Beispiel #1
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件

    Medusa = [
        PbootCommandExecution.medusa(Url, RandomAgent, ProxyIp),
        PbootOnlineMessageDeskSqlInjection.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="SecCms plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #2
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        AdvancedBusBookingScriptSQLInjection.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa,
                      ascii=True,
                      desc="BusBookingScript plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #3
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        BlueCMSHasSQLinjectionVulnerability.medusa(Url, RandomAgent, ProxyIp),
        BlueCMSMasterPasswordLoginVulnerability.medusa(Url, RandomAgent,
                                                       ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="BlueCMS plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #4
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        Ruvar_multi_sqli.medusa(Url, RandomAgent, ProxyIp),
        Ruvar_multi_sqli2.medusa(Url, RandomAgent, ProxyIp),
        Ruvar_multi_sqli3.medusa(Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Ruvar plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #5
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        PhpStudyBackdoor.medusa(Url, RandomAgent, ProxyIp),
        PhpstudyPhpmyadminDefaultpwd.medusa(Url, RandomAgent, ProxyIp),
        PhpstudyProbe.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="PHP plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #6
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件

    Medusa = [
        PhpwebArbitraryFileUploadVulnerability.medusa(Url, RandomAgent,
                                                      ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="phpweb plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #7
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件

    Medusa = [
        SecCmsRemoteCodeExecutionV6_45.medusa(Url, RandomAgent, ProxyIp),
        SecCmsRemoteCodeExecutionV6_54.medusa(Url, RandomAgent, ProxyIp),
        SecCmsRemoteCodeExecutionV6_55.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="SecCms plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #8
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        AfterLogicWebMailArbitraryFileContains.medusa(Url, RandomAgent,
                                                      ProxyIp),
    ]
    try:
        for i in tqdm(Medusa,
                      ascii=True,
                      desc="AfterLogicWebMail plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #9
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        SolrVelocityTemplateRemoteCodeExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
        SolrVelocityTemplateRemoteCodeExecutionVulnerability2.medusa(
            Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Solr plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #10
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        MetinfoArbitraryFileReadVulnerability.medusa(Url, RandomAgent,
                                                     ProxyIp),
        MetinfoInformationDisclosureVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
        MetinfoSQLInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="MetinfoCms plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #11
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        JenkinsArbitraryFileReadVulnerability.medusa(Url, RandomAgent,
                                                     ProxyIp),
        JenkinsRemoteCommandExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
        JenkinsConfigurationErrorCausesUnauthorizedCodeExecutionVulnerability.
        medusa(Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Jenkins plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #12
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        OneCaitongElectronicProcurementSystemUploadsArbitraryFiles2.medusa(
            Url, RandomAgent, ProxyIp),
        OneCaitongElectronicProcurementSystemUploadsArbitraryFiles.medusa(
            Url, RandomAgent, ProxyIp),
        OneCaitongElectronicProcurementSystemSQLInjection2.medusa(
            Url, RandomAgent, ProxyIp),
        OneCaitongElectronicProcurementSystemSQLInjection.medusa(
            Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="1Caitong plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #13
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        S2_001.medusa(Url, RandomAgent, ProxyIp),
        S2_007.medusa(Url, RandomAgent, ProxyIp),
        S2_012.medusa(Url, RandomAgent, ProxyIp),
        S2_013.medusa(Url, RandomAgent, ProxyIp),
        S2_016.medusa(Url, RandomAgent, ProxyIp),
        S2_052.medusa(Url, RandomAgent, ProxyIp),
        S2_053.medusa(Url, RandomAgent, ProxyIp),
        S2_057.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Struts2 plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #14
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        B2BbuilderBackgroundCommandExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
        B2BbuilderContainsVulnerabilitiesLocally.medusa(
            Url, RandomAgent, ProxyIp),
        B2BbuilderHeadSQLInjectionVulnerability.medusa(Url, RandomAgent,
                                                       ProxyIp),
        B2BbuilderSQLInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp),
        B2BbuilderSQLInjectionVulnerability2.medusa(Url, RandomAgent, ProxyIp),
        B2BbuilderSQLInjectionVulnerability3.medusa(Url, RandomAgent, ProxyIp),
        B2BbuilderSQLInjectionVulnerability4.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="B2Bbuilder plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Beispiel #15
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  # 获取生成的头文件

    Medusa = [
        Seeyou_a8_logs_disclosure.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_cm_info_content_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_ehr_ELTextFile.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_fe_treeXml_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_getemaildata_fileread.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_icc_struts2.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_multi_union_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_NCFindWeb_fileread.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_status_default_pwd.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_test_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_user_ids_sqli.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Seeyou plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass