Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits, Payloads, Scanners, etc, via Repositories.
Console
Ronin provides users with a powerful Ruby Console, pre-loaded with powerful convenience methods. In the Console one can work with data and automate complex tasks, with greater ease than the command-line.
>> File.read(‘data’).base64_decode
Database
Ronin ships with a preconfigured Database, that one can interact with from Ruby, without having to write any SQL.
>> HostName.tld(‘eu’).urls.with_query_param(‘id’)
Repositories
Ronin provides a Repository system, allowing users to organize and share miscallaneous Data, Code, Exploits, Payloads, Scanners, etc.
$ ronin install git://github.com/user/myexploits.git
Libraries
Ronin provides libraries with additional functionality, such as Exploitation and Scanning:
$ gem install ronin-exploits
Features
pp
).print_info
, print_error
, print_warning
and print_debug
output helper methods with color-output.!nmap -v -sT victim.com
)Synopsis
Start the Ronin console:
$ ronin
Run a Ruby script in Ronin:
$ ronin exec script.rb
View available commands:
$ ronin help
View a man-page for a command:
$ ronin help wordlist
Install a Repository:
$ ronin install svn://example.com/path/to/repo
List installed Repositories:
$ ronin repos
Update all installed Repositories:
$ ronin update
Update a specific Repositories:
$ ronin update repo-name
Uninstall a specific Repositories:
$ ronin uninstall repo-name
List available Databases:
$ ronin database
Add a new Database:
$ ronin database –add team –uri mysql://user:pass@vpn.example.com/db
Remove a Database:
$ ronin database –remove team
Requirements
Install
$ gem install ronin
Development
cd ronin
bundle install
git checkout -b my_feature
bundle exec rake spec
git push origin my_feature
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…