Ejemplo n.º 1
0
    def __init__(self, x, params, single_instance_checker, abcpath):
        self.params = params
        self.single_instance_checker = single_instance_checker

        self.utility = Utility(abcpath)
        # Set locale to determine localisation
        locale.setlocale(locale.LC_ALL, '')

        sys.stdout.write('Client Starting Up.\n')
        sys.stdout.write('Build: ' + self.utility.lang.get('build') + '\n')

        wx.App.__init__(self, x)
Ejemplo n.º 2
0
# Logging
logging.getLogger('scrapy').setLevel(logging.CRITICAL)
logging.getLogger('scrapy').propagate = False

# IMPORT OUR CUSTOM CLASSES/LIBS
##############################################################################################

import config
from Utility.utility import Utility
from Db.db import Db
from Exploits import Exploits

# INITIALISE OUR CLASSES/LIBS/GLOBALS
##############################################################################################

U = Utility()
Db = Db()
JOB_URL = config.host['JOB_URL']
JOB_LOGIN_URL = config.host['JOB_LOGIN_URL']
DOMAIN = U.host_from_url(JOB_URL)
SECONDS_BETWEEN_REQUESTS = config.host['SECONDS_BETWEEN_REQUESTS']
USERNAME = config.host['USERNAME']
PASSWORD = config.host['PASSWORD']
# Lits of exploits available for this program
EXPLOITS_LIST = Exploits.load_exploits()
# Pages fetched from the database, after they have been verified to have contained exploits are marked as exploitable
PAGES_ATTACKED_SUCCESSFULLY = []
# List if pages from the database
DB_FETECHED_PAGES_ATTACK_FOR_EXPLOITS = []
CREATED_URL_PAYLOADS = []
EXCLUDE_PAGES = ['logout.php', 'signout']