{"id":13492943,"url":"https://github.com/blackhatruby/BHR_Labs","last_synced_at":"2025-03-28T11:31:16.482Z","repository":{"id":45786874,"uuid":"289672238","full_name":"blackhatruby/BHR_Labs","owner":"blackhatruby","description":"Black Hat Ruby book | Lab files | Buy the book https://www.amazon.com/dp/B08JHSF6GT","archived":false,"fork":false,"pushed_at":"2021-01-15T21:14:41.000Z","size":160968,"stargazers_count":82,"open_issues_count":1,"forks_count":32,"subscribers_count":7,"default_branch":"master","last_synced_at":"2024-08-01T19:45:33.078Z","etag":null,"topics":["api","blackhat","blackhat-ruby","burpsuite","exploits","hacking","metasploit","rails","rce","ruby","xss"],"latest_commit_sha":null,"homepage":"","language":"Ruby","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/blackhatruby.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-08-23T11:28:14.000Z","updated_at":"2024-07-07T14:28:35.000Z","dependencies_parsed_at":"2022-07-17T00:46:02.500Z","dependency_job_id":null,"html_url":"https://github.com/blackhatruby/BHR_Labs","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/blackhatruby%2FBHR_Labs","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/blackhatruby%2FBHR_Labs/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/blackhatruby%2FBHR_Labs/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/blackhatruby%2FBHR_Labs/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/blackhatruby","download_url":"https://codeload.github.com/blackhatruby/BHR_Labs/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":222376246,"owners_count":16974312,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["api","blackhat","blackhat-ruby","burpsuite","exploits","hacking","metasploit","rails","rce","ruby","xss"],"created_at":"2024-07-31T19:01:10.643Z","updated_at":"2024-10-31T07:30:54.777Z","avatar_url":"https://github.com/blackhatruby.png","language":"Ruby","readme":"# Black Hat Ruby Labs\n\n![BookCover](BHR-Cover.png)\n\nWelcome to the Black Hat Ruby labs repository. \n\nThis repository is publicly available repository for all files related to [Black Hat Ruby Book](https://www.amazon.com/dp/B08JHSF6GT). If you have any related questions or bugs, please open a new [issue](https://github.com/blackhatruby/BHR_Labs/issues).\n\n## Module 1:  Introduction\n### Chapter 1 – Introduction\n```\n📁\n├── ch01\n│   ├── bht-template.rb\n│   ├── enough_talking.rb\n│   └── ruby-language-riptutorial.com.pdf\n```\n### Chapter 2 – Setting Up Your Development Environment\n```\n📁\n├── ch02\n│   ├── installing-ruby_Linux.txt\n│   └── installing-ruby_Windows.txt\n```\n## Module 2: Hacker's everyday codes in Ruby\n### Chapter 3 – Ruby in Terminal\n```\n📁\n├── ch03\n│   ├── BHRuby.exe\n│   ├── BHRuby.py\n│   ├── binary-data-ruby.pdf\n│   ├── cli-args.rb\n│   ├── cli-opts-1.rb\n│   ├── cli-opts-2.rb\n│   ├── cli-opts.rb\n│   ├── colorization-1.rb\n│   ├── console-tab-completion-1.rb\n│   ├── console-tab-completion-2.rb\n│   ├── cursor-1.rb\n│   ├── cursor-2.rb\n│   ├── cursor-ctrl.rb\n│   └── terminal-size.rb\n```\n### Chapter 4 – String Manipulation, Conversion, and Extraction \n```\n📁\n├── ch04\n│   ├── conversion.rb\n│   ├── extraction.rb\n│   ├── iconv.rb\n│   ├── pattern_create-offset.rb\n│   ├── saml.rb\n│   └── user_pass.list\n```\n## Module 3: System Hacking\n### Chapter 5 – File Manipulation\n```\n📁\n├── ch05\n│   ├── Abyss Web Server X1 2.11.1.exe\n│   ├── badpdf-clone.rb\n│   ├── badpdf.rb\n│   ├── bhr\n│   ├── bhr.asm\n│   ├── bhr-clean.pdf\n│   ├── bhr-ntlm.pdf\n│   ├── find-suid.rb\n│   ├── find-unquoted-services.rb\n│   ├── hexdump.rb\n│   ├── index.html\n│   ├── index.json\n│   ├── index.xml\n│   ├── parsing-html.rb\n│   ├── parsing-json.rb\n│   ├── parsing-xml.rb\n│   ├── rshell.rb\n│   ├── stack5-exploit.rb\n│   ├── timestomper.rb\n│   └── timestomper-win.rb\n```\n### Chapter 6 – Cryptography\n```\n📁\n├── ch06\n│   ├── aes_encryptor.rb\n│   ├── caesar_cipher.rb\n│   ├── generate_hashes.rb\n│   ├── lm_hash.rb\n│   ├── rijndael.rb\n│   ├── rsa-encryptor.rb\n│   ├── rsa-keys_and_certs.rb\n│   ├── rubyfu.png\n│   ├── secret.pdf\n│   ├── steganor.rb\n│   └── unsteganor.rb\n```\n### Chapter 7 – System Command Execution\n```\n📁\n├── ch07\n│   ├── detect-os.rb\n│   └── execute-system-commands.rb\n```\n### Chapter 8 – Windows Red Team Techniques\n```\n📁\n├── ch08\n│   ├── badexcel.rb\n│   ├── badshortcut.lnk\n│   ├── badshortcut.rb\n│   ├── dll-injector-nums.rb\n│   ├── dll-injector.rb\n│   ├── inline-shellcode.rb\n│   ├── winrm.rb\n│   └── wmi-rshell.rb\n```\n## Module 4: Network Hacking\n### Chapter 9 – Ruby Socket for hackers\n```\n📁\n├── ch09\n│   ├── bind-shell.rb\n│   ├── ifconfig.rb\n│   ├── ip-obfuscator.rb\n│   ├── port-scanner.rb\n│   ├── reverse-shell.rb\n│   ├── ssid_finder.rb\n│   ├── tcp-client.rb\n│   ├── tcp-client-socket.rb\n│   ├── tcp-server.rb\n│   ├── tcp-server-socket.rb\n│   ├── udp-client.rb\n│   └── udp-server.rb\n```\n### Chapter 10 – Network Services and Clients\n```\n📁\n├── ch10\n│   ├── config.txt\n│   ├── cve-2018-10933.iso\n│   ├── cve-2018-10933.rb\n│   ├── dns-client.rb\n│   ├── dns-server.rb\n│   ├── domain_splitter.rb\n│   ├── druby-client.rb\n│   ├── druby-server.exe\n│   ├── druby-server.rb\n│   ├── druby-server-ssl.exe\n│   ├── ftp-client.rb\n│   ├── ftp-server.rb\n│   ├── http-server-advanced.rb\n│   ├── ssh-client-cli.rb\n│   ├── ssh-client-exec.rb\n│   ├── ssh-client-shell.rb\n│   ├── ssh-fw-tunnel.rb\n│   ├── ssh-rv-tunnel.rb\n│   ├── ssh-server.rb\n│   ├── tftp-client.rb\n│   ├── tftp-client-simplified.rb\n│   └── tftp-server.rb\n```\n### Chapter 11 – Network Packet Manipulation \u0026 Protocols Attacks\n```\n📁\n├── ch11\n│   ├── arp-spoofer.rb\n│   ├── deauth.rb\n│   ├── ftp-captured.pcapng\n│   ├── ftp-sniffer.rb\n│   ├── packet-capturer.rb\n│   ├── packetgen-tcp.rb\n│   ├── packet-parser.rb\n│   ├── rogue-ap.rb\n│   └── snmp-spoofing.rb\n```\n## Module 5: Web Hacking \n### Chapter 12 – Dealing with HTTP in ruby \n```\n📁\n├── ch12\n│   ├── dealing_with_cookies.rb\n│   ├── http_auth-basic.rb\n│   ├── http_auth-digest.rb\n│   ├── http_auth-ntlm.rb\n│   ├── net-http_get.rb\n│   ├── net-http_post-exfiltrate.rb\n│   ├── net-http_post.rb\n│   ├── urlexrtactor.rb\n│   └── websocket_request.rb\n```\n### Chapter 13 – Hunting and Exploiting XSS by Browser Automation\n```\n📁\n├── ch13\n│   ├── contact-us-xss\n│   │   ├── contact-us.rb\n│   │   └── views\n│   │       ├── admin.erb\n│   │       ├── contactus.erb\n│   │       └── login.erb\n│   ├── geckodriver\n│   ├── payloads.txt\n│   ├── xss-hunter-cgi.rb\n│   ├── xss-hunter.rb\n│   ├── xss-scanner-reflected.rb\n│   └── xss-scanner-stored.rb\n```\n### Chapter 14 – Exploiting Web Services and APIs for C2\n```\n📁\n├── ch14\n│   ├── require.rb\n│   ├── slack-c2.rb\n│   └── telegram-c2.rb\n```\n### Chapter 15 – Extending and Controlling Burp Suite\n```\n📁\n├── ch15\n│   ├── burp_alert.rb\n│   ├── burp_extension_template.rb\n│   ├── burp-gui-blink.rb\n│   ├── burp_gui.rb\n│   ├── jruby-complete-9.2.5.0.jar\n│   ├── Scanner-Extension-Template.rb\n│   ├── s2-052.iso\n│   ├── Struts_S2-052_Scanner.rb\n│   └── Struts_S2-052_pwn.rb\n```\n## Module 6: Exploitation \n### Chapter 16 – Writing Fuzzers and Exploits\n```\n📁\n├── ch16\n│   ├── efssetup7.2.exe\n│   ├── fsws1.rb\n│   ├── fsws2.rb\n│   ├── fsws3.rb\n│   ├── fsws4.rb\n│   ├── fsws5.rb\n│   └── fuzzer_socket.rb\n```\n### Chapter 17 – Metasploit Development\n```\n📁\n├── ch17\n│   ├── aux.rc\n│   ├── easyfilesharing_dump_dbs.rb\n│   ├── easyfilesharing_finder.rb\n│   ├── easyfilesharing_vfolder_seh.rb\n│   ├── exp.rc\n│   └── read_users.rb\n```\n\n","funding_links":[],"categories":["Ruby"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fblackhatruby%2FBHR_Labs","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fblackhatruby%2FBHR_Labs","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fblackhatruby%2FBHR_Labs/lists"}