ronin-exploits icon indicating copy to clipboard operation
ronin-exploits copied to clipboard

A Ruby micro-framework for writing and running exploits

Results 30 ronin-exploits issues
Sort by recently updated
recently updated
newest added

It should be possible to specify one or more version range strings in `software_versions`. ```ruby software_versions [ '>= 1.2.3, < 1.5.9', ... ] ```

feature
exploits-api

Add boilerplate `software "..."` and `software_versions [...]` metadata attributes to the exploit generated by the `ronin-exploits new` command. If `--software` or `--software-version` are specified then the command should populate the...

command
enhancement

Only add `require 'ronin/exploits/mixins/has_targets'` and `include Mixins::HasTargets` to the generated exploit if `--has-targets` is specified.

feature
command-option

Change the `run_exploit` method in the `CLI::Commands::Run` command to also call `@exploit.perform_test` and check if the return value is of type `TestResult::NotVulnable` and print an error message (using `log_error`) with...

feature
command

Add a `auto_select_target` or `determine_target` method that can automatically select the target based on the detected version of the service.

feature
idea
targets-api

Add a `capabilities` metadata attribute for listing the "capabilities" or "abilities" that the exploit grants the user. ```ruby capabilities [ :arbitrary_file_read, :command_exec, ... ] ``` This will also require defining...

feature
exploits-api
idea

Add a `base_url` method which simply returns `params[:base_url]`.

feature
mixin

Release version 1.1.0

chore