diff --git a/packages/010editor.vm/010editor.vm.nuspec b/packages/010editor.vm/010editor.vm.nuspec index 3e42d27ed..7bfda8802 100644 --- a/packages/010editor.vm/010editor.vm.nuspec +++ b/packages/010editor.vm/010editor.vm.nuspec @@ -2,7 +2,7 @@ 010editor.vm - 13.0.2 + 14.0 Professional text and hex editor with Binary Templates technology. SweetScape diff --git a/packages/010editor.vm/tools/chocolateyinstall.ps1 b/packages/010editor.vm/tools/chocolateyinstall.ps1 index 58cd559f8..61df41639 100644 --- a/packages/010editor.vm/tools/chocolateyinstall.ps1 +++ b/packages/010editor.vm/tools/chocolateyinstall.ps1 @@ -5,10 +5,10 @@ try { $toolName = '010Editor' $category = 'Hex Editors' - $url = 'https://download.sweetscape.com/010EditorWin32Installer13.0.2.exe' - $checksum = '30f21ab0d744b37951b7406aee84d7e2f236d4e2d1e7dcf50d750638408461b2' - $url64 = 'https://download.sweetscape.com/010EditorWin64Installer13.0.2.exe' - $checksum64 = 'c85695071e530d1bc86d116fe8f674d1089ae222659055bafab650280427a1ee' + $url = 'https://download.sweetscape.com/010EditorWin32Installer14.0.exe' + $checksum = '11d96fa10df0f8e6add3509e03b963c398a190890f0ea45d8e56c4dd77cbeaa9' + $url64 = 'https://download.sweetscape.com/010EditorWin64Installer14.0.exe' + $checksum64 = '9f926af3bc49df3ab3b2fa8e9cf97caf018081df277c25ee37fab8c2fdd974ba' $packageArgs = @{ packageName = ${Env:ChocolateyPackageName} diff --git a/packages/apktool.vm/apktool.vm.nuspec b/packages/apktool.vm/apktool.vm.nuspec index bd1b040d2..b6f3a6a89 100644 --- a/packages/apktool.vm/apktool.vm.nuspec +++ b/packages/apktool.vm/apktool.vm.nuspec @@ -2,12 +2,12 @@ apktool.vm - 2.7.0 + 2.8.1 Connor Tumbleson, Ryszard Wisniewski A tool for reverse engineering 3rd party, closed, binary Android apps. - + diff --git a/packages/capa.vm/capa.vm.nuspec b/packages/capa.vm/capa.vm.nuspec index 68ee7dc94..ab6138e28 100755 --- a/packages/capa.vm/capa.vm.nuspec +++ b/packages/capa.vm/capa.vm.nuspec @@ -2,7 +2,7 @@ capa.vm - 5.1.0.20230418 + 6.0.0 capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. @williballenthin, @mr-tz, @Ana06, @mike-hunhoff, @mwilliams31, @MalwareMechanic diff --git a/packages/capa.vm/tools/chocolateyinstall.ps1 b/packages/capa.vm/tools/chocolateyinstall.ps1 index d70169b4e..9d44240e4 100755 --- a/packages/capa.vm/tools/chocolateyinstall.ps1 +++ b/packages/capa.vm/tools/chocolateyinstall.ps1 @@ -4,8 +4,8 @@ Import-Module vm.common -Force -DisableNameChecking $toolName = 'capa' $category = 'Utilities' -$zipUrl = "https://github.com/mandiant/capa/releases/download/v5.1.0/capa-v5.1.0-windows.zip" -$zipSha256 = "80ac9adfd095cb631a6fa39743b37444651e4129b4181fd34c8b8b3e53bc5b06" +$zipUrl = "https://github.com/mandiant/capa/releases/download/v6.0.0/capa-v6.0.0-windows.zip" +$zipSha256 = "ca9a5388de86e95289426007ef794f6f6977ba6720f7fe5bc35a8cdc8a16f452" VM-Install-From-Zip $toolName $category $zipUrl -zipSha256 $zipSha256 -consoleApp $true diff --git a/packages/ghidra.vm/ghidra.vm.nuspec b/packages/ghidra.vm/ghidra.vm.nuspec index 6af8b272d..e8ed7e691 100644 --- a/packages/ghidra.vm/ghidra.vm.nuspec +++ b/packages/ghidra.vm/ghidra.vm.nuspec @@ -2,13 +2,13 @@ ghidra.vm - 10.3.2 + 10.3.2.20230802 National Security Agency A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission. - + diff --git a/packages/openvpn.vm/openvpn.vm.nuspec b/packages/openvpn.vm/openvpn.vm.nuspec index 9b0f1658e..be9b9de3f 100644 --- a/packages/openvpn.vm/openvpn.vm.nuspec +++ b/packages/openvpn.vm/openvpn.vm.nuspec @@ -2,12 +2,12 @@ openvpn.vm - 2.6.5.20230713 + 2.6.5.20230803 OpenVPN Technologies Inc OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations. - + diff --git a/packages/sysinternals.vm/sysinternals.vm.nuspec b/packages/sysinternals.vm/sysinternals.vm.nuspec index b12411539..5edd38e60 100644 --- a/packages/sysinternals.vm/sysinternals.vm.nuspec +++ b/packages/sysinternals.vm/sysinternals.vm.nuspec @@ -2,12 +2,12 @@ sysinternals.vm - 2023.6.27.20230713 + 2023.7.26 Mark Russinovich, Bryce Cogswell Sysinternals suite of troubleshooting tools. - + \ No newline at end of file