Sha256: 70944185f75578e5f32a6d662af96574e7234c52f166f3e8c4ee39c58bf23f9b
Contents?: true
Size: 1.78 KB
Versions: 4
Compression:
Stored size: 1.78 KB
Contents
# ronin-exploits-new 1 "May 2022" Ronin "User Manuals" ## SYNOPSIS `ronin-exploits new` [*options*] *FILE* ## DESCRIPTION Creates a new exploit file. ## ARGUMENTS *FILE* The path to the exploit file to generate. ## OPTIONS `-t`, `--type` `exploit`\|`heap_overflow`\|`stack_overflow`\|`web`\|`open_redirect`\|`lfi`\|`rfi`\|`sqli`\|`ssti`\|`xss` The type for the new exploit. `-a`, `--author` *NAME* The name of the author. Defaults to the configured git author name or the `USERNAME` environment variable. `-e`, `--author-email` *EMAIL* The email address of the author. Defaults to the configured git author email. `-s`, `--summary` *TEXT* One sentence summary for the exploit. `-d`, `--description` *TEXT* Longer description for the exploit. `-I`, `--advisory-id` *ID* Add the advisory ID to the exploit. `-R`, `--reference` *URL* Adds a reference to the exploit. `-P`, `--has-payload` `payload`\|`asm`\|`shellcode`\|`c`\|`shell`\|`powershell`\|`html`\|`javascript`\|`typpescript`\|`java`\|`sql`\|`php`\|`nodejs` The payload type the exploit uses. `-N`, `--networking` `remote_tcp`\|`remote_udp`\|`http` The networking mixin to use. `-A`, `--arch` `x86`\|`x86-64`\|`amd64`\|`ia64`\|`ppc`\|`ppc64`\|`arm`\|`armbe`\|`arm64`\|`arm64be`\|`mips`\|`mipsle`\|`mips64`\|`mips64le` The architecture to target. `-O`, `--os` `linux`\|`macos`\|`windows`\|`freebsd`\|`openbsd`\|`netbsd` The Operating System (OS) to target. `--os-version` *VERSION* The OS version to target. `-S`, `--software` *NAME* The software to target. `-V`, `--software-version` *VERSION* The software version to target. `-L`, `--loot` Adds the loot mixin. `-h`, `--help` Print help information ## AUTHOR Postmodern <postmodern.mod3@gmail.com> ## SEE ALSO ronin-exploits-show(1) ronin-exploits-run(1)
Version data entries
4 entries across 4 versions & 1 rubygems