We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
批量导入url扫描 -f , 输入命令无效果
The text was updated successfully, but these errors were encountered:
批量扫描不成功
____ /``` ____ _ _ | _ \ /|p|\ / | | | ___ _ __ ___ | | ___ _ __ | |) | |w| | | | ' \ / _ | '_ ` _ | '_ \ / _ \ '| | /| |n| | | | |) | () | | | | | | |) | __/ | || _/ _| |./ _/|| || ||./ __|_|
{https://github.com/tr0uble-mAker/POC-bomber} Version: RedTeam 3.0
用法: 获取poc/exp信息: python3 pocbomber.py --show 单目标检测: python3 pocbomber.py -u http://xxx.xxx.xx 批量检测: python3 pocbomber.py -f url.txt -o report.txt 指定poc检测: python3 pocbomber.py -f url.txt --poc="thinkphp2_rce.py" exp攻击模式: python3 pocbomber.py -u 目标url --poc="指定poc文件" --attack 参数: -u --url 目标url -f --file 指定目标url文件 -o --output 指定生成报告的文件(默认不生成) -p --poc 指定单个或多个poc进行检测, 直接传入poc文件名, 多个poc用(,)分开 -t --thread 指定线程池最大并发数量(默认30) -to --timeout 指定poc最大超时时间(默认15s) -d --delay 指定poc休眠时间(默认0s) --show 展示poc/exp详细信息 --attack 使用poc文件中的exp进行攻击 --dnslog 使用dnslog平台检测无回显漏洞
Sorry, something went wrong.
No branches or pull requests
批量导入url扫描 -f , 输入命令无效果
The text was updated successfully, but these errors were encountered: