plugins: bypass ssl certificate verification. useful when debugging with burp
This commit is contained in:
@@ -4,7 +4,7 @@ from urllib.parse import urlparse
|
||||
|
||||
def commoncrawl(host, page=0):
|
||||
these_params = set()
|
||||
response = requests.get('http://index.commoncrawl.org/CC-MAIN-2020-29-index?url=*.%s&fl=url&page=%s&limit=10000' % (host, page)).text
|
||||
response = requests.get('http://index.commoncrawl.org/CC-MAIN-2020-29-index?url=*.%s&fl=url&page=%s&limit=10000' % (host, page), verify=False).text
|
||||
if response.startswith('<!DOCTYPE html>'):
|
||||
return ([], False, 'commoncrawl')
|
||||
urls = response.split('\n')
|
||||
|
||||
@@ -4,7 +4,7 @@ from urllib.parse import urlparse
|
||||
|
||||
def otx(host, page):
|
||||
these_params = set()
|
||||
data = requests.get('https://otx.alienvault.com/api/v1/indicators/hostname/%s/url_list?limit=50&page=%d' % (host, page)).json()
|
||||
data = requests.get('https://otx.alienvault.com/api/v1/indicators/hostname/%s/url_list?limit=50&page=%d' % (host, page), verify=False).json()
|
||||
if 'url_list' not in data:
|
||||
return (these_params, False, 'otx')
|
||||
for obj in data['url_list']:
|
||||
|
||||
@@ -19,7 +19,8 @@ def wayback(host, page):
|
||||
response = requests.get(
|
||||
'http://web.archive.org/cdx/search?filter=mimetype:text/html&filter=statuscode:200',
|
||||
params=payload,
|
||||
headers=headers
|
||||
headers=headers,
|
||||
verify=False
|
||||
).text
|
||||
if not response:
|
||||
return (these_params, False, 'wayback')
|
||||
|
||||
Reference in New Issue
Block a user