1
+ name : Weekly Data and External Tool Updater
2
+
3
+ # https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
4
+ permissions :
5
+ actions : none
6
+ checks : none
7
+ contents : none
8
+ deployments : none
9
+ id-token : none
10
+ issues : none
11
+ discussions : none
12
+ packages : none
13
+ pages : none
14
+ pull-requests : write
15
+ repository-projects : none
16
+ security-events : none
17
+ statuses : none
18
+
19
+ on :
20
+ schedule :
21
+ # Run once a week (e.g., every Monday at 01:00 UTC)
22
+ - cron : ' 0 1 * * 1'
23
+ workflow_dispatch : # Allows manual triggering from the Actions tab
24
+
25
+ jobs :
26
+ update-data-files :
27
+ runs-on : ubuntu-latest
28
+
29
+ env :
30
+ BUNDLE_WITHOUT : " coverage development pcap"
31
+
32
+ strategy :
33
+ fail-fast : true
34
+ matrix :
35
+ ruby :
36
+ - ' 3.1'
37
+
38
+ steps :
39
+ - name : Install system dependencies
40
+ run : sudo apt-get install libpcap-dev graphviz
41
+
42
+ - name : Checkout code
43
+ uses : actions/checkout@v4
44
+ with :
45
+ fetch-depth : 0
46
+
47
+ - uses : ruby/setup-ruby@v1
48
+ with :
49
+ ruby-version : ' ${{ matrix.ruby }}'
50
+ bundler-cache : true
51
+
52
+ - name : Run Ruby updater scripts
53
+ run : |
54
+ ruby tools/dev/update_wordpress_vulnerabilities.rb
55
+ ruby tools/dev/update_joomla_components.rb
56
+ ruby tools/dev/update_user_agent_strings.rb
57
+ ruby tools/dev/check_external_scripts.rb -u
58
+ - name : Remove vendor folder # prevent git from adding it
59
+ run : rm -rf vendor
60
+
61
+ - name : Create Pull Request
62
+ uses : peter-evans/create-pull-request@v7
63
+ with :
64
+ token : ${{ secrets.GITHUB_TOKEN }}
65
+ commit-message : Update report
66
+ base : master
67
+ branch : weekly-updates
68
+ committer : github-actions[bot] <github-actions[bot]@users.noreply.github.com>
69
+ author : github-actions[bot] <github-actions[bot]@users.noreply.github.com>
70
+ title : " Weekly Data Update"
71
+ draft : false
72
+ body : |
73
+ This pull request was created automatically by a GitHub Action to update data files and external scripts.
74
+ The following tools were run:
75
+ - ruby tools/dev/update_wordpress_vulnerabilities.rb
76
+ - ruby tools/dev/update_joomla_components.rb
77
+ - ruby tools/dev/update_user_agent_strings.rb
78
+ - ruby tools/dev/check_external_scripts.rb -u
79
+ ## Verification
80
+ ### Wordpress/Joomla Files
81
+ - [ ] Do a sanity check, do the additions look legit?
82
+ - [ ] Start `msfconsole`
83
+ - [ ] `use modules/auxiliary/scanner/http/wordpress_scanner`
84
+ - [ ] **Verify** it runs
85
+ ### JTR Files
86
+ - [ ] Do a sanity check, do the additions look legit?
87
+ - [ ] See https://docs.metasploit.com/docs/using-metasploit/intermediate/hashes-and-password-cracking.html#example-hashes for hashes and cracking
88
+ ### SharpHound
89
+ - [ ] Start `msfconsole`
90
+ - [ ] get a shell on a DC or box connected to a dc
91
+ - [ ] `use post/windows/gather/bloodhound`
92
+ - [ ] `set session`
93
+ - [ ] `run`
94
+ - [ ] **Verify** it runs w/o erroring
95
+ - [ ] `set method disk`
96
+ - [ ] **Verify** it runs w/o erroring
0 commit comments