forked from Cl0udG0d/SZhe_Scan
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathBugScan.py
57 lines (49 loc) · 1.79 KB
/
BugScan.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
from sqlinjection.InjectionIndex import InjectionControl
from XSSBug.XSSCheck import GetXSS
from ComIn.ComCheck import GetComIn
from File_Inclusion.LocalFileInclude import CheckLocalFileInclude
from POCScan import POCScan
class BugScan:
def __init__(self, oldurl, url):
self.url = url
self.oldurl = oldurl
def SQLBugScan(self):
try:
vulnerable, payload, bugdetail = InjectionControl(self.url)
return vulnerable, payload, bugdetail
except Exception as e:
print(e)
return False, None,None
def XSSBugScan(self):
try:
vulnerable, payload, bugdetail = GetXSS(self.url)
return vulnerable, payload, bugdetail
except Exception as e:
print(e)
return False, None, None
def ComInScan(self):
try:
vulnerable, payload, bugdetail = GetComIn(self.url)
return vulnerable, payload, bugdetail
except Exception as e:
print(e)
return False, None, None
def FileIncludeScan(self):
try:
vulnerable, payload, bugdetail = CheckLocalFileInclude(self.url)
return vulnerable, payload, bugdetail
except Exception as e:
print(e)
return False, None, None
def POCScan(self):
try:
POCScan.POCScanConsole(self.oldurl, self.url)
except Exception as e:
print(e)
pass
if __name__ == '__main__':
# test=BugScan('http://testphp.vulnweb.com/listproducts.php?cat=1')
# test=BugScan('http://leettime.net/xsslab1/chalg1.php?name=1')
# print(test.SQLBugScan())
test = BugScan('http://127.0.0.1/Cl0ud.php?page=1')
print(test.FileIncludeScan())