ronin-exploits 1.0.3 → 1.0.4

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4e6dbf77b0e6b4b6de88b6a1afe5484b74918b7a5e3a74007da060381d419f90
4
- data.tar.gz: 14664066b0d2262912344e5a3c41e4f247eb60bc1d8464bd0b7ca93348cb9549
3
+ metadata.gz: 5cfd3c025753ca4049f2ec1f5a61aa9442e6fb39dab803aed575cfddcfadd0e8
4
+ data.tar.gz: 48651dbef77525c74e9fbcdea6a7688f4048e2be5ce696a1301b408fb8d30e2f
5
5
  SHA512:
6
- metadata.gz: 7ed8dedb7ddb26720c0a9df41894e3c97d952c7872bb93adbb76a02d2ffb132368e8a94e3e579daa7517a9b95c7aa97713df88eb0170bc35cd3dfb80c6088828
7
- data.tar.gz: c6674278d65300b9f4862ef98a1282d0f8a8b7def02618a1ee11df02069c255ba1d493d8ad6b85a64704d0df4f5be0ceb81ae140e3e6e426cb31dc82ac5570ad
6
+ metadata.gz: 3c048f3293d44ec2c8615d56ee8c3ab363aa0393fa3fe50dc35b83875ab289b86f55fa28501a127138ee8eca3bc5bce077debee6b0992154294bcfbe825da840
7
+ data.tar.gz: 76486d06cf34785a94b867ca79cde13fe79da7a26e71896388fc5cd8c46ff0968e4484e8da854d99a7c02c084cd7e3edcae67f7dffec5fb014023e8e593d2f4a
@@ -16,7 +16,7 @@ jobs:
16
16
  - truffleruby
17
17
  name: Ruby ${{ matrix.ruby }}
18
18
  steps:
19
- - uses: actions/checkout@v2
19
+ - uses: actions/checkout@v4
20
20
  - name: Set up Ruby
21
21
  uses: ruby/setup-ruby@v1
22
22
  with:
@@ -35,7 +35,7 @@ jobs:
35
35
  rubocop:
36
36
  runs-on: ubuntu-latest
37
37
  steps:
38
- - uses: actions/checkout@v2
38
+ - uses: actions/checkout@v4
39
39
  - name: Set up Ruby
40
40
  uses: ruby/setup-ruby@v1
41
41
  with:
data/ChangeLog.md CHANGED
@@ -1,3 +1,12 @@
1
+ ### 1.0.4 / 2023-12-23
2
+
3
+ * Documentation fixes.
4
+
5
+ #### CLI
6
+
7
+ * Fixed a bug in `ronin-exploits run` when the exploit does not accept a payload
8
+ and no payload is given.
9
+
1
10
  ### 1.0.3 / 2023-09-19
2
11
 
3
12
  #### CLI
data/README.md CHANGED
@@ -154,8 +154,8 @@ $ ronin-exploits run my_exploit --param host=example.com --param port=9999 \
154
154
  Generate a ronin repository of your own exploits (and/or payloads):
155
155
 
156
156
  ```shell
157
- $ ronin-repos new my-exploits
158
- $ cd my-exploits/
157
+ $ ronin-repos new my-repo
158
+ $ cd my-repo/
159
159
  $ mkdir exploits
160
160
  $ ronin-exploits new exploits/my_exploit.rb --type stack_overflow \
161
161
  --arch x86 --os linux --software ExampleWare --software-version 1.2.3 \
@@ -29,7 +29,6 @@ require 'ronin/core/cli/generator/options/author'
29
29
  require 'ronin/core/cli/generator/options/summary'
30
30
  require 'ronin/core/cli/generator/options/description'
31
31
  require 'ronin/core/cli/generator/options/reference'
32
- require 'ronin/core/git'
33
32
 
34
33
  require 'command_kit/inflector'
35
34
 
@@ -78,6 +77,7 @@ module Ronin
78
77
  include Core::CLI::Generator
79
78
  include Payloads::CLI::Generator
80
79
 
80
+ # Mapping of exploit types and their file/class names.
81
81
  EXPLOIT_TYPES = {
82
82
  exploit: {
83
83
  file: 'exploit',
@@ -135,6 +135,7 @@ module Ronin
135
135
  }
136
136
  }
137
137
 
138
+ # Mapping of network mixins and their file/module names.
138
139
  NETWORKING_TYPES = {
139
140
  remote_tcp: {
140
141
  file: 'remote_tcp',
@@ -340,7 +340,7 @@ module Ronin
340
340
  # Validates the payload.
341
341
  #
342
342
  def validate_payload
343
- super(@payload)
343
+ super(@payload) if @payload
344
344
  end
345
345
 
346
346
  #
@@ -160,13 +160,7 @@ module Ronin
160
160
  # @option kwargs [Hash, String, nil] :form_data
161
161
  # The form data that may be sent in the body of the request.
162
162
  #
163
- # @option kwargs [String, nil] :user (http_user)
164
- # The user to authenticate as.
165
- #
166
- # @option kwargs [String, nil] :password (http_password)
167
- # The password to authenticate with.
168
- #
169
- # @option kwargs [Hash{Symbol,String => String}, nil] :headers
163
+ # @option kwargs [Hash{Symbol,String => String}, nil] :headers (http_headers)
170
164
  # Additional HTTP headers to use for the request.
171
165
  #
172
166
 
@@ -66,15 +66,15 @@ module Ronin
66
66
  # @param [Integer] port
67
67
  # The port to connect to.
68
68
  #
69
- # @param [Hash{Symbol => Object}] kwargs
70
- # Additional keyword arguments for {#tcp_connect}.
71
- #
72
- # @option kwargs [String, nil] bind_host
69
+ # @param [String, nil] bind_host
73
70
  # The local host to bind to.
74
71
  #
75
- # @option kwargs [Integer, nil] bind_port
72
+ # @param [Integer, nil] bind_port
76
73
  # The local port to bind to.
77
74
  #
75
+ # @param [Hash{Symbol => Object}] kwargs
76
+ # Additional keyword arguments for {#tcp_connect}.
77
+ #
78
78
  # @option kwargs [Integer] :timeout (5)
79
79
  # The maximum time to attempt connecting.
80
80
  #
@@ -66,15 +66,15 @@ module Ronin
66
66
  # @param [Integer] port
67
67
  # The port to connect to.
68
68
  #
69
- # @param [Hash{Symbol => Object}] kwargs
70
- # Additional keyword arguments for {#udp_connect}.
71
- #
72
- # @option kwargs [String, nil] :bind_host
69
+ # @param [String, nil] bind_host
73
70
  # The local host to bind to.
74
71
  #
75
- # @option kwargs [Integer, nil] :bind_port
72
+ # @param kwargs [Integer, nil] bind_port
76
73
  # The local port to bind to.
77
74
  #
75
+ # @param [Hash{Symbol => Object}] kwargs
76
+ # Additional keyword arguments for {#udp_connect}.
77
+ #
78
78
  # @option kwargs [Integer] :timeout (5)
79
79
  # The maximum time to attempt connecting.
80
80
  #
@@ -22,6 +22,6 @@
22
22
  module Ronin
23
23
  module Exploits
24
24
  # ronin-exploits version
25
- VERSION = '1.0.3'
25
+ VERSION = '1.0.4'
26
26
  end
27
27
  end
@@ -1,10 +1,10 @@
1
- .\" Generated by kramdown-man 0.1.8
1
+ .\" Generated by kramdown-man 0.1.9
2
2
  .\" https://github.com/postmodern/kramdown-man#readme
3
3
  .TH ronin-exploits-irb 1 "2023-02-01" Ronin "User Manuals"
4
4
  .LP
5
5
  .SH SYNOPSIS
6
6
  .LP
7
- .HP
7
+ .PP
8
8
  \fBronin-exploits irb\fR \[lB]\fIoptions\fP\[rB]
9
9
  .LP
10
10
  .SH DESCRIPTION
@@ -1,10 +1,10 @@
1
- .\" Generated by kramdown-man 0.1.8
1
+ .\" Generated by kramdown-man 0.1.9
2
2
  .\" https://github.com/postmodern/kramdown-man#readme
3
3
  .TH ronin-exploits-list 1 "2023-02-01" Ronin "User Manuals"
4
4
  .LP
5
5
  .SH SYNOPSIS
6
6
  .LP
7
- .HP
7
+ .PP
8
8
  \fBronin-exploits list\fR \[lB]\fIoptions\fP\[rB] \fIDIR\fP
9
9
  .LP
10
10
  .SH DESCRIPTION
@@ -1,11 +1,11 @@
1
- .\" Generated by kramdown-man 0.1.8
1
+ .\" Generated by kramdown-man 0.1.9
2
2
  .\" https://github.com/postmodern/kramdown-man#readme
3
3
  .TH ronin-exploits-new 1 "2023-02-01" Ronin "User Manuals"
4
4
  .LP
5
5
  .SH SYNOPSIS
6
6
  .LP
7
- .HP
8
- \fBronin-exploits new\fR \[lB]\fIoptions\fP\[rB] \fIFILE\fP
7
+ .PP
8
+ \fBronin-exploits new\fR \[lB]\fIoptions\fP\[rB] \fIPATH\fP
9
9
  .LP
10
10
  .SH DESCRIPTION
11
11
  .LP
@@ -15,7 +15,7 @@ Creates a new exploit file\.
15
15
  .SH ARGUMENTS
16
16
  .LP
17
17
  .TP
18
- \fIFILE\fP
18
+ \fIPATH\fP
19
19
  The path to the exploit file to generate\.
20
20
  .LP
21
21
  .SH OPTIONS
@@ -2,7 +2,7 @@
2
2
 
3
3
  ## SYNOPSIS
4
4
 
5
- `ronin-exploits new` [*options*] *FILE*
5
+ `ronin-exploits new` [*options*] *PATH*
6
6
 
7
7
  ## DESCRIPTION
8
8
 
@@ -10,7 +10,7 @@ Creates a new exploit file.
10
10
 
11
11
  ## ARGUMENTS
12
12
 
13
- *FILE*
13
+ *PATH*
14
14
  The path to the exploit file to generate.
15
15
 
16
16
  ## OPTIONS
@@ -1,10 +1,10 @@
1
- .\" Generated by kramdown-man 0.1.8
1
+ .\" Generated by kramdown-man 0.1.9
2
2
  .\" https://github.com/postmodern/kramdown-man#readme
3
3
  .TH ronin-exploits-run 1 "2023-02-01" Ronin "User Manuals"
4
4
  .LP
5
5
  .SH SYNOPSIS
6
6
  .LP
7
- .HP
7
+ .PP
8
8
  \fBronin-exploits run\fR \[lB]\fIoptions\fP\[rB] \[lC]\fINAME\fP \[or] \fB--file\fR \fIFILE\fP\[rC]
9
9
  .LP
10
10
  .SH DESCRIPTION
@@ -1,10 +1,10 @@
1
- .\" Generated by kramdown-man 0.1.8
1
+ .\" Generated by kramdown-man 0.1.9
2
2
  .\" https://github.com/postmodern/kramdown-man#readme
3
3
  .TH ronin-exploits-show 1 "2023-02-01" Ronin "User Manuals"
4
4
  .LP
5
5
  .SH SYNOPSIS
6
6
  .LP
7
- .HP
7
+ .PP
8
8
  \fBronin-exploits show\fR \[lB]\fIoptions\fP\[rB] \[lC]\fINAME\fP \[or] \-\-file \fIFILE\fP\[rC]
9
9
  .LP
10
10
  .SH DESCRIPTION
data/man/ronin-exploits.1 CHANGED
@@ -1,10 +1,10 @@
1
- .\" Generated by kramdown-man 0.1.8
1
+ .\" Generated by kramdown-man 0.1.9
2
2
  .\" https://github.com/postmodern/kramdown-man#readme
3
3
  .TH ronin-exploits 1 "2023-02-01" Ronin "User Manuals"
4
4
  .LP
5
5
  .SH SYNOPSIS
6
6
  .LP
7
- .HP
7
+ .PP
8
8
  \fBronin-exploits\fR \[lB]\fIoptions\fP\[rB] \[lB]\fICOMMAND\fP \[lB]\.\.\.\[rB]\[rB]
9
9
  .LP
10
10
  .SH DESCRIPTION
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: ronin-exploits
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.3
4
+ version: 1.0.4
5
5
  platform: ruby
6
6
  authors:
7
7
  - Postmodern
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-09-19 00:00:00.000000000 Z
11
+ date: 2023-12-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: uri-query_params