offensivecomputing 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- data.tar.gz.sig +0 -0
- data/.document +5 -0
- data/Gemfile +14 -0
- data/Gemfile.lock +35 -0
- data/LICENSE.txt +20 -0
- data/README.rdoc +46 -0
- data/Rakefile +54 -0
- data/VERSION +1 -0
- data/lib/offensivecomputing.rb +1 -0
- data/lib/offensivecomputing/offensivecomputing.rb +156 -0
- data/test/helper.rb +18 -0
- data/test/test_offensivecomputing.rb +37 -0
- metadata +159 -0
- metadata.gz.sig +0 -0
data.tar.gz.sig
ADDED
Binary file
|
data/.document
ADDED
data/Gemfile
ADDED
@@ -0,0 +1,14 @@
|
|
1
|
+
source "http://rubygems.org"
|
2
|
+
# Add dependencies required to use your gem here.
|
3
|
+
# Example:
|
4
|
+
# gem "activesupport", ">= 2.3.5"
|
5
|
+
|
6
|
+
# Add dependencies to develop your gem here.
|
7
|
+
# Include everything needed to run rake, tests, features, etc.
|
8
|
+
group :development do
|
9
|
+
gem "shoulda", ">= 0"
|
10
|
+
gem "rdoc", "~> 3.12"
|
11
|
+
gem "bundler", "~> 1.1.5"
|
12
|
+
gem "jeweler", "~> 1.8.4"
|
13
|
+
gem "rcov", ">= 0"
|
14
|
+
end
|
data/Gemfile.lock
ADDED
@@ -0,0 +1,35 @@
|
|
1
|
+
GEM
|
2
|
+
remote: http://rubygems.org/
|
3
|
+
specs:
|
4
|
+
activesupport (3.2.8)
|
5
|
+
i18n (~> 0.6)
|
6
|
+
multi_json (~> 1.0)
|
7
|
+
git (1.2.5)
|
8
|
+
i18n (0.6.0)
|
9
|
+
jeweler (1.8.4)
|
10
|
+
bundler (~> 1.0)
|
11
|
+
git (>= 1.2.5)
|
12
|
+
rake
|
13
|
+
rdoc
|
14
|
+
json (1.7.5)
|
15
|
+
multi_json (1.3.6)
|
16
|
+
rake (0.9.2.2)
|
17
|
+
rcov (1.0.0)
|
18
|
+
rdoc (3.12)
|
19
|
+
json (~> 1.4)
|
20
|
+
shoulda (3.1.1)
|
21
|
+
shoulda-context (~> 1.0)
|
22
|
+
shoulda-matchers (~> 1.2)
|
23
|
+
shoulda-context (1.0.0)
|
24
|
+
shoulda-matchers (1.2.0)
|
25
|
+
activesupport (>= 3.0.0)
|
26
|
+
|
27
|
+
PLATFORMS
|
28
|
+
ruby
|
29
|
+
|
30
|
+
DEPENDENCIES
|
31
|
+
bundler (~> 1.1.5)
|
32
|
+
jeweler (~> 1.8.4)
|
33
|
+
rcov
|
34
|
+
rdoc (~> 3.12)
|
35
|
+
shoulda
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
Copyright (c) 2012 chrislee35
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
4
|
+
a copy of this software and associated documentation files (the
|
5
|
+
"Software"), to deal in the Software without restriction, including
|
6
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
7
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
8
|
+
permit persons to whom the Software is furnished to do so, subject to
|
9
|
+
the following conditions:
|
10
|
+
|
11
|
+
The above copyright notice and this permission notice shall be
|
12
|
+
included in all copies or substantial portions of the Software.
|
13
|
+
|
14
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
15
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
16
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
17
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
18
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
19
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
20
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.rdoc
ADDED
@@ -0,0 +1,46 @@
|
|
1
|
+
= offensivecomputing
|
2
|
+
|
3
|
+
Rubygem for interacting with OffensiveComputing.net, a malware sharing community. This allows for query and downloading of malware.
|
4
|
+
|
5
|
+
oc = OffensiveComputing::MalwareSearch.new(user, pass)
|
6
|
+
recs = oc.search("4462aae981360f73b0016d69029321b4")
|
7
|
+
pp recs => [#<struct OffensiveComputing::MalwareResult
|
8
|
+
md5="4462aae981360f73b0016d69029321b4",
|
9
|
+
sha1="f8229be77c429c84f4c612a4f106bc54a96a8733",
|
10
|
+
sha256="f951deff6086a1e68f0d09bd3856f1c1af5c117590443ea05d171a75969bbb63",
|
11
|
+
filename="4462aae981360f73b0016d69029321b4.EXE",
|
12
|
+
added=Sat May 26 17:38:23 UTC 2007,
|
13
|
+
magic="MZ executable for MS-DOS",
|
14
|
+
packer=nil,
|
15
|
+
avresults=
|
16
|
+
[#<struct OffensiveComputing::AVResult
|
17
|
+
name="ClamAV",
|
18
|
+
signature="VGEN.735.3">,
|
19
|
+
#<struct OffensiveComputing::AVResult
|
20
|
+
name="BitDefender",
|
21
|
+
signature="GenDropper.MutaGen">,
|
22
|
+
#<struct OffensiveComputing::AVResult
|
23
|
+
name="Kaspersky",
|
24
|
+
signature="Virus.DOS.MutaGen.100.Test.1325">,
|
25
|
+
#<struct OffensiveComputing::AVResult
|
26
|
+
name="AVGScan",
|
27
|
+
signature="Virus found Mutagen">],
|
28
|
+
tags=nil,
|
29
|
+
dlurl="download.php?id=1...7&auth=9...e">]
|
30
|
+
|
31
|
+
|
32
|
+
== Contributing to offensivecomputing
|
33
|
+
|
34
|
+
* Check out the latest master to make sure the feature hasn't been implemented or the bug hasn't been fixed yet.
|
35
|
+
* Check out the issue tracker to make sure someone already hasn't requested it and/or contributed it.
|
36
|
+
* Fork the project.
|
37
|
+
* Start a feature/bugfix branch.
|
38
|
+
* Commit and push until you are happy with your contribution.
|
39
|
+
* Make sure to add tests for it. This is important so I don't break it in a future version unintentionally.
|
40
|
+
* Please try not to mess with the Rakefile, version, or history. If you want to have your own version, or is otherwise necessary, that is fine, but please isolate to its own commit so I can cherry-pick around it.
|
41
|
+
|
42
|
+
== Copyright
|
43
|
+
|
44
|
+
Copyright (c) 2012 chrislee35. See LICENSE.txt for
|
45
|
+
further details.
|
46
|
+
|
data/Rakefile
ADDED
@@ -0,0 +1,54 @@
|
|
1
|
+
# encoding: utf-8
|
2
|
+
|
3
|
+
require 'rubygems'
|
4
|
+
require 'bundler'
|
5
|
+
begin
|
6
|
+
Bundler.setup(:default, :development)
|
7
|
+
rescue Bundler::BundlerError => e
|
8
|
+
$stderr.puts e.message
|
9
|
+
$stderr.puts "Run `bundle install` to install missing gems"
|
10
|
+
exit e.status_code
|
11
|
+
end
|
12
|
+
require 'rake'
|
13
|
+
|
14
|
+
require 'jeweler'
|
15
|
+
Jeweler::Tasks.new do |gem|
|
16
|
+
# gem is a Gem::Specification... see http://docs.rubygems.org/read/chapter/20 for more options
|
17
|
+
gem.name = "offensivecomputing"
|
18
|
+
gem.homepage = "http://github.com/chrislee35/offensivecomputing"
|
19
|
+
gem.license = "MIT"
|
20
|
+
gem.summary = %Q{Rubygem for interacting with OffensiveComputing.net, a malware sharing community}
|
21
|
+
gem.description = %Q{Rubygem for interacting with OffensiveComputing.net, a malware sharing community. This allows for query and downloading of malware}
|
22
|
+
gem.email = "rubygems@chrislee.dhs.org"
|
23
|
+
gem.authors = ["chrislee35"]
|
24
|
+
gem.signing_key = "#{File.dirname(__FILE__)}/../gem-private_key.pem"
|
25
|
+
gem.cert_chain = ["#{File.dirname(__FILE__)}/../gem-public_cert.pem"]
|
26
|
+
end
|
27
|
+
Jeweler::RubygemsDotOrgTasks.new
|
28
|
+
|
29
|
+
require 'rake/testtask'
|
30
|
+
Rake::TestTask.new(:test) do |test|
|
31
|
+
test.libs << 'lib' << 'test'
|
32
|
+
test.pattern = 'test/**/test_*.rb'
|
33
|
+
test.verbose = true
|
34
|
+
end
|
35
|
+
|
36
|
+
require 'rcov/rcovtask'
|
37
|
+
Rcov::RcovTask.new do |test|
|
38
|
+
test.libs << 'test'
|
39
|
+
test.pattern = 'test/**/test_*.rb'
|
40
|
+
test.verbose = true
|
41
|
+
test.rcov_opts << '--exclude "gems/*"'
|
42
|
+
end
|
43
|
+
|
44
|
+
task :default => :test
|
45
|
+
|
46
|
+
require 'rdoc/task'
|
47
|
+
Rake::RDocTask.new do |rdoc|
|
48
|
+
version = File.exist?('VERSION') ? File.read('VERSION') : ""
|
49
|
+
|
50
|
+
rdoc.rdoc_dir = 'rdoc'
|
51
|
+
rdoc.title = "offensivecomputing #{version}"
|
52
|
+
rdoc.rdoc_files.include('README*')
|
53
|
+
rdoc.rdoc_files.include('lib/**/*.rb')
|
54
|
+
end
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
0.1.0
|
@@ -0,0 +1 @@
|
|
1
|
+
require 'offensivecomputing/offensivecomputing'
|
@@ -0,0 +1,156 @@
|
|
1
|
+
require 'net/http'
|
2
|
+
require 'openssl'
|
3
|
+
|
4
|
+
module OffensiveComputing
|
5
|
+
|
6
|
+
class MalwareSearch
|
7
|
+
@@baseurl = "http://www.offensivecomputing.net"
|
8
|
+
@@user_agent = "Ruby/#{RUBY_VERSION} offensivecomputing rubygem (https://github.com/chrislee35/offensivecomputing)"
|
9
|
+
|
10
|
+
attr_reader :cookie
|
11
|
+
def initialize(username, password)
|
12
|
+
# login and get a cookie
|
13
|
+
# handle failures
|
14
|
+
params = {'edit[name]' => username, 'edit[pass]' => password, 'edit[form_id]' => 'user_login_block'}
|
15
|
+
@cookie = nil
|
16
|
+
@referer = @@baseurl
|
17
|
+
_post("?q=node&destination=node&op=Log+in", params)
|
18
|
+
end
|
19
|
+
|
20
|
+
def _request(request, url)
|
21
|
+
request.add_field("User-Agent", @@user_agent)
|
22
|
+
request.add_field("Referer", @referer)
|
23
|
+
request.add_field("Cookie", @cookie) if @cookie
|
24
|
+
|
25
|
+
http = Net::HTTP.new(url.host, url.port)
|
26
|
+
if url.scheme == 'https'
|
27
|
+
http.use_ssl = true
|
28
|
+
http.verify_mode = OpenSSL::SSL::VERIFY_NONE
|
29
|
+
http.verify_depth = 5
|
30
|
+
end
|
31
|
+
resp = http.request(request)
|
32
|
+
@cookie = resp.header["set-cookie"].split(/[,; ]+/).find_all{|x| x=~ /PHPSESSID/}.last if resp.header["set-cookie"]
|
33
|
+
resp.body
|
34
|
+
end
|
35
|
+
|
36
|
+
def _post(path, params=nil)
|
37
|
+
url = URI.parse "#{@@baseurl}/#{path}"
|
38
|
+
path = url.path
|
39
|
+
if url.query
|
40
|
+
path += "?"+url.query
|
41
|
+
end
|
42
|
+
#puts path
|
43
|
+
request = Net::HTTP::Post.new(path)
|
44
|
+
request.set_form_data(params) if params
|
45
|
+
_request(request, url)
|
46
|
+
end
|
47
|
+
|
48
|
+
def _get(path, params=nil)
|
49
|
+
url = URI.parse "#{@@baseurl}/#{path}"
|
50
|
+
data = nil
|
51
|
+
path = url.path
|
52
|
+
if params and params.length > 0
|
53
|
+
data = params.map { |k,v|
|
54
|
+
"#{k}=#{v}".gsub(/([^ a-zA-Z0-9_.-=]+)/) do
|
55
|
+
'%' + $1.unpack('H2' * $1.bytesize).join('%').upcase
|
56
|
+
end.tr(' ', '+')
|
57
|
+
}.join("&")
|
58
|
+
end
|
59
|
+
if data and url.query
|
60
|
+
path += "?#{url.query}&#{data}"
|
61
|
+
elsif data
|
62
|
+
path += "?#{data}"
|
63
|
+
elsif url.query
|
64
|
+
path += "?#{url.query}"
|
65
|
+
end
|
66
|
+
request = Net::HTTP::Get.new(path)
|
67
|
+
_request(request, url)
|
68
|
+
end
|
69
|
+
|
70
|
+
def search(hash)
|
71
|
+
params = {'search'=>hash} # 'slowsearch'=>'on'
|
72
|
+
body = _post('?q=ocsearch', params)
|
73
|
+
records = []
|
74
|
+
table = body.match(/<\!\-\- begin content.*?<\!\-\- end content \-\->/).to_s
|
75
|
+
if table
|
76
|
+
urls = table.scan(/download[^\"]+/)
|
77
|
+
arr = table.gsub(/<.*?>/,"\t").gsub(/\s*\t+/,"\t").split(/\t/)
|
78
|
+
#pp arr
|
79
|
+
field = nil
|
80
|
+
rec = {}
|
81
|
+
avname = nil
|
82
|
+
arr.each do |item|
|
83
|
+
if item == "infected"
|
84
|
+
records << MalwareResult.new(rec[:md5],rec[:sha1],rec[:sha256],rec[:filename],rec[:added],rec[:magic],rec[:packer],rec[:avresults],rec[:tags],rec[:dlurl], self)
|
85
|
+
elsif item == "MD5:"
|
86
|
+
field = :md5
|
87
|
+
elsif item == "SHA1:"
|
88
|
+
field = :sha1
|
89
|
+
elsif item == "SHA256:"
|
90
|
+
field = :sha256
|
91
|
+
elsif item == "Original Submitted Filename:"
|
92
|
+
field = :filename
|
93
|
+
elsif item == "Date Added:"
|
94
|
+
field = :added
|
95
|
+
elsif item == "Magic File Type:"
|
96
|
+
field = :magic
|
97
|
+
elsif item == "Packer Signature:"
|
98
|
+
field = :packer
|
99
|
+
elsif item == "Anti-Virus Results:"
|
100
|
+
field = :avresults
|
101
|
+
elsif item == "Tags:"
|
102
|
+
field = :tags
|
103
|
+
elsif item == "Add a tag:"
|
104
|
+
field = nil
|
105
|
+
elsif item == "Download Sample"
|
106
|
+
rec[:dlurl] = urls.shift
|
107
|
+
elsif field == :md5 and item =~ /^[0-9a-f]{32}$/
|
108
|
+
rec[field] = item
|
109
|
+
elsif field == :sha1 and item =~ /^[0-9a-f]{40}$/
|
110
|
+
rec[field] = item
|
111
|
+
elsif field == :sha256 and item =~ /^[0-9a-f]{64}$/
|
112
|
+
rec[field] = item
|
113
|
+
elsif field == :filename
|
114
|
+
rec[field] = item
|
115
|
+
elsif field == :added and item =~ /^\d{4}\-\d{2}\-\d{2}/
|
116
|
+
rec[field] = Time.parse("#{item} +0000").utc
|
117
|
+
elsif field == :magic
|
118
|
+
rec[field] = item
|
119
|
+
elsif field == :avresults
|
120
|
+
#puts "DEBUG: avresults #{item}"
|
121
|
+
rec[field] = [] unless rec[field]
|
122
|
+
if avname
|
123
|
+
rec[field] << AVResult.new(avname,item)
|
124
|
+
avname = nil
|
125
|
+
else
|
126
|
+
avname = item
|
127
|
+
end
|
128
|
+
elsif field == :tags
|
129
|
+
rec[field] = [] unless rec[field]
|
130
|
+
rec[field] << item
|
131
|
+
end
|
132
|
+
end
|
133
|
+
end
|
134
|
+
records
|
135
|
+
end
|
136
|
+
|
137
|
+
def download(malwareresult,filename=nil)
|
138
|
+
if malwareresult.respond_to? :dlurl and malwareresult.dlurl
|
139
|
+
doc = _get(malwareresult.dlurl)
|
140
|
+
if filename
|
141
|
+
File.open(filename,'w') do |f|
|
142
|
+
f.write(doc)
|
143
|
+
end
|
144
|
+
end
|
145
|
+
doc
|
146
|
+
end
|
147
|
+
end
|
148
|
+
end
|
149
|
+
|
150
|
+
class MalwareResult < Struct.new(:md5, :sha1, :sha256, :filename, :added, :magic, :packer, :avresults, :tags, :dlurl, :malwaresearch);
|
151
|
+
def download(filename=nil)
|
152
|
+
self.malwaresearch.download(self,filename)
|
153
|
+
end
|
154
|
+
end
|
155
|
+
class AVResult < Struct.new(:name, :signature); end
|
156
|
+
end
|
data/test/helper.rb
ADDED
@@ -0,0 +1,18 @@
|
|
1
|
+
require 'rubygems'
|
2
|
+
require 'bundler'
|
3
|
+
begin
|
4
|
+
Bundler.setup(:default, :development)
|
5
|
+
rescue Bundler::BundlerError => e
|
6
|
+
$stderr.puts e.message
|
7
|
+
$stderr.puts "Run `bundle install` to install missing gems"
|
8
|
+
exit e.status_code
|
9
|
+
end
|
10
|
+
require 'test/unit'
|
11
|
+
require 'shoulda'
|
12
|
+
|
13
|
+
$LOAD_PATH.unshift(File.join(File.dirname(__FILE__), '..', 'lib'))
|
14
|
+
$LOAD_PATH.unshift(File.dirname(__FILE__))
|
15
|
+
require 'offensivecomputing'
|
16
|
+
|
17
|
+
class Test::Unit::TestCase
|
18
|
+
end
|
@@ -0,0 +1,37 @@
|
|
1
|
+
require 'helper'
|
2
|
+
require 'digest/md5'
|
3
|
+
require 'pp'
|
4
|
+
|
5
|
+
class TestOffensivecomputing < Test::Unit::TestCase
|
6
|
+
should "log into OC and search for 4462aae981360f73b0016d69029321b4" do
|
7
|
+
fail "You must set OCUSER and OCPASS in your environment before running tests\nE.g.\nexport OCUSER=\"l33tsloth\"\nexport OCPASS=\"n3v3r+f33r\"\n" unless ENV['OCUSER'] and ENV['OCPASS']
|
8
|
+
oc = OffensiveComputing::MalwareSearch.new(ENV['OCUSER'], ENV['OCPASS'])
|
9
|
+
recs = oc.search("4462aae981360f73b0016d69029321b4")
|
10
|
+
assert_equal(1, recs.length)
|
11
|
+
rec = recs[0]
|
12
|
+
assert_equal(
|
13
|
+
["4462aae981360f73b0016d69029321b4",
|
14
|
+
"f8229be77c429c84f4c612a4f106bc54a96a8733",
|
15
|
+
"f951deff6086a1e68f0d09bd3856f1c1af5c117590443ea05d171a75969bbb63",
|
16
|
+
"4462aae981360f73b0016d69029321b4.EXE",
|
17
|
+
"Sat May 26 17:38:23 UTC 2007",
|
18
|
+
"MZ executable for MS-DOS",
|
19
|
+
nil,
|
20
|
+
nil], [rec.md5,rec.sha1,rec.sha256,rec.filename,rec.added.to_s,rec.magic,rec.packer,rec.tags])
|
21
|
+
file = "test/test.bin"
|
22
|
+
dl = rec.download(file)
|
23
|
+
assert_equal(1277,dl.length)
|
24
|
+
assert_equal(1277,File.size(file))
|
25
|
+
assert_equal("103835290aa6daa55d270bf3dde84271",Digest::MD5.hexdigest(dl))
|
26
|
+
assert_equal("103835290aa6daa55d270bf3dde84271",Digest::MD5.hexdigest(File.open(file).read))
|
27
|
+
if File.exists? file
|
28
|
+
File.unlink(file)
|
29
|
+
end
|
30
|
+
end
|
31
|
+
should "log into OC and search for \"conficker\"" do
|
32
|
+
fail "You must set OCUSER and OCPASS in your environment before running tests\nE.g.\nexport OCUSER=\"l33tsloth\"\nexport OCPASS=\"n3v3r+f33r\"\n" unless ENV['OCUSER'] and ENV['OCPASS']
|
33
|
+
oc = OffensiveComputing::MalwareSearch.new(ENV['OCUSER'], ENV['OCPASS'])
|
34
|
+
recs = oc.search("conficker")
|
35
|
+
assert_equal(4, recs.length)
|
36
|
+
end
|
37
|
+
end
|
metadata
ADDED
@@ -0,0 +1,159 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: offensivecomputing
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
prerelease: false
|
5
|
+
segments:
|
6
|
+
- 0
|
7
|
+
- 1
|
8
|
+
- 0
|
9
|
+
version: 0.1.0
|
10
|
+
platform: ruby
|
11
|
+
authors:
|
12
|
+
- chrislee35
|
13
|
+
autorequire:
|
14
|
+
bindir: bin
|
15
|
+
cert_chain:
|
16
|
+
- |
|
17
|
+
-----BEGIN CERTIFICATE-----
|
18
|
+
MIIDYjCCAkqgAwIBAgIBADANBgkqhkiG9w0BAQUFADBXMREwDwYDVQQDDAhydWJ5
|
19
|
+
Z2VtczEYMBYGCgmSJomT8ixkARkWCGNocmlzbGVlMRMwEQYKCZImiZPyLGQBGRYD
|
20
|
+
ZGhzMRMwEQYKCZImiZPyLGQBGRYDb3JnMB4XDTExMDIyNzE1MzAxOVoXDTEyMDIy
|
21
|
+
NzE1MzAxOVowVzERMA8GA1UEAwwIcnVieWdlbXMxGDAWBgoJkiaJk/IsZAEZFghj
|
22
|
+
aHJpc2xlZTETMBEGCgmSJomT8ixkARkWA2RoczETMBEGCgmSJomT8ixkARkWA29y
|
23
|
+
ZzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALNM1Hjs6q58sf7Jp64A
|
24
|
+
vEY2cnRWDdFpD8UWpwaJK5kgSHOVgs+0mtszn+YlYjmx8kpmuYpyU4g9mNMImMQe
|
25
|
+
ow8pVsL4QBBK/1Ozgdxrsptk3IiTozMYA+g2I/+WvZSEDu9uHkKe8pvMBEMrg7RJ
|
26
|
+
IN7+jWaPnSzg3DbFwxwOdi+QRw33DjK7oFWcOaaBqWTUpI4epdi/c/FE1I6UWULJ
|
27
|
+
ZF/Uso0Sc2Pp/YuVhuMHGrUbn7zrWWo76nnK4DTLfXFDbZF5lIXT1w6BtIiN6Ho9
|
28
|
+
Rdr/W6663hYUo3WMsUSa3I5+PJXEBKmGHIZ2TNFnoFIRHha2fmm1HC9+BTaKwcO9
|
29
|
+
PLcCAwEAAaM5MDcwCQYDVR0TBAIwADAdBgNVHQ4EFgQURzsNkZo2rv86Ftc+hVww
|
30
|
+
RNICMrwwCwYDVR0PBAQDAgSwMA0GCSqGSIb3DQEBBQUAA4IBAQBRRw/iNA/PdnvW
|
31
|
+
OBoNCSr/IiHOGZqMHgPJwyWs68FhThnLc2EyIkuLTQf98ms1/D3p0XX9JsxazvKT
|
32
|
+
W/in8Mm/R2fkVziSdzqChtw/4Z4bW3c+RF7TgX6SP5cKxNAfKmAPuItcs2Y+7bdS
|
33
|
+
hr/FktVtT2iAmISRnlEbdaTpfl6N2ZWNT83khV6iOs5xRkX/+0e+GgAv9mE6nqr1
|
34
|
+
AkuDXMhposxcnFZUrZ3UtMPEe/JnyP7Vv6pvr3qtZm8FidFZU91+rX/fwdyBU8RP
|
35
|
+
/5l8uLWXXNt1wEbtu4N1I66LwTK2iRrQZE8XtlgZGbxYDFUkiurq3OafF2YwRs6W
|
36
|
+
6yhklP75
|
37
|
+
-----END CERTIFICATE-----
|
38
|
+
|
39
|
+
date: 2012-09-06 00:00:00 -04:00
|
40
|
+
default_executable:
|
41
|
+
dependencies:
|
42
|
+
- !ruby/object:Gem::Dependency
|
43
|
+
prerelease: false
|
44
|
+
type: :development
|
45
|
+
name: shoulda
|
46
|
+
version_requirements: &id001 !ruby/object:Gem::Requirement
|
47
|
+
requirements:
|
48
|
+
- - ">="
|
49
|
+
- !ruby/object:Gem::Version
|
50
|
+
segments:
|
51
|
+
- 0
|
52
|
+
version: "0"
|
53
|
+
requirement: *id001
|
54
|
+
- !ruby/object:Gem::Dependency
|
55
|
+
prerelease: false
|
56
|
+
type: :development
|
57
|
+
name: rdoc
|
58
|
+
version_requirements: &id002 !ruby/object:Gem::Requirement
|
59
|
+
requirements:
|
60
|
+
- - ~>
|
61
|
+
- !ruby/object:Gem::Version
|
62
|
+
segments:
|
63
|
+
- 3
|
64
|
+
- 12
|
65
|
+
version: "3.12"
|
66
|
+
requirement: *id002
|
67
|
+
- !ruby/object:Gem::Dependency
|
68
|
+
prerelease: false
|
69
|
+
type: :development
|
70
|
+
name: bundler
|
71
|
+
version_requirements: &id003 !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - ~>
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
segments:
|
76
|
+
- 1
|
77
|
+
- 1
|
78
|
+
- 5
|
79
|
+
version: 1.1.5
|
80
|
+
requirement: *id003
|
81
|
+
- !ruby/object:Gem::Dependency
|
82
|
+
prerelease: false
|
83
|
+
type: :development
|
84
|
+
name: jeweler
|
85
|
+
version_requirements: &id004 !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ~>
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
segments:
|
90
|
+
- 1
|
91
|
+
- 8
|
92
|
+
- 4
|
93
|
+
version: 1.8.4
|
94
|
+
requirement: *id004
|
95
|
+
- !ruby/object:Gem::Dependency
|
96
|
+
prerelease: false
|
97
|
+
type: :development
|
98
|
+
name: rcov
|
99
|
+
version_requirements: &id005 !ruby/object:Gem::Requirement
|
100
|
+
requirements:
|
101
|
+
- - ">="
|
102
|
+
- !ruby/object:Gem::Version
|
103
|
+
segments:
|
104
|
+
- 0
|
105
|
+
version: "0"
|
106
|
+
requirement: *id005
|
107
|
+
description: Rubygem for interacting with OffensiveComputing.net, a malware sharing community. This allows for query and downloading of malware
|
108
|
+
email: rubygems@chrislee.dhs.org
|
109
|
+
executables: []
|
110
|
+
|
111
|
+
extensions: []
|
112
|
+
|
113
|
+
extra_rdoc_files:
|
114
|
+
- LICENSE.txt
|
115
|
+
- README.rdoc
|
116
|
+
files:
|
117
|
+
- .document
|
118
|
+
- Gemfile
|
119
|
+
- Gemfile.lock
|
120
|
+
- LICENSE.txt
|
121
|
+
- README.rdoc
|
122
|
+
- Rakefile
|
123
|
+
- VERSION
|
124
|
+
- lib/offensivecomputing.rb
|
125
|
+
- lib/offensivecomputing/offensivecomputing.rb
|
126
|
+
- test/helper.rb
|
127
|
+
- test/test_offensivecomputing.rb
|
128
|
+
has_rdoc: true
|
129
|
+
homepage: http://github.com/chrislee35/offensivecomputing
|
130
|
+
licenses:
|
131
|
+
- MIT
|
132
|
+
post_install_message:
|
133
|
+
rdoc_options: []
|
134
|
+
|
135
|
+
require_paths:
|
136
|
+
- lib
|
137
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
138
|
+
requirements:
|
139
|
+
- - ">="
|
140
|
+
- !ruby/object:Gem::Version
|
141
|
+
segments:
|
142
|
+
- 0
|
143
|
+
version: "0"
|
144
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
145
|
+
requirements:
|
146
|
+
- - ">="
|
147
|
+
- !ruby/object:Gem::Version
|
148
|
+
segments:
|
149
|
+
- 0
|
150
|
+
version: "0"
|
151
|
+
requirements: []
|
152
|
+
|
153
|
+
rubyforge_project:
|
154
|
+
rubygems_version: 1.3.6
|
155
|
+
signing_key:
|
156
|
+
specification_version: 3
|
157
|
+
summary: Rubygem for interacting with OffensiveComputing.net, a malware sharing community
|
158
|
+
test_files: []
|
159
|
+
|
metadata.gz.sig
ADDED
Binary file
|