From 964d186f15ae888b5d0e49096b8e17c62eed3d51 Mon Sep 17 00:00:00 2001 From: rpkr <13591644403@139.com> Date: Fri, 29 Nov 2019 21:37:22 +0800 Subject: [PATCH] [+]Add: search_exploits --- .gitignore | 2 ++ README.md | 10 ++++++++++ moon.py | 6 +++++- search_exploits/Main_search_exploits.py | 10 ++++++++++ search_exploits/__init__.py | 1 + search_exploits/search_exploit.py | 15 +++++++++++++++ 6 files changed, 43 insertions(+), 1 deletion(-) create mode 100644 search_exploits/Main_search_exploits.py create mode 100644 search_exploits/__init__.py create mode 100644 search_exploits/search_exploit.py diff --git a/.gitignore b/.gitignore index c272349..6629290 100644 --- a/.gitignore +++ b/.gitignore @@ -8,3 +8,5 @@ __pycache__/ *.xml *.iml +*.log +.vscode/settings.json diff --git a/README.md b/README.md index 5558d47..60ae084 100644 --- a/README.md +++ b/README.md @@ -123,3 +123,13 @@ - js代码中敏感信息收集 # 主要参考 By Threezh1 > moon.py -u js + +## search_exploits + +- 在 exploitalert 中搜索某中间件存在的历史漏洞 + +> moon.py -u exploits xxxxxx + +![search_exploits](https://raw.githubusercontent.com/1120362990/Paper/master/images/vulnerability-list-images/search_exploits.png) + +请勿用于违法行为,后果自负。 diff --git a/moon.py b/moon.py index 4ccd321..bac8f68 100644 --- a/moon.py +++ b/moon.py @@ -19,6 +19,8 @@ import bf_dicts.Main_bf import thinkphp.Main_thinkphp import memcache_vuln.Main_memcache_vuln import js_find.Main_js_find +import search_exploits.Main_search_exploits + if __name__ == "__main__": @@ -43,7 +45,7 @@ modul:js pass else: sys.argv[3] = sys.argv[3][0:-1] - print('[*]检测地址:'+sys.argv[3]) + print('[*]目标:'+sys.argv[3]) if sys.argv[2] == 'tomcat': tomcat.Main_tomcat.exec(sys.argv[3]) @@ -81,6 +83,8 @@ modul:js memcache_vuln.Main_memcache_vuln.exec(sys.argv[3]) elif sys.argv[2] == 'js': js_find.Main_js_find.exec(sys.argv[3]) + elif sys.argv[2] == 'exploits': + search_exploits.Main_search_exploits.exec(sys.argv[3]) else: print(''' diff --git a/search_exploits/Main_search_exploits.py b/search_exploits/Main_search_exploits.py new file mode 100644 index 0000000..83a1a98 --- /dev/null +++ b/search_exploits/Main_search_exploits.py @@ -0,0 +1,10 @@ +# -*- coding: utf-8 -*- +import search_exploits.search_exploit + + +def exec(URL): + search_exploits.search_exploit.attack(URL) + + +if __name__ == "__main__": + exec() diff --git a/search_exploits/__init__.py b/search_exploits/__init__.py new file mode 100644 index 0000000..7c68785 --- /dev/null +++ b/search_exploits/__init__.py @@ -0,0 +1 @@ +# -*- coding: utf-8 -*- \ No newline at end of file diff --git a/search_exploits/search_exploit.py b/search_exploits/search_exploit.py new file mode 100644 index 0000000..501a663 --- /dev/null +++ b/search_exploits/search_exploit.py @@ -0,0 +1,15 @@ +# -*- coding: utf-8 -*- +import requests + + +def attack(URL): + print(f'[+]开始在exploitalert中搜索 {URL} 存在的历史漏洞。') + payload = {'name': URL} + r = requests.get("https://www.exploitalert.com/api/search-exploit", params=payload) + for json in r.json(): + print(json) + print(f'[+]在exploitalert中搜索 {URL} 存在的历史漏洞结束。') + + +if __name__ == "__main__": + attack()