def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 try: Medusa=InformationDisclosure.Druid.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa = InformationDisclosure.Git.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa=InformationDisclosure.Phpinfo.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa=InformationDisclosure.PhpApc.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa=InformationDisclosure.Sftp.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa=InformationDisclosure.Svn.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Fsmcms.Fsmcms_columninfo_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Fsmcms.Fsmcms_p_replydetail_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Fsmcms.Fsmcms_setup_reinstall.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Seacms.Seacms_order_code_exec.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Seacms.Seacms_search_code_exec.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Seacms.Seacms_search_jq_code_exec.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) # 传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() # 获取生成的头文件 try: Medusa = OA.Weaver.Weaver_db_disclosure.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa = OA.Weaver.Weaver_download_sqli.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa = OA.Weaver.Weaver_filedownload.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa = OA.Weaver.Weaver_CommandExecution.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Phpcms.Phpcms_authkey_disclosure.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Phpcms.Phpcms_digg_add_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Phpcms.Phpcms_flash_upload_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Phpcms.Phpcms_product_code_exec.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 try: Medusa=Cms.Kingdee.Kingdee_conf_disclosure.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa=Cms.Kingdee.Kingdee_filedownload.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa=Cms.Kingdee.Kingdee_logoImgServlet_fileread.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa=Cms.Kingdee.Kingdee_resin_dir_path_disclosure.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Live800.Live800_downlog_filedownload.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Live800.Live800_fileDownloadServer_fileread.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Live800.Live800_loginAction_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Live800.Live800_sta_export_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 try: Medusa=Cms.Dedecms.Dedecms_download_redirect.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa=Cms.Dedecms.Dedecms_error_trace_disclosure.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa=Cms.Dedecms.Dedecms_recommend_sqli.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa = Cms.Dedecms.Dedecms_search_typeArr_sqli.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass try: Medusa=Cms.Dedecms.Dedecms_version.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Hanweb.Hanweb_downfile_filedownload.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Hanweb.Hanweb_readxml_fileread.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Hanweb.Hanweb_VerifyCodeServlet_install.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Shopnum.Shopnum_GuidBuyList_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Shopnum.Shopnum_ProductDetail_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Shopnum.Shopnum_ProductListCategory_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Shopnum.Shopnum_ShoppingCart1_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 Medusa = [_74CMSThereIsReflectiveXSSVulnerability.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists2.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists3.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists4.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists5.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists6.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists7.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists8.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists9.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists10.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists11.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists12.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists13.medusa(Url,RandomAgent,ProxyIp), _74CMSSQLInjectionVulnerabilityExists14.medusa(Url, RandomAgent, ProxyIp), _74CMSSQLInjectionVulnerabilityExists15.medusa(Url, RandomAgent, ProxyIp),] try: for i in tqdm(Medusa, ascii=True, desc="74CMS plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Discuz.Discuz_forum_message_ssrf.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Discuz.Discuz_plugin_ques_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Discuz.Discuz_x25_path_disclosure.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) # 传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() # 获取生成的头文件 Weaver_db_disclosure.medusa(Url, RandomAgent, ProxyIp), Weaver_sqli.medusa( Url, RandomAgent, ProxyIp ), Weaver_filedownload.medusa( Url, RandomAgent, ProxyIp), Weaver_CommandExecution.medusa( Url, RandomAgent, ProxyIp ), Weaver_WorkflowCenterTreeDataInterfaceInjectionVulnerability.medusa( Url, RandomAgent, ProxyIp), Medusa = [ Weaver_db_disclosure.medusa(Url, RandomAgent, ProxyIp), Weaver_sqli.medusa(Url, RandomAgent, ProxyIp), Weaver_filedownload.medusa(Url, RandomAgent, ProxyIp), Weaver_CommandExecution.medusa(Url, RandomAgent, ProxyIp), Weaver_WorkflowCenterTreeDataInterfaceInjectionVulnerability.medusa( Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="Weaver plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Eyou.Eyou_admin_id_sqli.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Eyou.Eyou_resetpw.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Eyou.Eyou_user_kw_sqli.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]NginxDirectoryTraversalVulnerability Scan error") try: Medusa = Cms.Eyou.Eyou_weakpass.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 try: Medusa=Cms.Finecms.Finecms_uploadfile.medusa(Url,RandomAgent,ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 Medusa = [BearAdminArbitraryFileDownload.medusa(Url,RandomAgent,ProxyIp),] try: for i in tqdm(Medusa, ascii=True, desc="BearAdmin plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 Medusa = [MetinfoArbitraryFileReadVulnerability.medusa(Url,RandomAgent,ProxyIp), MetinfoInformationDisclosureVulnerability.medusa(Url,RandomAgent,ProxyIp),MetinfoSQLInjectionVulnerability.medusa(Url,RandomAgent,ProxyIp),] try: for i in tqdm(Medusa, ascii=True, desc="MetinfoCms plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Solr.SolrVelocityTemplateRemoteCodeExecutionVulnerability.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.Siteengine.Siteengine_comments_module_sqli.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Confluence.AtlassianConfluencePathTraversal_and_CommandExecutionVulnerability.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 Medusa = [BlueCMSHasSQLinjectionVulnerability.medusa(Url,RandomAgent,ProxyIp), BlueCMSMasterPasswordLoginVulnerability.medusa(Url,RandomAgent,ProxyIp),] try: for i in tqdm(Medusa, ascii=True, desc="BlueCMS plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Cms.DigitalCampus.Digital_campus_log_disclosure.medusa( Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 Medusa = [PbootCommandExecution.medusa(Url,RandomAgent,ProxyIp), PbootOnlineMessageDeskSqlInjection.medusa(Url,RandomAgent,ProxyIp),] try: for i in tqdm(Medusa, ascii=True, desc="SecCms plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 try: Medusa = Struts2.S2_001.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]S2-001 Scan error") try: Medusa = Struts2.S2_007.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]S2-007 Scan error") try: Medusa = Struts2.S2_012.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]S2-012 Scan error") try: Medusa = Struts2.S2_013.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]S2-013 Scan error") try: Medusa = Struts2.S2_016.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]S2-016 Scan error") try: Medusa = Struts2.S2_052.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]S2-052 Scan error") try: Medusa = Struts2.S2_053.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass #print("[-]S2-053 Scan error") try: Medusa = Struts2.S2_057.medusa(Url, RandomAgent, ProxyIp) WriteFile.Write(Medusa) except: pass
def Main(Url,FileName,Values,ProxyIp): WriteFile = ClassCongregation.WriteFile(FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua=ClassCongregation.UserAgentS(Values)#传入用户输入用户指定的浏览器头 RandomAgent=ua.UserAgent()#获取生成的头文件 Medusa = [FiveClibArbitraryFileDownloadVulnerability.medusa(Url,RandomAgent,ProxyIp), FiveClibArbitraryFileTraversalVulnerability.medusa(Url,RandomAgent,ProxyIp), FiveClibThereIsAnUnauthorizedLoophole.medusa(Url,RandomAgent,ProxyIp), FiveClibUnauthorizedAddAdministratorVulnerability.medusa(Url,RandomAgent,ProxyIp),] try: for i in tqdm(Medusa, ascii=True, desc="5Clibe plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ NginxDirectoryTraversalVulnerability.medusa(Url, RandomAgent, ProxyIp), NginxCRLFInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp) ] try: for i in tqdm(Medusa, ascii=True, desc="Kibana plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ AtlassianConfluencePathTraversal_and_CommandExecutionVulnerability. medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="Confluence plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ BocwebNetworkSystemSensitiveInformationLeakage.medusa( Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="Bocweb plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ SolrVelocityTemplateRemoteCodeExecutionVulnerability.medusa( Url, RandomAgent, ProxyIp) ] try: for i in tqdm(Medusa, ascii=True, desc="Solr plugin progress"): WriteFile.Write(str(i)) except: pass
def Main(Url, FileName, Values, ProxyIp): WriteFile = ClassCongregation.WriteFile( FileName) # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的) ua = ClassCongregation.UserAgentS(Values) #传入用户输入用户指定的浏览器头 RandomAgent = ua.UserAgent() #获取生成的头文件 Medusa = [ AdvancedBusBookingScriptSQLInjection.medusa(Url, RandomAgent, ProxyIp), ] try: for i in tqdm(Medusa, ascii=True, desc="BusBookingScript plugin progress"): WriteFile.Write(str(i)) except: pass