pwn 0.4.850 → 0.4.851
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/lib/pwn/version.rb +1 -1
- data/lib/pwn/www/hacker_one.rb +12 -4
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 68f48c50d16ebd56e19ffdc102ff07fe09f6bf7dd3176638a8f6e9902d7c7c73
|
4
|
+
data.tar.gz: 593536b5c7076fd9bc71c691584de83fdf2689938f8e0004b59018d575699ca9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 5f36369ae56660ecaa12710e96257080854c5d2a108776facbca305b9ba622e68f4f36413e31fc04701f9c9d1f340dc5506d759d4c3b71efad414c90512ce92b
|
7
|
+
data.tar.gz: 51d03ad68193af874ceb1390e08f8fb6e92591d2eb58966bd5ee8f1d21e38a885c771cb9a17d07fb7d72a9c2386dc88586f2a91b17cfab6af4bc7d62b39d6106
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
38
38
|
$ gem install --verbose pwn
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.4.
|
40
|
+
pwn[v0.4.851]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.4.
|
55
|
+
pwn[v0.4.851]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
|
data/lib/pwn/version.rb
CHANGED
data/lib/pwn/www/hacker_one.rb
CHANGED
@@ -26,12 +26,15 @@ module PWN
|
|
26
26
|
# Supported Method Parameters::
|
27
27
|
# bb_prograns_arr = PWN::WWW::HackerOne.get_bounty_programs(
|
28
28
|
# browser_obj: 'required - browser_obj returned from #open method',
|
29
|
-
# proxy: 'optional - scheme://proxy_host:port || tor'
|
29
|
+
# proxy: 'optional - scheme://proxy_host:port || tor',
|
30
|
+
# min_payouts_enabled: 'optional - only display programs where payouts are > $0.00 (defaults to false)'
|
30
31
|
# )
|
31
32
|
|
32
33
|
public_class_method def self.get_bounty_programs(opts = {})
|
33
34
|
browser_obj = opts[:browser_obj]
|
34
35
|
browser = browser_obj[:browser]
|
36
|
+
min_payouts_enabled = true if opts[:min_payouts_enabled]
|
37
|
+
min_payouts_enabled ||= false
|
35
38
|
|
36
39
|
browser.goto('https://hackerone.com/bug-bounty-programs')
|
37
40
|
# Wait for JavaScript to load the DOM
|
@@ -39,11 +42,15 @@ module PWN
|
|
39
42
|
bb_programs_arr = []
|
40
43
|
browser.ul(class: 'program__meta-data').wait_until(&:present?)
|
41
44
|
browser.uls(class: 'program__meta-data').each do |ul|
|
42
|
-
|
45
|
+
min_payout = ul.text.split('$').last.split.first.to_f
|
46
|
+
|
47
|
+
next if min_payouts_enabled && min_payout.zero?
|
43
48
|
|
49
|
+
print '.'
|
44
50
|
link = ul.first.text
|
45
|
-
|
51
|
+
min_payout_fmt = format('$%0.2f', min_payout)
|
46
52
|
|
53
|
+
|
47
54
|
bounty_program_hash = {
|
48
55
|
name: link.split('/').last,
|
49
56
|
min_payout: min_payout,
|
@@ -140,7 +147,8 @@ module PWN
|
|
140
147
|
|
141
148
|
bb_prograns_arr = #{self}.get_bounty_programs(
|
142
149
|
browser_obj: 'required - browser_obj returned from #open method',
|
143
|
-
proxy: 'optional - scheme://proxy_host:port || tor'
|
150
|
+
proxy: 'optional - scheme://proxy_host:port || tor',
|
151
|
+
min_payouts_enabled: 'optional - only display programs where payouts are > $0.00 (defaults to false)'
|
144
152
|
)
|
145
153
|
|
146
154
|
browser_obj = #{self}.login(
|