def __init__(self, x, params, single_instance_checker, abcpath): self.params = params self.single_instance_checker = single_instance_checker self.utility = Utility(abcpath) # Set locale to determine localisation locale.setlocale(locale.LC_ALL, '') sys.stdout.write('Client Starting Up.\n') sys.stdout.write('Build: ' + self.utility.lang.get('build') + '\n') wx.App.__init__(self, x)
# Logging logging.getLogger('scrapy').setLevel(logging.CRITICAL) logging.getLogger('scrapy').propagate = False # IMPORT OUR CUSTOM CLASSES/LIBS ############################################################################################## import config from Utility.utility import Utility from Db.db import Db from Exploits import Exploits # INITIALISE OUR CLASSES/LIBS/GLOBALS ############################################################################################## U = Utility() Db = Db() JOB_URL = config.host['JOB_URL'] JOB_LOGIN_URL = config.host['JOB_LOGIN_URL'] DOMAIN = U.host_from_url(JOB_URL) SECONDS_BETWEEN_REQUESTS = config.host['SECONDS_BETWEEN_REQUESTS'] USERNAME = config.host['USERNAME'] PASSWORD = config.host['PASSWORD'] # Lits of exploits available for this program EXPLOITS_LIST = Exploits.load_exploits() # Pages fetched from the database, after they have been verified to have contained exploits are marked as exploitable PAGES_ATTACKED_SUCCESSFULLY = [] # List if pages from the database DB_FETECHED_PAGES_ATTACK_FOR_EXPLOITS = [] CREATED_URL_PAYLOADS = [] EXCLUDE_PAGES = ['logout.php', 'signout']