forked from Cl0udG0d/SZhe_Scan
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathBugScan.py
36 lines (29 loc) · 1.23 KB
/
BugScan.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
from sqlinjection.InjectionIndex import InjectionControl
from XSSBug.XSSCheck import GetXSS
from ComIn.ComCheck import GetComIn
from File_Inclusion.LocalFileInclude import CheckLocalFileInclude
from POCScan import POCScan
class BugScan:
def __init__(self,oldurl,url):
self.url=url
self.oldurl=oldurl
def SQLBugScan(self):
vulnerable, payload,bugdetail =InjectionControl(self.url)
return vulnerable,payload,bugdetail
def XSSBugScan(self):
vulnerable, payload,bugdetail=GetXSS(self.url)
return vulnerable, payload,bugdetail
def ComInScan(self):
vulnerable, payload,bugdetail=GetComIn(self.url)
return vulnerable, payload,bugdetail
def FileIncludeScan(self):
vulnerable, payload,bugdetail=CheckLocalFileInclude(self.url)
return vulnerable, payload,bugdetail
def POCScan(self):
POCScan.POCScanConsole(self.oldurl,self.url)
if __name__=='__main__':
# test=BugScan('http://testphp.vulnweb.com/listproducts.php?cat=1')
# test=BugScan('http://leettime.net/xsslab1/chalg1.php?name=1')
# print(test.SQLBugScan())
test=BugScan('http://127.0.0.1/Cl0ud.php?page=1')
print(test.FileIncludeScan())