shadowbrokers-exploits/windows/Resources/Ops/PyScripts/lib/ops/data/duplicatetoken.py
2017-04-14 11:45:07 +02:00

8 lines
No EOL
707 B
Python

from ops.data import OpsClass, OpsField, DszObject, DszCommandObject, cmd_definitions
import dsz
if ('duplicatetoken' not in cmd_definitions):
dszduplicatetokenprocess = OpsClass('process', {'id': OpsField('id', dsz.TYPE_INT), 'name': OpsField('name', dsz.TYPE_STRING), 'user': OpsField('user', dsz.TYPE_STRING)}, DszObject, single=False)
dszduplicatetokentoken = OpsClass('token', {'alias': OpsField('alias', dsz.TYPE_STRING), 'value': OpsField('value', dsz.TYPE_STRING)}, DszObject)
duplicatetokencommand = OpsClass('duplicatetoken', {'process': dszduplicatetokenprocess, 'token': dszduplicatetokentoken}, DszCommandObject)
cmd_definitions['duplicatetoken'] = duplicatetokencommand