pwn 0.4.732 → 0.4.733

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8b0a86add4de60f9c9241450a6e7e6d9b96dcd473024fed599a79eff838c1ba3
4
- data.tar.gz: a6f59f9688ff2217162596b97faa30eabd7437ea92b3ca8c4108adb1c85d95ef
3
+ metadata.gz: 6440be0b7c0dc86b8551df9a4b9cb2b5779924b77ffc3d6687a4872c9703b4e8
4
+ data.tar.gz: 5a16d32ada65b0bb631f0238c17760f25543db8a7082d2382054bfe37009a063
5
5
  SHA512:
6
- metadata.gz: d33c3c1cca76b67ea8d7609b1bb192f9673c40ea1457c4ea7b037fc43c3e17afba2b27d8e8922d6aae72c28815cc2a4304b2732500a9532e94aa19e2ae46448c
7
- data.tar.gz: 9f7a6b1994d58f2398deac4aee75b6023088bf1fb55496d11780231ff0b4c9d977f85408a2ca939e20504ee795b759bf8149d132b7fa09c416cbd6dd932294d0
6
+ metadata.gz: 46e43c9b96e9a2d71fa1ec70fca237c71c6b1defae51d714a39b9f35603f822ac8eff72a604f2da2c84dabcd6722c2c8f683690acf89307587609550034c04ce
7
+ data.tar.gz: 7e88c613bfc17b98d37d54e8b6722751a88d4b377f73eb2f300d26374d61dc91f99522c8a0e7c686ab9cba474d68cb8286c982fdc1ac355482efc33fb81e6511
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.732]:001 >>> PWN.help
40
+ pwn[v0.4.733]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.732]:001 >>> PWN.help
55
+ pwn[v0.4.733]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -59,30 +59,30 @@ module PWN
59
59
 
60
60
  when :post, :put
61
61
  headers = opts[:http_headers]
62
- if http_body.key?(:multipart)
63
- headers ||= {
64
- authorization: "Bearer #{token}"
65
- }
66
- response = rest_client.execute(
67
- method: :post,
68
- url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
69
- headers: headers,
70
- payload: http_body,
71
- verify_ssl: false
72
- )
73
- else
74
- headers ||= {
75
- content_type: content_type,
76
- authorization: "Bearer #{token}"
77
- }
78
- response = rest_client.execute(
79
- method: http_method,
80
- url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
81
- headers: headers,
82
- payload: http_body.to_json,
83
- verify_ssl: false
84
- )
85
- end
62
+ # if http_body.key?(:multipart)
63
+ headers ||= {
64
+ authorization: "Bearer #{token}"
65
+ }
66
+ response = rest_client.execute(
67
+ method: :post,
68
+ url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
69
+ headers: headers,
70
+ payload: http_body,
71
+ verify_ssl: false
72
+ )
73
+ # else
74
+ # headers ||= {
75
+ # content_type: content_type,
76
+ # authorization: "Bearer #{token}"
77
+ # }
78
+ # response = rest_client.execute(
79
+ # method: http_method,
80
+ # url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
81
+ # headers: headers,
82
+ # payload: http_body.to_json,
83
+ # verify_ssl: false
84
+ # )
85
+ # end
86
86
  else
87
87
  raise @@logger.error("Unsupported HTTP Method #{http_method} for #{self} Plugin")
88
88
  end
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.732'
4
+ VERSION = '0.4.733'
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.732
4
+ version: 0.4.733
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.