Files
vulnerability-list/moon.py
2019-11-30 22:10:58 +08:00

126 lines
4.2 KiB
Python
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# -*- coding: utf-8 -*-
import sys
import tomcat.Main_tomcat
import fckeditor.Main_fckeditor
import ipquery.Main_ipquery
import weblogic.Main_weblogic
import iis.Main_iis
import docker_vuln.Main_docker
import redis_vuln.Main_redis
import zabbix_vuln.Main_zabbix
import navigate_vuln.Main_navigate
import gatepass_vuln.Main_gatepass
import ipq.Main_ipq
import spring_vuln.Main_spring
import jboss.Main_jboss
import kindeditor.Main_kindeditor
import durpal.Main_durpal
import bf_dicts.Main_bf
import thinkphp.Main_thinkphp
import memcache_vuln.Main_memcache_vuln
import js_find.Main_js_find
import search_exploits.Main_search_exploits
import activemq_vuln.Main_activemq
if __name__ == "__main__":
#使用说明
if len(sys.argv) < 3 or sys.argv[1]=="-h":
print('''
漏洞检测:
userage: python -u module http://xx.xx.xx.xx:xx
modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor thinkphp memcache actviemq
IP归属查询
userage: python -u module www.xxxxx.com/xx.xx.xx.xx
modulip ipq
Js中敏感信息收集
userage: python -u module http://xx.xx.xx.xx:xx
moduljs
历史漏洞查询:
modul: exploits
''')
#漏洞利用
elif sys.argv[1] == '-u':
# 处理url末尾可能存在的/
if sys.argv[3][-1] != '/':
pass
else:
sys.argv[3] = sys.argv[3][0:-1]
print('[*]目标:'+sys.argv[3])
if sys.argv[2] == 'tomcat':
tomcat.Main_tomcat.exec(sys.argv[3])
elif sys.argv[2] == 'fck':
fckeditor.Main_fckeditor.exec(sys.argv[3])
elif sys.argv[2] == 'ip':
ipquery.Main_ipquery.exec(sys.argv[3])
elif sys.argv[2] == 'weblogic':
weblogic.Main_weblogic.exec(sys.argv[3])
elif sys.argv[2] == 'iis':
iis.Main_iis.exec(sys.argv[3])
elif sys.argv[2] == 'docker':
docker_vuln.Main_docker.exec(sys.argv[3])
elif sys.argv[2] == 'redis':
redis_vuln.Main_redis.exec(sys.argv[3])
elif sys.argv[2] == 'zabbix':
zabbix_vuln.Main_zabbix.exec(sys.argv[3])
elif sys.argv[2] == 'navigate':
navigate_vuln.Main_navigate.exec(sys.argv[3])
elif sys.argv[2] == 'gatepass':
gatepass_vuln.Main_gatepass.exec(sys.argv[3])
elif sys.argv[2] == 'spring':
spring_vuln.Main_spring.exec(sys.argv[3])
elif sys.argv[2] == 'ipq':
ipq.Main_ipq.exec(sys.argv[3])
elif sys.argv[2] == 'jboss':
jboss.Main_jboss.exec(sys.argv[3])
elif sys.argv[2] == 'kindeditor':
kindeditor.Main_kindeditor.exec(sys.argv[3])
elif sys.argv[2] == 'drupal':
durpal.Main_durpal.exec(sys.argv[3])
elif sys.argv[2] == 'thinkphp':
thinkphp.Main_thinkphp.exec(sys.argv[3])
elif sys.argv[2] == 'memcache':
memcache_vuln.Main_memcache_vuln.exec(sys.argv[3])
elif sys.argv[2] == 'js':
js_find.Main_js_find.exec(sys.argv[3])
elif sys.argv[2] == 'exploits':
search_exploits.Main_search_exploits.exec(sys.argv[3])
elif sys.argv[2] == 'activemq':
activemq_vuln.Main_activemq.exec(sys.argv[3])
else:
print('''
漏洞检测:
userage: python -u module http://xx.xx.xx.xx:xx
modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor thinkphp memcache activemq
IP归属查询
userage: python -u module www.xxxxx.com/xx.xx.xx.xx
modulip ipq
Js中敏感信息收集
userage: python -u module http://xx.xx.xx.xx:xx
moduljs
历史漏洞查询:
modul: exploits
''')
elif sys.argv[1] == '-p':
print('[+]检测地址:'+sys.argv[2]+sys.argv[3]+sys.argv[4])
bf_dicts.Main_bf.exec(sys.argv[2],sys.argv[3],sys.argv[4])
else:
print('''
漏洞检测:
userage: python -u module http://xx.xx.xx.xx:xx
modul: tomcat fck weblogic iis docker redis zabbix navigate gatepass kindeditor thinkphp memcache activemq
IP归属查询
userage: python -u module www.xxxxx.com/xx.xx.xx.xx
modulip ipq
Js中敏感信息收集
userage: python -u module http://xx.xx.xx.xx:xx
moduljs
历史漏洞查询:
modul: exploits
''')