Esempio n. 1
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [Mongo_expressRemoteCodeExecutionVulnerability.medusa(Url,RandomAgent,ProxyIp)]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Mongo plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 2
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  # 获取生成的头文件
    Medusa = [Weaver_db_disclosure.medusa(Url, RandomAgent, ProxyIp),Weaver_sqli.medusa(Url, RandomAgent, ProxyIp),Weaver_filedownload.medusa(Url, RandomAgent, ProxyIp),Weaver_CommandExecution.medusa(Url, RandomAgent, ProxyIp),Weaver_WorkflowCenterTreeDataInterfaceInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Weaver plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 3
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [AtlassianConfluencePathTraversal_and_CommandExecutionVulnerability.medusa(Url, RandomAgent, ProxyIp), ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Confluence plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 4
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa=[ActiveMQArbitraryFileWritingVulnerability.medusa(Url, RandomAgent, ProxyIp),
            Log4jRemoteCommandExecutionVulnerability.medusa(Url, RandomAgent, ProxyIp),]
    try:
        for i in tqdm(Medusa,ascii=True,desc="Apache plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 5
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [BugFreeFileContains.medusa(Url,RandomAgent,ProxyIp),
              ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="BugFree plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 6
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [BocwebNetworkSystemSensitiveInformationLeakage.medusa(Url,RandomAgent,ProxyIp),
              ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Bocweb plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 7
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        RubyOnRailsArbitraryFileReading.medusa(Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Rails plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 8
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        NginxDirectoryTraversalVulnerability.medusa(Url, RandomAgent, ProxyIp),
        NginxCRLFInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Kibana plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 9
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        SpringReflectionFileDownloadVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Spring plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 10
0
def Main(Url,FileName,Values,ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua=UserAgentS(Values)#传入用户输入用户指定的浏览器头
    RandomAgent=ua.UserAgent()#获取生成的头文件
    Medusa = [FiveClibArbitraryFileDownloadVulnerability.medusa(Url,RandomAgent,ProxyIp),
              FiveClibArbitraryFileTraversalVulnerability.medusa(Url,RandomAgent,ProxyIp),
              FiveClibThereIsAnUnauthorizedLoophole.medusa(Url,RandomAgent,ProxyIp),
              FiveClibUnauthorizedAddAdministratorVulnerability.medusa(Url,RandomAgent,ProxyIp),]
    try:
        for i in tqdm(Medusa, ascii=True, desc="5Clibe plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 11
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        BlueCMSHasSQLinjectionVulnerability.medusa(Url, RandomAgent, ProxyIp),
        BlueCMSMasterPasswordLoginVulnerability.medusa(Url, RandomAgent,
                                                       ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="BlueCMS plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 12
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        PhpStudyBackdoor.medusa(Url, RandomAgent, ProxyIp),
        PhpstudyPhpmyadminDefaultpwd.medusa(Url, RandomAgent, ProxyIp),
        PhpstudyProbe.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="PHP plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 13
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        AdvancedBusBookingScriptSQLInjection.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa,
                      ascii=True,
                      desc="BusBookingScript plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 14
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件

    Medusa = [
        PbootCommandExecution.medusa(Url, RandomAgent, ProxyIp),
        PbootOnlineMessageDeskSqlInjection.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="SecCms plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 15
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        MetinfoArbitraryFileReadVulnerability.medusa(Url, RandomAgent,
                                                     ProxyIp),
        MetinfoInformationDisclosureVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
        MetinfoSQLInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="MetinfoCms plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 16
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        JenkinsArbitraryFileReadVulnerability.medusa(Url, RandomAgent,
                                                     ProxyIp),
        JenkinsRemoteCommandExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
        JenkinsConfigurationErrorCausesUnauthorizedCodeExecutionVulnerability.
        medusa(Url, RandomAgent, ProxyIp)
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Jenkins plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 17
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        S2_001.medusa(Url, RandomAgent, ProxyIp),
        S2_007.medusa(Url, RandomAgent, ProxyIp),
        S2_012.medusa(Url, RandomAgent, ProxyIp),
        S2_013.medusa(Url, RandomAgent, ProxyIp),
        S2_016.medusa(Url, RandomAgent, ProxyIp),
        S2_052.medusa(Url, RandomAgent, ProxyIp),
        S2_053.medusa(Url, RandomAgent, ProxyIp),
        S2_057.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Struts2 plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 18
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        OneCaitongElectronicProcurementSystemUploadsArbitraryFiles2.medusa(
            Url, RandomAgent, ProxyIp),
        OneCaitongElectronicProcurementSystemUploadsArbitraryFiles.medusa(
            Url, RandomAgent, ProxyIp),
        OneCaitongElectronicProcurementSystemSQLInjection2.medusa(
            Url, RandomAgent, ProxyIp),
        OneCaitongElectronicProcurementSystemSQLInjection.medusa(
            Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="1Caitong plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 19
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  #获取生成的头文件
    Medusa = [
        B2BbuilderBackgroundCommandExecutionVulnerability.medusa(
            Url, RandomAgent, ProxyIp),
        B2BbuilderContainsVulnerabilitiesLocally.medusa(
            Url, RandomAgent, ProxyIp),
        B2BbuilderHeadSQLInjectionVulnerability.medusa(Url, RandomAgent,
                                                       ProxyIp),
        B2BbuilderSQLInjectionVulnerability.medusa(Url, RandomAgent, ProxyIp),
        B2BbuilderSQLInjectionVulnerability2.medusa(Url, RandomAgent, ProxyIp),
        B2BbuilderSQLInjectionVulnerability3.medusa(Url, RandomAgent, ProxyIp),
        B2BbuilderSQLInjectionVulnerability4.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="B2Bbuilder plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass
Esempio n. 20
0
def Main(Url, FileName, Values, ProxyIp):
    WriteFiles = WriteFile(FileName)  # 声明调用类集合中的WriteFile类,并传入文件名字(这一步是必须的)
    ua = UserAgentS(Values)  #传入用户输入用户指定的浏览器头
    RandomAgent = ua.UserAgent()  # 获取生成的头文件

    Medusa = [
        Seeyou_a8_logs_disclosure.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_cm_info_content_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_ehr_ELTextFile.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_fe_treeXml_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_getemaildata_fileread.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_icc_struts2.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_multi_union_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_NCFindWeb_fileread.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_status_default_pwd.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_test_sqli.medusa(Url, RandomAgent, ProxyIp),
        Seeyou_user_ids_sqli.medusa(Url, RandomAgent, ProxyIp),
    ]
    try:
        for i in tqdm(Medusa, ascii=True, desc="Seeyou plugin progress"):
            WriteFiles.Write(str(i))
    except:
        pass