pwn 0.5.543 → 0.5.545

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3008e2daa5e9c13d353eba69309a5f8e7ccb2e274135ef9a118a1eb8ccf48071
4
- data.tar.gz: 2e5c39aab4a9d9ca35fc0e23ee7a3275cea6eb6b6e21f91642340bf1aad9185f
3
+ metadata.gz: 717d110605939553b86667e954a7b91318e7e838493501df5313061024864a90
4
+ data.tar.gz: 199ab9d59ebce1331ca2bb31fd32dc0914eb7ff230a7c13e62d896d75730a569
5
5
  SHA512:
6
- metadata.gz: d866a645a30afe6d3cbf454a9427c9e5a5a0a2561beeeca6ad9a43f5a5f9d509619277b9bbf91d866dfb66bee7e5f89ef5143288626441517e3019b778cc0df5
7
- data.tar.gz: d96984af6c54ebaf8eb65bd6a57c490e516cbbcb770ad63d06810798b492d5bb35bd273ee55f78d739d43a81c5db785c74a4a6af20943d49fc2e52f19a84e19b
6
+ metadata.gz: d2e6523acc202365dc8fbb2de66872c7abe1e024cdb6b58ede8acdf3357d9e3b745dfc46611a574527c01b528b6550fa7ddb84fbe16589bd0ba53c51114b623e
7
+ data.tar.gz: dee031cfc85494743679645d87ec37c34ca9c1b24f5c3f0d83b22dcd9e5d38f1a5c06e56cedee122225e9dee11ab7a33aa70c776ddf116908a9d0b76da8edd40
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ cd /opt/pwn
37
37
  $ ./install.sh
38
38
  $ ./install.sh ruby-gem
39
39
  $ pwn
40
- pwn[v0.5.543]:001 >>> PWN.help
40
+ pwn[v0.5.545]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-4.0.1@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.5.543]:001 >>> PWN.help
55
+ pwn[v0.5.545]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
  If you're using a multi-user install of RVM do:
@@ -62,7 +62,7 @@ $ rvm use ruby-4.0.1@pwn
62
62
  $ rvmsudo gem uninstall --all --executables pwn
63
63
  $ rvmsudo gem install --verbose pwn
64
64
  $ pwn
65
- pwn[v0.5.543]:001 >>> PWN.help
65
+ pwn[v0.5.545]:001 >>> PWN.help
66
66
  ```
67
67
 
68
68
  PWN periodically upgrades to the latest version of Ruby which is reflected in `/opt/pwn/.ruby-version`. The easiest way to upgrade to the latest version of Ruby from a previous PWN installation is to run the following script:
data/lib/pwn/ai/agent.rb CHANGED
@@ -15,6 +15,7 @@ module PWN
15
15
  autoload :GQRX, 'pwn/ai/agent/gqrx'
16
16
  autoload :SAST, 'pwn/ai/agent/sast'
17
17
  autoload :TransparentBrowser, 'pwn/ai/agent/transparent_browser'
18
+ autoload :VulnGen, 'pwn/ai/agent/vuln_gen'
18
19
 
19
20
  # Display a List of Every PWN::AI Module
20
21
 
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.5.543'
4
+ VERSION = '0.5.545'
5
5
  end
@@ -4,7 +4,7 @@ require 'spec_helper'
4
4
 
5
5
  describe PWN::AI::Agent do
6
6
  it 'should return data for help method' do
7
- help_response = Pwn::AI::Agent.help
7
+ help_response = PWN::AI::Agent.help
8
8
  expect(help_response).not_to be_nil
9
9
  end
10
10
  end
@@ -1,5 +1,27 @@
1
1
  {"messages":[{"role":"user","content":"PWN.help Usage"},{"role":"assistant","content":"`PWN.help`: "}]}
2
2
  {"messages":[{"role":"user","content":"PWN::AI.help Usage"},{"role":"assistant","content":"`PWN::AI.help`: "}]}
3
+ {"messages":[{"role":"user","content":"PWN::AI::Agent.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent.help`: "}]}
4
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::Assembly.analyze Usage"},{"role":"assistant","content":"`PWN::AI::Agent::Assembly.analyze`: Supported Method Parameters\n\nai_analysis = PWN::AI::Agent::Assembly.analyze(\n\nrequest: 'required - the assembly opcodes or instructions to be analyzed',\ntype: 'required - :opcodes_to_asm|:asm_to_opcodes - specify the type of analysis to perform',\narch: 'required - name of arch returned from `PWN::Plugins::Assembly.list_supported_archs` (e.g., :i386|:i686|:x86|:x64|:arm|:arm64, etc.)',\nendian: 'required - the endianness of the assembly code (e.g., :little|:big)'\n\n)\n"}]}
5
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::Assembly.authors Usage"},{"role":"assistant","content":"`PWN::AI::Agent::Assembly.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
6
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::Assembly.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent::Assembly.help`: "}]}
7
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::BTC.analyze Usage"},{"role":"assistant","content":"`PWN::AI::Agent::BTC.analyze`: Supported Method Parameters\n\nai_analysis = PWN::AI::Agent::BTC.analyze(\n\nrequest: 'required - latest block information retrieved from a bitcoin node via `PWN::Blockchain::BTC.get_latest_block`'\n\n)\n"}]}
8
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::BTC.authors Usage"},{"role":"assistant","content":"`PWN::AI::Agent::BTC.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
9
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::BTC.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent::BTC.help`: "}]}
10
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::BurpSuite.analyze Usage"},{"role":"assistant","content":"`PWN::AI::Agent::BurpSuite.analyze`: Supported Method Parameters\n\nai_analysis = PWN::AI::Agent::BurpSuite.analyze(\n\nrequest: 'required HTTP request/response pair or WebSocket message as a string'\n\n)\n"}]}
11
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::BurpSuite.authors Usage"},{"role":"assistant","content":"`PWN::AI::Agent::BurpSuite.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
12
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::BurpSuite.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent::BurpSuite.help`: "}]}
13
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::GQRX.analyze Usage"},{"role":"assistant","content":"`PWN::AI::Agent::GQRX.analyze`: Supported Method Parameters\n\nai_analysis = PWN::AI::Agent::GQRX.analyze(\n\nrequest: 'required - A string containing the signal data captured by GQRX that you want to analyze. This data should be in a format that can be interpreted by the AI for analysis, such as raw signal data, frequency information, or any relevant metadata associated with the capture.',\nlocation: 'required - A string containing a city, state, country, or GPS coordinates where the signal data was captured. This information will be used to provide context for the analysis and to determine if the frequency is licensed or unlicensed based on FCC records.'\n\n)\n"}]}
14
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::GQRX.authors Usage"},{"role":"assistant","content":"`PWN::AI::Agent::GQRX.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
15
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::GQRX.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent::GQRX.help`: "}]}
16
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::HackerOne.analyze Usage"},{"role":"assistant","content":"`PWN::AI::Agent::HackerOne.analyze`: Supported Method Parameters\n\nai_analysis = PWN::AI::Agent::HackerOne.analyze(\n\nrequest: 'required - dataset to analyze, such as bounty program details, scope details, or hacktivity details'\ntype: 'required - type of analysis to perform, such as :bounty_programs, :scope_details, or :hacktivity'\n\n)\n"}]}
17
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::HackerOne.authors Usage"},{"role":"assistant","content":"`PWN::AI::Agent::HackerOne.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
18
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::HackerOne.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent::HackerOne.help`: "}]}
19
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::SAST.analyze Usage"},{"role":"assistant","content":"`PWN::AI::Agent::SAST.analyze`: Supported Method Parameters\n\nai_analysis = PWN::AI::Agent::SAST.analyze(\n\nrequest: 'required - A string containing the source code snippet to be analyzed for SAST antipatterns and vulnerabilities.'\n\n)\n"}]}
20
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::SAST.authors Usage"},{"role":"assistant","content":"`PWN::AI::Agent::SAST.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
21
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::SAST.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent::SAST.help`: "}]}
22
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::TransparentBrowser.analyze Usage"},{"role":"assistant","content":"`PWN::AI::Agent::TransparentBrowser.analyze`: Supported Method Parameters\n\nai_analysis = PWN::AI::Agent::TransparentBrowser.analyze(\n\nrequest: 'required - current step in the JavaScript debugging session to analyze',\nsource_to_review: 'required - the block of JavaScript code in which the current step resides'\n\n)\n"}]}
23
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::TransparentBrowser.authors Usage"},{"role":"assistant","content":"`PWN::AI::Agent::TransparentBrowser.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
24
+ {"messages":[{"role":"user","content":"PWN::AI::Agent::TransparentBrowser.help Usage"},{"role":"assistant","content":"`PWN::AI::Agent::TransparentBrowser.help`: "}]}
3
25
  {"messages":[{"role":"user","content":"PWN::AI::Grok.authors Usage"},{"role":"assistant","content":"`PWN::AI::Grok.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
4
26
  {"messages":[{"role":"user","content":"PWN::AI::Grok.chat Usage"},{"role":"assistant","content":"`PWN::AI::Grok.chat`: Supported Method Parameters\n\nresponse = PWN::AI::Grok.chat(\n\nrequest: 'required - message to Grok'\nmodel: 'optional - model to use for text generation (defaults to PWN::Env[:ai][:grok][:model])',\ntemp: 'optional - creative response float (deafults to PWN::Env[:ai][:grok][:temp])',\nsystem_role_content: 'optional - context to set up the model behavior for conversation (Default: PWN::Env[:ai][:grok][:system_role_content])',\nresponse_history: 'optional - pass response back in to have a conversation',\nspeak_answer: 'optional speak answer using PWN::Plugins::Voice.text_to_speech (Default: nil)',\ntimeout: 'optional timeout in seconds (defaults to 300)',\nspinner: 'optional - display spinner (defaults to false)'\n\n)\n"}]}
5
27
  {"messages":[{"role":"user","content":"PWN::AI::Grok.get_models Usage"},{"role":"assistant","content":"`PWN::AI::Grok.get_models`: Supported Method Parameters\n\nmodels = PWN::AI::Grok.get_models\n"}]}
@@ -1042,7 +1064,7 @@
1042
1064
  {"messages":[{"role":"user","content":"PWN::Plugins::Vsphere.login Usage"},{"role":"assistant","content":"`PWN::Plugins::Vsphere.login`: Supported Method Parameters\n\nvsphere_obj = PWN::Plugins::Vsphere.login(\n\nhost: 'required - vsphere host or ip',\nusername: 'required - username',\npassword: 'optional - password (will prompt if nil)',\ninsecure: 'optional - ignore ssl checks (defaults to false)\n\n)\n"}]}
1043
1065
  {"messages":[{"role":"user","content":"PWN::Plugins::Vsphere.logout Usage"},{"role":"assistant","content":"`PWN::Plugins::Vsphere.logout`: Supported Method Parameters\n\nPWN::Plugins::HackerOne.logout(\n\nvsphere_obj: 'required vsphere_obj returned from #login method'\n\n)\n"}]}
1044
1066
  {"messages":[{"role":"user","content":"PWN::Plugins::XXD.authors Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.authors`: Author(s)\n\n0day Inc. <support@0dayinc.com>\n"}]}
1045
- {"messages":[{"role":"user","content":"PWN::Plugins::XXD.calc_addr_offset Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.calc_addr_offset`: Supported Method Parameters\n\nhex_offset = PWN::Plugins::XXD.calc_addr_offset(\n\nstart_addr: 'required - start address to evaluate',\ntarget_addr: 'required - memory address to set breakpoint'\n\n) ^^^ Instructions for #{self}.calc_addr_offset: This is useful for calculating address offsets of known functions in debuggers to set breakpoints of instructions that are not known at runtime.\n\nSet a breakpoint at main and record its address - this is the start_addr. For example in r2: “‘ [0x00001050]> db main [0x00001050]> ood [0x7fd16122b360]> dc INFO: hit breakpoint at: 0x562e8547d139 [0x562e8547d139]> db “`\n\nPopulate start_addr w/ address (i.e. ‘0x562e8547d139’) of a known function (i.e. main)\n\nStep down to the instruction where you want to set a breakpoint. Record its address… this is the target_addr. “‘ [0x562e8547d139]> v <step through to the target instruction via F7/F8> “`\n\nGet the hex offset value by calling PWN::Plugins::XXD.calc_addr_offset method\n\nFuture breakpoints can be calculated by adding the hex offset to the updated start_addr (which changes every time the binary is executed). If the offset returned is 0x00000ec2, a breakpoint for the target instruction can be set in r2 via: “‘ [0x00001050]> ood [0x7f1a45bea360]> db main [0x7f1a45bea360]> db (main)+0x00000ec2 [0x7f1a45bea360]> db 0x558eebd75139 - 0x558eebd7513a 1 –x sw break enabled valid … 0x558eebd75ffb - 0x558eebd75ffc 1 –x sw break enabled valid … [0x7f1a45bea360]> dc INFO: hit breakpoint at: 0x55ee0a0e5139 [0x55ee0a0e5139]> dc INFO: hit breakpoint at: 0x5558c3101ffb [0x5558c3101ffb]> v <step through via F7, F8, F9, etc. to get to desired instruction> “`\n\n"}]}
1067
+ {"messages":[{"role":"user","content":"PWN::Plugins::XXD.calc_addr_offset Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.calc_addr_offset`: Supported Method Parameters\n\nhex_offset = PWN::Plugins::XXD.calc_addr_offset(\n\nstart_addr: 'required - start address to evaluate',\ntarget_addr: 'required - memory address to set breakpoint'\n\n) ^^^ Instructions for #{self}.calc_addr_offset: This is useful for calculating address offsets of known functions in debuggers to set breakpoints of instructions that are not known at runtime.\n\nSet a breakpoint at main and record its address - this is the start_addr. For example in r2: “‘ [0x00001050]> db main [0x00001050]> ood [0x7fd16122b360]> dc INFO: hit breakpoint at: 0x562e8547d139 [0x562e8547d139]> db “`\n\nPopulate start_addr w/ address (i.e. ‘0x562e8547d139’) of a known function (i.e. main)\n\nStep down to the instruction where you want to set a breakpoint. Record its address… this is the target_addr. “‘ [0x562e8547d139]> v <step through to the target instruction via F7/F8> “`\n\nGet the hex offset value by calling PWN::Plugins::XXD.calc_addr_offset method\n\nFuture breakpoints can be calculated by adding the hex offset to the updated start_addr (which changes every time the binary is executed). If the offset returned is 0x00000ec2`, a breakpoint for the target instruction can be set in r2 via: “` [0x00001050]> ood [0x7f1a45bea360]> db main [0x7f1a45bea360]> db (main)+0x00000ec2 [0x7f1a45bea360]> db 0x558eebd75139 - 0x558eebd7513a 1 –x sw break enabled valid … 0x558eebd75ffb - 0x558eebd75ffc 1 –x sw break enabled valid … [0x7f1a45bea360]> dc INFO: hit breakpoint at: 0x55ee0a0e5139 [0x55ee0a0e5139]> dc INFO: hit breakpoint at: 0x5558c3101ffb [0x5558c3101ffb]> v <step through via F7, F8, F9, etc. to get to desired instruction> “`\n\n"}]}
1046
1068
  {"messages":[{"role":"user","content":"PWN::Plugins::XXD.dump Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.dump`: Supported Method Parameters\n\nhexdump = PWN::Plugins::XXD.dump(\n\nfile: 'required - path to binary file to dump',\nhashed: 'optional - return hexdump as hash instead of string (default: false)'\n\n)\n"}]}
1047
1069
  {"messages":[{"role":"user","content":"PWN::Plugins::XXD.fill_range_w_byte Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.fill_range_w_byte`: Supported Method Parameters\n\nhexdump = PWN::Plugins::XXD.fill_range_w_byte(\n\nhexdump: 'required - hexdump returned from #dump method',\nstart_addr: 'required - start address to fill with byte',\nend_addr: 'required - end address to fill with byte',\nbyte: 'required - byte to fill range with'\n\n)\n"}]}
1048
1070
  {"messages":[{"role":"user","content":"PWN::Plugins::XXD.help Usage"},{"role":"assistant","content":"`PWN::Plugins::XXD.help`: "}]}
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.543
4
+ version: 0.5.545
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.