README.md in ronin-vulns-0.1.0.beta1 vs README.md in ronin-vulns-0.1.0

- old
+ new

@@ -1,9 +1,10 @@ # ronin-vulns [![CI](https://github.com/ronin-rb/ronin-vulns/actions/workflows/ruby.yml/badge.svg)](https://github.com/ronin-rb/ronin-vulns/actions/workflows/ruby.yml) [![Code Climate](https://codeclimate.com/github/ronin-rb/ronin-vulns.svg)](https://codeclimate.com/github/ronin-rb/ronin-vulns) +[![Gem Version](https://badge.fury.io/rb/ronin-vulns.svg)](https://badge.fury.io/rb/ronin-vulns) * [Website](https://ronin-rb.dev/) * [Source](https://github.com/ronin-rb/ronin-vulns) * [Issues](https://github.com/ronin-rb/ronin-vulns/issues) * [Documentation](https://ronin-rb.dev/docs/ronin-vulns/frames) @@ -13,10 +14,10 @@ ## Description ronin-vulns is a Ruby library for blind vulnerability testing. It currently supports testing for Local File Inclusion (LFI), Remote File Inclusion (RFI), -SQL injection (SQLi), reflective Cross Site Scripting (XSS), and Server Side +SQL injection (SQLi), reflective Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects. ronin-vulns is part of the [ronin-rb] project, a [Ruby] toolkit for security research and development.