1
mirror of https://github.com/rapid7/metasploit-payloads synced 2025-01-02 11:36:22 +01:00
metasploit-payloads/java
Michael Schierl 28b3adc3a6 Call dx from Maven profile
Convert the dx calls from build.sh to equivalent exec calls in Maven
deploy profile.

While this commit takes into account differences between Windows and *nix,
it was only tested on Windows, and the resulting binaries have not been
tested at all!

In addition, I was not able to pass individual .class file names to dx
without getting a "class name does not match path" error, so I changed it
to copy all required classes into a temp directory and call dx from there.

I also changed the cross-project paths to refer to the respective Maven
classpath, so in case you do an individual project build, the library
dependencies are taken from the Maven repository instead of taking them
from the target/ directory of the projects directly.
2013-04-27 22:20:18 +02:00
..
_root Land #1217, java payload build system refactor 2013-04-11 13:10:03 -05:00
androidpayload Call dx from Maven profile 2013-04-27 22:20:18 +02:00
javapayload Make BindTCP test more robust 2013-03-03 21:08:06 +01:00
meterpreter fix obvious breakage 2013-04-18 10:24:50 +01:00
version-compatibility-check Add version compatibility checks for JavaPayload 2012-12-21 14:37:46 +01:00
COMPILING.txt Antivirus can interfere with compiling 2013-03-03 21:07:08 +01:00
pom.xml make android build conditional on -Dandroid.sdk.path= 2013-04-27 00:21:13 +01:00