pwn 0.4.845 → 0.4.846

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 59485e0828bfda38b500b4112cb509615fbf0ab652ea178a1539e895944745db
4
- data.tar.gz: 27e696c194229c6c7822cfcdd79f90cb415a02dcf64c3cdb23507f7acd483733
3
+ metadata.gz: cf9657c510e7517b71d6663e75949a760a4fc25b2f4f90824ac24e5f75650caa
4
+ data.tar.gz: 8962f1a2e2f63079bd91149c71e2eb5ba9b32a9939f43057802ebfbe35948271
5
5
  SHA512:
6
- metadata.gz: b22f5340596d1af3e8da1ab76e725aaecb32c5d31f6dabb88caecff9be6b549dedf4d3bca04524538f61e1980198921f315367d508526679300a772a3201707b
7
- data.tar.gz: 5630dbab9104070809defda4963172d51c3354ead96d1bd14d0ece3ab5d6eb3425c1fafcbd87d53e331d6920ad46f78a3861e08ce880c9cc62f16a85910fea17
6
+ metadata.gz: 5defd4cf3ccd0344642c2081a96ccd1ea07485dbffa748343e395aa3faa66fb518ad133fc9c0680237506f7255baf921a603354ba0771a4c42b25715c51d875e
7
+ data.tar.gz: d04578b29f09608a7fca84ede77489faef0661dfdaa625ca1bcea0d55657f5c244b2030dd36306c136fcb82178679f43d6e1ce4e0e577a32c5c78271debf5204
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.845]:001 >>> PWN.help
40
+ pwn[v0.4.846]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.845]:001 >>> PWN.help
55
+ pwn[v0.4.846]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.845'
4
+ VERSION = '0.4.846'
5
5
  end
@@ -24,7 +24,7 @@ module PWN
24
24
  end
25
25
 
26
26
  # Supported Method Parameters::
27
- # browser_obj = PWN::WWW::HackerOne.get_bounty_programs(
27
+ # bb_prograns_arr = PWN::WWW::HackerOne.get_bounty_programs(
28
28
  # browser_obj: 'required - browser_obj returned from #open method',
29
29
  # proxy: 'optional - scheme://proxy_host:port || tor'
30
30
  # )
@@ -35,9 +35,9 @@ module PWN
35
35
 
36
36
  browser.goto('https://hackerone.com/bug-bounty-programs')
37
37
  # Wait for JavaScript to load the DOM
38
- sleep 6
38
+ sleep 9
39
39
 
40
- bb_orgs_arr = []
40
+ bb_prograns_arr = []
41
41
  browser.links.each do |link|
42
42
  print '.'
43
43
  next unless link.href && link.text == ''
@@ -46,10 +46,10 @@ module PWN
46
46
  name: link.href.split('/').last,
47
47
  url: link.href
48
48
  }
49
- bb_orgs_arr.push(bounty_program_hash)
49
+ bb_prograns_arr.push(bounty_program_hash)
50
50
  end
51
51
 
52
- bb_orgs_arr
52
+ bb_prograns_arr
53
53
  rescue StandardError => e
54
54
  raise e
55
55
  end
@@ -135,7 +135,7 @@ module PWN
135
135
  browser = browser_obj[:browser]
136
136
  puts browser.public_methods
137
137
 
138
- bb_orgs_arr = #{self}.get_bounty_programs(
138
+ bb_prograns_arr = #{self}.get_bounty_programs(
139
139
  browser_obj: 'required - browser_obj returned from #open method',
140
140
  proxy: 'optional - scheme://proxy_host:port || tor'
141
141
  )
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.845
4
+ version: 0.4.846
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.