# -*- encoding: utf-8 -*- # stub: ronin-exploits 1.0.0.beta2 ruby lib Gem::Specification.new do |s| s.name = "ronin-exploits".freeze s.version = "1.0.0.beta2".freeze s.required_rubygems_version = Gem::Requirement.new(">= 0".freeze) if s.respond_to? :required_rubygems_version= s.metadata = { "bug_tracker_uri" => "https://github.com/ronin-rb/ronin-exploits/issues", "changelog_uri" => "https://github.com/ronin-rb/ronin-exploits/blob/main/ChangeLog.md", "documentation_uri" => "https://ronin-rb.dev/docs/ronin-exploits", "rubygems_mfa_required" => "true", "source_code_uri" => "https://github.com/ronin-rb/ronin-exploits" } if s.respond_to? :metadata= s.require_paths = ["lib".freeze] s.authors = ["Postmodern".freeze] s.date = "2023-01-09" s.description = "ronin-exploits is a Ruby micro-framework for writing and running exploits. ronin-exploits allows one to write exploits as plain old Ruby classes. ronin-exploits can be distributed as Ruby files or as git repositories that can be installed using ronin-reps.".freeze s.email = "postmodern.mod3@gmail.com".freeze s.executables = ["ronin-exploits".freeze] s.extra_rdoc_files = ["COPYING.txt".freeze, "ChangeLog.md".freeze, "README.md".freeze] s.files = [".document".freeze, ".editorconfig".freeze, ".github/workflows/ruby.yml".freeze, ".gitignore".freeze, ".mailmap".freeze, ".rspec".freeze, ".ruby-version".freeze, ".yardopts".freeze, "COPYING.txt".freeze, "ChangeLog.md".freeze, "Gemfile".freeze, "README.md".freeze, "Rakefile".freeze, "bin/ronin-exploits".freeze, "data/new/exploit.rb.erb".freeze, "gemspec.yml".freeze, "lib/ronin/exploits.rb".freeze, "lib/ronin/exploits/advisory.rb".freeze, "lib/ronin/exploits/cli.rb".freeze, "lib/ronin/exploits/cli/command.rb".freeze, "lib/ronin/exploits/cli/commands/irb.rb".freeze, "lib/ronin/exploits/cli/commands/list.rb".freeze, "lib/ronin/exploits/cli/commands/new.rb".freeze, "lib/ronin/exploits/cli/commands/run.rb".freeze, "lib/ronin/exploits/cli/commands/show.rb".freeze, "lib/ronin/exploits/cli/exploit_command.rb".freeze, "lib/ronin/exploits/cli/exploit_methods.rb".freeze, "lib/ronin/exploits/cli/ruby_shell.rb".freeze, "lib/ronin/exploits/client_side_web_vuln.rb".freeze, "lib/ronin/exploits/exceptions.rb".freeze, "lib/ronin/exploits/exploit.rb".freeze, "lib/ronin/exploits/heap_overflow.rb".freeze, "lib/ronin/exploits/lfi.rb".freeze, "lib/ronin/exploits/loot.rb".freeze, "lib/ronin/exploits/loot/file.rb".freeze, "lib/ronin/exploits/memory_corruption.rb".freeze, "lib/ronin/exploits/metadata/arch.rb".freeze, "lib/ronin/exploits/metadata/cookie_param.rb".freeze, "lib/ronin/exploits/metadata/default_filename.rb".freeze, "lib/ronin/exploits/metadata/default_port.rb".freeze, "lib/ronin/exploits/metadata/header_name.rb".freeze, "lib/ronin/exploits/metadata/os.rb".freeze, "lib/ronin/exploits/metadata/shouts.rb".freeze, "lib/ronin/exploits/metadata/url_path.rb".freeze, "lib/ronin/exploits/metadata/url_query_param.rb".freeze, "lib/ronin/exploits/mixins.rb".freeze, "lib/ronin/exploits/mixins/binary.rb".freeze, "lib/ronin/exploits/mixins/build_dir.rb".freeze, "lib/ronin/exploits/mixins/file_builder.rb".freeze, "lib/ronin/exploits/mixins/format_string.rb".freeze, "lib/ronin/exploits/mixins/has_payload.rb".freeze, "lib/ronin/exploits/mixins/has_targets.rb".freeze, "lib/ronin/exploits/mixins/html.rb".freeze, "lib/ronin/exploits/mixins/http.rb".freeze, "lib/ronin/exploits/mixins/loot.rb".freeze, "lib/ronin/exploits/mixins/nops.rb".freeze, "lib/ronin/exploits/mixins/remote_tcp.rb".freeze, "lib/ronin/exploits/mixins/remote_udp.rb".freeze, "lib/ronin/exploits/mixins/seh.rb".freeze, "lib/ronin/exploits/mixins/stack_overflow.rb".freeze, "lib/ronin/exploits/mixins/text.rb".freeze, "lib/ronin/exploits/open_redirect.rb".freeze, "lib/ronin/exploits/params/base_url.rb".freeze, "lib/ronin/exploits/params/bind_host.rb".freeze, "lib/ronin/exploits/params/bind_port.rb".freeze, "lib/ronin/exploits/params/filename.rb".freeze, "lib/ronin/exploits/params/host.rb".freeze, "lib/ronin/exploits/params/port.rb".freeze, "lib/ronin/exploits/registry.rb".freeze, "lib/ronin/exploits/rfi.rb".freeze, "lib/ronin/exploits/root.rb".freeze, "lib/ronin/exploits/seh_overflow.rb".freeze, "lib/ronin/exploits/sqli.rb".freeze, "lib/ronin/exploits/ssti.rb".freeze, "lib/ronin/exploits/stack_overflow.rb".freeze, "lib/ronin/exploits/target.rb".freeze, "lib/ronin/exploits/test_result.rb".freeze, "lib/ronin/exploits/use_after_free.rb".freeze, "lib/ronin/exploits/version.rb".freeze, "lib/ronin/exploits/web.rb".freeze, "lib/ronin/exploits/web_vuln.rb".freeze, "lib/ronin/exploits/xss.rb".freeze, "man/ronin-exploits-irb.1".freeze, "man/ronin-exploits-irb.1.md".freeze, "man/ronin-exploits-list.1".freeze, "man/ronin-exploits-list.1.md".freeze, "man/ronin-exploits-new.1".freeze, "man/ronin-exploits-new.1.md".freeze, "man/ronin-exploits-run.1".freeze, "man/ronin-exploits-run.1.md".freeze, "man/ronin-exploits-show.1".freeze, "man/ronin-exploits-show.1.md".freeze, "man/ronin-exploits.1".freeze, "man/ronin-exploits.1.md".freeze, "ronin-exploits.gemspec".freeze, "spec/advisory_spec.rb".freeze, "spec/cli/exploit_command_spec.rb".freeze, "spec/cli/exploit_methods_spec.rb".freeze, "spec/cli/ruby_shell_spec.rb".freeze, "spec/client_side_web_vuln_spec.rb".freeze, "spec/exploit_spec.rb".freeze, "spec/exploits_spec.rb".freeze, "spec/heap_overflow_spec.rb".freeze, "spec/lfi_spec.rb".freeze, "spec/loot/file_spec.rb".freeze, "spec/loot_spec.rb".freeze, "spec/memory_corruption_spec.rb".freeze, "spec/metadata/arch_spec.rb".freeze, "spec/metadata/cookie_param_spec.rb".freeze, "spec/metadata/default_filename_spec.rb".freeze, "spec/metadata/default_port_spec.rb".freeze, "spec/metadata/header_name_spec.rb".freeze, "spec/metadata/os_spec.rb".freeze, "spec/metadata/shouts_spec.rb".freeze, "spec/metadata/url_path_spec.rb".freeze, "spec/metadata/url_query_param_spec.rb".freeze, "spec/mixins/binary_spec.rb".freeze, "spec/mixins/build_dir.rb".freeze, "spec/mixins/file_builder_spec.rb".freeze, "spec/mixins/format_string_spec.rb".freeze, "spec/mixins/has_payload_spec.rb".freeze, "spec/mixins/has_targets_spec.rb".freeze, "spec/mixins/html_spec.rb".freeze, "spec/mixins/http_spec.rb".freeze, "spec/mixins/loot_spec.rb".freeze, "spec/mixins/nops_spec.rb".freeze, "spec/mixins/remote_tcp_spec.rb".freeze, "spec/mixins/remote_udp_spec.rb".freeze, "spec/mixins/seh_spec.rb".freeze, "spec/mixins/stack_overflow_spec.rb".freeze, "spec/mixins/text_spec.rb".freeze, "spec/open_redirect_spec.rb".freeze, "spec/params/base_url_spec.rb".freeze, "spec/params/bind_host_spec.rb".freeze, "spec/params/bind_port_spec.rb".freeze, "spec/params/filename_spec.rb".freeze, "spec/params/host_spec.rb".freeze, "spec/params/port_spec.rb".freeze, "spec/rfi_spec.rb".freeze, "spec/seh_overflow_spec.rb".freeze, "spec/spec_helper.rb".freeze, "spec/sqli_spec.rb".freeze, "spec/ssti_spec.rb".freeze, "spec/stack_overflow_spec.rb".freeze, "spec/target_spec.rb".freeze, "spec/test_result_spec.rb".freeze, "spec/use_after_free_spec.rb".freeze, "spec/web_spec.rb".freeze, "spec/web_vuln_spec.rb".freeze, "spec/xss_spec.rb".freeze] s.homepage = "https://ronin-rb.dev/exploits/".freeze s.licenses = ["LGPL-3.0".freeze] s.required_ruby_version = Gem::Requirement.new(">= 3.0.0".freeze) s.rubygems_version = "3.5.10".freeze s.summary = "A Ruby micro-framework for writing and running exploits and payloads.".freeze s.test_files = ["spec/advisory_spec.rb".freeze, "spec/cli/exploit_command_spec.rb".freeze, "spec/cli/exploit_methods_spec.rb".freeze, "spec/cli/ruby_shell_spec.rb".freeze, "spec/client_side_web_vuln_spec.rb".freeze, "spec/exploit_spec.rb".freeze, "spec/exploits_spec.rb".freeze, "spec/heap_overflow_spec.rb".freeze, "spec/lfi_spec.rb".freeze, "spec/loot/file_spec.rb".freeze, "spec/loot_spec.rb".freeze, "spec/memory_corruption_spec.rb".freeze, "spec/metadata/arch_spec.rb".freeze, "spec/metadata/cookie_param_spec.rb".freeze, "spec/metadata/default_filename_spec.rb".freeze, "spec/metadata/default_port_spec.rb".freeze, "spec/metadata/header_name_spec.rb".freeze, "spec/metadata/os_spec.rb".freeze, "spec/metadata/shouts_spec.rb".freeze, "spec/metadata/url_path_spec.rb".freeze, "spec/metadata/url_query_param_spec.rb".freeze, "spec/mixins/binary_spec.rb".freeze, "spec/mixins/file_builder_spec.rb".freeze, "spec/mixins/format_string_spec.rb".freeze, "spec/mixins/has_payload_spec.rb".freeze, "spec/mixins/has_targets_spec.rb".freeze, "spec/mixins/html_spec.rb".freeze, "spec/mixins/http_spec.rb".freeze, "spec/mixins/loot_spec.rb".freeze, "spec/mixins/nops_spec.rb".freeze, "spec/mixins/remote_tcp_spec.rb".freeze, "spec/mixins/remote_udp_spec.rb".freeze, "spec/mixins/seh_spec.rb".freeze, "spec/mixins/stack_overflow_spec.rb".freeze, "spec/mixins/text_spec.rb".freeze, "spec/open_redirect_spec.rb".freeze, "spec/params/base_url_spec.rb".freeze, "spec/params/bind_host_spec.rb".freeze, "spec/params/bind_port_spec.rb".freeze, "spec/params/filename_spec.rb".freeze, "spec/params/host_spec.rb".freeze, "spec/params/port_spec.rb".freeze, "spec/rfi_spec.rb".freeze, "spec/seh_overflow_spec.rb".freeze, "spec/sqli_spec.rb".freeze, "spec/ssti_spec.rb".freeze, "spec/stack_overflow_spec.rb".freeze, "spec/target_spec.rb".freeze, "spec/test_result_spec.rb".freeze, "spec/use_after_free_spec.rb".freeze, "spec/web_spec.rb".freeze, "spec/web_vuln_spec.rb".freeze, "spec/xss_spec.rb".freeze] s.specification_version = 4 s.add_runtime_dependency(%q.freeze, ["~> 0.6".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 1.0.0.beta1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 2.0.0.beta1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1.0.beta1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1.0.beta1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1.0.beta1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1.0.beta1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1.0.beta1".freeze]) s.add_development_dependency(%q.freeze, ["~> 2.0".freeze]) end