Esempio n. 1
0
 def eyou_rce_callback(self, future):
     resp = future.result()
     if resp:
         if resp['code'] == 200:
             result = resp['text']
             LOGGER.success(result)
         else:
             msg = 'The target ' + str(resp['url']) + ' not vuln !'
             LOGGER.info(msg)
 def spider_callback(self, future):
     resp = future.result()
     status = int(self.get_options('status'))
     try:
         if resp['code'] == status:
             url = resp['url']
             title = re.findall('<title>(.*?)</title>', resp['text'])[0]
             msg = f'{url} - {status} - {title}'
             LOGGER.success(msg)
     except (TypeError, IndexError):
         pass
Esempio n. 3
0
    def rg_uac_passleak_callback(self, future):
        resp = future.result()
        if resp['code'] == 200:
            result = resp['text']
            user = re.findall('"name":"(.*?)"', result)
            password = re.findall('"password":"******"', result)
            for i in range(len(user)):
                msg = f'name:{user[i]},password:{password[i]}'
                LOGGER.success(msg)

        else:
            msg = 'The target ' + str(resp['url']) + ' not vuln !'
            LOGGER.info(msg)
 def tcp_scan_callback(self, future):
     ip, port, status = future.result()
     if status == 'open':
         msg = f'{ip} {port} {status}'
         LOGGER.success(msg)
 def command_reload(self):
     module_metadata = self.module_metadata()
     LOGGER.info(f'Reloading module {module_metadata}...')
     reload_module()
     self.command_back()
     LOGGER.success(f'Reload complete, please use {module_metadata}')