def run(): if currentProgram.getExecutableFormat() != ElfLoader.ELF_NAME: popup('Not an ELF file, cannot continue') return arch = 'amd64' abi = 'default' Constants(currentProgram, currentSelection, monitor, state, arch, abi)
def run(): if currentProgram.getExecutableFormat() != ElfLoader.ELF_NAME: popup('Not an ELF file, cannot continue') return arch = getDebianName(currentProgram) if arch == None: popup('Architecture not defined') return abi = 'default' if arch not in DEFAULT_ABIS else DEFAULT_ABIS[arch] obj = Constants(currentProgram, currentSelection, monitor, state, arch, abi)
import os import sys import re import threading from termcolor import cprint, colored from pyfiglet import figlet_format from lib.Utils import Utils from lib.Constants import Constants from lib.SocketConnection import SocketConnection from pathlib import Path import colorama colorama.init() utils = Utils() constants = Constants() # Argument parser parser = argparse.ArgumentParser( description='HTTP Request Smuggling vulnerability detection tool') parser.add_argument("-u", "--url", help="set the target url") parser.add_argument("-urls", "--urls", help="set list of target urls, i.e (urls.txt)") parser.add_argument("-t", "--timeout", help="set socket timeout, default - 10") parser.add_argument("-m", "--method", help="set HTTP Methods, i.e (GET or POST), default - POST") parser.add_argument( "-r", "--retry",