class WebXploit(): """ """ def __init__(self): self.recon_headers = Headers() self.recon_cookies = Cookies() self.recon_methods = HTTPMethods() self.recon_others = Others() self.sql = Sql_injection() self.crlf = Crlf_injection() self.clickjacking = Clickjacking() def launch(self): os.system("toilet -F metal WebXploit - Recon") def get_headers(self, target): self.recon_headers.execute_all_func(target) def get_cookies(self, target): self.recon_cookies.execute_all_func(target) def execute_random_vulns(self, target): self.recon_others.execute_all_func(target) def get_HTTP_methods(self, target): self.recon_methods.test_allowed_methods(target)
def __init__(self): self.recon_headers = Headers() self.recon_cookies = Cookies() self.recon_methods = HTTPMethods() self.recon_others = Others() self.sql = Sql_injection() self.crlf = Crlf_injection() self.clickjacking = Clickjacking()
class WebXploit(): def __init__(self): self.target_url = "" self.target_port = "" self.target_host = "" self.logger = logger self.recon_headers = Headers() self.recon_cookies = Cookies() self.recon_methods = HTTPMethods() self.recon_others = Others() self.sql = Sql_injection() self.crlf = Crlf_injection() self.host = Host_injection() self.apache = Apache2_tests() self.wordpress = Wordpress() self.Print = Print() def parse_target(self, target): try: self.target_url = target flag = urlparse(target) self.target_host = flag.scheme + "://" + flag.netloc print("Target"+str(self.target_host)) self.target_port = flag.port except Exception as e: self.logger.error_log(e) self.Print.printer(None, self.target_url, None) def launch(self): os.system("toilet -F metal WebXploit - Recon") def get_headers(self, target): self.recon_headers.execute_all_func(self.target_url) def get_cookies(self, target): self.recon_cookies.execute_all_func(target) def execute_random_vulns(self, target): self.recon_others.execute_all_func(target) def get_HTTP_methods(self, target): self.recon_methods.test_allowed_methods(target)
class WebXploit(): def __init__(self): self.target_url = "" self.target_port = "" self.target_host = "" self.logger = logger self.recon_headers = Headers() self.recon_cookies = Cookies() self.recon_methods = HTTPMethods() self.recon_others = Others() self.sql = Sql_injection() self.crlf = Crlf_injection() self.host = Host_injection() self.apache = Apache2_tests() self.wordpress = Wordpress() self.Print = Print() def parse_target(self, target): try: self.target_url = target flag = urlparse(target) self.target_host = flag.scheme + "://" + flag.netloc print("Target" + str(self.target_host)) self.target_port = flag.port except Exception as e: self.logger.error_log(e) self.Print.printer(None, self.target_url, None) def launch(self): os.system("toilet -F metal WebXploit - Recon") def get_headers(self, target): self.recon_headers.execute_all_func(self.target_url) def get_cookies(self, target): self.recon_cookies.execute_all_func(target) def execute_random_vulns(self, target): self.recon_others.execute_all_func(target) def get_HTTP_methods(self, target): self.recon_methods.test_allowed_methods(target)
def __init__(self): self.target_url = "" self.target_port = "" self.target_host = "" self.logger = logger self.recon_headers = Headers() self.recon_cookies = Cookies() self.recon_methods = HTTPMethods() self.recon_others = Others() self.sql = Sql_injection() self.crlf = Crlf_injection() self.host = Host_injection() self.apache = Apache2_tests() self.wordpress = Wordpress() self.Print = Print()