pwn 0.4.689 → 0.4.690

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 80a2ba8d5e9a5f68d6b9042f124e8b248cf717018578d8d6671586015a504b25
4
- data.tar.gz: dd33ca623452c9b4002019e1b79165e1ed45cf7222c0fd7ffb3c63b4dfbbb10d
3
+ metadata.gz: ae20a0e5c5d61ad4ad651ef0f0c50c81687557aa3c71feb972c298e47f9163cd
4
+ data.tar.gz: 1adb75369858392e550ef56b6b742f4b3bd56262bf6d15e082cfd35734a88ea0
5
5
  SHA512:
6
- metadata.gz: 0b04c9a36db52a55c636028c8cb4c6bfc51f382de5590e7142c52732221559b8ea9ab58cfebf1dea926c8dca97f34dd30c9e32a2cd38edfb9d2d844f437a34bc
7
- data.tar.gz: abd627bf5a913d05b5cd65aa91d60fa4a68597bab736b6fed6703b83cb44ceed977e0e28ceefce9991e12cad90749ec91c01219ce8e8ee958c37e8ade174ccdc
6
+ metadata.gz: 9a798aa4bb4770f898790824dade8b7a732349f3e13d75bec6c365826feb33afd51c4ef5ca66244f70be8d0b65b3ef4756b61f384cf45195b5741535f17cc65a
7
+ data.tar.gz: 74131d67cc9639ad768b7388fc16a6101c38eae331d96753e9ac2879f62a269912ebf170e0819c39b8f1dbf9d657a255f762a039b07e1930664ce403a5f04afe
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.689]:001 >>> PWN.help
40
+ pwn[v0.4.690]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.689]:001 >>> PWN.help
55
+ pwn[v0.4.690]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -15,7 +15,7 @@ OptionParser.new do |options|
15
15
  --csv-diff vuln_scan_diff.csv \\
16
16
  --exclude-column-names 'Synopsis,Description,Solution,See Also,Plugin Output,Asset UUID,Vulnerability State,IP Address,FQDN,NetBios,OS,MAC Address,Plugin Family,CVSS Base Score,CVSS Temporal Score,CVSS Temporal Vector,CVSS Vector,CVSS3 Base Score,CVSS3 Temporal Score,CVSS3 Temporal Vector,CVSS3 Vector,System Type,Host Start,Host End,Vulnerability Priority Rating (VPR),First Found,Last Found,Host Scan Schedule ID,Host Scan ID,Indexed At,Last Authenticated Results Date,Last Unauthenticated Results Date,Tracked,Risk Factor,Severity,Original Severity,Modification,Plugin Family ID,Plugin Type,Plugin Version,Service,Plugin Modification Date,Plugin Publication Date,Checks for Malware,Exploit Available,Exploited by Malware,Exploited by Nessus,CANVAS,D2 Elliot,Metasploit,Core Exploits,ExploitHub,Default Account,Patch Available,In The News,Unsupported By Vendor,Last Fixed'
17
17
 
18
- EXAMPLE w/ OpeVAS Results:
18
+ EXAMPLE w/ OpenVAS Results:
19
19
  #{$PROGRAM_NAME} \\
20
20
  --csv-a vuln_scan1.csv \\
21
21
  --csv-b vuln_scan2.csv \\
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.689'
4
+ VERSION = '0.4.690'
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.689
4
+ version: 0.4.690
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.