# -*- encoding: utf-8 -*- # stub: ronin-exploits 1.0.3 ruby lib Gem::Specification.new do |s| s.name = "ronin-exploits".freeze s.version = "1.0.3".freeze s.required_rubygems_version = Gem::Requirement.new(">= 0".freeze) if s.respond_to? :required_rubygems_version= s.metadata = { "bug_tracker_uri" => "https://github.com/ronin-rb/ronin-exploits/issues", "changelog_uri" => "https://github.com/ronin-rb/ronin-exploits/blob/main/ChangeLog.md", "documentation_uri" => "https://ronin-rb.dev/docs/ronin-exploits", "rubygems_mfa_required" => "true", "source_code_uri" => "https://github.com/ronin-rb/ronin-exploits" } if s.respond_to? :metadata= s.require_paths = ["lib".freeze] s.authors = ["Postmodern".freeze] s.date = "2023-09-19" s.description = "ronin-exploits is a Ruby micro-framework for writing and running exploits.\nronin-exploits allows one to write exploits as plain old Ruby classes.\nronin-exploits can be distributed as Ruby files or as git repositories that\ncan be installed using ronin-reps.\n\nIt's like a simpler version of Metasploit.\n".freeze s.email = "postmodern.mod3@gmail.com".freeze s.executables = ["ronin-exploits".freeze] s.extra_rdoc_files = ["COPYING.txt".freeze, "ChangeLog.md".freeze, "README.md".freeze] s.files = [".document".freeze, ".editorconfig".freeze, ".github/workflows/ruby.yml".freeze, ".gitignore".freeze, ".mailmap".freeze, ".rspec".freeze, ".rubocop.yml".freeze, ".ruby-version".freeze, ".yardopts".freeze, "COPYING.txt".freeze, "ChangeLog.md".freeze, "Gemfile".freeze, "README.md".freeze, "Rakefile".freeze, "bin/ronin-exploits".freeze, "data/new/exploit.rb.erb".freeze, "gemspec.yml".freeze, "lib/ronin/exploits.rb".freeze, "lib/ronin/exploits/advisory.rb".freeze, "lib/ronin/exploits/cli.rb".freeze, "lib/ronin/exploits/cli/command.rb".freeze, "lib/ronin/exploits/cli/commands/irb.rb".freeze, "lib/ronin/exploits/cli/commands/list.rb".freeze, "lib/ronin/exploits/cli/commands/new.rb".freeze, "lib/ronin/exploits/cli/commands/run.rb".freeze, "lib/ronin/exploits/cli/commands/show.rb".freeze, "lib/ronin/exploits/cli/exploit_command.rb".freeze, "lib/ronin/exploits/cli/exploit_methods.rb".freeze, "lib/ronin/exploits/cli/ruby_shell.rb".freeze, "lib/ronin/exploits/client_side_web_vuln.rb".freeze, "lib/ronin/exploits/exceptions.rb".freeze, "lib/ronin/exploits/exploit.rb".freeze, "lib/ronin/exploits/heap_overflow.rb".freeze, "lib/ronin/exploits/lfi.rb".freeze, "lib/ronin/exploits/loot.rb".freeze, "lib/ronin/exploits/loot/file.rb".freeze, "lib/ronin/exploits/memory_corruption.rb".freeze, "lib/ronin/exploits/metadata/arch.rb".freeze, "lib/ronin/exploits/metadata/cookie_param.rb".freeze, "lib/ronin/exploits/metadata/default_filename.rb".freeze, "lib/ronin/exploits/metadata/default_port.rb".freeze, "lib/ronin/exploits/metadata/header_name.rb".freeze, "lib/ronin/exploits/metadata/os.rb".freeze, "lib/ronin/exploits/metadata/shouts.rb".freeze, "lib/ronin/exploits/metadata/url_path.rb".freeze, "lib/ronin/exploits/metadata/url_query_param.rb".freeze, "lib/ronin/exploits/mixins.rb".freeze, "lib/ronin/exploits/mixins/binary.rb".freeze, "lib/ronin/exploits/mixins/build_dir.rb".freeze, "lib/ronin/exploits/mixins/file_builder.rb".freeze, "lib/ronin/exploits/mixins/format_string.rb".freeze, "lib/ronin/exploits/mixins/has_payload.rb".freeze, "lib/ronin/exploits/mixins/has_targets.rb".freeze, "lib/ronin/exploits/mixins/html.rb".freeze, "lib/ronin/exploits/mixins/http.rb".freeze, "lib/ronin/exploits/mixins/loot.rb".freeze, "lib/ronin/exploits/mixins/nops.rb".freeze, "lib/ronin/exploits/mixins/remote_tcp.rb".freeze, "lib/ronin/exploits/mixins/remote_udp.rb".freeze, "lib/ronin/exploits/mixins/seh.rb".freeze, "lib/ronin/exploits/mixins/stack_overflow.rb".freeze, "lib/ronin/exploits/mixins/text.rb".freeze, "lib/ronin/exploits/open_redirect.rb".freeze, "lib/ronin/exploits/params/base_url.rb".freeze, "lib/ronin/exploits/params/bind_host.rb".freeze, "lib/ronin/exploits/params/bind_port.rb".freeze, "lib/ronin/exploits/params/filename.rb".freeze, "lib/ronin/exploits/params/host.rb".freeze, "lib/ronin/exploits/params/port.rb".freeze, "lib/ronin/exploits/registry.rb".freeze, "lib/ronin/exploits/rfi.rb".freeze, "lib/ronin/exploits/root.rb".freeze, "lib/ronin/exploits/seh_overflow.rb".freeze, "lib/ronin/exploits/sqli.rb".freeze, "lib/ronin/exploits/ssti.rb".freeze, "lib/ronin/exploits/stack_overflow.rb".freeze, "lib/ronin/exploits/target.rb".freeze, "lib/ronin/exploits/test_result.rb".freeze, "lib/ronin/exploits/use_after_free.rb".freeze, "lib/ronin/exploits/version.rb".freeze, "lib/ronin/exploits/web.rb".freeze, "lib/ronin/exploits/web_vuln.rb".freeze, "lib/ronin/exploits/xss.rb".freeze, "man/ronin-exploits-irb.1".freeze, "man/ronin-exploits-irb.1.md".freeze, "man/ronin-exploits-list.1".freeze, "man/ronin-exploits-list.1.md".freeze, "man/ronin-exploits-new.1".freeze, "man/ronin-exploits-new.1.md".freeze, "man/ronin-exploits-run.1".freeze, "man/ronin-exploits-run.1.md".freeze, "man/ronin-exploits-show.1".freeze, "man/ronin-exploits-show.1.md".freeze, "man/ronin-exploits.1".freeze, "man/ronin-exploits.1.md".freeze, "ronin-exploits.gemspec".freeze] s.homepage = "https://ronin-rb.dev/exploits/".freeze s.licenses = ["LGPL-3.0".freeze] s.required_ruby_version = Gem::Requirement.new(">= 3.0.0".freeze) s.rubygems_version = "3.5.10".freeze s.summary = "A Ruby micro-framework for writing and running exploits and payloads.".freeze s.specification_version = 4 s.add_runtime_dependency(%q.freeze, ["~> 0.6".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 1.0".freeze, ">= 1.0.1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 2.0".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1".freeze, ">= 0.1.1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1".freeze, ">= 0.1.1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1".freeze]) s.add_runtime_dependency(%q.freeze, ["~> 0.1".freeze]) s.add_development_dependency(%q.freeze, ["~> 2.0".freeze]) end