def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ PbootCommandExecution.medusa(Url, RandomAgent, ProxyIp), PbootOnlineMessageDeskSqlInjection.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="SecCms plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ AdvancedBusBookingScriptSQLInjection.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="BusBookingScript plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ BlueCMSHasSQLinjectionVulnerability.medusa(Url, RandomAgent, ProxyIp), BlueCMSMasterPasswordLoginVulnerability.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="BlueCMS plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ Ruvar_multi_sqli.medusa(Url, RandomAgent, ProxyIp), Ruvar_multi_sqli2.medusa(Url, RandomAgent, ProxyIp), Ruvar_multi_sqli3.medusa(Url, RandomAgent, ProxyIp) ] try: for i in tqdm(Medusa, ascii=True, desc="Ruvar plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ PhpStudyBackdoor.medusa(Url, RandomAgent, ProxyIp), PhpstudyPhpmyadminDefaultpwd.medusa(Url, RandomAgent, ProxyIp), PhpstudyProbe.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="PHP plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ PhpwebArbitraryFileUploadVulnerability.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="phpweb plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ SecCmsRemoteCodeExecutionV6_45.medusa(Url, RandomAgent, ProxyIp), SecCmsRemoteCodeExecutionV6_54.medusa(Url, RandomAgent, ProxyIp), SecCmsRemoteCodeExecutionV6_55.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="SecCms plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ AfterLogicWebMailArbitraryFileContains.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="AfterLogicWebMail plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ SolrVelocityTemplateRemoteCodeExecutionVulnerability.medusa( Url, RandomAgent, ProxyIp), SolrVelocityTemplateRemoteCodeExecutionVulnerability2.medusa( Url, RandomAgent, ProxyIp) ] try: for i in tqdm(Medusa, ascii=True, desc="Solr plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ MetinfoArbitraryFileReadVulnerability.medusa(Url, RandomAgent, ProxyIp), MetinfoInformationDisclosureVulnerability.medusa( Url, RandomAgent, ProxyIp), MetinfoSQLInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="MetinfoCms plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ JenkinsArbitraryFileReadVulnerability.medusa(Url, RandomAgent, ProxyIp), JenkinsRemoteCommandExecutionVulnerability.medusa( Url, RandomAgent, ProxyIp), JenkinsConfigurationErrorCausesUnauthorizedCodeExecutionVulnerability. medusa(Url, RandomAgent, ProxyIp) ] try: for i in tqdm(Medusa, ascii=True, desc="Jenkins plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ OneCaitongElectronicProcurementSystemUploadsArbitraryFiles2.medusa( Url, RandomAgent, ProxyIp), OneCaitongElectronicProcurementSystemUploadsArbitraryFiles.medusa( Url, RandomAgent, ProxyIp), OneCaitongElectronicProcurementSystemSQLInjection2.medusa( Url, RandomAgent, ProxyIp), OneCaitongElectronicProcurementSystemSQLInjection.medusa( Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="1Caitong plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ S2_001.medusa(Url, RandomAgent, ProxyIp), S2_007.medusa(Url, RandomAgent, ProxyIp), S2_012.medusa(Url, RandomAgent, ProxyIp), S2_013.medusa(Url, RandomAgent, ProxyIp), S2_016.medusa(Url, RandomAgent, ProxyIp), S2_052.medusa(Url, RandomAgent, ProxyIp), S2_053.medusa(Url, RandomAgent, ProxyIp), S2_057.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="Struts2 plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ B2BbuilderBackgroundCommandExecutionVulnerability.medusa( Url, RandomAgent, ProxyIp), B2BbuilderContainsVulnerabilitiesLocally.medusa( Url, RandomAgent, ProxyIp), B2BbuilderHeadSQLInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp), B2BbuilderSQLInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp), B2BbuilderSQLInjectionVulnerability2.medusa(Url, RandomAgent, ProxyIp), B2BbuilderSQLInjectionVulnerability3.medusa(Url, RandomAgent, ProxyIp), B2BbuilderSQLInjectionVulnerability4.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="B2Bbuilder plugin progress"): WriteFiles.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFiles = WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() # 获取生成的头文件 Medusa = [ Seeyou_a8_logs_disclosure.medusa(Url, RandomAgent, ProxyIp), Seeyou_cm_info_content_sqli.medusa(Url, RandomAgent, ProxyIp), Seeyou_ehr_ELTextFile.medusa(Url, RandomAgent, ProxyIp), Seeyou_fe_treeXml_sqli.medusa(Url, RandomAgent, ProxyIp), Seeyou_getemaildata_fileread.medusa(Url, RandomAgent, ProxyIp), Seeyou_icc_struts2.medusa(Url, RandomAgent, ProxyIp), Seeyou_multi_union_sqli.medusa(Url, RandomAgent, ProxyIp), Seeyou_NCFindWeb_fileread.medusa(Url, RandomAgent, ProxyIp), Seeyou_status_default_pwd.medusa(Url, RandomAgent, ProxyIp), Seeyou_test_sqli.medusa(Url, RandomAgent, ProxyIp), Seeyou_user_ids_sqli.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="Seeyou plugin progress"): WriteFiles.Write(str(i)) except: pass