pwn 0.4.835 → 0.4.836
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/lib/pwn/version.rb +1 -1
- data/lib/pwn/www/hacker_one.rb +28 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 56a3845964b8be6ab9e082e5998d7c96fb7e867c8e79d8ee60eb1ff7497f9923
|
4
|
+
data.tar.gz: '07108718fedc73cf8d93b12e18f5b398231641e90f173712471aa8b747cc41fa'
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9d612709b13f46c12a45950010c6fcfa700dd0d017f11d0256b0763bfb539f8d639eecb0f74b87fb6c971319065f83358d4a54de8f74f7def5fc81e7733b36e4
|
7
|
+
data.tar.gz: 6318f95bdcfbe3d2880200715ad4fc1b67df4f0078bccd07d8adf62b356253cf4c727b5c6fd47de619309e77f030a642e8db26084ed0ec0f8f795cf46e787f12
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
38
38
|
$ gem install --verbose pwn
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.4.
|
40
|
+
pwn[v0.4.836]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.4.
|
55
|
+
pwn[v0.4.836]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
|
data/lib/pwn/version.rb
CHANGED
data/lib/pwn/www/hacker_one.rb
CHANGED
@@ -23,6 +23,29 @@ module PWN
|
|
23
23
|
raise e
|
24
24
|
end
|
25
25
|
|
26
|
+
# Supported Method Parameters::
|
27
|
+
# browser_obj = PWN::WWW::HackerOne.get_bounty_org_links(
|
28
|
+
# browser_obj: 'required - browser_obj returned from #open method',
|
29
|
+
# proxy: 'optional - scheme://proxy_host:port || tor'
|
30
|
+
# )
|
31
|
+
|
32
|
+
public_class_method def self.get_bounty_org_links(opts = {})
|
33
|
+
browser_obj = opts[:browser_obj]
|
34
|
+
browser = browser_obj[:browser]
|
35
|
+
|
36
|
+
bb_orgs = 'https://hackerone.com/bug-bounty-programs'
|
37
|
+
browser.goto(bb_orgs)
|
38
|
+
|
39
|
+
bb_orgs_arr = []
|
40
|
+
browser.links.each do |link|
|
41
|
+
bb_orgs_arr.push(link.href) if link.href && link.text == ''
|
42
|
+
end
|
43
|
+
|
44
|
+
bb_orgs_arr
|
45
|
+
rescue StandardError => e
|
46
|
+
raise e
|
47
|
+
end
|
48
|
+
|
26
49
|
# Supported Method Parameters::
|
27
50
|
# browser_obj = PWN::WWW::HackerOne.login(
|
28
51
|
# browser_obj: 'required - browser_obj returned from #open method',
|
@@ -104,6 +127,11 @@ module PWN
|
|
104
127
|
browser = browser_obj[:browser]
|
105
128
|
puts browser.public_methods
|
106
129
|
|
130
|
+
bb_orgs_arr = #{self}.get_bounty_org_links(
|
131
|
+
browser_obj: 'required - browser_obj returned from #open method',
|
132
|
+
proxy: 'optional - scheme://proxy_host:port || tor'
|
133
|
+
)
|
134
|
+
|
107
135
|
browser_obj = #{self}.login(
|
108
136
|
browser_obj: 'required - browser_obj returned from #open method',
|
109
137
|
username: 'required - username',
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: pwn
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.4.
|
4
|
+
version: 0.4.836
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- 0day Inc.
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-08-
|
11
|
+
date: 2023-08-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: activesupport
|