# -*- encoding: utf-8 -*- # stub: ronin-exploits 0.2.0 ruby lib Gem::Specification.new do |s| s.name = "ronin-exploits".freeze s.version = "0.2.0".freeze s.required_rubygems_version = Gem::Requirement.new(">= 0".freeze) if s.respond_to? :required_rubygems_version= s.require_paths = ["lib".freeze] s.authors = ["Postmodern".freeze] s.date = "2009-05-11" s.description = "Ronin Exploits is a Ruby library for Ronin that provides exploitation and payload crafting functionality. Ronin is a Ruby platform designed for information security and data exploration tasks. Ronin allows for the rapid development and distribution of code over many of the common Source-Code-Management (SCM) systems.".freeze s.email = ["postmodern.mod3@gmail.com".freeze] s.executables = ["ronin-payload".freeze, "ronin-payloads".freeze, "ronin-exploits".freeze] s.extra_rdoc_files = ["History.txt".freeze, "COPYING.txt".freeze, "Manifest.txt".freeze, "README.txt".freeze, "TODO.txt".freeze] s.files = ["COPYING.txt".freeze, "History.txt".freeze, "Manifest.txt".freeze, "README.txt".freeze, "Rakefile".freeze, "TODO.txt".freeze, "bin/ronin-exploits".freeze, "bin/ronin-payload".freeze, "bin/ronin-payloads".freeze, "lib/ronin/exploits.rb".freeze, "lib/ronin/exploits/allow.rb".freeze, "lib/ronin/exploits/exceptions.rb".freeze, "lib/ronin/exploits/exceptions/exploit_not_built.rb".freeze, "lib/ronin/exploits/exceptions/payload_size.rb".freeze, "lib/ronin/exploits/exceptions/restricted_char.rb".freeze, "lib/ronin/exploits/exceptions/target_data_missing.rb".freeze, "lib/ronin/exploits/exceptions/target_unspecified.rb".freeze, "lib/ronin/exploits/exceptions/unknown_helper.rb".freeze, "lib/ronin/exploits/exploit.rb".freeze, "lib/ronin/exploits/exploit_author.rb".freeze, "lib/ronin/exploits/ftp.rb".freeze, "lib/ronin/exploits/helpers.rb".freeze, "lib/ronin/exploits/helpers/binary.rb".freeze, "lib/ronin/exploits/helpers/buffer_overflow.rb".freeze, "lib/ronin/exploits/helpers/format_string.rb".freeze, "lib/ronin/exploits/helpers/padding.rb".freeze, "lib/ronin/exploits/http.rb".freeze, "lib/ronin/exploits/local.rb".freeze, "lib/ronin/exploits/remote.rb".freeze, "lib/ronin/exploits/remote_tcp.rb".freeze, "lib/ronin/exploits/remote_udp.rb".freeze, "lib/ronin/exploits/target.rb".freeze, "lib/ronin/exploits/targets.rb".freeze, "lib/ronin/exploits/targets/buffer_overflow.rb".freeze, "lib/ronin/exploits/targets/format_string.rb".freeze, "lib/ronin/exploits/version.rb".freeze, "lib/ronin/exploits/web.rb".freeze, "lib/ronin/model/targets_arch.rb".freeze, "lib/ronin/model/targets_os.rb".freeze, "lib/ronin/payloads.rb".freeze, "lib/ronin/payloads/binary_payload.rb".freeze, "lib/ronin/payloads/control.rb".freeze, "lib/ronin/payloads/encoder.rb".freeze, "lib/ronin/payloads/encoders.rb".freeze, "lib/ronin/payloads/encoders/xor.rb".freeze, "lib/ronin/payloads/exceptions.rb".freeze, "lib/ronin/payloads/exceptions/unknown_helper.rb".freeze, "lib/ronin/payloads/helpers.rb".freeze, "lib/ronin/payloads/helpers/exceptions.rb".freeze, "lib/ronin/payloads/helpers/exceptions/program_not_found.rb".freeze, "lib/ronin/payloads/helpers/exceptions/unimplemented.rb".freeze, "lib/ronin/payloads/helpers/file_system.rb".freeze, "lib/ronin/payloads/helpers/rpc.rb".freeze, "lib/ronin/payloads/helpers/shell.rb".freeze, "lib/ronin/payloads/nops.rb".freeze, "lib/ronin/payloads/payload.rb".freeze, "lib/ronin/payloads/payload_author.rb".freeze, "lib/ronin/payloads/shellcode.rb".freeze, "lib/ronin/payloads/web_payload.rb".freeze, "lib/ronin/targeted_arch.rb".freeze, "lib/ronin/targeted_os.rb".freeze, "lib/ronin/targeted_product.rb".freeze, "lib/ronin/ui/command_line/commands/exploits.rb".freeze, "lib/ronin/ui/command_line/commands/payload.rb".freeze, "lib/ronin/ui/command_line/commands/payloads.rb".freeze, "lib/ronin/vuln/behavior.rb".freeze, "spec/exploits/binary_exploit_spec.rb".freeze, "spec/exploits/buffer_overflow_exploit_spec.rb".freeze, "spec/exploits/exploit_spec.rb".freeze, "spec/exploits/format_string_exploit_spec.rb".freeze, "spec/exploits/ftp_spec.rb".freeze, "spec/exploits/http_spec.rb".freeze, "spec/exploits/padding_exploit_spec.rb".freeze, "spec/exploits/remote_tcp_spec.rb".freeze, "spec/exploits/remote_udp_spec.rb".freeze, "spec/exploits/target_spec.rb".freeze, "spec/exploits/targets/buffer_overflow_spec.rb".freeze, "spec/exploits/web_spec.rb".freeze, "spec/exploits_spec.rb".freeze, "spec/helpers/database.rb".freeze, "spec/helpers/objects.rb".freeze, "spec/objects/exploits/test.rb".freeze, "spec/objects/payloads/example.rb".freeze, "spec/objects/payloads/test.rb".freeze, "spec/payloads/encoder_spec.rb".freeze, "spec/payloads/encoders/xor_spec.rb".freeze, "spec/payloads/payload_spec.rb".freeze, "spec/spec_helper.rb".freeze, "spec/vuln/behavior_spec.rb".freeze, "tasks/spec.rb".freeze] s.homepage = "http://ronin.rubyforge.org/exploits/".freeze s.rdoc_options = ["--main".freeze, "README.txt".freeze] s.rubygems_version = "3.5.10".freeze s.summary = "Ronin Exploits is a Ruby library for Ronin that provides exploitation and payload crafting functionality".freeze s.specification_version = 2 s.add_runtime_dependency(%q.freeze, [">= 0.2.3".freeze]) s.add_development_dependency(%q.freeze, [">= 1.12.2".freeze]) end