Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits, Payloads, Scanners, etc, via Repositories.
Console
Ronin provides users with a powerful Ruby Console, pre-loaded with powerful convenience methods. In the Console one can work with data and automate complex tasks, with greater ease than the command-line.
>> File.read(‘data’).base64_decode
Database
Ronin ships with a preconfigured Database, that one can interact with from Ruby, without having to write any SQL.
>> HostName.tld(‘eu’).urls.with_query_param(‘id’)
Repositories
Ronin provides a Repository system, allowing users to organize and share miscallaneous Data, Code, Exploits, Payloads, Scanners, etc.
$ ronin install git://github.com/user/myexploits.git
Libraries
Ronin provides libraries with additional functionality, such as Exploitation and Scanning:
$ gem install ronin-exploits
Features
pp).print_info, print_error, print_warning and print_debug output helper methods with color-output.!nmap -v -sT victim.com)Synopsis
Start the Ronin console:
$ ronin
Run a Ruby script in Ronin:
$ ronin exec script.rb
View available commands:
$ ronin help
View a man-page for a command:
$ ronin help wordlist
Install a Repository:
$ ronin install svn://example.com/path/to/repo
List installed Repositories:
$ ronin repos
Update all installed Repositories:
$ ronin update
Update a specific Repositories:
$ ronin update repo-name
Uninstall a specific Repositories:
$ ronin uninstall repo-name
List available Databases:
$ ronin database
Add a new Database:
$ ronin database –add team –uri mysql://user:pass@vpn.example.com/db
Remove a Database:
$ ronin database –remove team
Requirements
Install
$ gem install ronin
Development
cd roninbundle installgit checkout -b my_featurebundle exec rake specgit push origin my_featureWhen people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…