[+]Add: search_exploits

This commit is contained in:
rpkr
2019-11-29 21:37:22 +08:00
parent 9c484e72c3
commit 964d186f15
6 changed files with 43 additions and 1 deletions

2
.gitignore vendored
View File

@@ -8,3 +8,5 @@ __pycache__/
*.xml
*.iml
*.log
.vscode/settings.json

View File

@@ -123,3 +123,13 @@
- js代码中敏感信息收集 # 主要参考 <https://threezh1.github.io> By Threezh1
> moon.py -u js <http://xxx.xxx.xxx.xxx:xxxx>
## search_exploits
- 在 exploitalert 中搜索某中间件存在的历史漏洞
> moon.py -u exploits xxxxxx
![search_exploits](https://raw.githubusercontent.com/1120362990/Paper/master/images/vulnerability-list-images/search_exploits.png)
请勿用于违法行为,后果自负。

View File

@@ -19,6 +19,8 @@ import bf_dicts.Main_bf
import thinkphp.Main_thinkphp
import memcache_vuln.Main_memcache_vuln
import js_find.Main_js_find
import search_exploits.Main_search_exploits
if __name__ == "__main__":
@@ -43,7 +45,7 @@ moduljs
pass
else:
sys.argv[3] = sys.argv[3][0:-1]
print('[*]检测地址:'+sys.argv[3])
print('[*]目标:'+sys.argv[3])
if sys.argv[2] == 'tomcat':
tomcat.Main_tomcat.exec(sys.argv[3])
@@ -81,6 +83,8 @@ moduljs
memcache_vuln.Main_memcache_vuln.exec(sys.argv[3])
elif sys.argv[2] == 'js':
js_find.Main_js_find.exec(sys.argv[3])
elif sys.argv[2] == 'exploits':
search_exploits.Main_search_exploits.exec(sys.argv[3])
else:
print('''

View File

@@ -0,0 +1,10 @@
# -*- coding: utf-8 -*-
import search_exploits.search_exploit
def exec(URL):
search_exploits.search_exploit.attack(URL)
if __name__ == "__main__":
exec()

View File

@@ -0,0 +1 @@
# -*- coding: utf-8 -*-

View File

@@ -0,0 +1,15 @@
# -*- coding: utf-8 -*-
import requests
def attack(URL):
print(f'[+]开始在exploitalert中搜索 {URL} 存在的历史漏洞。')
payload = {'name': URL}
r = requests.get("https://www.exploitalert.com/api/search-exploit", params=payload)
for json in r.json():
print(json)
print(f'[+]在exploitalert中搜索 {URL} 存在的历史漏洞结束。')
if __name__ == "__main__":
attack()