def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    try:
        Medusa=InformationDisclosure.Druid.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa = InformationDisclosure.Git.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa=InformationDisclosure.Phpinfo.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa=InformationDisclosure.PhpApc.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa=InformationDisclosure.Sftp.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa=InformationDisclosure.Svn.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #2
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Fsmcms.Fsmcms_columninfo_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Fsmcms.Fsmcms_p_replydetail_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Fsmcms.Fsmcms_setup_reinstall.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #3
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Seacms.Seacms_order_code_exec.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Seacms.Seacms_search_code_exec.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Seacms.Seacms_search_jq_code_exec.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #4
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  # 传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  # 获取生成的头文件
    try:
        Medusa = OA.Weaver.Weaver_db_disclosure.medusa(Url, RandomAgent,
                                                       ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass

    try:
        Medusa = OA.Weaver.Weaver_download_sqli.medusa(Url, RandomAgent,
                                                       ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa = OA.Weaver.Weaver_filedownload.medusa(Url, RandomAgent,
                                                      ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa = OA.Weaver.Weaver_CommandExecution.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #5
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Phpcms.Phpcms_authkey_disclosure.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Phpcms.Phpcms_digg_add_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Phpcms.Phpcms_flash_upload_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Phpcms.Phpcms_product_code_exec.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #6
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    try:
        Medusa=Cms.Kingdee.Kingdee_conf_disclosure.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa=Cms.Kingdee.Kingdee_filedownload.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa=Cms.Kingdee.Kingdee_logoImgServlet_fileread.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa=Cms.Kingdee.Kingdee_resin_dir_path_disclosure.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #7
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Live800.Live800_downlog_filedownload.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Live800.Live800_fileDownloadServer_fileread.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Live800.Live800_loginAction_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Live800.Live800_sta_export_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #8
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    try:
        Medusa=Cms.Dedecms.Dedecms_download_redirect.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa=Cms.Dedecms.Dedecms_error_trace_disclosure.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa=Cms.Dedecms.Dedecms_recommend_sqli.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa = Cms.Dedecms.Dedecms_search_typeArr_sqli.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
    try:
        Medusa=Cms.Dedecms.Dedecms_version.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #9
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Hanweb.Hanweb_downfile_filedownload.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Hanweb.Hanweb_readxml_fileread.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Hanweb.Hanweb_VerifyCodeServlet_install.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #10
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Shopnum.Shopnum_GuidBuyList_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Shopnum.Shopnum_ProductDetail_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Shopnum.Shopnum_ProductListCategory_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")

    try:
        Medusa = Cms.Shopnum.Shopnum_ShoppingCart1_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #11
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [_74CMSThereIsReflectiveXSSVulnerability.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists2.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists3.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists4.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists5.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists6.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists7.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists8.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists9.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists10.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists11.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists12.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists13.medusa(Url,RandomAgent,ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists14.medusa(Url, RandomAgent, ProxyIp),
              _74CMSSQLInjectionVulnerabilityExists15.medusa(Url, RandomAgent, ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="74CMS plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #12
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Discuz.Discuz_forum_message_ssrf.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Discuz.Discuz_plugin_ques_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Discuz.Discuz_x25_path_disclosure.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #13
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  # 传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  # 获取生成的头文件
    Weaver_db_disclosure.medusa(Url, RandomAgent, ProxyIp), Weaver_sqli.medusa(
        Url, RandomAgent, ProxyIp
    ), Weaver_filedownload.medusa(
        Url, RandomAgent, ProxyIp), Weaver_CommandExecution.medusa(
            Url, RandomAgent, ProxyIp
        ), Weaver_WorkflowCenterTreeDataInterfaceInjectionVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
    Medusa = [
        Weaver_db_disclosure.medusa(Url, RandomAgent, ProxyIp),
        Weaver_sqli.medusa(Url, RandomAgent, ProxyIp),
        Weaver_filedownload.medusa(Url, RandomAgent, ProxyIp),
        Weaver_CommandExecution.medusa(Url, RandomAgent, ProxyIp),
        Weaver_WorkflowCenterTreeDataInterfaceInjectionVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Weaver plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #14
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Eyou.Eyou_admin_id_sqli.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Eyou.Eyou_resetpw.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Eyou.Eyou_user_kw_sqli.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]NginxDirectoryTraversalVulnerability Scan error")
    try:
        Medusa = Cms.Eyou.Eyou_weakpass.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #15
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    try:
        Medusa=Cms.Finecms.Finecms_uploadfile.medusa(Url,RandomAgent,ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #16
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [BearAdminArbitraryFileDownload.medusa(Url,RandomAgent,ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="BearAdmin plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #17
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [MetinfoArbitraryFileReadVulnerability.medusa(Url,RandomAgent,ProxyIp), MetinfoInformationDisclosureVulnerability.medusa(Url,RandomAgent,ProxyIp),MetinfoSQLInjectionVulnerability.medusa(Url,RandomAgent,ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="MetinfoCms plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #18
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Solr.SolrVelocityTemplateRemoteCodeExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #19
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.Siteengine.Siteengine_comments_module_sqli.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #20
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Confluence.AtlassianConfluencePathTraversal_and_CommandExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #21
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [BlueCMSHasSQLinjectionVulnerability.medusa(Url,RandomAgent,ProxyIp),
              BlueCMSMasterPasswordLoginVulnerability.medusa(Url,RandomAgent,ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="BlueCMS plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #22
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Cms.DigitalCampus.Digital_campus_log_disclosure.medusa(
            Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #23
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件

    Medusa = [PbootCommandExecution.medusa(Url,RandomAgent,ProxyIp),
              PbootOnlineMessageDeskSqlInjection.medusa(Url,RandomAgent,ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="SecCms plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #24
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    try:
        Medusa = Struts2.S2_001.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]S2-001 Scan error")
    try:
        Medusa = Struts2.S2_007.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]S2-007 Scan error")
    try:
        Medusa = Struts2.S2_012.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]S2-012 Scan error")
    try:
        Medusa = Struts2.S2_013.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]S2-013 Scan error")
    try:
        Medusa = Struts2.S2_016.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]S2-016 Scan error")
    try:
        Medusa = Struts2.S2_052.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]S2-052 Scan error")
    try:
        Medusa = Struts2.S2_053.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
        #print("[-]S2-053 Scan error")
    try:
        Medusa = Struts2.S2_057.medusa(Url, RandomAgent, ProxyIp)
        WriteFile.Write(Medusa)
    except:
        pass
Example #25
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFile = ClassCongregation.WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [FiveClibArbitraryFileDownloadVulnerability.medusa(Url,RandomAgent,ProxyIp),
              FiveClibArbitraryFileTraversalVulnerability.medusa(Url,RandomAgent,ProxyIp),
              FiveClibThereIsAnUnauthorizedLoophole.medusa(Url,RandomAgent,ProxyIp),
              FiveClibUnauthorizedAddAdministratorVulnerability.medusa(Url,RandomAgent,ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="5Clibe plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #26
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        NginxDirectoryTraversalVulnerability.medusa(Url, RandomAgent, ProxyIp),
        NginxCRLFInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Kibana plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #27
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        AtlassianConfluencePathTraversal_and_CommandExecutionVulnerability.
        medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Confluence plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #28
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        BocwebNetworkSystemSensitiveInformationLeakage.medusa(
            Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Bocweb plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
Example #29
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        SolrVelocityTemplateRemoteCodeExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Solr plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass
def Main(Url, FileName, Values, ProxyIp):
    WriteFile = ClassCongregation.WriteFile(
        FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = ClassCongregation.UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        AdvancedBusBookingScriptSQLInjection.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa,
                      ascii=True,
                      desc="BusBookingScript plugin progress"):
            WriteFile.Write(str(i))
    except:
        pass