pwn 0.4.835 → 0.4.837
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/lib/pwn/version.rb +1 -1
- data/lib/pwn/www/hacker_one.rb +29 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c62dbc369c525330565c28759d1ab4dd31a634a3e45b65fff4f3c10fef9f0eb9
|
4
|
+
data.tar.gz: d962a713eec0082ca28f8a4b97b7eaf8302f81fcac9c1b3cf7b30b633dc52131
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 05d61a72fd321924955cae42f996a5b2bc786c91ff8caf92a92ad5e32442a589b79c37878088ffcc60dba2fe0b7c32ff054e5ac5064eda99822d472530f65fa3
|
7
|
+
data.tar.gz: d4bbaa072d08f38a3a00ab9f1a07f17673aef5b2eb8d52cae8bd44896852ffd935c55efc32c0053ead9766d339b402532e30bda18f71cd0eaf4b55c0f68fe9ba
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
38
38
|
$ gem install --verbose pwn
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.4.
|
40
|
+
pwn[v0.4.837]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.4.
|
55
|
+
pwn[v0.4.837]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
|
data/lib/pwn/version.rb
CHANGED
data/lib/pwn/www/hacker_one.rb
CHANGED
@@ -23,6 +23,30 @@ module PWN
|
|
23
23
|
raise e
|
24
24
|
end
|
25
25
|
|
26
|
+
# Supported Method Parameters::
|
27
|
+
# browser_obj = PWN::WWW::HackerOne.get_bounty_org_links(
|
28
|
+
# browser_obj: 'required - browser_obj returned from #open method',
|
29
|
+
# proxy: 'optional - scheme://proxy_host:port || tor'
|
30
|
+
# )
|
31
|
+
|
32
|
+
public_class_method def self.get_bounty_org_links(opts = {})
|
33
|
+
browser_obj = opts[:browser_obj]
|
34
|
+
browser = browser_obj[:browser]
|
35
|
+
|
36
|
+
bb_orgs = 'https://hackerone.com/bug-bounty-programs'
|
37
|
+
browser.goto(bb_orgs)
|
38
|
+
|
39
|
+
bb_orgs_arr = []
|
40
|
+
browser.links.each do |link|
|
41
|
+
bb_orgs_arr.push(link.href) if link.href && link.text == ''
|
42
|
+
print '.'
|
43
|
+
end
|
44
|
+
|
45
|
+
bb_orgs_arr
|
46
|
+
rescue StandardError => e
|
47
|
+
raise e
|
48
|
+
end
|
49
|
+
|
26
50
|
# Supported Method Parameters::
|
27
51
|
# browser_obj = PWN::WWW::HackerOne.login(
|
28
52
|
# browser_obj: 'required - browser_obj returned from #open method',
|
@@ -104,6 +128,11 @@ module PWN
|
|
104
128
|
browser = browser_obj[:browser]
|
105
129
|
puts browser.public_methods
|
106
130
|
|
131
|
+
bb_orgs_arr = #{self}.get_bounty_org_links(
|
132
|
+
browser_obj: 'required - browser_obj returned from #open method',
|
133
|
+
proxy: 'optional - scheme://proxy_host:port || tor'
|
134
|
+
)
|
135
|
+
|
107
136
|
browser_obj = #{self}.login(
|
108
137
|
browser_obj: 'required - browser_obj returned from #open method',
|
109
138
|
username: 'required - username',
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: pwn
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.4.
|
4
|
+
version: 0.4.837
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- 0day Inc.
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-08-
|
11
|
+
date: 2023-08-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: activesupport
|