ronin-exploits
ronin-exploits copied to clipboard
A Ruby micro-framework for writing and running exploits
It should be possible to specify one or more version range strings in `software_versions`. ```ruby software_versions [ '>= 1.2.3, < 1.5.9', ... ] ```
Add boilerplate `software "..."` and `software_versions [...]` metadata attributes to the exploit generated by the `ronin-exploits new` command. If `--software` or `--software-version` are specified then the command should populate the...
Only add `require 'ronin/exploits/mixins/has_targets'` and `include Mixins::HasTargets` to the generated exploit if `--has-targets` is specified.
Change the `run_exploit` method in the `CLI::Commands::Run` command to also call `@exploit.perform_test` and check if the return value is of type `TestResult::NotVulnable` and print an error message (using `log_error`) with...
Add a `auto_select_target` or `determine_target` method that can automatically select the target based on the detected version of the service.
Add a `capabilities` metadata attribute for listing the "capabilities" or "abilities" that the exploit grants the user. ```ruby capabilities [ :arbitrary_file_read, :command_exec, ... ] ``` This will also require defining...
Add a `base_url` method which simply returns `params[:base_url]`.