It's a repository to import public exploits to be written in Ruby without Metasploit complication
- To educate people how to write exploits using Ruby
- To Write exploit for CVEs that doesn't have exploit in a simple way
- To avoid Metasploit complications. But we still LOVE Metasploit
- To list a common exploit that we face in PT that may or may not exist in Metasploit
- To Centeralize exploits that written in other languages to be written in Ruby
- Fork it
- Create your new exploit branch (
git checkout -b CVE-2016-xxxx
) - Create a sub-directory for your exploit with the same CVE number (
mkdir CVE-2016-xxxx
) - Create your
CVE-2016-xxx_exploit.rb
andREADME.md
files. Naming convsion is required - Add the vulnerable application to the sub-directory
CVE-2016-xxxx
. Recommended! - Commit your changes (
git commit add *
) - Commit your changes (
git commit -m "CVE-2016-xxxx | Application name"
) - Push to the branch (
git push origin CVE-2016-xxxx
) - Cerate new Pull Request (PR)
- It's good to add some comment in your code when needed
- It's good to add a PoC if you'd like.
- Add usefull references in README.md file
- Check and copy CVE-0000-0000 example