<!DOCTYPE html>
<html>
  <head>

    <title>Black Hat Ruby book</title>
    <meta name="description" content="Offensive Ruby Programming for Hackers and Pentesters" />
    <meta property="og:site_name" content="Black Hat Ruby book" />
    <meta property="og:type" content="article" />
    <meta property="og:title" content="Black Hat Ruby book" />
    <meta property="og:description" content="Ruby Exploit Buffer Overflow C2 Data Exfiltration DLL injection SQL injection XSS Network Protocols spoofing nostarch" />

    <link href='https://fonts.googleapis.com/css?family=Cinzel%20Decorative' rel='stylesheet'>
    <link href='https://fonts.googleapis.com/css?family=Petit%20Formal%20Script' rel='stylesheet'>
    <style>
      h1   { font-family: 'Cinzel Decorative';font-size: 40px; color:#c90000 }
      h3   { font-family: 'Cinzel Decorative';font-size: 22px; color:#c90000 }
      body { font-family: 'Cinzel Decorative';font-size: 16px; }
      footer { font-family: 'Times New Roman';font-size: 16px; }
    </style>

  </head>

  <body style="background-color:#1b1b1b;">
    <br><br>
    <center>

    <h1>Black Hat Rubyy</h1>
    <h3>Offensive Ruby Programming for Hackers and Pentesters</h3>

    </center>
    <ul><span style="color: #c90000;">
      <li>
        <strong>Module 1 | Introduction</strong>
        <ul>
          <li>
            <div>Chapter 1 &ndash; Introduction</div>
          </li>
          <li>
            <div>Chapter 2 &ndash; Setting Up Your Development Environment</div>
          </li>
        </ul>
      </li>
      <li>
        <strong>Module 2 | Hacker's everyday codes in Ruby</strong>
        <ul>
          <li>
            <div>Chapter 3 &ndash; Ruby in Terminal</div>
          </li>
          <li>
            <div>Chapter 4 &ndash; String Conversion, Extraction and Generation</div>
          </li>
        </ul>
      </li>
      <li>
        <strong>Module 3 | System Hacking</strong>
        <ul>
          <li>
            <div>Chapter 5 &ndash; File Manipulation</div>
          </li>
          <li>
            <div>Chapter 6 &ndash; Cryptography</div>
          </li>
          <li>
            <div>Chapter 7 &ndash; System Command Execution</div>
          </li>
          <li>
            <div>Chapter 8 &ndash; Windows Red Team Tactics</div>
          </li>
        </ul>
      </li>
      <li>
        <strong>Module 4 | Network Hacking</strong>
        <ul>
          <li>
            <div>Chapter 9 &ndash; Ruby Socket for Hackers</div>
          </li>
          <li>
            <div>Chapter 10 &ndash; Network Services and Clients</div>
          </li>
          <li>
            <div>Chapter 11 &ndash; Network Packet Manipulation & Protocols Attacks</div>
          </li>
        </ul>
      </li>
      <li>
        <strong>Module 5 | Web Hacking</strong>
        <ul>
          <li>
            <div>Chapter 12 &ndash; Dealing with HTTP in Ruby</div>
          </li>
          <li>
            <div>Chapter 13 &ndash; Hunting and Exploiting XSS by Browser Automation</div>
          </li>
          <li>
            <div>Chapter 14 &ndash;&nbsp; Exploiting Web Services and APIs for C2</div>
          </li>
          <li>
            <div>Chapter 15 &ndash; Extending and Controlling Burp Suite</div>
          </li>
        </ul>
      </li>
      <li>
        <strong>Module 6 | Exploitation</strong>
        <ul>
          <li>
            <div>Chapter 16 &ndash; Writing Fuzzers and Exploits</div>
          </li>
          <li>
            <div>Chapter 17 &ndash; Metasploit Development</div>
          </li>
        </ul>
      </li>
    </ul></span>
    <footer>
      <small><font color="#c90000"><b>KING SABRI | @KINGSABRI</b></font></small>
    </footer>

    <!-- eJwrNzAoUVQoKU9NLVEoyUhVCCpNqlRIzk9JBfISSxSK83PKUouB7MxiheSMxJyc1Lx0oFS+ggNIYVopAMCtFpw= -->
  </body>
</html>