vulne = middleware_vulne(target,logger_type,middleware_type = middleware) vulne.analyse() if proxy: proxies = Proxy(target,logger_type) proxy_queue = proxies.executor() if waf: if proxy: proxy = get_proxy(proxy_queue) check_waf(target, logger_type, proxy = proxy) else: check_waf(target, logger_type) module_attack = Attack(target,logger_type,cookie = cookies, subdomain_queue = subdomain_queue,proxy_queue = proxy_queue,file = file_) execution = module_attack.execution quicksliver(execution,threads) print(f"{red}[!!][{time}] Vulnerability scan has finished !{end}")
except Exception: pass if __name__ == '__main__': cerberus = Attack("http://www.ztcc.com","StreamLogger") # target = requester("http://www.weibo.com",None,GET = True) # cerberus.url_extrator(target.text) execut = cerberus.execution # execut() quicksliver(execut,7) # target = "dance.qq.com" # url, data = chambering(target, strike=False) # received = requester(url, data, GET=True, timeout=5) # print(received.headers) # print(received.status_code) # # import requests # res = requests.get() # # p = cerberus.url_extrator(target.text) # while not p.empty(): # print(p.get()) #