GithubHelp home page GithubHelp logo

hartl3y94 / ronin-vulns Goto Github PK

View Code? Open in Web Editor NEW

This project forked from ronin-rb/ronin-vulns

0.0 0.0 0.0 180 KB

Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.

Home Page: https://ronin-rb.dev

License: GNU Lesser General Public License v3.0

Ruby 99.29% Perl 0.11% PHP 0.10% Java 0.12% ColdFusion 0.10% ASP.NET 0.12% Classic ASP 0.15%

ronin-vulns's Introduction

ronin-vulns

CI Code Climate Gem Version

Description

ronin-vulns is a Ruby library for blind vulnerability testing. It currently supports testing for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), reflective Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects.

ronin-vulns is part of the ronin-rb project, a Ruby toolkit for security research and development.

Features

  • Supports testing for:
    • Local File Inclusion (LFI)
    • Remote File Inclusion (RFI)
      • PHP
      • ASP Class / ASP.NET
      • JSP
      • ColdFusion
      • Perl
    • SQL Injection (SQLi)
    • Reflected Cross Site Scripting (XSS)
    • Server Side Template Injection (SSTI)
    • Open Redirects
  • Supports testing:
    • URL query parameters.
    • HTTP Headers.
    • HTTP Cookie parameters.
    • Form parameters.
  • Has 96% documentation coverage.
  • Has 99% test coverage.

Synopsis

Usage: ronin-vulns [options] [COMMAND [ARGS...]]

Options:
    -h, --help                       Print help information

Arguments:
    [COMMAND]                        The command name to run
    [ARGS ...]                       Additional arguments for the command

Commands:
    help
    lfi
    open-redirect
    reflected-xss, xss
    rfi
    scan
    sqli
    ssti

Test a URL for any web vulnerabilities:

$ ronin-vulns scan "http://www.example.com/page.php?lang=en"

Test a URL for Remote File Inclusion (RFI):

$ ronin-vulns rfi "http://www.example.com/page.php?lang=en"

Test a URL for Local File Inclusion (LFI):

$ ronin-vulns lfi "http://www.example.com/page.php?lang=en"

Test a URL for SQL injection (SQLi):

$ ronin-vulns sqli "http://www.example.com/page.php?lang=en"

Test a URL for Server Side Template Injection (SSTI):

$ ronin-vulns sqli "http://www.example.com/page.php?lang=en"

Test a URL for Open Redirects:

$ ronin-vulns open-redirect "http://www.example.com/page.php?lang=en"

Test a URL for reflected Cross Site Scripting (XSS):

$ ronin-vulns reflected-xss "http://www.example.com/page.php?lang=en"

Examples

Test a URL for any web vulnerability:

require 'ronin/vulns/url_scanner'

vuln = Ronin::Vulns::URLScanner.test('http://www.example.com/page.php?lang=en')
# => #<Ronin::Vulns::SQLI: ...>

Scan a URL for all web vulnerabilities:

require 'ronin/vulns/url_scanner'

vulns = Ronin::Vulns::URLScanner.scan('http://www.example.com/page.php?lang=en')
do |vuln|
  puts "Found #{vuln.class} on #{vuln.url} query param #{vuln.query_param}"
end
# => [#<Ronin::Vulns::SQLI: ...>, #<Ronin::Vulns::ReflectedXSS: ...>, ...]

Remote File Inclusion (RFI)

Test a URL for Remote File Inclusion (RFI):

require 'ronin/vulns/rfi'

vuln = Ronin::Vulns::RFI.test('http://www.example.com/page.php?lang=en')
# => #<Ronin::Vulns::RFI: ...>

Finds all Remote File Inclusion (RFI) vulnerabilities for a given URL:

vulns = Ronin::Vulns::RFI.scan('http://www.example.com/page.php?lang=en')
# => [#<Ronin::Vulns::RFI: ...>, ...]

vulns = Ronin::Vulns::RFI.scan('http://www.example.com/page.php?lang=en') do |vuln|
  puts "Found RFI on #{vuln.url} query param #{vuln.query_param}"
end
# => [#<Ronin::Vulns::RFI: ...>, ...]

Local File Inclusion (LFI)

Test a URL for Local File Inclusion (LFI):

require 'ronin/vulns/lfi'

vuln = Ronin::Vulns::LFI.test('http://www.example.com/page.php?lang=en')
# => #<Ronin::Vulns::LFI: ...>

Finds all Local File Inclusion (LFI) vulnerabilities for a given URL:

vulns = Ronin::Vulns::LFI.scan('http://www.example.com/page.php?lang=en')
# => [#<Ronin::Vulns::LFI: ...>, ...]

vulns = Ronin::Vulns::LFI.scan('http://www.example.com/page.php?lang=en') do |vuln|
  puts "Found LFI on #{vuln.url} query param #{vuln.query_param}"
end

SQL Injection (SQLI)

Test a URL for SQL Injection (SQLi):

require 'ronin/vulns/sqli'

vuln = Ronin::Vulns::SQLI.test('http://www.example.com/page.php?lang=en')
# => #<Ronin::Vulns::SQLI: ...>

Finds all Server Side Template Injection (SQLI) vulnerabilities for a given URL:

vulns = Ronin::Vulns::SQLI.scan('http://www.example.com/page.php?lang=en')
# => [#<Ronin::Vulns::SQLI: ...>, ...]

vulns = Ronin::Vulns::SQLI.scan('http://www.example.com/page.php?lang=en') do |vuln|
  puts "Found SQLi on #{vuln.url} query param #{vuln.query_param}"
end
# => [#<Ronin::Vulns::SQLI: ...>, ...]

Server Side Template Injection (SSTI)

Test a URL for Server Side Template Injection (SSTI):

require 'ronin/vulns/ssti'

vuln = Ronin::Vulns::SSTI.test('http://www.example.com/page.php?lang=en')
# => #<Ronin::Vulns::SSTI: ...>

Finds all Server Side Template Injection (SSTI) vulnerabilities for a given URL:

vulns = Ronin::Vulns::SSTI.scan('http://www.example.com/page.php?lang=en')
# => [#<Ronin::Vulns::SSTI: ...>, ...]

vulns = Ronin::Vulns::SSTI.scan('http://www.example.com/page.php?lang=en') do |vuln|
  puts "Found SSTI on #{vuln.url} query param #{vuln.query_param}"
end
# => [#<Ronin::Vulns::SSTI: ...>, ...]

Reflected Cross Site Scripting (XSS)

Test a URL for an (Reflected) Cross Site Scripting (XSS) vulnerability:

require 'ronin/vulns/reflected_xss'

vuln = Ronin::Vulns::ReflectedXSS.test('http://www.example.com/page.php?lang=en')
# => #<Ronin::Vulns::ReflectedXSS: ...>

Finds all (Reflected) Cross Site Scripting (XSS) vulnerabilities for a given URL:

vulns = Ronin::Vulns::ReflectedXSS.scan('http://www.example.com/page.php?lang=en')
# => [#<Ronin::Vulns::ReflectedXSS: ...>, ...]

vulns = Ronin::Vulns::ReflectedXSS.scan('http://www.example.com/page.php?lang=en') do |vuln|
  puts "Found ReflectedXSS on #{vuln.url} query param #{vuln.query_param}"
end
# => [#<Ronin::Vulns::ReflectedXSS: ...>, ...]

Open Redirect

Test a URL for an Open Redirect vulnerability:

require 'ronin/vulns/open_redirect'

vuln = Ronin::Vulns::OpenRedirect.test('http://www.example.com/page.php?lang=en')
# => #<Ronin::Vulns::OpenRedirect: ...>

Finds all Open Redirect vulnerabilities for a given URL:

vulns = Ronin::Vulns::OpenRedirect.scan('http://www.example.com/page.php?lang=en')
# => [#<Ronin::Vulns::OpenRedirect: ...>, ...]

vulns = Ronin::Vulns::OpenRedirect.scan('http://www.example.com/page.php?lang=en') do |vuln|
  puts "Found OpenRedirect on #{vuln.url} query param #{vuln.query_param}"
end
# => [#<Ronin::Vulns::OpenRedirect: ...>, ...]

Requirements

Install

$ gem install ronin-vulns

Gemfile

gem 'ronin-vulns', '~> 0.1'

gemspec

gem.add_dependency 'ronin-vulns', '~> 0.1'

Development

  1. Fork It!
  2. Clone It!
  3. cd ronin-vulns/
  4. bundle install
  5. git checkout -b my_feature
  6. Code It!
  7. bundle exec rake spec
  8. git push origin my_feature

License

Copyright (c) 2022 Hal Brodigan (postmodern.mod3 at gmail.com)

ronin-vulns is free software: you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

ronin-vulns is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.

You should have received a copy of the GNU Lesser General Public License along with ronin-vulns. If not, see https://www.gnu.org/licenses/.

ronin-vulns's People

Contributors

postmodern avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.