From d1311a4f857c22abe61c456db388ca030450c91c Mon Sep 17 00:00:00 2001 From: MD15 Date: Mon, 1 Feb 2021 10:38:58 +0700 Subject: [PATCH] Daffa / Fixing minor bugs in tools --- CSRF PoC Generator/index.html | 2 +- Clickjacking/README.md | 2 +- Clickjacking/index.html | 11 +- .../{index.php => index.html} | 0 Google Maps API Scanner/result.php | 202 +++++++++++------- Laravel Bug Scanner/result.php | 86 +++++--- Mass Find Configuration File/laravel.sh | 18 ++ .../zend.sh | 2 +- .../laravel.sh | 0 .../wordpress.sh | 0 README.md | 2 +- WordPress Bug Scanner/result.php | 5 +- 12 files changed, 209 insertions(+), 121 deletions(-) rename Google Maps API Scanner/{index.php => index.html} (100%) create mode 100644 Mass Find Configuration File/laravel.sh rename {Mass Find Logs => Mass Find Configuration File}/zend.sh (90%) rename {Mass Find Logs => Mass Find Logs File}/laravel.sh (100%) rename {Mass Find Logs => Mass Find Logs File}/wordpress.sh (100%) diff --git a/CSRF PoC Generator/index.html b/CSRF PoC Generator/index.html index 076670f..2aa6486 100644 --- a/CSRF PoC Generator/index.html +++ b/CSRF PoC Generator/index.html @@ -2,7 +2,7 @@ - CSRF PoC Generator ~ MD15 + CSRF PoC Generator ~ Daffainfo diff --git a/Clickjacking/README.md b/Clickjacking/README.md index fc53ac3..91a70ee 100644 --- a/Clickjacking/README.md +++ b/Clickjacking/README.md @@ -1,3 +1,3 @@ # Clickjacking ![Preview](https://i.ibb.co/9HcRVD8/image.png) -[Live Preview](https://md15.github.io/clickjacking) +[Live Preview](https://daffainfo.github.io/Bug-Bounty-Tools/Clickjacking) diff --git a/Clickjacking/index.html b/Clickjacking/index.html index ffde43d..6c1755d 100644 --- a/Clickjacking/index.html +++ b/Clickjacking/index.html @@ -4,6 +4,11 @@ +
@@ -14,11 +19,11 @@ Add http:// or https:// in the beginning
- + + + + + + +
+

Results

+
Staticmap API
+ API key is vulnerable for Staticmap API

"; + echo "Staticmap API"; + } else if ($yourProducts[0] == 403) { + echo "

API key is not vulnerable for Staticmap API

"; + } + ?> +
Streetview API
+ API key is vulnerable for Streetview API

"; + echo "Streetview API"; + } else if ($yourProducts[1] == 403) { + echo "

API key is not vulnerable for Streetview API

"; + } + ?> +
Embed API
+ API key is vulnerable for Embed API

"; + echo "Embed API"; + } else if ($yourProducts[2] == 403) { + echo "

API key is not vulnerable for Embed API

"; + } + ?> +
Directions API
+ API key is vulnerable for Directions API

"; + echo "Directions API"; + } else if ($yourProducts[3] == 200) { + echo "

API key is not vulnerable for Directions API

"; + } + ?> +
Geocoding API
+ API key is vulnerable for Geocoding API

"; + echo "Geocoding API"; + } else if ($yourProducts[4] == 200) { + echo "

API key is not vulnerable for Geocoding API

"; + } + ?> +
Matrix API
+ API key is vulnerable for Matrix API

"; + echo "Matrix API"; + } else if ($yourProducts[5] == 200) { + echo "

API key is not vulnerable for Matrix API

"; + } + ?> +
Find Place from Text API
+ API key is vulnerable for Find Place from Text API

"; + echo "Find Place from Text API"; + } else if ($yourProducts[6] == 200) { + echo "

API key is not vulnerable for Find Place from Text API

"; + } + ?> +
Autocomplete API
+ API key is vulnerable for Autocomplete API

"; + echo "Autocomplete API"; + } else if ($yourProducts[7] == 200) { + echo "

API key is not vulnerable for Autocomplete API

"; + } + ?> +
Elevation API
+ API key is vulnerable for Elevation API

"; + echo "Elevation API"; + } else if ($yourProducts[7] == 200) { + echo "

API key is not vulnerable for Elevation API

"; + } + ?> +
Timezone API
+ API key is vulnerable for Timezone API

"; + echo "Timezone API"; + } else if ($yourProducts[9] == 200) { + echo "

API key is not vulnerable for Timezone API

"; + } + ?> +
Roads API
+ API key is vulnerable for Roads API

"; + echo "Roads API"; + } else if (strpos($yourProducts[10], '403') === false) { + echo "

API key is not vulnerable for Roads API

"; + } + ?> + + \ No newline at end of file diff --git a/Laravel Bug Scanner/result.php b/Laravel Bug Scanner/result.php index 701edda..dc33273 100644 --- a/Laravel Bug Scanner/result.php +++ b/Laravel Bug Scanner/result.php @@ -1,5 +1,5 @@ -// var_dump($listUrl[0]); - -if ($listUrl[0] == "200") { - echo "

.env exposed

"; - echo ''.$url.'
'; - echo "==========================================="; -} -else if ($listUrl[0] != "200") { - echo "

.env not exposed


"; - echo "==========================================="; -} - -if ($listUrl[1] == "200") { - echo "

Logs exposed

"; - echo ''.$url2.'
'; - echo "==========================================="; -} -else if ($listUrl[1] != "200") { - echo "

Logs file not exposed


"; - echo "==========================================="; -} - -if ($listUrl[2] == "405") { - echo '

Debug mode enabled

'; - echo ''.$url3.'
'; - echo "==========================================="; -} -else if ($listUrl[2] != "405") { - echo "

Debug mode in ".$input." disabled


"; - echo "==========================================="; -} - -?> \ No newline at end of file + + + + Result Laravel + + + + + + + +
+

Results

+
.env File
+ .env exposed

"; + echo ''.$url.'
'; + } + else if ($listUrl[0] != "200") { + echo "

.env not exposed


"; + } + ?> +
Logs file
+ Logs exposed

"; + echo ''.$url2.'
'; + } + else if ($listUrl[1] != "200") { + echo "

Logs file not exposed


"; + } + ?> +
Debug mode
+ Debug mode enabled

'; + echo ''.$url3.'
'; + } + else if ($listUrl[2] != "405") { + echo "

Debug mode in ".$input." disabled


"; + } + ?> \ No newline at end of file diff --git a/Mass Find Configuration File/laravel.sh b/Mass Find Configuration File/laravel.sh new file mode 100644 index 0000000..ba2355b --- /dev/null +++ b/Mass Find Configuration File/laravel.sh @@ -0,0 +1,18 @@ +#!/bin/bash +# Find Laravel Configuration File Mass Scanner +LISTS=$1 + +if [[ ! -f ${LISTS} ]]; then + echo "ERROR: ${LISTS} not found" + echo "usage: bash $0 list.txt" + exit +fi + +for SITE in $(cat $LISTS); +do + if [[ $(curl --connect-timeout 3 --max-time 3 -kLs "${SITE}/.env" ) =~ 'DB_DATABASE' ]]; then + echo -e "\e[32m[+] FOUND: ${SITE}/.env" + else + echo -e "\e[31m[-] NOT FOUND: ${SITE}" + fi +done diff --git a/Mass Find Logs/zend.sh b/Mass Find Configuration File/zend.sh similarity index 90% rename from Mass Find Logs/zend.sh rename to Mass Find Configuration File/zend.sh index 8bfcc34..144bbb4 100644 --- a/Mass Find Logs/zend.sh +++ b/Mass Find Configuration File/zend.sh @@ -1,5 +1,5 @@ #!/bin/bash -# Log Zend Mass Scanner +# Find Zend Configuration File Mass Scanner LISTS=$1 if [[ ! -f ${LISTS} ]]; then diff --git a/Mass Find Logs/laravel.sh b/Mass Find Logs File/laravel.sh similarity index 100% rename from Mass Find Logs/laravel.sh rename to Mass Find Logs File/laravel.sh diff --git a/Mass Find Logs/wordpress.sh b/Mass Find Logs File/wordpress.sh similarity index 100% rename from Mass Find Logs/wordpress.sh rename to Mass Find Logs File/wordpress.sh diff --git a/README.md b/README.md index 971a2cb..8826443 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,2 @@ # BugBounty -Tools for Bug Bounty +Random tools for Bug Bounty \ No newline at end of file diff --git a/WordPress Bug Scanner/result.php b/WordPress Bug Scanner/result.php index 34c72ed..ea3fcf6 100644 --- a/WordPress Bug Scanner/result.php +++ b/WordPress Bug Scanner/result.php @@ -1,4 +1,5 @@ Username Wordpress "; echo "".$nomer++.""; echo "".$json[$i]["slug"]."";