offensivecomputing 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
data.tar.gz.sig ADDED
Binary file
data/.document ADDED
@@ -0,0 +1,5 @@
1
+ lib/**/*.rb
2
+ bin/*
3
+ -
4
+ features/**/*.feature
5
+ LICENSE.txt
data/Gemfile ADDED
@@ -0,0 +1,14 @@
1
+ source "http://rubygems.org"
2
+ # Add dependencies required to use your gem here.
3
+ # Example:
4
+ # gem "activesupport", ">= 2.3.5"
5
+
6
+ # Add dependencies to develop your gem here.
7
+ # Include everything needed to run rake, tests, features, etc.
8
+ group :development do
9
+ gem "shoulda", ">= 0"
10
+ gem "rdoc", "~> 3.12"
11
+ gem "bundler", "~> 1.1.5"
12
+ gem "jeweler", "~> 1.8.4"
13
+ gem "rcov", ">= 0"
14
+ end
data/Gemfile.lock ADDED
@@ -0,0 +1,35 @@
1
+ GEM
2
+ remote: http://rubygems.org/
3
+ specs:
4
+ activesupport (3.2.8)
5
+ i18n (~> 0.6)
6
+ multi_json (~> 1.0)
7
+ git (1.2.5)
8
+ i18n (0.6.0)
9
+ jeweler (1.8.4)
10
+ bundler (~> 1.0)
11
+ git (>= 1.2.5)
12
+ rake
13
+ rdoc
14
+ json (1.7.5)
15
+ multi_json (1.3.6)
16
+ rake (0.9.2.2)
17
+ rcov (1.0.0)
18
+ rdoc (3.12)
19
+ json (~> 1.4)
20
+ shoulda (3.1.1)
21
+ shoulda-context (~> 1.0)
22
+ shoulda-matchers (~> 1.2)
23
+ shoulda-context (1.0.0)
24
+ shoulda-matchers (1.2.0)
25
+ activesupport (>= 3.0.0)
26
+
27
+ PLATFORMS
28
+ ruby
29
+
30
+ DEPENDENCIES
31
+ bundler (~> 1.1.5)
32
+ jeweler (~> 1.8.4)
33
+ rcov
34
+ rdoc (~> 3.12)
35
+ shoulda
data/LICENSE.txt ADDED
@@ -0,0 +1,20 @@
1
+ Copyright (c) 2012 chrislee35
2
+
3
+ Permission is hereby granted, free of charge, to any person obtaining
4
+ a copy of this software and associated documentation files (the
5
+ "Software"), to deal in the Software without restriction, including
6
+ without limitation the rights to use, copy, modify, merge, publish,
7
+ distribute, sublicense, and/or sell copies of the Software, and to
8
+ permit persons to whom the Software is furnished to do so, subject to
9
+ the following conditions:
10
+
11
+ The above copyright notice and this permission notice shall be
12
+ included in all copies or substantial portions of the Software.
13
+
14
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
15
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
16
+ MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
17
+ NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
18
+ LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
19
+ OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
20
+ WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
data/README.rdoc ADDED
@@ -0,0 +1,46 @@
1
+ = offensivecomputing
2
+
3
+ Rubygem for interacting with OffensiveComputing.net, a malware sharing community. This allows for query and downloading of malware.
4
+
5
+ oc = OffensiveComputing::MalwareSearch.new(user, pass)
6
+ recs = oc.search("4462aae981360f73b0016d69029321b4")
7
+ pp recs => [#<struct OffensiveComputing::MalwareResult
8
+ md5="4462aae981360f73b0016d69029321b4",
9
+ sha1="f8229be77c429c84f4c612a4f106bc54a96a8733",
10
+ sha256="f951deff6086a1e68f0d09bd3856f1c1af5c117590443ea05d171a75969bbb63",
11
+ filename="4462aae981360f73b0016d69029321b4.EXE",
12
+ added=Sat May 26 17:38:23 UTC 2007,
13
+ magic="MZ executable for MS-DOS",
14
+ packer=nil,
15
+ avresults=
16
+ [#<struct OffensiveComputing::AVResult
17
+ name="ClamAV",
18
+ signature="VGEN.735.3">,
19
+ #<struct OffensiveComputing::AVResult
20
+ name="BitDefender",
21
+ signature="GenDropper.MutaGen">,
22
+ #<struct OffensiveComputing::AVResult
23
+ name="Kaspersky",
24
+ signature="Virus.DOS.MutaGen.100.Test.1325">,
25
+ #<struct OffensiveComputing::AVResult
26
+ name="AVGScan",
27
+ signature="Virus found Mutagen">],
28
+ tags=nil,
29
+ dlurl="download.php?id=1...7&auth=9...e">]
30
+
31
+
32
+ == Contributing to offensivecomputing
33
+
34
+ * Check out the latest master to make sure the feature hasn't been implemented or the bug hasn't been fixed yet.
35
+ * Check out the issue tracker to make sure someone already hasn't requested it and/or contributed it.
36
+ * Fork the project.
37
+ * Start a feature/bugfix branch.
38
+ * Commit and push until you are happy with your contribution.
39
+ * Make sure to add tests for it. This is important so I don't break it in a future version unintentionally.
40
+ * Please try not to mess with the Rakefile, version, or history. If you want to have your own version, or is otherwise necessary, that is fine, but please isolate to its own commit so I can cherry-pick around it.
41
+
42
+ == Copyright
43
+
44
+ Copyright (c) 2012 chrislee35. See LICENSE.txt for
45
+ further details.
46
+
data/Rakefile ADDED
@@ -0,0 +1,54 @@
1
+ # encoding: utf-8
2
+
3
+ require 'rubygems'
4
+ require 'bundler'
5
+ begin
6
+ Bundler.setup(:default, :development)
7
+ rescue Bundler::BundlerError => e
8
+ $stderr.puts e.message
9
+ $stderr.puts "Run `bundle install` to install missing gems"
10
+ exit e.status_code
11
+ end
12
+ require 'rake'
13
+
14
+ require 'jeweler'
15
+ Jeweler::Tasks.new do |gem|
16
+ # gem is a Gem::Specification... see http://docs.rubygems.org/read/chapter/20 for more options
17
+ gem.name = "offensivecomputing"
18
+ gem.homepage = "http://github.com/chrislee35/offensivecomputing"
19
+ gem.license = "MIT"
20
+ gem.summary = %Q{Rubygem for interacting with OffensiveComputing.net, a malware sharing community}
21
+ gem.description = %Q{Rubygem for interacting with OffensiveComputing.net, a malware sharing community. This allows for query and downloading of malware}
22
+ gem.email = "rubygems@chrislee.dhs.org"
23
+ gem.authors = ["chrislee35"]
24
+ gem.signing_key = "#{File.dirname(__FILE__)}/../gem-private_key.pem"
25
+ gem.cert_chain = ["#{File.dirname(__FILE__)}/../gem-public_cert.pem"]
26
+ end
27
+ Jeweler::RubygemsDotOrgTasks.new
28
+
29
+ require 'rake/testtask'
30
+ Rake::TestTask.new(:test) do |test|
31
+ test.libs << 'lib' << 'test'
32
+ test.pattern = 'test/**/test_*.rb'
33
+ test.verbose = true
34
+ end
35
+
36
+ require 'rcov/rcovtask'
37
+ Rcov::RcovTask.new do |test|
38
+ test.libs << 'test'
39
+ test.pattern = 'test/**/test_*.rb'
40
+ test.verbose = true
41
+ test.rcov_opts << '--exclude "gems/*"'
42
+ end
43
+
44
+ task :default => :test
45
+
46
+ require 'rdoc/task'
47
+ Rake::RDocTask.new do |rdoc|
48
+ version = File.exist?('VERSION') ? File.read('VERSION') : ""
49
+
50
+ rdoc.rdoc_dir = 'rdoc'
51
+ rdoc.title = "offensivecomputing #{version}"
52
+ rdoc.rdoc_files.include('README*')
53
+ rdoc.rdoc_files.include('lib/**/*.rb')
54
+ end
data/VERSION ADDED
@@ -0,0 +1 @@
1
+ 0.1.0
@@ -0,0 +1 @@
1
+ require 'offensivecomputing/offensivecomputing'
@@ -0,0 +1,156 @@
1
+ require 'net/http'
2
+ require 'openssl'
3
+
4
+ module OffensiveComputing
5
+
6
+ class MalwareSearch
7
+ @@baseurl = "http://www.offensivecomputing.net"
8
+ @@user_agent = "Ruby/#{RUBY_VERSION} offensivecomputing rubygem (https://github.com/chrislee35/offensivecomputing)"
9
+
10
+ attr_reader :cookie
11
+ def initialize(username, password)
12
+ # login and get a cookie
13
+ # handle failures
14
+ params = {'edit[name]' => username, 'edit[pass]' => password, 'edit[form_id]' => 'user_login_block'}
15
+ @cookie = nil
16
+ @referer = @@baseurl
17
+ _post("?q=node&destination=node&op=Log+in", params)
18
+ end
19
+
20
+ def _request(request, url)
21
+ request.add_field("User-Agent", @@user_agent)
22
+ request.add_field("Referer", @referer)
23
+ request.add_field("Cookie", @cookie) if @cookie
24
+
25
+ http = Net::HTTP.new(url.host, url.port)
26
+ if url.scheme == 'https'
27
+ http.use_ssl = true
28
+ http.verify_mode = OpenSSL::SSL::VERIFY_NONE
29
+ http.verify_depth = 5
30
+ end
31
+ resp = http.request(request)
32
+ @cookie = resp.header["set-cookie"].split(/[,; ]+/).find_all{|x| x=~ /PHPSESSID/}.last if resp.header["set-cookie"]
33
+ resp.body
34
+ end
35
+
36
+ def _post(path, params=nil)
37
+ url = URI.parse "#{@@baseurl}/#{path}"
38
+ path = url.path
39
+ if url.query
40
+ path += "?"+url.query
41
+ end
42
+ #puts path
43
+ request = Net::HTTP::Post.new(path)
44
+ request.set_form_data(params) if params
45
+ _request(request, url)
46
+ end
47
+
48
+ def _get(path, params=nil)
49
+ url = URI.parse "#{@@baseurl}/#{path}"
50
+ data = nil
51
+ path = url.path
52
+ if params and params.length > 0
53
+ data = params.map { |k,v|
54
+ "#{k}=#{v}".gsub(/([^ a-zA-Z0-9_.-=]+)/) do
55
+ '%' + $1.unpack('H2' * $1.bytesize).join('%').upcase
56
+ end.tr(' ', '+')
57
+ }.join("&")
58
+ end
59
+ if data and url.query
60
+ path += "?#{url.query}&#{data}"
61
+ elsif data
62
+ path += "?#{data}"
63
+ elsif url.query
64
+ path += "?#{url.query}"
65
+ end
66
+ request = Net::HTTP::Get.new(path)
67
+ _request(request, url)
68
+ end
69
+
70
+ def search(hash)
71
+ params = {'search'=>hash} # 'slowsearch'=>'on'
72
+ body = _post('?q=ocsearch', params)
73
+ records = []
74
+ table = body.match(/<\!\-\- begin content.*?<\!\-\- end content \-\->/).to_s
75
+ if table
76
+ urls = table.scan(/download[^\"]+/)
77
+ arr = table.gsub(/<.*?>/,"\t").gsub(/\s*\t+/,"\t").split(/\t/)
78
+ #pp arr
79
+ field = nil
80
+ rec = {}
81
+ avname = nil
82
+ arr.each do |item|
83
+ if item == "infected"
84
+ records << MalwareResult.new(rec[:md5],rec[:sha1],rec[:sha256],rec[:filename],rec[:added],rec[:magic],rec[:packer],rec[:avresults],rec[:tags],rec[:dlurl], self)
85
+ elsif item == "MD5:"
86
+ field = :md5
87
+ elsif item == "SHA1:"
88
+ field = :sha1
89
+ elsif item == "SHA256:"
90
+ field = :sha256
91
+ elsif item == "Original Submitted Filename:"
92
+ field = :filename
93
+ elsif item == "Date Added:"
94
+ field = :added
95
+ elsif item == "Magic File Type:"
96
+ field = :magic
97
+ elsif item == "Packer Signature:"
98
+ field = :packer
99
+ elsif item == "Anti-Virus Results:"
100
+ field = :avresults
101
+ elsif item == "Tags:"
102
+ field = :tags
103
+ elsif item == "Add a tag:"
104
+ field = nil
105
+ elsif item == "Download Sample"
106
+ rec[:dlurl] = urls.shift
107
+ elsif field == :md5 and item =~ /^[0-9a-f]{32}$/
108
+ rec[field] = item
109
+ elsif field == :sha1 and item =~ /^[0-9a-f]{40}$/
110
+ rec[field] = item
111
+ elsif field == :sha256 and item =~ /^[0-9a-f]{64}$/
112
+ rec[field] = item
113
+ elsif field == :filename
114
+ rec[field] = item
115
+ elsif field == :added and item =~ /^\d{4}\-\d{2}\-\d{2}/
116
+ rec[field] = Time.parse("#{item} +0000").utc
117
+ elsif field == :magic
118
+ rec[field] = item
119
+ elsif field == :avresults
120
+ #puts "DEBUG: avresults #{item}"
121
+ rec[field] = [] unless rec[field]
122
+ if avname
123
+ rec[field] << AVResult.new(avname,item)
124
+ avname = nil
125
+ else
126
+ avname = item
127
+ end
128
+ elsif field == :tags
129
+ rec[field] = [] unless rec[field]
130
+ rec[field] << item
131
+ end
132
+ end
133
+ end
134
+ records
135
+ end
136
+
137
+ def download(malwareresult,filename=nil)
138
+ if malwareresult.respond_to? :dlurl and malwareresult.dlurl
139
+ doc = _get(malwareresult.dlurl)
140
+ if filename
141
+ File.open(filename,'w') do |f|
142
+ f.write(doc)
143
+ end
144
+ end
145
+ doc
146
+ end
147
+ end
148
+ end
149
+
150
+ class MalwareResult < Struct.new(:md5, :sha1, :sha256, :filename, :added, :magic, :packer, :avresults, :tags, :dlurl, :malwaresearch);
151
+ def download(filename=nil)
152
+ self.malwaresearch.download(self,filename)
153
+ end
154
+ end
155
+ class AVResult < Struct.new(:name, :signature); end
156
+ end
data/test/helper.rb ADDED
@@ -0,0 +1,18 @@
1
+ require 'rubygems'
2
+ require 'bundler'
3
+ begin
4
+ Bundler.setup(:default, :development)
5
+ rescue Bundler::BundlerError => e
6
+ $stderr.puts e.message
7
+ $stderr.puts "Run `bundle install` to install missing gems"
8
+ exit e.status_code
9
+ end
10
+ require 'test/unit'
11
+ require 'shoulda'
12
+
13
+ $LOAD_PATH.unshift(File.join(File.dirname(__FILE__), '..', 'lib'))
14
+ $LOAD_PATH.unshift(File.dirname(__FILE__))
15
+ require 'offensivecomputing'
16
+
17
+ class Test::Unit::TestCase
18
+ end
@@ -0,0 +1,37 @@
1
+ require 'helper'
2
+ require 'digest/md5'
3
+ require 'pp'
4
+
5
+ class TestOffensivecomputing < Test::Unit::TestCase
6
+ should "log into OC and search for 4462aae981360f73b0016d69029321b4" do
7
+ fail "You must set OCUSER and OCPASS in your environment before running tests\nE.g.\nexport OCUSER=\"l33tsloth\"\nexport OCPASS=\"n3v3r+f33r\"\n" unless ENV['OCUSER'] and ENV['OCPASS']
8
+ oc = OffensiveComputing::MalwareSearch.new(ENV['OCUSER'], ENV['OCPASS'])
9
+ recs = oc.search("4462aae981360f73b0016d69029321b4")
10
+ assert_equal(1, recs.length)
11
+ rec = recs[0]
12
+ assert_equal(
13
+ ["4462aae981360f73b0016d69029321b4",
14
+ "f8229be77c429c84f4c612a4f106bc54a96a8733",
15
+ "f951deff6086a1e68f0d09bd3856f1c1af5c117590443ea05d171a75969bbb63",
16
+ "4462aae981360f73b0016d69029321b4.EXE",
17
+ "Sat May 26 17:38:23 UTC 2007",
18
+ "MZ executable for MS-DOS",
19
+ nil,
20
+ nil], [rec.md5,rec.sha1,rec.sha256,rec.filename,rec.added.to_s,rec.magic,rec.packer,rec.tags])
21
+ file = "test/test.bin"
22
+ dl = rec.download(file)
23
+ assert_equal(1277,dl.length)
24
+ assert_equal(1277,File.size(file))
25
+ assert_equal("103835290aa6daa55d270bf3dde84271",Digest::MD5.hexdigest(dl))
26
+ assert_equal("103835290aa6daa55d270bf3dde84271",Digest::MD5.hexdigest(File.open(file).read))
27
+ if File.exists? file
28
+ File.unlink(file)
29
+ end
30
+ end
31
+ should "log into OC and search for \"conficker\"" do
32
+ fail "You must set OCUSER and OCPASS in your environment before running tests\nE.g.\nexport OCUSER=\"l33tsloth\"\nexport OCPASS=\"n3v3r+f33r\"\n" unless ENV['OCUSER'] and ENV['OCPASS']
33
+ oc = OffensiveComputing::MalwareSearch.new(ENV['OCUSER'], ENV['OCPASS'])
34
+ recs = oc.search("conficker")
35
+ assert_equal(4, recs.length)
36
+ end
37
+ end
metadata ADDED
@@ -0,0 +1,159 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: offensivecomputing
3
+ version: !ruby/object:Gem::Version
4
+ prerelease: false
5
+ segments:
6
+ - 0
7
+ - 1
8
+ - 0
9
+ version: 0.1.0
10
+ platform: ruby
11
+ authors:
12
+ - chrislee35
13
+ autorequire:
14
+ bindir: bin
15
+ cert_chain:
16
+ - |
17
+ -----BEGIN CERTIFICATE-----
18
+ MIIDYjCCAkqgAwIBAgIBADANBgkqhkiG9w0BAQUFADBXMREwDwYDVQQDDAhydWJ5
19
+ Z2VtczEYMBYGCgmSJomT8ixkARkWCGNocmlzbGVlMRMwEQYKCZImiZPyLGQBGRYD
20
+ ZGhzMRMwEQYKCZImiZPyLGQBGRYDb3JnMB4XDTExMDIyNzE1MzAxOVoXDTEyMDIy
21
+ NzE1MzAxOVowVzERMA8GA1UEAwwIcnVieWdlbXMxGDAWBgoJkiaJk/IsZAEZFghj
22
+ aHJpc2xlZTETMBEGCgmSJomT8ixkARkWA2RoczETMBEGCgmSJomT8ixkARkWA29y
23
+ ZzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALNM1Hjs6q58sf7Jp64A
24
+ vEY2cnRWDdFpD8UWpwaJK5kgSHOVgs+0mtszn+YlYjmx8kpmuYpyU4g9mNMImMQe
25
+ ow8pVsL4QBBK/1Ozgdxrsptk3IiTozMYA+g2I/+WvZSEDu9uHkKe8pvMBEMrg7RJ
26
+ IN7+jWaPnSzg3DbFwxwOdi+QRw33DjK7oFWcOaaBqWTUpI4epdi/c/FE1I6UWULJ
27
+ ZF/Uso0Sc2Pp/YuVhuMHGrUbn7zrWWo76nnK4DTLfXFDbZF5lIXT1w6BtIiN6Ho9
28
+ Rdr/W6663hYUo3WMsUSa3I5+PJXEBKmGHIZ2TNFnoFIRHha2fmm1HC9+BTaKwcO9
29
+ PLcCAwEAAaM5MDcwCQYDVR0TBAIwADAdBgNVHQ4EFgQURzsNkZo2rv86Ftc+hVww
30
+ RNICMrwwCwYDVR0PBAQDAgSwMA0GCSqGSIb3DQEBBQUAA4IBAQBRRw/iNA/PdnvW
31
+ OBoNCSr/IiHOGZqMHgPJwyWs68FhThnLc2EyIkuLTQf98ms1/D3p0XX9JsxazvKT
32
+ W/in8Mm/R2fkVziSdzqChtw/4Z4bW3c+RF7TgX6SP5cKxNAfKmAPuItcs2Y+7bdS
33
+ hr/FktVtT2iAmISRnlEbdaTpfl6N2ZWNT83khV6iOs5xRkX/+0e+GgAv9mE6nqr1
34
+ AkuDXMhposxcnFZUrZ3UtMPEe/JnyP7Vv6pvr3qtZm8FidFZU91+rX/fwdyBU8RP
35
+ /5l8uLWXXNt1wEbtu4N1I66LwTK2iRrQZE8XtlgZGbxYDFUkiurq3OafF2YwRs6W
36
+ 6yhklP75
37
+ -----END CERTIFICATE-----
38
+
39
+ date: 2012-09-06 00:00:00 -04:00
40
+ default_executable:
41
+ dependencies:
42
+ - !ruby/object:Gem::Dependency
43
+ prerelease: false
44
+ type: :development
45
+ name: shoulda
46
+ version_requirements: &id001 !ruby/object:Gem::Requirement
47
+ requirements:
48
+ - - ">="
49
+ - !ruby/object:Gem::Version
50
+ segments:
51
+ - 0
52
+ version: "0"
53
+ requirement: *id001
54
+ - !ruby/object:Gem::Dependency
55
+ prerelease: false
56
+ type: :development
57
+ name: rdoc
58
+ version_requirements: &id002 !ruby/object:Gem::Requirement
59
+ requirements:
60
+ - - ~>
61
+ - !ruby/object:Gem::Version
62
+ segments:
63
+ - 3
64
+ - 12
65
+ version: "3.12"
66
+ requirement: *id002
67
+ - !ruby/object:Gem::Dependency
68
+ prerelease: false
69
+ type: :development
70
+ name: bundler
71
+ version_requirements: &id003 !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ~>
74
+ - !ruby/object:Gem::Version
75
+ segments:
76
+ - 1
77
+ - 1
78
+ - 5
79
+ version: 1.1.5
80
+ requirement: *id003
81
+ - !ruby/object:Gem::Dependency
82
+ prerelease: false
83
+ type: :development
84
+ name: jeweler
85
+ version_requirements: &id004 !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - ~>
88
+ - !ruby/object:Gem::Version
89
+ segments:
90
+ - 1
91
+ - 8
92
+ - 4
93
+ version: 1.8.4
94
+ requirement: *id004
95
+ - !ruby/object:Gem::Dependency
96
+ prerelease: false
97
+ type: :development
98
+ name: rcov
99
+ version_requirements: &id005 !ruby/object:Gem::Requirement
100
+ requirements:
101
+ - - ">="
102
+ - !ruby/object:Gem::Version
103
+ segments:
104
+ - 0
105
+ version: "0"
106
+ requirement: *id005
107
+ description: Rubygem for interacting with OffensiveComputing.net, a malware sharing community. This allows for query and downloading of malware
108
+ email: rubygems@chrislee.dhs.org
109
+ executables: []
110
+
111
+ extensions: []
112
+
113
+ extra_rdoc_files:
114
+ - LICENSE.txt
115
+ - README.rdoc
116
+ files:
117
+ - .document
118
+ - Gemfile
119
+ - Gemfile.lock
120
+ - LICENSE.txt
121
+ - README.rdoc
122
+ - Rakefile
123
+ - VERSION
124
+ - lib/offensivecomputing.rb
125
+ - lib/offensivecomputing/offensivecomputing.rb
126
+ - test/helper.rb
127
+ - test/test_offensivecomputing.rb
128
+ has_rdoc: true
129
+ homepage: http://github.com/chrislee35/offensivecomputing
130
+ licenses:
131
+ - MIT
132
+ post_install_message:
133
+ rdoc_options: []
134
+
135
+ require_paths:
136
+ - lib
137
+ required_ruby_version: !ruby/object:Gem::Requirement
138
+ requirements:
139
+ - - ">="
140
+ - !ruby/object:Gem::Version
141
+ segments:
142
+ - 0
143
+ version: "0"
144
+ required_rubygems_version: !ruby/object:Gem::Requirement
145
+ requirements:
146
+ - - ">="
147
+ - !ruby/object:Gem::Version
148
+ segments:
149
+ - 0
150
+ version: "0"
151
+ requirements: []
152
+
153
+ rubyforge_project:
154
+ rubygems_version: 1.3.6
155
+ signing_key:
156
+ specification_version: 3
157
+ summary: Rubygem for interacting with OffensiveComputing.net, a malware sharing community
158
+ test_files: []
159
+
metadata.gz.sig ADDED
Binary file