingw'
require 'rex/crypto/chacha20'
module Msf
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/payloads/meterpreter/config'
module Msf
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/payloads/meterpreter/uri_checksum'
module Msf
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/payloads/shuffle'
module Msf
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/payloads/meterpreter/config'
module Msf
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/payloads/meterpreter/config'
module Msf
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/payloads/meterpreter/uri_checksum'
module Msf
-1
View File
@@ -6,7 +6,6 @@ module Windows
module CliParse
require 'rex/logging'
require 'rex/exceptions'
#Msf::Post::Windows::CliParse::ParseError
+1 -1
View File
@@ -3,7 +3,7 @@ require 'xmlrpc/client'
require 'msgpack'
require 'rex'
require 'rex/proto/http'
module Msf
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex'
require 'rex/ui/text/output/buffer'
module Msf
module RPC
-1
View File
@@ -2,7 +2,6 @@
require 'msgpack'
require 'rex'
require 'rex/service_manager'
module Msf
module RPC
-1
View File
@@ -1,5 +1,4 @@
# -*- coding: binary -*-
require 'rex/ui'
module Msf
module Session
@@ -1,6 +1,5 @@
require 'rack'
require 'metasploit/framework/parsed_options/remote_db'
require 'rex/ui/text/output/stdio'
class Msf::WebServices::HttpDBManagerService
@@ -1,6 +1,5 @@
require 'json'
require 'metasploit/framework/data_service/remote/http/response_data_helper'
require 'rex/ui/text/output/stdio'
module Msf::WebServices::ServletHelper
include ResponseDataHelper
-1
View File
@@ -1,6 +1,5 @@
# -*- coding: binary -*-
require 'rex/ui'
module Msf
module Ui
@@ -1,7 +1,6 @@
# -*- coding: binary -*-
require 'rexml/document'
require 'rex/parser/nmap_xml'
module Msf
module Ui
@@ -4,7 +4,6 @@
# Rex
#
require 'rex/ui/text/output/buffer/stdout'
#
# Project
@@ -1,7 +1,6 @@
# -*- coding: binary -*-
require 'rexml/document'
require 'rex/parser/nmap_xml'
require 'metasploit/framework/password_crackers/hashcat/formatter'
require 'metasploit/framework/password_crackers/jtr/formatter'
@@ -2,7 +2,6 @@
require 'json'
require 'rexml/document'
require 'rex/parser/nmap_xml'
require 'metasploit/framework/data_service'
require 'metasploit/framework/data_service/remote/http/core'
@@ -5,7 +5,6 @@
# Rex
#
require 'rex/ui/text/output/buffer/stdout'
module Msf
module Ui
@@ -1,7 +1,5 @@
# -*- coding: binary -*-
require 'rex/ui/text/output/buffer/stdout'
require 'rex/parser/arguments'
module Msf
module Ui

Some files were not shown because too many files have changed in this diff Show More