ronin-exploits 1.0.0.beta2 → 1.0.0.beta3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. checksums.yaml +4 -4
  2. data/.github/workflows/ruby.yml +1 -0
  3. data/README.md +4 -0
  4. data/gemspec.yml +3 -1
  5. data/lib/ronin/exploits/cli/commands/run.rb +55 -5
  6. data/lib/ronin/exploits/version.rb +1 -1
  7. data/ronin-exploits.gemspec +2 -1
  8. metadata +10 -115
  9. data/spec/advisory_spec.rb +0 -71
  10. data/spec/cli/exploit_command_spec.rb +0 -68
  11. data/spec/cli/exploit_methods_spec.rb +0 -208
  12. data/spec/cli/ruby_shell_spec.rb +0 -14
  13. data/spec/client_side_web_vuln_spec.rb +0 -117
  14. data/spec/exploit_spec.rb +0 -538
  15. data/spec/exploits_spec.rb +0 -8
  16. data/spec/heap_overflow_spec.rb +0 -14
  17. data/spec/lfi_spec.rb +0 -162
  18. data/spec/loot/file_spec.rb +0 -131
  19. data/spec/loot_spec.rb +0 -138
  20. data/spec/memory_corruption_spec.rb +0 -22
  21. data/spec/metadata/arch_spec.rb +0 -82
  22. data/spec/metadata/cookie_param_spec.rb +0 -67
  23. data/spec/metadata/default_filename_spec.rb +0 -62
  24. data/spec/metadata/default_port_spec.rb +0 -62
  25. data/spec/metadata/header_name_spec.rb +0 -67
  26. data/spec/metadata/os_spec.rb +0 -164
  27. data/spec/metadata/shouts_spec.rb +0 -100
  28. data/spec/metadata/url_path_spec.rb +0 -67
  29. data/spec/metadata/url_query_param_spec.rb +0 -67
  30. data/spec/mixins/binary_spec.rb +0 -129
  31. data/spec/mixins/build_dir.rb +0 -66
  32. data/spec/mixins/file_builder_spec.rb +0 -67
  33. data/spec/mixins/format_string_spec.rb +0 -44
  34. data/spec/mixins/has_payload_spec.rb +0 -333
  35. data/spec/mixins/has_targets_spec.rb +0 -434
  36. data/spec/mixins/html_spec.rb +0 -772
  37. data/spec/mixins/http_spec.rb +0 -1227
  38. data/spec/mixins/loot_spec.rb +0 -20
  39. data/spec/mixins/nops_spec.rb +0 -165
  40. data/spec/mixins/remote_tcp_spec.rb +0 -217
  41. data/spec/mixins/remote_udp_spec.rb +0 -217
  42. data/spec/mixins/seh_spec.rb +0 -89
  43. data/spec/mixins/stack_overflow_spec.rb +0 -87
  44. data/spec/mixins/text_spec.rb +0 -43
  45. data/spec/open_redirect_spec.rb +0 -71
  46. data/spec/params/base_url_spec.rb +0 -71
  47. data/spec/params/bind_host_spec.rb +0 -34
  48. data/spec/params/bind_port_spec.rb +0 -35
  49. data/spec/params/filename_spec.rb +0 -77
  50. data/spec/params/host_spec.rb +0 -34
  51. data/spec/params/port_spec.rb +0 -77
  52. data/spec/rfi_spec.rb +0 -107
  53. data/spec/seh_overflow_spec.rb +0 -18
  54. data/spec/spec_helper.rb +0 -8
  55. data/spec/sqli_spec.rb +0 -306
  56. data/spec/ssti_spec.rb +0 -121
  57. data/spec/stack_overflow_spec.rb +0 -18
  58. data/spec/target_spec.rb +0 -92
  59. data/spec/test_result_spec.rb +0 -32
  60. data/spec/use_after_free_spec.rb +0 -14
  61. data/spec/web_spec.rb +0 -12
  62. data/spec/web_vuln_spec.rb +0 -854
  63. data/spec/xss_spec.rb +0 -69
data/spec/xss_spec.rb DELETED
@@ -1,69 +0,0 @@
1
- require 'spec_helper'
2
- require 'ronin/exploits/xss'
3
-
4
- describe Ronin::Exploits::XSS do
5
- module TestXSS
6
- class TestExploit < Ronin::Exploits::XSS
7
- base_path '/showthread.asp'
8
- query_param 'id'
9
- end
10
- end
11
-
12
- let(:exploit_class) { TestXSS::TestExploit }
13
- let(:base_url) { 'http://testasp.vulnweb.com' }
14
-
15
- subject do
16
- exploit_class.new(
17
- params: {
18
- base_url: base_url
19
- }
20
- )
21
- end
22
-
23
- it "must inherite from Ronin::Exploits::ClientSideWebVuln" do
24
- expect(described_class).to be < Ronin::Exploits::ClientSideWebVuln
25
- end
26
-
27
- it "must include Ronin::Exploits::Mixins::HTML" do
28
- expect(described_class).to include(Ronin::Exploits::Mixins::HTML)
29
- end
30
-
31
- describe ".exploit_type" do
32
- subject { described_class }
33
-
34
- it { expect(subject.exploit_type).to eq(:xss) }
35
- end
36
-
37
- describe "#initialize" do
38
- it "must default #payload to a Ronin::Payloads::Test::XSS payload" do
39
- expect(subject.payload).to be_kind_of(Ronin::Payloads::Test::XSS)
40
- end
41
-
42
- context "when given the payload: keyword argument" do
43
- let(:payload) { Ronin::Payloads::JavaScriptPayload.new }
44
-
45
- subject do
46
- exploit_class.new(
47
- payload: payload,
48
- params: {
49
- base_url: base_url
50
- }
51
- )
52
- end
53
-
54
- it "must set #payload" do
55
- expect(subject.payload).to be(payload)
56
- end
57
- end
58
- end
59
-
60
- describe "#vuln" do
61
- it "must return a Ronin::Vulns::ReflectedXSS object" do
62
- expect(subject.vuln).to be_kind_of(Ronin::Vulns::ReflectedXSS)
63
- end
64
-
65
- it "must set the #url attribute of the ReflectedXSS vuln object" do
66
- expect(subject.vuln.url).to eq(subject.url)
67
- end
68
- end
69
- end