├── url.txt ├── PHPStudyMySQLPass.jar ├── README.md └── password3306.txt /url.txt: -------------------------------------------------------------------------------- 1 | http://www.xxx.com 2 | https://www.xxx.com -------------------------------------------------------------------------------- /PHPStudyMySQLPass.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Tas9er/PHPStudyMySQLPass/HEAD/PHPStudyMySQLPass.jar -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | **PHPStudyMySQL弱口令批量爆破验证** 2 | 3 | **Code By:Tas9er** 4 | 5 | 6 | 7 | 警 告 8 | 本工具旨在帮助企业快速定位漏洞修复漏洞,仅限授权安全测试使用 9 | 严格遵守《中华人民共和国网络安全法》,禁止未授权非法攻击站点 10 | 11 | 12 | 13 | 授权测试用例: 14 | 15 | 将企业授权安全测试目标整理后放入url.txt 16 | 17 | java -jar PHPStudyMySQLPass.jar 18 | 19 | 等待系统结束后,存在漏洞的网站以及结果会保存在当前目录下,同时也对企业服务器的安全设备的部署有一定的可用性检测。 20 | 21 | 22 | 23 | -------------------------------------------------------------------------------- /password3306.txt: -------------------------------------------------------------------------------- 1 | root 2 | Passw0rd 3 | admin123 4 | admin888 5 | test 6 | 1q2w3e4r 7 | 1qaz2wsx 8 | qazwsx 9 | 123qwe 10 | 123qaz 11 | 123456qwerty 12 | password123 13 | 1q2w3e 14 | test123 15 | test12345 16 | test123456 17 | q1w2e3r4 18 | mysql 19 | web 20 | 123 21 | 1234 22 | 12345 23 | 123456 24 | admin 25 | pass 26 | password 27 | 1234567 28 | abc123 29 | 111111 30 | 123321 31 | 123123 32 | 12345678 33 | 123456789 34 | 000000 35 | 888888 36 | 123asd 37 | qwer123 38 | P@ssw0rd 39 | Q1W2E3b3 --------------------------------------------------------------------------------