pwn 0.5.409 → 0.5.411
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile +1 -1
- data/README.md +3 -3
- data/bin/pwn_burp_suite_pro_active_rest_api_scan +1 -3
- data/bin/pwn_burp_suite_pro_active_scan +1 -3
- data/bin/pwn_zaproxy_active_rest_api_scan +5 -13
- data/bin/pwn_zaproxy_active_scan +1 -3
- data/lib/pwn/plugins/burp_suite.rb +7 -1
- data/lib/pwn/plugins/zaproxy.rb +21 -2
- data/lib/pwn/version.rb +1 -1
- data/third_party/pwn_rdoc.jsonl +15 -4
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6e8c4df2a4b02ded646f819e84eb0673aefc4f4a0f7a771ed5213d4d2b6ce3fd
|
4
|
+
data.tar.gz: ad1e9ad33c95d83bf7128d02600251e9229734d58c905854e29dc12511d23d83
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: c4e78349fe9c1729a8a3df6bf69a319a4e47c971fbc98791ae7b69da9a93561a6e15bb84c0a64a6f49653278aa42a936f1685fdb480440fe3300589cd1f7877d
|
7
|
+
data.tar.gz: 3a7ff1c398b1bcc19f4a42e6c9ceea872078e65df1f1b3efddf2d754a93b9086847fe10de27582ed00a22b60615f0c3b9a808e7568d5d7db7895d8f76eb6f32a
|
data/Gemfile
CHANGED
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ cd /opt/pwn
|
|
37
37
|
$ ./install.sh
|
38
38
|
$ ./install.sh ruby-gem
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.5.
|
40
|
+
pwn[v0.5.411]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.4.4@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.5.
|
55
|
+
pwn[v0.5.411]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
If you're using a multi-user install of RVM do:
|
@@ -62,7 +62,7 @@ $ rvm use ruby-3.4.4@pwn
|
|
62
62
|
$ rvmsudo gem uninstall --all --executables pwn
|
63
63
|
$ rvmsudo gem install --verbose pwn
|
64
64
|
$ pwn
|
65
|
-
pwn[v0.5.
|
65
|
+
pwn[v0.5.411]:001 >>> PWN.help
|
66
66
|
```
|
67
67
|
|
68
68
|
PWN periodically upgrades to the latest version of Ruby which is reflected in `/opt/pwn/.ruby-version`. The easiest way to upgrade to the latest version of Ruby from a previous PWN installation is to run the following script:
|
@@ -85,7 +85,6 @@ begin
|
|
85
85
|
burp_jar_path = opts[:burp_jar_path]
|
86
86
|
headless = opts[:headless] || false
|
87
87
|
browser_type = opts[:browser_type] ||= :firefox
|
88
|
-
browser_type = browser_type.to_s.downcase.to_sym unless browser_type.is_a?(Symbol)
|
89
88
|
debug = opts[:debug] || false
|
90
89
|
|
91
90
|
swagger_defs_arr = swagger_definitions.split(',').map(&:strip)
|
@@ -121,8 +120,7 @@ begin
|
|
121
120
|
if headless
|
122
121
|
burp_obj = PWN::Plugins::BurpSuite.start(
|
123
122
|
burp_jar_path: burp_jar_path,
|
124
|
-
headless: headless
|
125
|
-
browser_type: :headless
|
123
|
+
headless: headless
|
126
124
|
)
|
127
125
|
else
|
128
126
|
burp_obj = PWN::Plugins::BurpSuite.start(
|
@@ -66,7 +66,6 @@ begin
|
|
66
66
|
burp_jar_path = opts[:burp_jar_path]
|
67
67
|
headless = opts[:headless] || false
|
68
68
|
browser_type = opts[:browser_type] ||= :firefox
|
69
|
-
browser_type = browser_type.to_s.downcase.to_sym unless browser_type.is_a?(Symbol)
|
70
69
|
spider = opts[:spider] || false
|
71
70
|
navigation_instruct = opts[:navigation_instruct]
|
72
71
|
in_scope = opts[:in_scope] ||= target_url
|
@@ -76,8 +75,7 @@ begin
|
|
76
75
|
if headless
|
77
76
|
burp_obj = PWN::Plugins::BurpSuite.start(
|
78
77
|
burp_jar_path: burp_jar_path,
|
79
|
-
headless: headless
|
80
|
-
browser_type: :headless
|
78
|
+
headless: headless
|
81
79
|
)
|
82
80
|
else
|
83
81
|
burp_obj = PWN::Plugins::BurpSuite.start(
|
@@ -85,7 +85,6 @@ begin
|
|
85
85
|
zap_bin_path = opts[:zap_bin_path]
|
86
86
|
headless = opts[:headless] || false
|
87
87
|
browser_type = opts[:browser_type] ||= :firefox
|
88
|
-
browser_type = browser_type.to_s.downcase.to_sym unless browser_type.is_a?(Symbol)
|
89
88
|
debug = opts[:debug] || false
|
90
89
|
|
91
90
|
swagger_defs_arr = swagger_definitions.split(',').map(&:strip)
|
@@ -117,8 +116,7 @@ begin
|
|
117
116
|
zap_obj = PWN::Plugins::Zaproxy.start(
|
118
117
|
zap_bin_path: zap_bin_path,
|
119
118
|
api_key: api_key,
|
120
|
-
headless: headless
|
121
|
-
browser_type: :headless
|
119
|
+
headless: headless
|
122
120
|
)
|
123
121
|
else
|
124
122
|
zap_obj = PWN::Plugins::Zaproxy.start(
|
@@ -130,9 +128,12 @@ begin
|
|
130
128
|
|
131
129
|
logger.info(zap_obj)
|
132
130
|
|
131
|
+
additional_http_headers = JSON.parse(additional_http_headers, symbolize_names: true) if additional_http_headers.is_a?(String)
|
133
132
|
json_sitemap = PWN::Plugins::Zaproxy.import_openapi_to_sitemap(
|
134
133
|
zap_obj: zap_obj,
|
135
|
-
openapi_spec: openapi_spec
|
134
|
+
openapi_spec: openapi_spec,
|
135
|
+
additional_http_headers: additional_http_headers,
|
136
|
+
target_regex: in_scope
|
136
137
|
)
|
137
138
|
raise "ERROR: Failed to import OpenAPI/Swagger spec #{openapi_spec} into ZAP's Sitemap." if json_sitemap.nil? || json_sitemap.empty?
|
138
139
|
|
@@ -141,15 +142,6 @@ begin
|
|
141
142
|
target_regex: in_scope
|
142
143
|
)
|
143
144
|
|
144
|
-
if additional_http_headers.is_a?(String)
|
145
|
-
additional_http_headers = JSON.parse(additional_http_headers, symbolize_names: true)
|
146
|
-
PWN::Plugins::Zaproxy.inject_additional_http_headers(
|
147
|
-
zap_obj: zap_obj,
|
148
|
-
target_regex: in_scope,
|
149
|
-
headers: additional_http_headers
|
150
|
-
)
|
151
|
-
end
|
152
|
-
|
153
145
|
PWN::Plugins::Zaproxy.active_scan(
|
154
146
|
zap_obj: zap_obj,
|
155
147
|
target_url: in_scope,
|
data/bin/pwn_zaproxy_active_scan
CHANGED
@@ -73,7 +73,6 @@ begin
|
|
73
73
|
zap_bin_path = opts[:zap_bin_path].to_s.strip.chomp.scrub if File.exist?(opts[:zap_bin_path].to_s.strip.chomp.scrub)
|
74
74
|
headless = opts[:headless] || false
|
75
75
|
browser_type = opts[:browser_type] ||= :firefox
|
76
|
-
browser_type = browser_type.to_s.downcase.to_sym unless browser_type.is_a?(Symbol)
|
77
76
|
spider = opts[:spider] || false
|
78
77
|
navigation_instruct = opts[:navigation_instruct]
|
79
78
|
in_scope = opts[:in_scope] ||= "#{target_url}.*"
|
@@ -84,8 +83,7 @@ begin
|
|
84
83
|
zap_obj = PWN::Plugins::Zaproxy.start(
|
85
84
|
zap_bin_path: zap_bin_path,
|
86
85
|
api_key: api_key,
|
87
|
-
headless: headless
|
88
|
-
browser_type: :headless
|
86
|
+
headless: headless
|
89
87
|
)
|
90
88
|
else
|
91
89
|
zap_obj = PWN::Plugins::Zaproxy.start(
|
@@ -62,7 +62,10 @@ module PWN
|
|
62
62
|
|
63
63
|
burp_root = File.dirname(burp_jar_path)
|
64
64
|
|
65
|
+
headless = opts[:headless] || false
|
65
66
|
browser_type = opts[:browser_type] ||= :firefox
|
67
|
+
browser_type = browser_type.to_s.downcase.to_sym unless browser_type.is_a?(Symbol)
|
68
|
+
browser_type = :headless if headless
|
66
69
|
burp_ip = opts[:burp_ip] ||= '127.0.0.1'
|
67
70
|
burp_port = opts[:burp_port] ||= PWN::Plugins::Sock.get_random_unused_port
|
68
71
|
|
@@ -70,7 +73,7 @@ module PWN
|
|
70
73
|
pwn_burp_port = opts[:pwn_burp_port] ||= PWN::Plugins::Sock.get_random_unused_port
|
71
74
|
|
72
75
|
burp_cmd_string = 'java -Xms4G -Xmx16G'
|
73
|
-
burp_cmd_string = "#{burp_cmd_string} -Djava.awt.headless=true" if
|
76
|
+
burp_cmd_string = "#{burp_cmd_string} -Djava.awt.headless=true" if headless
|
74
77
|
burp_cmd_string = "#{burp_cmd_string} -Dproxy.address=#{burp_ip} -Dproxy.port=#{burp_port}"
|
75
78
|
burp_cmd_string = "#{burp_cmd_string} -Dserver.address=#{pwn_burp_ip} -Dserver.port=#{pwn_burp_port}"
|
76
79
|
burp_cmd_string = "#{burp_cmd_string} -jar #{burp_jar_path}"
|
@@ -485,6 +488,9 @@ module PWN
|
|
485
488
|
|
486
489
|
debug = opts[:debug] || false
|
487
490
|
|
491
|
+
openapi_spec_root = File.dirname(openapi_spec)
|
492
|
+
Dir.chdir(openapi_spec_root)
|
493
|
+
|
488
494
|
# Parse the OpenAPI JSON or YAML specification file
|
489
495
|
# If the openapi_spec is YAML, convert it to JSON
|
490
496
|
openapi = if openapi_spec.end_with?('.json')
|
data/lib/pwn/plugins/zaproxy.rb
CHANGED
@@ -93,6 +93,8 @@ module PWN
|
|
93
93
|
|
94
94
|
headless = opts[:headless] || false
|
95
95
|
browser_type = opts[:browser_type] ||= :firefox
|
96
|
+
browser_type = browser_type.to_s.downcase.to_sym unless browser_type.is_a?(Symbol)
|
97
|
+
browser_type = :headless if headless
|
96
98
|
zap_ip = opts[:zap_ip] ||= '127.0.0.1'
|
97
99
|
zap_port = opts[:zap_port] ||= PWN::Plugins::Sock.get_random_unused_port
|
98
100
|
|
@@ -148,7 +150,9 @@ module PWN
|
|
148
150
|
# Supported Method Parameters::
|
149
151
|
# PWN::Plugins::Zaproxy.import_openapi_to_sitemap(
|
150
152
|
# zap_obj: 'required - zap_obj returned from #open method',
|
151
|
-
# openapi_spec: 'required - path to OpenAPI JSON or YAML spec file'
|
153
|
+
# openapi_spec: 'required - path to OpenAPI JSON or YAML spec file',
|
154
|
+
# additional_http_headers: 'optional - hash of additional HTTP headers to include in requests (default: {})',
|
155
|
+
# target_regex: 'optional - url regex to inject additional_http_headers into (e.g. https://test.domain.local.*)'
|
152
156
|
# )
|
153
157
|
|
154
158
|
public_class_method def self.import_openapi_to_sitemap(opts = {})
|
@@ -160,6 +164,19 @@ module PWN
|
|
160
164
|
openapi_spec_root = File.dirname(openapi_spec)
|
161
165
|
Dir.chdir(openapi_spec_root)
|
162
166
|
|
167
|
+
additional_http_headers = opts[:additional_http_headers] ||= {}
|
168
|
+
raise 'ERROR: additional_http_headers must be a Hash' unless additional_http_headers.is_a?(Hash)
|
169
|
+
|
170
|
+
target_regex = opts[:target_regex]
|
171
|
+
|
172
|
+
if additional_http_headers.any?
|
173
|
+
inject_additional_http_headers(
|
174
|
+
zap_obj: zap_obj,
|
175
|
+
target_regex: target_regex,
|
176
|
+
headers: additional_http_headers
|
177
|
+
)
|
178
|
+
end
|
179
|
+
|
163
180
|
params = {
|
164
181
|
apikey: api_key,
|
165
182
|
file: openapi_spec
|
@@ -764,7 +781,9 @@ module PWN
|
|
764
781
|
|
765
782
|
#{self}.import_openapi_to_sitemap(
|
766
783
|
zap_obj: 'required - zap_obj returned from #open method',
|
767
|
-
openapi_spec: 'required - path to OpenAPI JSON or YAML spec file'
|
784
|
+
openapi_spec: 'required - path to OpenAPI JSON or YAML spec file',
|
785
|
+
additional_http_headers: 'optional - hash of additional HTTP headers to include in requests (default: {})',
|
786
|
+
target_regex: 'optional - url regex to inject additional_http_headers into (e.g. https://test.domain.local.*)'
|
768
787
|
)
|
769
788
|
|
770
789
|
#{self}.get_sitemap(
|
data/lib/pwn/version.rb
CHANGED
data/third_party/pwn_rdoc.jsonl
CHANGED
@@ -520,27 +520,34 @@
|
|
520
520
|
{"messages":[{"role":"user","content":"PWN::Plugins::BlackDuckBinaryAnalysis.get_vulnerabilities Usage"},{"role":"assistant","content":"`PWN::Plugins::BlackDuckBinaryAnalysis.get_vulnerabilities`: Supported Method Parameters\n\nresponse = PWN::Plugins::BlackDuckBinaryAnalysis.get_vulnerabilities(\n\ntoken: 'required - Bearer token'\n\n)\n"}]}
|
521
521
|
{"messages":[{"role":"user","content":"PWN::Plugins::BlackDuckBinaryAnalysis.help Usage"},{"role":"assistant","content":"`PWN::Plugins::BlackDuckBinaryAnalysis.help`: "}]}
|
522
522
|
{"messages":[{"role":"user","content":"PWN::Plugins::BlackDuckBinaryAnalysis.upload_file Usage"},{"role":"assistant","content":"`PWN::Plugins::BlackDuckBinaryAnalysis.upload_file`: Supported Method Parameters\n\nresponse = PWN::Plugins::BlackDuckBinaryAnalysis.upload_file(\n\ntoken: 'required - Bearer token',\nfile: 'required - path of file to upload',\ngroup_id: 'optional - group id',\ndelete_binary: 'optional - delete binary after upload (defaults to false)',\nforce_scan: 'optional - force scan (defaults to false)',\ncallback_url: 'optional - callback url',\nscan_infoleak: 'optional - scan infoleak (defaults to true)',\ncode_analysis: 'optional - code analysis (defaults to true)',\nscan_code_familiarity: 'optional - scan code familiarity (defaults to false)',\nversion: 'optional - version',\nproduct_id: 'optional - product id'\n\n)\n"}]}
|
523
|
-
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.active_scan Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.active_scan`: Supported Method Parameters\n\nactive_scan_url_arr = PWN::Plugins::BurpSuite.active_scan(\n\nburp_obj: 'required - burp_obj returned by #start method',\ntarget_url: 'required - target url to scan in sitemap (should be loaded & authenticated w/ burp_obj[:
|
523
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.active_scan Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.active_scan`: Supported Method Parameters\n\nactive_scan_url_arr = PWN::Plugins::BurpSuite.active_scan(\n\nburp_obj: 'required - burp_obj returned by #start method',\ntarget_url: 'required - target url to scan in sitemap (should be loaded & authenticated w/ burp_obj[:mitm_browser])',\nexclude_paths: 'optional - array of paths to exclude from active scan (default: [])'\n\n)\n"}]}
|
524
524
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.add_proxy_listener Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.add_proxy_listener`: Supported Method Parameters\n\njson_proxy_listener = PWN::Plugins::BurpSuite.add_proxy_listener(\n\nburp_obj: 'required - burp_obj returned by #start method',\nbind_address: 'required - bind address for the proxy listener (e.g., \"127.0.0.1\")',\nport: 'required - port for the proxy listener (e.g., 8081)',\nenabled: 'optional - enable the listener (defaults to true)'\n\n)\n"}]}
|
525
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.add_repeater_tab Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.add_repeater_tab`: Supported Method Parameters\n\nrepeater_id = PWN::Plugins::BurpSuite.add_repeater_tab(\n\nburp_obj: 'required - burp_obj returned by #start method',\nname: 'required - name of the repeater tab (max 30 characters)',\nrequest: 'optional - base64 encoded HTTP request string'\n\n)\n"}]}
|
525
526
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.add_to_scope Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.add_to_scope`: Supported Method Parameters\n\njson_in_scope = PWN::Plugins::BurpSuite.add_to_scope(\n\nburp_obj: 'required - burp_obj returned by #start method',\ntarget_url: 'required - target url to add to scope'\n\n)\n"}]}
|
526
527
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.add_to_sitemap Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.add_to_sitemap`: "}]}
|
527
528
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.authors Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
|
528
529
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.delete_proxy_listener Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.delete_proxy_listener`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.delete_proxy_listener(\n\nburp_obj: 'required - burp_obj returned by #start method',\nid: 'required - ID of the proxy listener (defaults to \"0\")'\n\n)\n"}]}
|
530
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.delete_repeater_tab Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.delete_repeater_tab`: Supported Method Parameters\n\nuri_in_scope = PWN::Plugins::BurpSuite.delete_repeater_tab(\n\nburp_obj: 'required - burp_obj returned by #start method',\nid: 'required - id of the repeater tab to delete'\n\n)\n"}]}
|
529
531
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.disable_proxy Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.disable_proxy`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.disable_proxy(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
|
530
532
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.enable_proxy Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.enable_proxy`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.enable_proxy(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
|
533
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.find_sitemap_entries Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.find_sitemap_entries`: Supported Method Parameters\n\nrepeater_id = PWN::Plugins::BurpSuite.find_sitemap_entries(\n\nburp_obj: 'required - burp_obj returned by #start method',\nsearch_string: 'required - string to search for in the sitemap entries'\n\n)\n"}]}
|
531
534
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp`: Supported Method Parameters\n\nuri = PWN::Plugins::BurpSuite.format_uri_from_sitemap_resp(\n\nscheme: 'required - scheme of the URI (http|https)',\nhost: 'required - host of the URI',\nport: 'optional - port of the URI',\npath: 'optional - path of the URI',\nquery: 'optional - query string of the URI'\n\n)\n"}]}
|
532
535
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.generate_scan_report Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.generate_scan_report`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.generate_scan_report(\n\nburp_obj: 'required - burp_obj returned by #start method',\ntarget_url: 'required - target_url passed to #active_scan method',\noutput_dir: 'required - directory to save the report',\nreport_type: required - <:html|:xml>'\n\n)\n"}]}
|
536
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.get_all_repeater_tabs Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.get_all_repeater_tabs`: Supported Method Parameters\n\nrepeater_tabs = PWN::Plugins::BurpSuite.get_all_repeater_tabs(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
|
533
537
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.get_proxy_listeners Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.get_proxy_listeners`: Supported Method Parameters\n\njson_proxy_listeners = PWN::Plugins::BurpSuite.get_proxy_listeners(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
|
538
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.get_repeater_tab Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.get_repeater_tab`: Supported Method Parameters\n\nrepeater_tab = PWN::Plugins::BurpSuite.get_repeater_tab(\n\nburp_obj: 'required - burp_obj returned by #start method',\nid: 'required - id of the repeater tab to get'\n\n)\n"}]}
|
534
539
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.get_scan_issues Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.get_scan_issues`: Supported Method Parameters\n\njson_scan_issues = PWN::Plugins::BurpSuite.get_scan_issues(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
|
535
540
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.get_sitemap Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.get_sitemap`: Supported Method Parameters\n\njson_sitemap = PWN::Plugins::BurpSuite.get_sitemap(\n\nburp_obj: 'required - burp_obj returned by #start method',\ntarget_url: 'optional - target URL to filter sitemap results (defaults to entire sitemap)'\n\n)\n"}]}
|
536
541
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.help Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.help`: "}]}
|
537
542
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.import_openapi_to_sitemap Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.import_openapi_to_sitemap`: "}]}
|
538
543
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.in_scope Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.in_scope`: Supported Method Parameters\n\nuri_in_scope = PWN::Plugins::BurpSuite.in_scope(\n\nburp_obj: 'required - burp_obj returned by #start method',\nuri: 'required - URI to determine if in scope'\n\n)\n"}]}
|
544
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.send_repeater_request Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.send_repeater_request`: Supported Method Parameters\n\nrepeater_resp = PWN::Plugins::BurpSuite.send_repeater_request(\n\nburp_obj: 'required - burp_obj returned by #start method',\nid: 'required - id of the repeater tab to send'\n\n)\n"}]}
|
539
545
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.spider Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.spider`: Supported Method Parameters\n\njson_spider = PWN::Plugins::BurpSuite.spider(\n\nburp_obj: 'required - burp_obj returned by #start method',\ntarget_url: 'required - target url to add to crawl / spider'\n\n)\n"}]}
|
540
546
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.start Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.start`: Supported Method Parameters\n\nburp_obj1 = PWN::Plugins::BurpSuite.start(\n\nburp_jar_path: 'optional - path of burp suite pro jar file (defaults to /opt/burpsuite/burpsuite_pro.jar)',\nheadless: 'optional - run burp headless if set to true',\nbrowser_type: 'optional - defaults to :firefox. See PWN::Plugins::TransparentBrowser.help for a list of types',\nburp_ip: 'optional - IP address for the Burp proxy (defaults to 127.0.0.1)',\nburp_port: 'optional - port for the Burp proxy (defaults to a random unused port)',\npwn_burp_ip: 'optional - IP address for the PWN Burp API (defaults to 127.0.0.1)',\npwn_burp_port: 'optional - port for the PWN Burp API (defaults to a random unused port)'\n\n)\n"}]}
|
541
547
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.stop Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.stop`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.stop(\n\nburp_obj: 'required - burp_obj returned by #start method'\n\n)\n"}]}
|
542
548
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.update_burp_jar Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.update_burp_jar`: Supported Method Parameters\n\nPWN::Plugins::BurpSuite.update_burp_jar( )\n"}]}
|
543
549
|
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.update_proxy_listener Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.update_proxy_listener`: Supported Method Parameters\n\njson_proxy_listener = PWN::Plugins::BurpSuite.update_proxy_listener(\n\nburp_obj: 'required - burp_obj returned by #start method',\nid: 'optional - ID of the proxy listener (defaults to \"0\")',\nbind_address: 'optional - bind address for the proxy listener (defaults to \"127.0.0.1\")',\nport: 'optional - port for the proxy listener (defaults to 8080)',\nenabled: 'optional - enable or disable the listener (defaults to true)'\n\n)\n"}]}
|
550
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::BurpSuite.update_repeater_tab Usage"},{"role":"assistant","content":"`PWN::Plugins::BurpSuite.update_repeater_tab`: Supported Method Parameters\n\nrepeater_obj = PWN::Plugins::BurpSuite.update_repeater_tab(\n\nburp_obj: 'required - burp_obj returned by #start method',\nid: 'required - id of the repeater tab to update',\nname: 'required - name of the repeater tab (max 30 characters)',\nrequest: 'required - base64 encoded HTTP request string'\n\n)\n"}]}
|
544
551
|
{"messages":[{"role":"user","content":"PWN::Plugins::BusPirate.authors Usage"},{"role":"assistant","content":"`PWN::Plugins::BusPirate.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
|
545
552
|
{"messages":[{"role":"user","content":"PWN::Plugins::BusPirate.connect Usage"},{"role":"assistant","content":"`PWN::Plugins::BusPirate.connect`: Supported Method Parameters\n\nbus_pirate_obj = PWN::Plugins::BusPirate.connect(\n\nblock_dev: 'optional serial block device path (defaults to /dev/ttyUSB0)',\nbaud: 'optional (defaults to 9600)',\ndata_bits: 'optional (defaults to 8)',\nstop_bits: 'optional (defaults to 1)',\nparity: 'optional (defaults to SerialPort::NONE)',\nflow_control: 'optional (defaults to SerialPort::HARD) SerialPort::NONE|SerialPort::SOFT|SerialPort::HARD'\n\n)\n"}]}
|
546
553
|
{"messages":[{"role":"user","content":"PWN::Plugins::BusPirate.connect_via_screen Usage"},{"role":"assistant","content":"`PWN::Plugins::BusPirate.connect_via_screen`: Supported Method Parameters\n\nPWN::Plugins::BusPirate.connect_via_screen(\n\nblock_dev: 'optional - serial block device path (defaults to /dev/ttyUSB0)'\n\n)\n"}]}
|
@@ -1033,14 +1040,18 @@
|
|
1033
1040
|
{"messages":[{"role":"user","content":"PWN::Plugins::XXD.fill_range_w_byte Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.fill_range_w_byte`: Supported Method Parameters\n\nhexdump = PWN::Plugins::XXD.fill_range_w_byte(\n\nhexdump: 'required - hexdump returned from #dump method',\nstart_addr: 'required - start address to fill with byte',\nend_addr: 'required - end address to fill with byte',\nbyte: 'required - byte to fill range with'\n\n)\n"}]}
|
1034
1041
|
{"messages":[{"role":"user","content":"PWN::Plugins::XXD.help Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.help`: "}]}
|
1035
1042
|
{"messages":[{"role":"user","content":"PWN::Plugins::XXD.reverse_dump Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.reverse_dump`: Supported Method Parameters\n\nPWN::Plugins::XXD.reverse_dump(\n\nhexdump: 'required - hexdump returned from #dump method',\nfile: 'required - path to binary file to dump',\nbyte_chunks: 'optional - if set, will write n byte chunks of hexdump to multiple files'\n\n)\n"}]}
|
1036
|
-
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.active_scan Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.active_scan`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.active_scan(\n\nzap_obj: 'required - zap_obj returned from #open method',\ntarget_url: 'required - url to scan',\nscan_policy: 'optional - scan policy to use (defaults to Default Policy)'\n\n)\n"}]}
|
1037
|
-
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.
|
1043
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.active_scan Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.active_scan`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.active_scan(\n\nzap_obj: 'required - zap_obj returned from #open method',\ntarget_url: 'required - url to scan',\nexclude_paths: 'optional - array of paths to exclude from scan (default: [])',\nscan_policy: 'optional - scan policy to use (defaults to Default Policy)'\n\n)\n"}]}
|
1044
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.add_to_scope Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.add_to_scope`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.add_to_scope(\n\nzap_obj: 'required - zap_obj returned from #open method',\ntarget_regex: 'required - url regex to add to scope (e.g. https://test.domain.local.*)',\ncontext_name: 'optional - context name to add target_regex to (defaults to Default Context)'\n\n)\n"}]}
|
1038
1045
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.authors Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
|
1039
1046
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.breakpoint Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.breakpoint`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.breakpoint(\n\nzap_obj: 'required - zap_obj returned from #open method',\nregex_type: 'required - :url, :request_header, :request_body, :response_header or :response_body',\nregex_pattern: 'required - regex pattern to search for respective regex_type',\nenabled: 'optional - boolean (defaults to true)'\n\n)\n"}]}
|
1047
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.find_har_entries Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.find_har_entries`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.find_har_entries(\n\nzap_obj: 'required - zap_obj returned from #open method',\nsearch_string: 'required - string to search for in the sitemap entries'\n\n)\n"}]}
|
1040
1048
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.generate_scan_report Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.generate_scan_report`: Supported Method Parameters\n\nreport_path = PWN::Plugins::Zaproxy.generate_scan_report(\n\nzap_obj: 'required - zap_obj returned from #open method',\noutput_dir: 'required - directory to save report',\nreport_type: 'required - <:html|:markdown|:xml>'\n\n)\n"}]}
|
1049
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.get_alerts Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.get_alerts`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.get_alerts(\n\nzap_obj: 'required - zap_obj returned from #open method',\ntarget_url: 'required - base url to return alerts'\n\n)\n"}]}
|
1050
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.get_sitemap Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.get_sitemap`: Supported Method Parameters\n\njson_sitemap = PWN::Plugins::Zaproxy.get_sitemap(\n\nzap_obj: 'required - zap_obj returned from #open method',\nreturn_as: 'optional - :base64 or :har (defaults to :base64)'\n\n)\n"}]}
|
1041
1051
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.help Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.help`: "}]}
|
1042
1052
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.import_openapi_to_sitemap Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.import_openapi_to_sitemap`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.import_openapi_to_sitemap(\n\nzap_obj: 'required - zap_obj returned from #open method',\nopenapi_spec: 'required - path to OpenAPI JSON or YAML spec file'\n\n)\n"}]}
|
1043
|
-
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.
|
1053
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.inject_additional_http_headers Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.inject_additional_http_headers`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.inject_additional_http_headers(\n\nzap_obj: 'required - zap_obj returned from #open method',\ntarget_regex: 'required - url regex to inject headers into (e.g. https://test.domain.local.*)',\nheaders: 'required - hash of additional headers to inject into each request',\n\n)\n"}]}
|
1054
|
+
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.requester Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.requester`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.requester(\n\nzap_obj: 'required - zap_obj returned from #open method',\nhar_entry: 'required - har entry (e.g. from #get_sitemap method or #find_har_entries method)',\nredirect: 'optional - follow redirects if set to true (defaults to false)'\n\n)\n"}]}
|
1044
1055
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.spider Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.spider`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.spider(\n\nzap_obj: 'required - zap_obj returned from #open method',\ntarget_url: 'required - url to spider'\n\n)\n"}]}
|
1045
1056
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.start Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.start`: Supported Method Parameters\n\nzap_obj = PWN::Plugins::Zaproxy.start(\n\napi_key: 'required - api key for API authorization',\nzap_bin_path: 'optional - path to zap.sh file'\nheadless: 'optional - run zap headless if set to true',\nbrowser_type: 'optional - defaults to :firefox. See PWN::Plugins::TransparentBrowser.help for a list of types',\nproxy: 'optional - change local zap proxy listener (defaults to http://127.0.0.1:<Random 1024-65535>)',\n\n)\n"}]}
|
1046
1057
|
{"messages":[{"role":"user","content":"PWN::Plugins::Zaproxy.stop Usage"},{"role":"assistant","content":"`PWN::Plugins::Zaproxy.stop`: Supported Method Parameters\n\nPWN::Plugins::Zaproxy.stop(\n\nzap_obj: 'required - zap_obj returned from #open method'\n\n)\n"}]}
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: pwn
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.5.
|
4
|
+
version: 0.5.411
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- 0day Inc.
|
@@ -631,14 +631,14 @@ dependencies:
|
|
631
631
|
requirements:
|
632
632
|
- - '='
|
633
633
|
- !ruby/object:Gem::Version
|
634
|
-
version: 1.18.
|
634
|
+
version: 1.18.10
|
635
635
|
type: :runtime
|
636
636
|
prerelease: false
|
637
637
|
version_requirements: !ruby/object:Gem::Requirement
|
638
638
|
requirements:
|
639
639
|
- - '='
|
640
640
|
- !ruby/object:Gem::Version
|
641
|
-
version: 1.18.
|
641
|
+
version: 1.18.10
|
642
642
|
- !ruby/object:Gem::Dependency
|
643
643
|
name: nokogiri-diff
|
644
644
|
requirement: !ruby/object:Gem::Requirement
|