Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
gauntlt is a ruggedization framework that embodies our motto of "be mean to your code"
Ruby
Tag: 0.0.5

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
bin
features
gem_tasks
lib
spec
vendor
.gitignore
.gitmodules
.travis.yml
Gemfile
LICENSE
README.md
Rakefile
gauntlt.gemspec

README.md

gauntlt Build Status

gauntlt is a ruggedization framework

PROJECT STATUS

The gauntlt project is under active development and is not ready for production use but we are looking for community feedback and involvement on the project. Please file issues via github and follow the project on twitter: @gauntlt.

Have questions? Ask us anything on the gauntlt google group.

GET STARTED

Before you start, please note that gauntlt is tested regularly against ruby 1.9.3. We don't test againt older versions of ruby. Keep in mind that you run gauntlt separately from the application it targets, so it does not matter whether the targeted application uses ruby.

  1. Clone the git repo

    $ git clone --recursive git@github.com:thegauntlet/gauntlt.git
    $ cd gauntlt
    
  2. Install bundler

    $ gem install bundler
    
  3. Install dependencies

Note, you may see errors in bundle related to the curb gem. It is looking for curl dependencies. In ubuntu you can do a sudo apt-get install libcurl4-openssl-dev

    $ bundle
  1. Create an attack file

    # general format
    $ bin/gauntlt attack --name <attack_name> --attack-file my_attack.attack
    
    # for example, launch an nmap attack
    # nmap.attack
    Feature: nmap attacks
      Background:
        Given "nmap" is installed
        And the target hostname is "google.com"
    
      Scenario: Verify server is available on standard web ports
        When I launch an "nmap" attack with:
          """
          nmap -p 80,443 <hostname>
          """
        Then the output should contain:
          """
          80/tcp  open  http
          443/tcp open  https
          """
    
    $ bin/gauntlt attack -n nmap -a nmap.attack
    

    For more attack examples, refer to features/attacks.

  2. Other commands

    # list defined tests
    $ bin/gauntlt attack --list
    
    # get help
    $ bin/gauntlt help
    

ROADMAP

We are adding different features into gauntlt rignt now. Please submit issues via github and tag them as enhancements. The core team meets weekly and will divide out the enhancement requests into our monthly releases.

Below are some tools we are targeting but don't let that stop you from adding your favorite hacking tool.

Have questions? Ask us anything on the gauntlt google group.

ADD A MODULE

See the wiki on how to add a module into gauntlt. We would love your contributions.

LICENSE

gauntlt is licensed under The MIT License. See the LICENSE file in the repo or visit gauntlt.mit-license.org for details.

Something went wrong with that request. Please try again.