def eyou_rce_callback(self, future): resp = future.result() if resp: if resp['code'] == 200: result = resp['text'] LOGGER.success(result) else: msg = 'The target ' + str(resp['url']) + ' not vuln !' LOGGER.info(msg)
def spider_callback(self, future): resp = future.result() status = int(self.get_options('status')) try: if resp['code'] == status: url = resp['url'] title = re.findall('<title>(.*?)</title>', resp['text'])[0] msg = f'{url} - {status} - {title}' LOGGER.success(msg) except (TypeError, IndexError): pass
def rg_uac_passleak_callback(self, future): resp = future.result() if resp['code'] == 200: result = resp['text'] user = re.findall('"name":"(.*?)"', result) password = re.findall('"password":"******"', result) for i in range(len(user)): msg = f'name:{user[i]},password:{password[i]}' LOGGER.success(msg) else: msg = 'The target ' + str(resp['url']) + ' not vuln !' LOGGER.info(msg)
def tcp_scan_callback(self, future): ip, port, status = future.result() if status == 'open': msg = f'{ip} {port} {status}' LOGGER.success(msg)
def command_reload(self): module_metadata = self.module_metadata() LOGGER.info(f'Reloading module {module_metadata}...') reload_module() self.command_back() LOGGER.success(f'Reload complete, please use {module_metadata}')