GithubHelp home page GithubHelp logo

rubyfu / rubyfu Goto Github PK

View Code? Open in Web Editor NEW
322.0 21.0 104.0 23.28 MB

Rubyfu, where Ruby goes evil!

Home Page: http://rubyfu.net

CSS 65.30% JavaScript 34.70%
ruby book hacking pentesting-windows blackhat rubyfu red-team network-security penetration-testing

rubyfu's Introduction

description
ruby for pentesters

Module 0x0 | Introduction


Rubyfu, where Ruby goes evil!
Twitter Follow

Introduction

This book is a great collection of ideas, tricks, and skills that could be useful for Hackers. It's a unique extraction reference, summarizes a lot of research and experience in order to achieve your w00t in the shortest and smartest way. Rubyfu is where you'll find plug-n-hack code. Rubyfu is a book to use not only to read, it's where ruby goes evil.

Who should read this book?

Ideally, Hackers! Those who have enough experience to hack our world and have at least basics in the Ruby programming language. To get the best benefits of the book, open Rubyfu.net and pin its browser tab. Use the irb/pry interactive interpreter to run the code, or run it as a script. Enhance the code to fit your needs and yeah, tweet the code and its output to @Rubyfu to share it with our awesome community.

Organization of the book

Module 0x0 | Introduction

Module 0x0 is just a smooth start for you, whether you're a reader, writer, hacker or someone who came to say hi. In this module you'll find a great start for you as a contributor, where all kinds of contributions are welcome starting from proofreading all the way up to topic writing.

Module 0x1 | Basic Ruby Kung Fu

Module 0x1 is an awesome collection of the most commonly needed string manipulation, extraction and conversion tasks; dealing with real cases that you might face during your hack. Your encoding and data conversion may be a trivial or complex challenge and here we don't care, we'll solve it.

Module 0x2 | System Kung Fu

Module 0x2 digs more into system hacking, where system commands, file manipulation, cryptography and generating common hashes are often needed. Getting simple bind and reverse shells with Ruby is a useful skill, no doubt. Almost all mainstream Linux systems are shipped with ruby and if not, no problem, we always have other ways to make use of our knowledge.

Module 0x3 | Network Kung Fu

Module 0x3 dives deeper into network sockets, protocols, packet manipulation, service enumeration and gives us more hacky and awesome code to get the job done. Working with network protocols needs a deeper knowledge of how these protocols work in order to exchange understandable data and yeah, we'll figure it out right here.

Module 0x4 | Web Kung Fu

Module 0x4 covers web topics. The web is the most common place to share information, making it one of the most delicious places to hack. Web hacking challenges, known for their uniqueness and with many potential technologies within a single page, require a versatile tool with easily adaptable capabilities. Here we'll learn how to deal with GET & POST requests, web services, databases, APIs and manipulating the browser to make it our soldier.

Module 0x5 builds your exploitation abilities with Ruby. Whatever the vulnerability may be, remote (FTP, IMAP, SMTP, etc.) or local (file format, local system) you'll need to know how to build fuzzers and skeleton exploits for it. If you get there you'll need a simple, clean and stable way to build your exploit. Here you'll learn how to build your fuzzer, exploit, and port your exploit to Metasploit -- and even how to write your own Metasploit modules too.

Module 0x6 | Forensic Kung Fu

Module 0x6 explores forensic capabilities with Rubyfu. Whoever you are: redteam, blueteam, or in-between you'll need some forensic skills in your hack and/or investigation. Here you'll learn more about how to deal with registry tasks, extracting browser information, and much more.

Black Hat Ruby — Offensive Ruby programming book for hackers & pentesters

Black Hat Ruby is the commercial edition of Rubyfu. The book contains many new topics and solving a lot of real-world challenges with detailed explanations targeting professionals.

Black Hat Ruby cover

{% hint style="success" %} You can purchase Black Hat Ruby on Amazon {% endhint %}

The primary goal of Black Hat Ruby book is to provide you with a vast angle of using Ruby as an information security professional in an offensive manner. The book meant to help you with weaponizing Ruby language in various offensive scenarios whether you are testing web applications, networks, systems, or exploit development to carve your ideas into working and achieving code.

Another intended goal of the book is to route you to the code that achieves your goal in the shortest time. This book is aimed at security researchers, security consultants, penetration testers, red teamers, or any professional who is interested in writing offensive Code.

In this book, you will learn:

  • Hacker's day to day string manipulation, conversion, and extraction.
  • Compiling ruby to exe, parsing, and files such as XML, JSON, HTML, and binary.
  • Manipulating files stamps, creating malicious Shortcut, Excel & PDF files.
  • Generating the most common hashes for various platforms.
  • Using ruby to execute system commands.
  • Tactical code for red teaming activities, such as lateral movements via WinRM, WMI and creating malicious OLE and malicious Excel files for spear phishing.
  • Importing Windows system internal for execute shellcode, dll injection.
  • Introduction to the network Socket operations in Ruby and creating a remote shell.
  • Malicious use for network services such as HTTP, SSH, DNS, FTP, TFTP for exploitation and data exfiltration.
  • Packet manipulation and building network packet from the ground up to for ARP spoofing, rogue wireless access point (AP), SNMP spoofing and parsing captured pcap files.
  • Introduction about dealing with services and creating covert C2 for data exfiltration.
  • Automating the hunting of XSS and blind-XSS. • Exploiting Web socket and WSDL services and its APIs.
  • Using Slack as a C2
  • Understanding and creating advanced Burp Suite scanner extensions (active and passive) and manipulate the Burp user interface in detail.
  • Step by step basic buffer overflow exploit development using ruby.
  • Porting your stand-alone exploit to Metasploit and creating Auxiliary, Exploit and Post modules.

Happy Hacking!

rubyfu's People

Contributors

abdallahmussad avatar astreuw avatar disenchant avatar hoekstraa avatar kingsabri avatar kotp avatar mervick avatar n3k00n3 avatar noraj avatar postmodern avatar sdcampbell avatar sidworks avatar tayjaybabee avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

rubyfu's Issues

FAQS duplicate

Similar to some issues we saw before there is another duplicate

  • faqs.md
  • FAQS/README.md (to remove)

right place for images?

There are images in:

  • .gitbook/assets
  • assets
  • images

Seems redundant, where is the right place?

Need more forensic

I'm not a forensic guy, we may need a hand from DFIR guys to enhance Module 0x6

Inventory notification

Your website has been inventoried on Rawsec's CyberSecurity Inventory.

https://inventory.rawsec.ml/resources.html#RubyFu

What is Rawsec's CyberSecurity Inventory?

An inventory of tools and resources about CyberSecurity. This inventory aims to help people to find everything related to CyberSecurity.

More details about features here.

Note: the inventory is a FLOSS (Free, Libre and Open-Source Software) project.

Why should you care about being inventoried?

Mainly because this is giving visibility to your tool and improve its referencing.

Badges

The badge shows to your community that your are inventoried. It looks good but also shows you care about your project, that your tool is referenced.

Feel free to claim your badge here: http://inventory.rawsec.ml/features.html#badges, it looks like that Rawsec's CyberSecurity Inventory, but there are several styles available.

Want to thank us?

If you want to thank us, you can help make our open project better known by tweeting about it! For example: Twitter URL

So what?

That's all, this message is just to notify you if you care. Else you can close this issue.

to make Twitter API a better API for programmers

السلام عليكم

https://github.com/rubyfu/RubyFu/blob/master/module_0x4__web_kung_fu/twitter_api.md

We know that Twitter Apps require approval from the Twitter API Team in order to create a project :(

so, we're going to use the [Android] Twitter app's consumer_key: 3nVuSoBZnx6U4vzUxf5w and consumer_secret: Bcs59EFbbsdF6Sl9Ng71smgStWEGwXXKSjYvPVt7qys .

Twitter can't ban you.

My Edit : -
Just put username and password 😄

#!/usr/bin/env ruby
require 'net/http'
require 'twitter'
require 'pp'

username = "" # Your Username
password = "" # Your Passowrd
def guest_token()
	gt = URI.parse("https://api.twitter.com/1.1/guest/activate.json")
	guest = Net::HTTP.new(gt.host, gt.port)
	guest.use_ssl = true
	req = Net::HTTP::Post.new(gt.request_uri)
	req["Authorization"] = "Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F"
	res = guest.request(req).body
	return res[/{"guest_token":"(.*?)"}/,1]
end
uri = URI.parse("https://api.twitter.com/auth/1/xauth_password.json")
http = Net::HTTP.new(uri.host, uri.port)
http.use_ssl = true
request = Net::HTTP::Post.new(uri.request_uri)
request["X-Guest-Token"] = guest_token()
request["Authorization"] = "Bearer AAAAAAAAAAAAAAAAAAAAAFXzAwAAAAAAMHCxpeSDG1gLNLghVe8d74hl6k4%3DRUMF4xAQLsbeBhTSRrCiQpJtxoGWeyHrDb5te2jpGskWDFW82F"
request.set_form_data({"x_auth_identifier" => username,"x_auth_password" => password})
response = http.request(request).body
private_access_token = response[/"oauth_token":"(.*?)"/,1]
private_access_token_secret = response[/"oauth_token_secret":"(.*?)"/,1]
############# Now u can use Twitter API Lib
client = Twitter::REST::Client.new do |config|
        config.consumer_key        = "3nVuSoBZnx6U4vzUxf5w"
        config.consumer_secret     = "Bcs59EFbbsdF6Sl9Ng71smgStWEGwXXKSjYvPVt7qys"
        config.access_token        = private_access_token
        config.access_token_secret = private_access_token_secret
end
#############
client.update("@0x1337r00t With @KINGSABRI #RubyFu")

~ 1337r00t
Blackfox's Team

bogojoker.com/readline redirects

module-0x1-or.../README.md at the very bottom, the link there redirects to something funky - holmestrail.something or other.

Just thought you should know :)

Brazilian portuguese Translation!

I started to translate RubyFu to Brazilian Portuguese. I'll associat my PR with this issue.

Thanks guys for this project. That's really amazing.

Duplicate content / old content

The folders with underscore seems to come from an old implementation and to be unused now.

image

Can we clean the duplicate content?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.