README.md in ronin-vulns-0.1.0.beta1 vs README.md in ronin-vulns-0.1.0
- old
+ new
@@ -1,9 +1,10 @@
# ronin-vulns
[![CI](https://github.com/ronin-rb/ronin-vulns/actions/workflows/ruby.yml/badge.svg)](https://github.com/ronin-rb/ronin-vulns/actions/workflows/ruby.yml)
[![Code Climate](https://codeclimate.com/github/ronin-rb/ronin-vulns.svg)](https://codeclimate.com/github/ronin-rb/ronin-vulns)
+[![Gem Version](https://badge.fury.io/rb/ronin-vulns.svg)](https://badge.fury.io/rb/ronin-vulns)
* [Website](https://ronin-rb.dev/)
* [Source](https://github.com/ronin-rb/ronin-vulns)
* [Issues](https://github.com/ronin-rb/ronin-vulns/issues)
* [Documentation](https://ronin-rb.dev/docs/ronin-vulns/frames)
@@ -13,10 +14,10 @@
## Description
ronin-vulns is a Ruby library for blind vulnerability testing. It currently
supports testing for Local File Inclusion (LFI), Remote File Inclusion (RFI),
-SQL injection (SQLi), reflective Cross Site Scripting (XSS), and Server Side
+SQL injection (SQLi), reflective Cross Site Scripting (XSS), Server Side
Template Injection (SSTI), and Open Redirects.
ronin-vulns is part of the [ronin-rb] project, a [Ruby] toolkit for security
research and development.